You are on page 1of 3

Dynamic Routing with Security Considerations

Abstract: In this project we deal fully about the Security which has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, we will propose a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol in wired networks and DestinationSequenced Distance Vector protocol in wireless networks, without introducing extra control messages. An analytic study on the proposed algorithm is presented, and a series of simulation experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm. In the past decades, various security-enhanced measures have been proposed to improve the security of data transmission over public networks. Existing work on security-enhanced data transmission includes the designs of cryptography algorithms and system infrastructures and security-enhanced routing methods. The main objective of the project is to propose a dynamic routing algorithm to improve the security of data transmission.

Existing system: Every node in the network is given a routing table and a link table using Hello protocol. construction and maintenance of routing tables are revised based on the wellknown Bellman-Ford algorithm Existing system disadvantage: The discovery of paths in an offline fashion might not be suitable to networks with a dynamic changing configuration which has been used in existing system.

Proposed system: The proposed algorithm implements popular routing protocols, such as 1. Routing Information Protocol (RIP) for wired networks 2. Destination-Sequenced Distance Vector (DSDV) protocol for wireless networks. Those based on RIP, each node maintains a routing table. If the proposed algorithm is implemented over RIP with equal cost links, then the Resulted path set would be the same as that generated by an equal-cost multipath protocol based on RIP. Proposed system advantage: Our security enhanced dynamic routing could be used with cryptography- based system designs to further improve the security of data transmission over networks.

Hardware requirements:

Processor Ram Monitor Hard disk Floppy drive Cddrive Keyboard Mouse

: pentium iv 2.6 ghz : 512 mb dd ram : 15 color : : : 20 gb 1.44 mb : lg 52x standard 102 keys : 3 buttons

Software requirements:

Front End Back End Tools Used

: Java, Swing : MS Access : JFrameBuilder

Operating System : WindowsXP

You might also like