This document proposes a secure protocol for creating spontaneous wireless ad hoc networks. The key aspects of the protocol are:
1. It uses asymmetric cryptography for device identification and symmetric cryptography for exchanging session keys between nodes.
2. New devices authenticate by sending an identity card signed by a trusted node to validate network membership. This distributed validation avoids the need for a central authority.
3. The protocol establishes secure communication and resource/service sharing between mobile nodes in an ad hoc network without any existing infrastructure or centralized administration.
At Softroniics we provide job oriented training for freshers in IT sector. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing, Mechanical, Automobile automation and many other. We are providing long term and short term internship also.
We are providing short term in industrial training, internship and inplant training for Btech/Bsc/MCA/MTech students. Attached is the list of Topics for Mechanical, Automobile and Mechatronics areas.
MD MANIKANDAN-9037291113,04954021113
softroniics@gmail.com
An authentication framework for wireless sensor networks using Signature Base...ijsrd.com
Authentication in Wireless Sensor Networks (WSNs) is a challenging process. Providing authentication for the Nodes in WSN is a vital issue in Secure Group communication among WSNs. Massive group of tiny sensor Nodes forms WSNs and these are placed in open, unattended milieu. Due to this reason, Nodes in WSN can endure exclusive encounters. WSNs are more vulnerable to active and passive attacks than wired ones due to their broadcasting nature, limitations in resources and unrestrained environments. However, security will be a significant factor for their complete implementation. In this proposal, a new approach has been introduced to achieve secure authentication among Nodes in WSNs.
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...TELKOMNIKA JOURNAL
The Internet of Things (IoT) communication protocol built over IP and non-IP environment.
Therefore, a gateway device will be needed to bridge the IP and non-IP network transparently since an IoT
user is more likely to concern on the service provided by the IoT device, rather than the complexity of the
network or device configuration. Since today ubiquitous computing needs to hide the architectural level
from it users, the data & information centric approach was proposed. However, the data & information
centric protocol is having several issues and one of them is device and service discovery protocol over IP
& non-IP network. This paper proposed a pervasive device and service discovery protocol that able to
work in interoperability of the IP and non-IP network. The system environment consists of a smart device
with XBee Communication as the non-IP network that will send the device and service description data to
the IP network using WebSocket. The gateway will able to recognize the smart device and sent the data to
the web-based user application. The user application displayed the discovered devices along the services
and able to send the control data to each of the smart devices. Our proposed protocol also enriched with
the smart device inoperability detection by using keep-alive tracking from the gateway to each of the smart
devices. The result showed that the delay for the user application to detect the smart device in the XBee
network is around 10.13 ms delay, and the service average delay requested by the user application to
each of the devices is 2.13 ms.
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTINGecij
This document summarizes a research paper on generating secret keys for multiple wireless devices using multipath routing. It proposes a framework that uses AES encryption to generate unique 128-bit keys for each device pair, overcoming issues of limited signal range and centralized networks. The methodology observes devices to compare RSS signals and encrypts keys using AES. Performance analysis shows AES key generation is faster than DES and provides stronger security due to longer, randomly generated keys.
User defined privacy grid system for continuous location based services abstractSoftroniics india
This document proposes a user-defined privacy grid system (DGS) to provide privacy-preserving location-based services. Existing systems rely on a fully-trusted third party or only achieve regional location privacy. The proposed DGS uses a semi-trusted third party (query server) that does not store or access user locations. It allows users to define a query area and grid structure. The system encrypts location information and grid cell identifiers during communication between the user, query server, and service provider to match points of interest to the user while preserving privacy. Experimental results show it is more efficient than state-of-the-art techniques for continuous location-based services.
User defined privacy grid system for continuous location-based servicesLeMeniz Infotech
User defined privacy grid system for continuous location-based services
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
At Softroniics we provide job oriented training for freshers in IT sector. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing, Mechanical, Automobile automation and many other. We are providing long term and short term internship also.
We are providing short term in industrial training, internship and inplant training for Btech/Bsc/MCA/MTech students. Attached is the list of Topics for Mechanical, Automobile and Mechatronics areas.
MD MANIKANDAN-9037291113,04954021113
softroniics@gmail.com
An authentication framework for wireless sensor networks using Signature Base...ijsrd.com
Authentication in Wireless Sensor Networks (WSNs) is a challenging process. Providing authentication for the Nodes in WSN is a vital issue in Secure Group communication among WSNs. Massive group of tiny sensor Nodes forms WSNs and these are placed in open, unattended milieu. Due to this reason, Nodes in WSN can endure exclusive encounters. WSNs are more vulnerable to active and passive attacks than wired ones due to their broadcasting nature, limitations in resources and unrestrained environments. However, security will be a significant factor for their complete implementation. In this proposal, a new approach has been introduced to achieve secure authentication among Nodes in WSNs.
