Professional Documents
Culture Documents
Student Name:
Student Id:
Supervisor Name:
Programme :
Implementation
The ad-hoc networks are the special category of the network that dont
depend on the particular infrastructure like centralized server, access point to
run the application. These ad-hoc networks are able to be deployed in any
type of environment with very less cost. The features of ad-hoc networks
made them to be attractive for the military applications and also for the
disaster applications. In addition to this the ad-hoc networks also find their
place in the commercial applications like video conferencing, sensor
networks etc. despite of having these merits, the ad-hoc networks also face
some demerits mainly related to the security. The unique features of these adhoc networks make them to be vulnerable for the security issues. Most of the
security issues of ad-hoc networks try to gain access to the information that is
exchanged over these networks.
The use of these ad-hoc networks in military has made the researchers to
focus the ways to protect the information exchanged over the ad-hoc
networks. In this project an on demand routing method is used for the ad-hoc
networks to provide security. This security method is based on distributed
authentication technique. Trust relationship will be established among the
network entities and only then information will be exchanged among the
network entities.
Objective
The crucial project objectives are to identify the attacks on the information
routed over the ad-hoc networks, to know the main need for securing the
information transmitted over the ad-hoc networks and to implement the
Securouting method for the ad-hoc networks using network simulator
software.
Figure 1 data flow diagram the flow of data from one step to the other
step
In the above data flow diagram, the flow of data from one step to the other
step is given above. Here the transmission of the file using the SecuRouting
method is provided in the above figure. The communication process between
the nodes present in the ad-hoc network will be shown above. As multiple
paths will be constructed between a pair of source and destination, several
intermediate nodes will be utilized to send the required file for the same
destination. In the above data flow diagram between a part of source and
destination three main parts are utilized and three different nodes are used in
these three different parts. The transmission of the same file will be done
along with these paths so that the effectiveness of the data that reached the
destination is high along with the provision of stronger level of security. This
construction of multiple routes help in providing secured transmission paths
between the source and destination.