A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 1
Joined: Dec 2009
31-12-2009, 10:03 PM

could u pls send me more details about dis topic...i find it interesitng 2 take it 4 my project and implimentation subj..
Active In SP

Posts: 247
Joined: Jan 2010
04-01-2010, 08:02 PM

A wireless ad-hoc network is a network which does not use any infrastructure such as access points or base station. Instead, the mobile nodes forward packets to each others, allowing communication among nodes outside wireless transmission range.It is formed spontaneously without any preplanning. Multicasting is a fundamental communication paradigm for group-oriented applications such as secure conferencing, visual broadcasts, military command and control, discussion forums, frequent stock updates, pay per view programs, and advertising. we present a route discovery protocol that mitigates the detrimental effects of such malicious
behavior, as to provide correct connectivity information. This protocol ensures that fabricated, compromised, or replayed route replies would either be rejected or never reach back the querying node.Also, the protocol responsiveness is
safeguarded under different types of attacks that exploit the routing
protocol itself.no assumption is made regarding the intermediate nodes,which may exhibit arbitrary and malicious behavior.
The insecurity of the wireless links, energy constraints, relatively poor physical protection of nodes in a hostile environment, and the vulnerability of statically configured security schemes are the challenges for the provision of security services in the MANET(Mobile Ad Hoc Networks).

We focus on bi-directional communication between a pair of nodes. A security association (SA) between the source node S and the destination node T is assumed. The trust relationship could be initiated by the
knowledge of the public key of the other end. The two nodes can negotiate a shared secret key verify that the principal that participated
in the exchange was indeed the trusted node using the SA. The use of SA is justified, because the end hosts
chose to employ a secure communication scheme and,consequently, should be able to authenticate each other.Although a set of
malicious nodes may mount attacks against the protocol
concurrently, we assume that nodes are not capable of
colluding within one step of the protocol execution within the period of broadcasting one query and reception of
the corresponding replies.

The scheme introduced here combats attacks that disrupt the
route discovery process and guarantees, the acquisition of correct
topological information, under the above assumptions, and it also incorporates mechanisms to safeguard the network functionality from attacks
exploiting the protocol itself to degrade network
performance and lead to DoS(denial of service).
The source node S initiates the route discovery, by
constructing a route request packet identified by a pair of
identifiers: a query sequence number and a random query
identifier.Message Authentication
Code (MAC) is calculated from the parameters source and destination and query identifiers.(IP addresses) of the traversed intermediate nodes are
accumulated in the route request packet.
Intermediate nodes relay route requests, so that one or
more query packets arrive at the destination, and maintain a
limited amount of state information regarding the relayed
queries, so that previously seen route requests are discarded.The route requests reach the destination T, which
constructs the route replies and it calculates a MAC and returns the packet to S over the reverse of the route accumulated in the request packet.The
querying node validates the replies and updates its topology

full seminar and presentation report pdf:

.pdf   Novel Secure Routing protocol for Mobile Ad hoc Networks.pdf (Size: 111.51 KB / Downloads: 126)
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 1,124
Joined: Jun 2010
04-10-2010, 04:41 PM

for more information about this topic please follow the link:

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Rainbow A novel 3 phase to 5 phase transformation using a special transformer connection ujvala 10 3,416 07-10-2015, 01:05 PM
Last Post: Guest
  Privacy-Preserving Public Auditing for Secure Cloud Storage Guest 7 1,826 19-07-2014, 03:54 PM
Last Post: mkaasees
  secure and practical outsourcing of linear programming in cloud computing Reference: ajh 2 623 11-06-2014, 10:32 AM
Last Post: seminar project topic
  secure and practical outsourcing of linear programming in cloud computing Guest 5 1,053 10-06-2014, 10:29 AM
Last Post: java projects
  Wireless Sensor Network Security model using Zero Knowledge Protocol Guest 1 1,008 28-02-2014, 01:40 AM
Last Post: mspadmini19
  Secure and Practical Outsourcing of Linear Programming in Cloud Computing jp16586 15 7,568 13-02-2014, 07:53 PM
Last Post: Guest
Last Post: seminar project topic
  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Guest 0 371 16-11-2013, 10:41 AM
Last Post: Guest
  Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks surya prakash 5 2,131 12-09-2013, 09:59 AM
Last Post: seminar projects maker
Last Post: study tips