Dynamic Routing with Security Considerations
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science topics
Active In SP
**

Posts: 610
Joined: Jun 2010
#1
01-07-2010, 04:38 PM


Dynamic Routing with Security Considerations

Modules:

1. Network Module
2. Dynamic Routing
3. Randomization Process
4. Routing Table Maintenance
5. Load on Throughput

Module Description:

1. Network Module

Client-server computing or networking is a distributed application architecture that partitions tasks or workloads between service providers (servers) and service requesters, called clients. Often clients and servers operate over a computer network on separate hardware. A server machine is a high-performance host that is running one or more server programs which share its resources with clients. A client also shares any of its resources; Clients therefore initiate communication sessions with servers which await (listen to) incoming requests.

2. Dynamic Routing

To propose a distance-vector based algorithm for dynamic routing to improve the security of data transmission. We propose to rely on existing distance information exchanged among neighboring nodes (referred to as routers as well in this paper) for the seeking of routing paths. In many distance-vector-based implementations, e.g., those based on RIP, each node maintains a routing table in which each entry is associated with a tuple, and Next hop denote some unique destination node, an estimated minimal cost to send a packet to t, and the next node along the minimal-cost path to the destination node, respectively.


3. Randomization Process

The delivery of a packet with the destination at a node. In order to minimize the probability that packets are eavesdropped over a specific link, a randomization process for packet deliveries, in this process, the previous next-hop for the source node s is identified in the first step of the process. Then, the process randomly picks up a neighboring node as the next hop for the current packet transmission. The exclusion for the next hop selection avoids transmitting two consecutive packets in the same link, and the randomized pickup prevents attackers from easily predicting routing paths for the coming transmitted packets.

4. Routing Table Maintenance

In the network be given a routing table and a link table. We assume that the link table of each node is constructed by an existing link discovery protocol, such as the Hello protocol in. On the other hand, the construction and maintenance of routing tables are revised based on the well-known Bellman-Ford algorithm.



5. Load on Throughput

Investigate the effect of traffic load on throughput for our proposed DDRA; the traffic is also generated based on variable-bit-rate applications such as file transfers over Transmission Control Protocol (TCP). The average packet size is 1,000 bytes, and source-destination pairs are chosen randomly with uniform probabilities.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
vasanthi.v
Active In SP
**

Posts: 1
Joined: Dec 2010
#2
31-12-2010, 03:36 PM

what is the previos paper for "Dynamic routing with security considerations"
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#3
01-01-2011, 09:55 AM

if you want to know some more information on Dynamic routing with security considerations , please go through the following thread.

topicideashow-to-dynamic-routing-with-security-considerations-full-report?pid=31233#pid31233
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#4
22-03-2011, 04:26 PM

