You are on page 1of 1

Distributed authentication method for secure routing in the ad-hoc networks

Student Name:

Student Id:

Supervisor Name:

Programme :

The Problem Statement

Implementation

The ad-hoc networks are the special category of the network that dont
depend on the particular infrastructure like centralized server, access point to
run the application. These ad-hoc networks are able to be deployed in any
type of environment with very less cost. The features of ad-hoc networks
made them to be attractive for the military applications and also for the
disaster applications. In addition to this the ad-hoc networks also find their
place in the commercial applications like video conferencing, sensor
networks etc. despite of having these merits, the ad-hoc networks also face
some demerits mainly related to the security. The unique features of these adhoc networks make them to be vulnerable for the security issues. Most of the
security issues of ad-hoc networks try to gain access to the information that is
exchanged over these networks.
The use of these ad-hoc networks in military has made the researchers to
focus the ways to protect the information exchanged over the ad-hoc
networks. In this project an on demand routing method is used for the ad-hoc
networks to provide security. This security method is based on distributed
authentication technique. Trust relationship will be established among the
network entities and only then information will be exchanged among the
network entities.

Figure 2 authentication has been started in which every ad-hoc node

The Aim & Objectives of the Project


The crucial aim of this project is to route the information securely in an adhoc network with the help of a secure routing mechanism (Securouting) that
uses distributed authentication technique.

Figure 3 SecuRouting protocol will now be implemented in the ad-hoc network

Objective
The crucial project objectives are to identify the attacks on the information
routed over the ad-hoc networks, to know the main need for securing the
information transmitted over the ad-hoc networks and to implement the
Securouting method for the ad-hoc networks using network simulator
software.

Figure 4 packets will completely remove from the network

Technologies Used For Implementation


Open source simulator and Fedora 7
Design of the System

Figure 5 process of evaluating the SecuRouting technique


Conclusion

Figure 1 data flow diagram the flow of data from one step to the other
step
In the above data flow diagram, the flow of data from one step to the other
step is given above. Here the transmission of the file using the SecuRouting
method is provided in the above figure. The communication process between
the nodes present in the ad-hoc network will be shown above. As multiple
paths will be constructed between a pair of source and destination, several
intermediate nodes will be utilized to send the required file for the same
destination. In the above data flow diagram between a part of source and
destination three main parts are utilized and three different nodes are used in
these three different parts. The transmission of the same file will be done
along with these paths so that the effectiveness of the data that reached the
destination is high along with the provision of stronger level of security. This
construction of multiple routes help in providing secured transmission paths
between the source and destination.

The securouting method provides security in the ad-hoc networks by constructing


multiple paths between a pair of source and destination. When these paths are
authentication of each node will be done and only after the transmission of the data
will be performed between a pair of source and destination. The authentication of the
user is done in the securouting technique with the help of the secret key that is present
in each node at the time of deployment itself.
References
Balasubramanian, K and Amutha, S (2013), Secure implementation of routing
protocols for wireless ad-hoc networks IEEE Conference Publications, Information
Communication and Embedded Systems (ICICES), 2013 International Conference on
DOI: 10.1109/ICICES.2013.6508359, Page(s): 960 965.
Azad, M.A and Arshad, J (2010), Performance Evaluation of Secure on-Demand
Routing Protocol for Mobile Ad-hoc Networks, IEEE Conference Publications,
Sensor and Ad-hoc Communications and Networks 2010, SECON 10, 2010 3rd
Annual
IEEE
Communications
Society
on
Volume:
3,
DOI:
10.1109/SAHCN.2010.288591. Page(s): 971 975.

You might also like