Secure Data Transmission In Wireless Ad Hoc Network

Read Complete Research Material

SECURE DATA TRANSMISSION IN WIRELESS AD HOC NETWORK

Secure Data Transmission In Wireless Ad Hoc Network



Table of Content

CHAPTER 1: BACKGROUND1

1.0INTRODUCTION1

1.1PROBLEM STATEMENT2

1.2OBJECTIVES OF RESEARCH2

1.2.1GENERAL OBJECTIVES3

1.2.2SPECIFIC OBJECTIVES4

1.3RESEARCH METHODS (OR RESEARCH STRATEGY)5

1.4SCOPE AND LIMITATION OF THE RESEARCH WORK6

CHAPTER 2: LITERATURE REVIEW7

2.0BACKGROUND7

2.1WPA, WPA2, WEP and RADIUS10

2.2INTRODUCTION12

2.3WORK OVERVIEW17

2.4DETAILS OF SMT OPERATION19

2.4.1DETERMINATION OF THE APS19

2.4.2MESSAGE DISPERSION AND TRANSMISSION20

2.5SUMMARY20

CHAPTER 3: DESIGN/FRAMEWORK OF SYSTEM22

CHAPTER 4: SYSTEM IMPLEMENTATION24

4.0. INTRODUCTION24

4.1 DETAILS24

4.2APS ADAPTATION29

4.3SUMMARY35

CHAPTER 5: EXPERIMENTATION36

5.0INTRODUCTION36

5.1PROTOCOL AUTOCONFIGURATION36

CHAPTER 6: ANALYSIS AND EVALUATION OF EXPERIMENTAL RESULTS OR COMPARISON RESULTS41

CHAPTER 7: CONCLUSIONS54

CHAPTER 8: FUTURE WORK/RECOMMENDATIONS56

REFERENCES58

CHAPTER 1: BACKGROUND

INTRODUCTION

The vision of nomadic computing with its ubiquitous get access to has roused much spare-time undertaking in the wireless ad hoc networking (MANET) technology. However, its expansion powerfully counts on the accessibility of defence provisions, amidst other factors. In the free-spoken, collaborative MANET setting, virtually any node can maliciously or selfishly disturb and turn down communication of other nodes. In this paper, we design the close higher conclusion transmission (SMT) protocol to safeguard the information transmission against random malicious demeanour of network nodes. (Papadimitratos, 2006, 10) SMT is a light-weight, yet very very creative, protocol that can function only in an end-to-end manner. It undertakings the redundancy of multi-path routing and adapts its task to stay effective and very creative even in highly harmful environments. SMT is adept of consigning higher to 83% more information notes than a protocol that does not close higher the information transmission. Moreover, SMT accomplishes higher to 65% lesser end-to-end hold ups and higher to 80% lesser contain back variability, equated with an choice single-path protocol--a close higher information forwarding protocol, which we period close higher lone street (SSP) protocol. Thus, SMT is sophisticated matched to boost value of service for real-time communications in the ad hoc networking environment.

PROBLEM STATEMENT

The security of data transmission is carried out without restrictive assumptions on the mesh nodes' accept as factual and mesh constituents, without the use of intrusion detection concepts, and at the total cost of moderate multi-path transmission overhead only.

OBJECTIVES OF RESEARCH

Secure connection, an important facet of any networking natural natural environment, is an especially significant argument in promotion hoc networks. The MANET paradigm searches for to endow connection over schemes whose topology and constituents can change frequently. Its attribute characteristic is that mesh nodes need to help with their looks in bearing the mesh functionality. In such an natural natural environment, malicious or selfish nodes can distract or even refute the communications of probably any node interior the promotion hoc networking domain. This is so, accurately because every node in the mesh is not only warranting, but is in minutia required, to help in the mesh establishment, the mesh upkeep, and the mesh operation.

GENERAL OBJECTIVES

The complete objectives of the examine are The contest in talking to these security vulnerabilities is due to the atop actual MANET aspects and due to the item that usual security method may be inapplicable here. First, the reasonably imperceptible or non-existent administrative perimeters encumber the a priori classification of a subset of nodes as ...
Related Ads