Dynamic Routing with Security Considerations
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science topics
Active In SP
**

Posts: 610
Joined: Jun 2010
#1
02-07-2010, 04:45 PM


Dynamic Routing with Security Considerations

Abstract:


Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, An analytic study on the proposed algorithm is presented, and experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm.

Algorithm / Technique used:

Distance-vector-based algorithm for dynamic routing.

Algorithm Description:

A distance-vector-based algorithm for dynamic routing to improve the security of data transmission. We propose to rely on existing distance information exchanged among neighboring nodes (referred to as routers as well in this paper) for the seeking of routing paths. In many distance-vector-based implementations, e.g., those based on RIP, each node Ni maintains a routing table in which each entry is associated with a tuple and Next hop denote some unique destination node, an estimated minimal cost to send a packet to t, and the next node along the minimal-cost path to the destination node, respectively.

Existing System:

Existing work on security-enhanced data transmission includes the designs of cryptography algorithms and system infrastructures and security-enhanced routing methods. Their common objectives are often to defeat various threats over the Internet, including eavesdropping, spoofing, session hijacking, etc. Among many well-known designs for cryptography based systems, the IP Security (IPSec) and the Secure Socket Layer (SSL) are popularly supported and implemented in many systems and platforms. Although IPSec and SSL do greatly improve the security level for data transmission, they unavoidably introduce substantial overheads, especially on gateway/host performance and effective network bandwidth. For example, the data transmission overhead is 5 cycles/byte over an Intel
Pentium II with the Linux IP stack alone, and the overhead increases to 58 cycles/byte when Advanced Encryption Standard (AES) is adopted for encryption/decryption for IPSec.


Proposed System:

We will propose a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks, without introducing extra control messages.

Hardware Requirements

¢ SYSTEM : Pentium IV 2.4 GHz
¢ HARD DISK : 40 GB
¢ FLOPPY DRIVE : 1.44 MB
¢ MONITOR : 15 VGA colour
¢ MOUSE : Logitech.
¢ RAM : 256 MB
¢ KEYBOARD : 110 keys enhanced.

Software Requirements


¢ Operating system :- Windows XP Professional
¢ Front End : - Java Technology.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
project report helper
Active In SP
**

Posts: 2,270
Joined: Sep 2010
#2
01-10-2010, 11:08 AM


.pdf   Dynamic%20Routing%20with%20Security%20Considerations.pdf (Size: 2.05 MB / Downloads: 70)

Dynamic Routing with Security Considerations



Chin-Fu Kuo, Member, IEEE, Ai-Chun Pang, Member, IEEE, and Sheng-Kun Chan


Abstract—

Security has become one of the major issues for data communication over wired and wireless networks. Different from the
past work on the designs of cryptography algorithms and system infrastructures, we will propose a dynamic routing algorithm that could
randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols,
such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks,
without introducing extra control messages. An analytic study on the proposed algorithm is presented, and a series of simulation
experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm.
Reply
project report helper
Active In SP
**

Posts: 2,270
Joined: Sep 2010
#3
08-10-2010, 11:52 AM


.pdf   Dynamic Routing with Security Considerations.pdf (Size: 2.05 MB / Downloads: 50)
Dynamic Routing with Security Considerations


Chin-Fu Kuo, Member, IEEE, Ai-Chun Pang, Member, IEEE, and Sheng-Kun Chan

Abstract—Security has become one of the major issues for data communication over wired and wireless networks. Different from the
past work on the designs of cryptography algorithms and system infrastructures, we will propose a dynamic routing algorithm that could
randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols,
such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks,
without introducing extra control messages. An analytic study on the proposed algorithm is presented, and a series of simulation
experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm.
Reply
project report helper
Active In SP
**

Posts: 2,270
Joined: Sep 2010
#4
12-10-2010, 12:43 PM


.ppt   ITJNS-05.ppt (Size: 505.5 KB / Downloads: 191)
Dynamic Routing with Security Considerations


BY:
G.VENKATA SRI KRISHNA 06S11A1256
G.SURENDER YADAV 06S11A1250
CH.SNEHA 05S11A1250

Introduction:


In this project and implimentation we deal fully about the Security which has become one of the major issues for data communication over wired and wireless networks.

We will propose a dynamic routing algorithm that could randomize delivery paths for data transmission.

The algorithm is easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks, without introducing extra control messages.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Implementation of ATM Security by Using Fingerprint recognition and GSM seminar tips 1 794 01-04-2016, 04:08 PM
Last Post: mkaasees
  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing PPT project girl 1 1,009 21-10-2015, 01:52 PM
Last Post: Guest
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,747 09-12-2014, 09:25 PM
Last Post: Guest
  SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY ppt project girl 5 2,501 10-06-2014, 11:39 AM
Last Post: java projects
  Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Abstract seminar projects maker 2 760 08-03-2014, 12:43 PM
Last Post: seminar project topic
  Wireless Sensor Network Security model using Zero Knowledge Protocol project uploader 1 1,037 28-02-2014, 01:44 AM
Last Post: mspadmini19
  Enhancing the Trust of Internet Routing With Lightweight Route Attestation Report project girl 2 951 10-01-2014, 04:16 PM
Last Post: seminar project topic
  Identifying Evolving Groups in Dynamic Multimode Networks Projects9 2 1,140 30-09-2013, 10:54 AM
Last Post: Guest
  PERSONALISED SEARCH ENGINE WITH DYNAMIC UPDATION pdf seminar projects maker 0 298 28-09-2013, 12:28 PM
Last Post: seminar projects maker
  Web based java compiler online with security access Report seminar projects maker 0 538 27-09-2013, 02:14 PM
Last Post: seminar projects maker