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...TELKOMNIKA JOURNAL
The Internet of Things (IoT) communication protocol built over IP and non-IP environment.
Therefore, a gateway device will be needed to bridge the IP and non-IP network transparently since an IoT
user is more likely to concern on the service provided by the IoT device, rather than the complexity of the
network or device configuration. Since today ubiquitous computing needs to hide the architectural level
from it users, the data & information centric approach was proposed. However, the data & information
centric protocol is having several issues and one of them is device and service discovery protocol over IP
& non-IP network. This paper proposed a pervasive device and service discovery protocol that able to
work in interoperability of the IP and non-IP network. The system environment consists of a smart device
with XBee Communication as the non-IP network that will send the device and service description data to
the IP network using WebSocket. The gateway will able to recognize the smart device and sent the data to
the web-based user application. The user application displayed the discovered devices along the services
and able to send the control data to each of the smart devices. Our proposed protocol also enriched with
the smart device inoperability detection by using keep-alive tracking from the gateway to each of the smart
devices. The result showed that the delay for the user application to detect the smart device in the XBee
network is around 10.13 ms delay, and the service average delay requested by the user application to
each of the devices is 2.13 ms.
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTINGecij
This document summarizes a research paper on generating secret keys for multiple wireless devices using multipath routing. It proposes a framework that uses AES encryption to generate unique 128-bit keys for each device pair, overcoming issues of limited signal range and centralized networks. The methodology observes devices to compare RSS signals and encrypts keys using AES. Performance analysis shows AES key generation is faster than DES and provides stronger security due to longer, randomly generated keys.
User defined privacy grid system for continuous location based services abstractSoftroniics india
This document proposes a user-defined privacy grid system (DGS) to provide privacy-preserving location-based services. Existing systems rely on a fully-trusted third party or only achieve regional location privacy. The proposed DGS uses a semi-trusted third party (query server) that does not store or access user locations. It allows users to define a query area and grid structure. The system encrypts location information and grid cell identifiers during communication between the user, query server, and service provider to match points of interest to the user while preserving privacy. Experimental results show it is more efficient than state-of-the-art techniques for continuous location-based services.
User defined privacy grid system for continuous location-based servicesLeMeniz Infotech
User defined privacy grid system for continuous location-based services
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
UDP Pervasive Protocol Integration with IoT for Smart Home Environment using ...IJECEIAES
Pervasive computing is an environment which is used and integrated into every object and activities to meet human needs and its existence isn’t perceived as something specific. The concept of Smart Home is to assist human needs in an everyday object that performs controls or being controlled. Based on previous research the used communication protocol is UDP (User Datagram Protocol) and the programming language is LabVIEW. UDP is used because it does not require handshaking in the broadcast process, as well as on the use of memory more efficient than other protocols. Devices which perform controls called Host and which is controlled called Client. Both of them (Things) have an ability to send data to the Internet without any human interaction. So this research wants to conduct pervasive protocol between Host and Client which each device is integrated with the Internet of Things (IoT). Data are posted at dweet.io that is a cloud server website that contains a simple online data submission which has free services. This research is conducted to measure the communication performance between host to client, host to cloud server and client to cloud server that represents household equipment.
Wireless lan intrusion detection by using statistical timing approacheSAT Journals
Abstract Today as we all are habitual of using internet through wired or wireless LAN Networks, but using internet through Wireless LAN becomes harder as the threat of unauthorized access point is increasing day by day. In This paper we are focusing on different types of rogue access points (APs) that are masquerading and attracting people to get associate with them or to connect with them. We are implementing a solution to avoid people or users from connecting to the unauthorized access point by using experimental time dependent scheme. Our detection technique is a client-oriented method that uses the complete tour time between the DNS server and user that perfectly determine that whether an access point with which the user has connected is the legitimate access point or a unauthorized access point. In this paper we are implementing concept using .Net framework and sql server, Which gives us the characteristics like robust, accuracy and effectiveness for detecting rogue or unauthorized access point without getting any help from WLAN administrator. In this simulation technique we will get accurate values so that we can distinguish between rogue access point and legitimate access point Keywords— WLAN, APs, RAP, LAN
This document provides an overview of Internet of Things (IoT) concepts including:
- IoT comprises things that have unique identities and are connected to the internet to communicate and exchange data. By 2020 there will be 50 billion connected devices.