PRESENTED BY:
E.PRASAD BABU
G.SRIRAMULU
S.SRAVANI
P.KARTIKEY


.pptx   drp.pptx (Size: 131.12 KB / Downloads: 91)
INTRODUCTION
 In the past decades, various security-enhanced measures have been proposed to improve the security of data transmission over public networks.
 Existing work on security-enhanced data transmission includes the designs of cryptography algorithms and system infrastructures and Security enhanced routing methods.
 Their common objectives are often to defeat various threats over the Internet, including eavesdropping, spoofing, session hijacking, etc.
 Among many well-known designs for cryptography based systems, the IP Security (IPSec) and the Secure Socket Layer (SSL) are popularly supported and implemented in many systems and platforms.
 Although IPSec and SSL do greatly improve the security level for data transmission, they unavoidably introduce substantial overheads, especially on gateway/host performance and effective network bandwidth.
 The data transmission overhead is 5 cycles/byte over an Intel Pentium II with the Linux IP stack alone, and the overhead increases to 58 cycles/byte
 Another alternative for security-enhanced data transmissions to dynamically route packets between each source and its destination so that the chance for system break-in, due to successful interception of consecutive packets for a session, is slim.
 The intention of security-enhanced routing is different from the adopting of multiple paths between a source and a destination to increase the throughput of data transmission.
 The set of multiple paths between each source and its destination is determined in an online fashion, and extra control message exchanging is needed.
 They proposed a traffic dispersion scheme to reduce the probability of eavesdropped information along the used paths provided that the set of data delivery paths is discovered in advance.
 Although excellent research results have been proposed for security-enhanced dynamic routing, many of them rely on the discovery of multiple paths either in an online or offline fashion.
 On the other hand, the discovery of paths in an offline fashion might not be suitable to networks with a dynamic changing configuration.
 we will propose a dynamic routing algorithm to provide security enhanced
OBJECTIVE
 Data delivery without introducing any extra control messages.
 The objective of this work is to explore a security enhanced dynamic routing algorithm based on distributed routing information widely supported in existing wired and wireless networks.
ABSTRACT
 Security has become one of the major issues for data communication over wired and wireless networks.
 Different from the past work on the designs of cryptography algorithms and system infrastructures, An analytic study on the proposed algorithm is presented, and experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm.
Algorithm Description
 A distance-vector-based algorithm for dynamic routing to improve the security of data transmission.
 We propose to rely on existing distance information exchanged among neighboring nodes (referred to as routers as well in this paper) for the seeking of routing paths.
 In many distance-vector-based implementations, e.g., those based on RIP, each node Ni maintains a routing table in which each entry is associated with a tuple and Next hop denote some unique destination node.
 An estimated minimal cost to send a packet to t, and the next node along the minimal-cost path to the destination node, respectively.
 Routing Table
 With the objective of this work in the randomization of routing paths, the routing table is extended to accommodate our security-enhanced dynamic routing algorithm.
 It maintains set of node candidates for the next hop.
 And a set of tuples, records the history for packet deliveries through the node Ni to the destination node t.
 Extended routing table
EXISTING SYSTEM
 Existing work on security-enhanced data transmission includes the designs of cryptography algorithms and system infrastructures and security-enhanced routing methods.
 Among many well-known designs for cryptography based systems, the IP Security (IPSec) and the Secure Socket Layer (SSL) are popularly supported and implemented in many systems and platforms.
 The data transmission overhead is 5 cycles/byte over an Intel Pentium II with the Linux IP stack alone, and the overhead increases to 58 cycles/byte when Advanced Encryption Standard (AES) is adopted for encryption/decryption for IPSec.
PROPOSED SYSTEM
 We will propose a dynamic routing algorithm that could randomize delivery paths for data transmission.
 The algorithm is easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks, without introducing extra control messages.
CONCLUSION
 This paper has proposed a security-enhanced dynamic routing algorithm based on distributed routing information widely supported in existing networks.
 The proposed algorithm is easy to implement and compatible with popular routing protocols, such as RIP and DSDV, over existing infrastructures.
Reply
harika ammineni
Active In SP
**

Posts: 1
Joined: Dec 2011
#5
09-12-2011, 08:35 PM

i just want to know the test cases,future scope and cost estimation for dynamic routing with security considerations in which distance vector routing algorithm is used.the project and implimentation contains the modules like server,centralized server,client.plzzzzzz
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#6
10-12-2011, 09:34 AM


to get information about the topic"Dynamic Routing with Security Considerations" refer the link bellow


topicideashow-to-dynamic-routing-with-security-considerations--11716?pid=59666#pid59666
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#7
16-01-2012, 12:15 PM



to get the topic dynamic routing with security considerations full report , ppt and related topics refer the link bellow
topicideashow-to-dynamic-routing-with-security-considerations-full-report

topicideashow-to-dynamic-routing-with-security-considerations--11716

topicideashow-to-dynamic-routing-with-security-considerations-full-report?page=4


to get the topic dynamic routing with security considerations full report , ppt and related topics refer the link bellow
topicideashow-to-dynamic-routing-with-security-considerations-full-report

topicideashow-to-dynamic-routing-with-security-considerations--11716

topicideashow-to-dynamic-routing-with-security-considerations-full-report?page=4
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Implementation of ATM Security by Using Fingerprint recognition and GSM seminar tips 1 794 01-04-2016, 04:08 PM
Last Post: mkaasees
  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing PPT project girl 1 1,009 21-10-2015, 01:52 PM
Last Post: Guest
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,747 09-12-2014, 09:25 PM
Last Post: Guest
  SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY ppt project girl 5 2,501 10-06-2014, 11:39 AM
Last Post: java projects
  Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Abstract seminar projects maker 2 760 08-03-2014, 12:43 PM
Last Post: seminar project topic
  Wireless Sensor Network Security model using Zero Knowledge Protocol project uploader 1 1,037 28-02-2014, 01:44 AM
Last Post: mspadmini19
  Enhancing the Trust of Internet Routing With Lightweight Route Attestation Report project girl 2 951 10-01-2014, 04:16 PM
Last Post: seminar project topic
  Identifying Evolving Groups in Dynamic Multimode Networks Projects9 2 1,140 30-09-2013, 10:54 AM
Last Post: Guest
  PERSONALISED SEARCH ENGINE WITH DYNAMIC UPDATION pdf seminar projects maker 0 298 28-09-2013, 12:28 PM
Last Post: seminar projects maker
  Web based java compiler online with security access Report seminar projects maker 0 538 27-09-2013, 02:14 PM
Last Post: seminar projects maker