Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project report helper
Active In SP

Posts: 2,270
Joined: Sep 2010
06-10-2010, 05:18 PM

.doc   ADHOC.doc (Size: 21.5 KB / Downloads: 76)



Ad hoc wireless networks is primarily important, because the communication
signals are openly available as they propagate through air and are more susceptible to attacks ranging from passive eavesdropping to active interfering. The lack of any central coordination and shared wireless medium makes them more vulnerable to attacks than wired networks. Nodes act both as hosts and routers and are interconnected by Multi- hop communication path for forwarding and receiving packets to/from other nodes. The objective of this paper is to propose a key exchange and encryption mechanism that aims to use the MAC address as an additional parameter as the message specific key[to encrypt]and forward data among the nodes. The nodes are organized in spanning tree fashion, as they avoid forming cycles and exchange of key occurs only with authenticated neighbors in ad hoc networks, where nodes join or leave the network dynamically.
Ad hoc wireless networks are defined as the category of wireless networks that
utilize multi-hop radio relaying and are capable of operating without the support of any fixed infrastructure and nodes communicate directly between one another over wireless channels . As the wireless channels are openly available and propagate through the air, security in ad hoc networks is of primary concern . In an ad hoc wireless network, the routing and resource management are done in a distributed manner in which all nodes coordinate to enable communication among them as a group. This requires each node to be more intelligent so that it can function both as a network host for transmitting and receiving data and as a network router for routing packets from other nodes. As ad hoc networks significantly vary from each other in many aspects, an environment-specific and efficient key management system is needed.
Active In SP

Posts: 1,124
Joined: Jun 2010
15-10-2010, 03:53 PM

.pdf   3.pdf (Size: 252.5 KB / Downloads: 70)
This article is presented by:Hui-Feng Huang and Yi-Jia Chang
Graduate School of Computer Science and Information Technology
National Taichung Institute of Technology
An Efficient Three Party Authenticated Key Exchange for Mobile Communications

In three-party password based key exchange protocol, a client is allowed to share a human-memorable password with a trusted server such that two clients can negotiate a session key to communicate with each other secretly. Recently, many three-party password based key exchange protocols have been developed. However, these proposed schemes cannot simultaneously achieve security and efficiency. Based on elliptic curve cryptography (ECC), this article will propose a new three-party password based authenticated key exchange scheme. The proposed method not only reduces computation cost for remote users and a trusted server but also is more efficient than previously proposed schemes. It is very suitable for hardware-limited users such as mobile units or smart cards.

Diffie and Hellman’s protocol is the first key exchange protocol [5]. However, Diffie and Hellman protocol does not provide authentication mechanism, and therefore easily suffers from “man-in-the-middle” attack. To overcome this problem, many key exchange protocols with authentication function have been developed [1,3], among which password based authenticated key exchange protocols are of interest. Since the password based authenticated key exchange protocols require users only to remember a human-memorable password, it is rather simple and user friendly. In 1992, Bellovin and Merritt is the first password based authenticated key exchange (PAKE) protocol which has been widely studied and much research has been proposed [2]. Recently, besides the two-party PAKE protocols, many researchers have begun to study the three-party PAKE protocols [10,12,13,14]. In a three-party password based authenticated key exchange, each client (user) first shares a human-memorable password with a trusted server (TS), and then when two users wish to create a session key, they resort to the trusted server for authenticating each other. With the sharing passwords, TS can help the two clients to authenticate each other and construct a common key for secure communication. However, these previously proposed schemes cannot resist the password guessing attacks [7,8,14]. In order to improve the password guessing attacks, Lin et al. presented a new three-party password based authenticated key exchange by using the server’s public key [11]. However, employing the server’s public key places a burden on the clients, because they have to verify it in advance. Therefore, many three-party key exchange protocols without a server’s public key have been developed to improve this issue [9,10,12,13]. Unfortunately, some of them require more rounds for authentication protocol - the bandwidth consumption rates are quite demanding and likely to bottleneck in many applications [11] - the others are not secure [9,10,12]. Later, to the best of our knowledge, Lu and Cao proposed a three-party password based key exchange protocol which is more efficient than previously proposed schemes [14]. However, in 2008, Chang points out that Lu and Cao’s also suffers from on-line password guessing attacks [5]. Currently, more and more people need secure transactions by cell phone for the electronic commerce. The security and efficiency are both important requirements for mobile communications. It is necessary to construct low-computation and communication for three-party key exchange protocol, two remote users and a trusted server. Moreover, compared to Diffie-Hellman key agreement [5] or the RSA cryptography system [16], elliptic curve cryptography (ECC) can achieve the same level of security with smaller key size. For example, it has been shown that 160-bit ECC provides comparable security to 1024-bit RSA and 224-bit ECC provides comparable security to 2048-bit RSA [7,15]. Hence, under the same security level, smaller key sizes of ECC offer merits of computational efficiency, as well as memory, and bandwidth saving. It is better suited for resource constrained devices such as smart cards or mobile units. Therefore, based on ECC, this article proposes an efficient three-party password based key exchange without the server’s public key. The proposed method not only reduces computation cost for remote users and a trusted server but also is more efficient than Lu and Cao’s scheme [14]. It is very suitable for the mobile environments.

Active In SP

Posts: 1
Joined: Feb 2011
01-02-2011, 07:02 AM

hi can u provide me any videofile for this project and implimentation

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,272 16-07-2015, 09:21 PM
Last Post: Guest
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,449 31-03-2015, 09:08 AM
Last Post: Guest
  secure atm by image processing jaseelati 0 286 10-02-2015, 01:33 PM
Last Post: jaseelati
  secure atm by image processing abstract jaseelati 0 351 23-01-2015, 03:08 PM
Last Post: jaseelati
  wireless video service in cdma systems wikipedia jaseelati 0 385 13-01-2015, 04:29 PM
Last Post: jaseelati
  computational intelligence in wireless sensor networks ppt jaseelati 0 368 10-01-2015, 03:10 PM
Last Post: jaseelati
  global wireless e voting wikipedia jaseelati 0 313 18-12-2014, 03:19 PM
Last Post: jaseelati
  underwater wireless communication ppt download jaseelati 0 366 13-12-2014, 02:24 PM
Last Post: jaseelati
  Privacy-Preserving Public Auditing for Secure Cloud Storage seminar ideas 4 1,327 13-09-2014, 02:35 PM
Last Post: Radhika.m
  MANETS: MOBILE ADHOC NETWORKS seminar projects crazy 2 1,993 11-06-2014, 09:44 AM
Last Post: seminar project topic