- IoT has characteristics like being dynamic and self-adapting, self-configuring, using interoperable communication protocols, and having unique identities.
- IoT applications include home automation, smart cities, environment monitoring, energy management, retail, logistics, agriculture, healthcare, and more.
- IoT devices use various protocols at the link, network, transport, and application layers to connect and exchange data. Common protocols discussed are Ethernet, WiFi,
Cloud computing and Software defined networkingsaigandham1
This is my Graduate defense presentation. I have interest in various topics like cloud computing and software defined networking. This slides includes the research of various researchers on cloud computing and SDN, presented their work as my comprehensive exam.
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
This document presents a study on identifying and classifying Internet of Things (IoT) devices based on their network traffic characteristics using machine learning algorithms. The study involved collecting network traffic data from 28 different IoT devices over a period of 6 months. Statistical attributes like port numbers, domain names, and cipher suites were extracted from the traffic to analyze characteristics. A support vector machine (SVM) classifier was developed and shown to identify specific IoT devices with over 99% accuracy based on their network activity attributes. The study aims to help network operators monitor and manage IoT devices on their networks.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Key characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Common uses of cloud computing involve hosting applications and services through major cloud platforms like Amazon Web Services, Microsoft Azure, and Google Cloud.
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
This work explores the possibility of transferring data between mobile devices that are nearby each other without the need of pairing, authentication, superuser access and Internet connectivity. Such technology can be used for emergency broadcast, traffic congestion avoidance, IoT, smart city, social and dating systems and games. Except Bluetooth Low Energy technology, there is no other protocol or technology available that allows pairing-free data transfer without Internet connectivity. Bluetooth Low Energy is capable of doing so but at a relatively short range. Using Wi-Fi Direct's Service Broadcast and Discovery, a simple yet novel method is developed which allows for seamless long range (Wi-Fi range) data transfer without Internet connectivity.
The design details of FATS-mumble can be found in the paper (http://www.comp.nus.edu.sg/~bhojan/papers/mumble15.pdf) published in ACM Mobicom 2015 SmartObjects. Please use it for all the references of this mumble project.
The project is open sourced (Github Link): https://github.com/FatsGW/FATS-Mumble.
Demo: http://youtu.be/ACmNYLd2NlI
Analysis the Privacy preserving and content protecting location based on querieskavidhapr
This document proposes a two-stage solution for secure location-based queries that improves performance. The first stage uses oblivious transfer to privately determine the user's location within a public grid. The second stage uses private information retrieval for the user to efficiently retrieve an appropriate data block from the private grid. The solution introduces a formal security model and analyzes the security of the novel protocol. It aims to achieve privacy protection for both the user and server in location-based services.
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICESnexgentechnology
This document proposes a user-defined privacy grid system called Dynamic Grid System (DGS) to provide privacy-preserving location-based services. DGS uses a semi-trusted third party called a query server to process user requests while preserving the privacy of user locations. It divides query processing between the query server and service provider. Experimental results show DGS is more efficient than existing techniques requiring a fully-trusted third party, providing better privacy guarantees with lower communication and computation costs.
As the enormous use of internet increases day by day so as security concern is also raise day by day over
the internet. In this paper we discuss the network security and its related threats and also study the types of
protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node
wired network scenario, its packet drop rate analysis through TCP protocol using NS2 as a simulator.
Analyzed the performance of 5-node network when the packet is drop down by graphical method also
called as Xgraph when rate parameter is in mb and also analyzed the performance of same network by
changing the value of rate parameter at same time so no packets would drop down at same time and also
analyzed the performance by Xgraph method.
Anonymity based privacy-preserving dataKamal Spring
In this paper, we propose an efficient anonymous data reporting protocol for participatory sensing, which provides strong privacy protection, data accuracy and generality. The protocol consists of two stages, namely slot reservation and message submission. In the slot reservation stage, a group of N participants cooperate to assign each member a message slot in a vector which is essentially a message submission schedule, in such a manner that each participant’s slot is oblivious to other members and the application server. In the message submission stage, each participant transmits an encoded data to the application server based on the slot information known only to herself, in such a way that the application server cannot link a data to a specific participant. With such a data reporting protocol, the link between the data and the participants is broken, and as a result, participant’s privacy is protected. We conduct theoretical analysis of the correctness and anonymity of our protocol, as well as experiments to demonstrate the efficiency in small-scale applications with periodic data sampling
Internet 2.0 is a proposed global internetworking system that uses a higher-level protocol called the Transmission Media Adaptation Layer (TMAL) to provide interconnection and internetworking services over both IP data networks and global telephony systems. TMAL enables remote applications to communicate over a variety of interconnected network devices worldwide, either separately or concurrently. Internet 2.0 aims to provide a more secure internetworking environment compared to the current Internet (Internet 1.0) by establishing private, dedicated communication channels using existing telephony systems.
Peer-to-peer Systems – Introduction – Napster and its legacy – Peer-to-peer – Middleware – Routing overlays. Overlay case studies: Pastry, Tapestry- Distributed File Systems –Introduction – File service architecture – Andrew File system. File System: Features-File model -File accessing models – File sharing semantics Naming: Identifiers, Addresses, Name Resolution – Name Space Implementation – Name Caches – LDAP.
Internet layer security protocol & IPsecKirti Ahirrao
Internet layer security protocol
Functions of Internet layer
Types of Protocols of Internet layer
Architecture of IPsec
Modes of IP sec
IPsec
IKE Protocol
Implementation of IKE
Privacy Preserving Data Leak Detection for Sensitive Datapaperpublications3
Abstract: Number of data leaks in the organization, research institutions and security firms have grown rapidly in recent years. The data leakage occurs if there is no proper protection. The common approach is to monitor the data that are stored in the organization local network. The existing method require the plaintext sensitive data. However, this requirement is undesirable, as it may threaten the confidentiality of the sensitive information. A privacy preserving data-leak detection solution is proposed which can be outsourced and be deployed in a semi-honest detection environment. Fuzzy fingerprint technique is designed and implemented that enhances data privacy during data-leak detection operations. The DLD provider computes fingerprints from network traffic and identifies potential leaks in them. To prevent the DLD provider from gathering exact knowledge about the sensitive data, the collection of potential leaks is composed of real leaks and noises. The evaluation results show that this method can provide accurate detection.
Privacy preserving optimal meeting location determination on mobile devicesIGEEKS TECHNOLOGIES
This paper proposes privacy-preserving algorithms for determining an optimal meeting location for a group of users. It addresses the privacy issues in location-based services (LBS) that require sharing of user locations. Two algorithms are presented that allow each user to provide a single location preference to the solver while preserving privacy from other users and the service provider. The paper evaluates the security and privacy of the algorithms through theoretical analysis and implementation on mobile devices. A user study provides insights into privacy concerns with LBS and the usability of the proposed solutions.
Mobile IP enables devices to change their Internet connection point while maintaining connectivity. It assigns a temporary IP address and uses tunneling to forward data to the device's care-of address. The Wireless Application Protocol (WAP) provides mobile access to information services over wireless networks using standards like IP, XML and HTTP. It includes the Wireless Transaction Protocol (WTP) and Wireless Transport Layer Security (WTLS) to enable secure transactions over bandwidth-limited wireless connections.
This document discusses security issues with wireless LANs and various methods to improve security. It begins by explaining how wireless networks are vulnerable without proper security since there are no physical boundaries. It then describes several original IEEE 802.11 security features like authentication modes, SSIDs, and WEP. Potential attacks on wireless LANs are listed, and solutions like limiting transmission ranges, MAC address filtering, 802.1x authentication, VPNs, and the new 802.11i standard are outlined.
A secure protocol for spontaneous wireless ad hoc networks creationJPINFOTECH JAYAPRAKASH
This paper proposes a secure protocol for creating spontaneous wireless ad hoc networks. It uses a hybrid symmetric/asymmetric scheme and trust between users to exchange initial data and secret keys for encrypting data. The protocol allows networks to self-configure and share secure services without infrastructure by distributing the certification authority and network management between trusted users. It applies asymmetric cryptography for device identification and symmetric cryptography to exchange session keys, providing authentication without anonymity. The paper details the network creation stages and protocol operation, and compares it to other ad hoc network protocols.
The document discusses various aspects of securing e-commerce networks. It describes digital certificates which serve to verify identity and are issued by a certification authority. There are four main types of digital certificates. The document also discusses selecting network security technologies based on principles like defense in depth. Technologies discussed for securing networks and protocols include firewalls, intrusion detection systems, virtual private networks, secure sockets layer (SSL), secure hypertext transfer protocol (HTTPS), and public key infrastructure.
UDP Pervasive Protocol Integration with IoT for Smart Home Environment using ...IJECEIAES
Pervasive computing is an environment which is used and integrated into every object and activities to meet human needs and its existence isn’t perceived as something specific. The concept of Smart Home is to assist human needs in an everyday object that performs controls or being controlled. Based on previous research the used communication protocol is UDP (User Datagram Protocol) and the programming language is LabVIEW. UDP is used because it does not require handshaking in the broadcast process, as well as on the use of memory more efficient than other protocols. Devices which perform controls called Host and which is controlled called Client. Both of them (Things) have an ability to send data to the Internet without any human interaction. So this research wants to conduct pervasive protocol between Host and Client which each device is integrated with the Internet of Things (IoT). Data are posted at dweet.io that is a cloud server website that contains a simple online data submission which has free services. This research is conducted to measure the communication performance between host to client, host to cloud server and client to cloud server that represents household equipment.
Wireless lan intrusion detection by using statistical timing approacheSAT Journals
Abstract Today as we all are habitual of using internet through wired or wireless LAN Networks, but using internet through Wireless LAN becomes harder as the threat of unauthorized access point is increasing day by day. In This paper we are focusing on different types of rogue access points (APs) that are masquerading and attracting people to get associate with them or to connect with them. We are implementing a solution to avoid people or users from connecting to the unauthorized access point by using experimental time dependent scheme. Our detection technique is a client-oriented method that uses the complete tour time between the DNS server and user that perfectly determine that whether an access point with which the user has connected is the legitimate access point or a unauthorized access point. In this paper we are implementing concept using .Net framework and sql server, Which gives us the characteristics like robust, accuracy and effectiveness for detecting rogue or unauthorized access point without getting any help from WLAN administrator. In this simulation technique we will get accurate values so that we can distinguish between rogue access point and legitimate access point Keywords— WLAN, APs, RAP, LAN
This document provides an overview of Internet of Things (IoT) concepts including:
- IoT comprises things that have unique identities and are connected to the internet to communicate and exchange data. By 2020 there will be 50 billion connected devices.
- IoT has characteristics like being dynamic and self-adapting, self-configuring, using interoperable communication protocols, and having unique identities.
- IoT applications include home automation, smart cities, environment monitoring, energy management, retail, logistics, agriculture, healthcare, and more.
- IoT devices use various protocols at the link, network, transport, and application layers to connect and exchange data. Common protocols discussed are Ethernet, WiFi,
Cloud computing and Software defined networkingsaigandham1
This is my Graduate defense presentation. I have interest in various topics like cloud computing and software defined networking. This slides includes the research of various researchers on cloud computing and SDN, presented their work as my comprehensive exam.
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
This document presents a study on identifying and classifying Internet of Things (IoT) devices based on their network traffic characteristics using machine learning algorithms. The study involved collecting network traffic data from 28 different IoT devices over a period of 6 months. Statistical attributes like port numbers, domain names, and cipher suites were extracted from the traffic to analyze characteristics. A support vector machine (SVM) classifier was developed and shown to identify specific IoT devices with over 99% accuracy based on their network activity attributes. The study aims to help network operators monitor and manage IoT devices on their networks.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Key characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Common uses of cloud computing involve hosting applications and services through major cloud platforms like Amazon Web Services, Microsoft Azure, and Google Cloud.
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
This work explores the possibility of transferring data between mobile devices that are nearby each other without the need of pairing, authentication, superuser access and Internet connectivity. Such technology can be used for emergency broadcast, traffic congestion avoidance, IoT, smart city, social and dating systems and games. Except Bluetooth Low Energy technology, there is no other protocol or technology available that allows pairing-free data transfer without Internet connectivity. Bluetooth Low Energy is capable of doing so but at a relatively short range. Using Wi-Fi Direct's Service Broadcast and Discovery, a simple yet novel method is developed which allows for seamless long range (Wi-Fi range) data transfer without Internet connectivity.
The design details of FATS-mumble can be found in the paper (http://www.comp.nus.edu.sg/~bhojan/papers/mumble15.pdf) published in ACM Mobicom 2015 SmartObjects. Please use it for all the references of this mumble project.
The project is open sourced (Github Link): https://github.com/FatsGW/FATS-Mumble.
Demo: http://youtu.be/ACmNYLd2NlI
Analysis the Privacy preserving and content protecting location based on querieskavidhapr
This document proposes a two-stage solution for secure location-based queries that improves performance. The first stage uses oblivious transfer to privately determine the user's location within a public grid. The second stage uses private information retrieval for the user to efficiently retrieve an appropriate data block from the private grid. The solution introduces a formal security model and analyzes the security of the novel protocol. It aims to achieve privacy protection for both the user and server in location-based services.
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICESnexgentechnology
This document proposes a user-defined privacy grid system called Dynamic Grid System (DGS) to provide privacy-preserving location-based services. DGS uses a semi-trusted third party called a query server to process user requests while preserving the privacy of user locations. It divides query processing between the query server and service provider. Experimental results show DGS is more efficient than existing techniques requiring a fully-trusted third party, providing better privacy guarantees with lower communication and computation costs.
As the enormous use of internet increases day by day so as security concern is also raise day by day over
the internet. In this paper we discuss the network security and its related threats and also study the types of
protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node
wired network scenario, its packet drop rate analysis through TCP protocol using NS2 as a simulator.
Analyzed the performance of 5-node network when the packet is drop down by graphical method also
called as Xgraph when rate parameter is in mb and also analyzed the performance of same network by
changing the value of rate parameter at same time so no packets would drop down at same time and also
analyzed the performance by Xgraph method.
Anonymity based privacy-preserving dataKamal Spring
In this paper, we propose an efficient anonymous data reporting protocol for participatory sensing, which provides strong privacy protection, data accuracy and generality. The protocol consists of two stages, namely slot reservation and message submission. In the slot reservation stage, a group of N participants cooperate to assign each member a message slot in a vector which is essentially a message submission schedule, in such a manner that each participant’s slot is oblivious to other members and the application server. In the message submission stage, each participant transmits an encoded data to the application server based on the slot information known only to herself, in such a way that the application server cannot link a data to a specific participant. With such a data reporting protocol, the link between the data and the participants is broken, and as a result, participant’s privacy is protected. We conduct theoretical analysis of the correctness and anonymity of our protocol, as well as experiments to demonstrate the efficiency in small-scale applications with periodic data sampling
Internet 2.0 is a proposed global internetworking system that uses a higher-level protocol called the Transmission Media Adaptation Layer (TMAL) to provide interconnection and internetworking services over both IP data networks and global telephony systems. TMAL enables remote applications to communicate over a variety of interconnected network devices worldwide, either separately or concurrently. Internet 2.0 aims to provide a more secure internetworking environment compared to the current Internet (Internet 1.0) by establishing private, dedicated communication channels using existing telephony systems.
Peer-to-peer Systems – Introduction – Napster and its legacy – Peer-to-peer – Middleware – Routing overlays. Overlay case studies: Pastry, Tapestry- Distributed File Systems –Introduction – File service architecture – Andrew File system. File System: Features-File model -File accessing models – File sharing semantics Naming: Identifiers, Addresses, Name Resolution – Name Space Implementation – Name Caches – LDAP.
Internet layer security protocol & IPsecKirti Ahirrao
Internet layer security protocol
Functions of Internet layer
Types of Protocols of Internet layer
Architecture of IPsec
Modes of IP sec
IPsec
IKE Protocol
Implementation of IKE
Privacy Preserving Data Leak Detection for Sensitive Datapaperpublications3
Abstract: Number of data leaks in the organization, research institutions and security firms have grown rapidly in recent years. The data leakage occurs if there is no proper protection. The common approach is to monitor the data that are stored in the organization local network. The existing method require the plaintext sensitive data. However, this requirement is undesirable, as it may threaten the confidentiality of the sensitive information. A privacy preserving data-leak detection solution is proposed which can be outsourced and be deployed in a semi-honest detection environment. Fuzzy fingerprint technique is designed and implemented that enhances data privacy during data-leak detection operations. The DLD provider computes fingerprints from network traffic and identifies potential leaks in them. To prevent the DLD provider from gathering exact knowledge about the sensitive data, the collection of potential leaks is composed of real leaks and noises. The evaluation results show that this method can provide accurate detection.
Privacy preserving optimal meeting location determination on mobile devicesIGEEKS TECHNOLOGIES
This paper proposes privacy-preserving algorithms for determining an optimal meeting location for a group of users. It addresses the privacy issues in location-based services (LBS) that require sharing of user locations. Two algorithms are presented that allow each user to provide a single location preference to the solver while preserving privacy from other users and the service provider. The paper evaluates the security and privacy of the algorithms through theoretical analysis and implementation on mobile devices. A user study provides insights into privacy concerns with LBS and the usability of the proposed solutions.
Mobile IP enables devices to change their Internet connection point while maintaining connectivity. It assigns a temporary IP address and uses tunneling to forward data to the device's care-of address. The Wireless Application Protocol (WAP) provides mobile access to information services over wireless networks using standards like IP, XML and HTTP. It includes the Wireless Transaction Protocol (WTP) and Wireless Transport Layer Security (WTLS) to enable secure transactions over bandwidth-limited wireless connections.
This document discusses security issues with wireless LANs and various methods to improve security. It begins by explaining how wireless networks are vulnerable without proper security since there are no physical boundaries. It then describes several original IEEE 802.11 security features like authentication modes, SSIDs, and WEP. Potential attacks on wireless LANs are listed, and solutions like limiting transmission ranges, MAC address filtering, 802.1x authentication, VPNs, and the new 802.11i standard are outlined.
A secure protocol for spontaneous wireless ad hoc networks creationJPINFOTECH JAYAPRAKASH
This paper proposes a secure protocol for creating spontaneous wireless ad hoc networks. It uses a hybrid symmetric/asymmetric scheme and trust between users to exchange initial data and secret keys for encrypting data. The protocol allows networks to self-configure and share secure services without infrastructure by distributing the certification authority and network management between trusted users. It applies asymmetric cryptography for device identification and symmetric cryptography to exchange session keys, providing authentication without anonymity. The paper details the network creation stages and protocol operation, and compares it to other ad hoc network protocols.
The document discusses various aspects of securing e-commerce networks. It describes digital certificates which serve to verify identity and are issued by a certification authority. There are four main types of digital certificates. The document also discusses selecting network security technologies based on principles like defense in depth. Technologies discussed for securing networks and protocols include firewalls, intrusion detection systems, virtual private networks, secure sockets layer (SSL), secure hypertext transfer protocol (HTTPS), and public key infrastructure.
Basics concept of network and internet mansiMansiGupta298
network, computer network, topology of network, types of computer network,OSI model, TCP/IP model, concept of internet, internet service provider, email
This document provides an introduction to virtual private networks (VPNs). It defines the key terms "virtual," "private," and "network" that make up a VPN. The document outlines basic VPN requirements like user authentication, address management, data encryption, and key management. It describes the main types of VPNs: remote access, intranet, and extranet. Remote access VPNs allow mobile users to connect to an organization's network. Intranet VPNs connect organization offices over the internet. Extranet VPNs are similar but connect external users like customers or suppliers. The document also discusses tunneling, which encapsulates data packets for transmission, and lists some advantages and disadvantages of using VPNs.
A Deep Dive in the World of IT Networking (Part 2)Tuan Yang
For a successful career in Information Technology, a strong foundation of basic networking concepts is a must. Networking technology allows for the exchange of data between large and small information systems used primarily by various businesses.
Learn more about:
» OSI Model
» Networking Protocol
» TCP Model
» Networking and data security
Chapter No 1 Introduction to Network and Network Models.pptxPoojaBahirat1
The document provides an introduction to computer networks and network models. It discusses the following key points in 3 sentences:
Data communication involves the exchange of data between two devices via transmission mediums like wired or wireless connections. The five basic components of a data communication system are the message, sender, receiver, transmission medium, and protocols. Network models like OSI and TCP/IP reference models organize networks into layers, with each layer performing specified functions and following protocols to communicate between devices.
Virtual private networks (VPNs) allow secure connections over public networks like the Internet instead of expensive leased lines. There are three main types of VPNs: trusted VPNs rely on a single provider's network for security; secure VPNs encrypt and authenticate all traffic between agreed parties; and hybrid VPNs combine secure VPN technologies running over trusted VPN technologies. VPNs use technologies like IPSec, SSL/TLS, and PPTP to provide critical functions of authentication, access control, confidentiality, and data integrity. They are commonly used by industries for remote access, site-to-site connectivity between offices, and access to networks for business partners and customers.
A virtual private network gives secure access to LAN resources over a shared network infrastructure such as the internet. It can be conceptualized as creating a tunnel from one location to another, with Encrypted data traveling through the tunnel before being decrypted at its destination.
There are two main types of virtual networks: virtual private networks (VPNs) and virtual local area networks (VLANs). VPNs use encryption to create a secure "tunnel" between two systems across a public network like the Internet. VLANs split a local area network into logical segments to reduce broadcast traffic. Both VPNs and VLANs serve different purposes due to how they operate and are used on networks.
This document provides an overview of virtual private networks (VPNs). It discusses the history of VPNs and how they arose from the need for secure remote access and communication between corporate networks without needing expensive dedicated private lines. The document defines key VPN terms and concepts, describes the main types of VPN topologies, and examines the components, benefits, and quality of service aspects of VPNs. It aims to serve as an introduction to VPNs, their implementation, and applications in business networks.
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...CSEIJJournal
In this paper, we propose a routing protocol that is based on securing the routing information from
unauthorized users. Even though routing protocols of this category are already proposed, they are not
efficient, in the sense that, they use the same kind of encryption algorithms (mostly high level) for every
Bit of routing information they pass from one intermediate node to another in the routing path. The
proposed mechanism is evaluated against selected alternative trust schemes, with the results showing that
our proposal achieves its goals.Our research aims at providing a secure and distributed
authentication service in the ad hoc networks.
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...cseij
ABSTRACT
In this paper, we propose a routing protocol that is based on securing the routing information from
unauthorized users. Even though routing protocols of this category are already proposed, they are not
efficient, in the sense that, they use the same kind of encryption algorithms (mostly high level) for every
Bit of routing information they pass from one intermediate node to another in the routing path. The
proposed mechanism is evaluated against selected alternative trust schemes, with the results showing that
our proposal achieves its goals.Our research aims at providing a secure and distributed
authentication service in the ad hoc networks.
A secure protocol for spontaneous wireless ad hoc networks creationIEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A secure protocol for spontaneous...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
The document discusses various technologies for securing e-commerce networks, including firewalls, intrusion detection systems, virtual private networks, and public key infrastructure. Firewalls act as a barrier between private and public networks and control network traffic. Intrusion detection systems monitor network activity for suspicious behavior. Virtual private networks use encryption to create secure connections over public networks like the Internet. A public key infrastructure enables secure exchange of data and payments on public networks through use of public/private key pairs from a trusted authority.
This document provides an overview of virtual private networks (VPNs). It defines a VPN as using public networks like the Internet to connect private networks securely through authentication and encryption. The document discusses the need for VPNs to reduce costs, improve communication, and ensure security. It covers VPN types, components, protocols, and security measures like firewalls and encryption. Advantages include cost savings and mobility, while disadvantages include security understanding and performance issues outside an organization's control. The future of VPNs is described as widespread use through standardization.
The document discusses network communication and protocols. It begins by defining the basic elements of communication - a sender, receiver, and channel. It then covers topics like message segmentation, network components, end devices, media types, and network infrastructures. Finally, it discusses network protocols and models like TCP/IP. The key points are that communication requires a sender, receiver and channel; messages are segmented for efficiency; and protocols define rules for network communication in a standardized way.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
1. A Secure Protocol for
Spontaneous Wireless Ad
Hoc Networks Creation
SAHIL BAJAJ
RAGHVENDRA YADAV
2. Ad-Hoc Networks
In Latin, ad hoc means “for this purpose only”
An ad-hoc network is a small network, in which some of network
devices are part of the network that are part of network only for short
duration
Peer to peer communication by use of Wi-Fi and Bluetooth technology
Devices or nodes in the network are mobile in nature
The wireless hosts in such networks, communicate with each other
without the existing of a fixed infrastructure and without a central
control
4. Characteristics
No Infrastructure needed
Can be deployed quickly, where there is no wireless communication
infrastructure present
Can act as an extension to an existing networks
Cost effective
Nodes are mobile and hence have dynamic network topology
Nodes in ad hoc network play role of both router and terminal
It is self-configuring
5. Multi hop communication
May need to traverse multiple links to reach destination
Mobility causes route change
6. Examples
Classroom
Ad hoc network between student PDAs and workstation of the
instructor
Large IT campus
Employees of a company moving within a large campus with PDAS,
laptops and cell phones
Disaster response
A mobile network as big as needed
Vehicles
Communicating with other vehicles for safety purpose
7. Protocol
Creates a network which allows sharing resources and offering new
services among users
Protocol includes all functions needed to operate without any external
support
Provides access to information anywhere, user friendliness, and easy
deployment
Builds a network consisting of mobile nodes that can communicate
with each other, share resources, services during a limited period of
time and in a limited space
Have little or no dependence on a centralized administration
8. Enables the user to have instant service without any external
infrastructure
Services in spontaneous networks depend significantly on network
size, the nature of the participating nodes and running applications
Tasks to be performed include: user identification, their
authorization, address assignment, and safety
Energy constraints, node variability, and bandwidth limitations
mandate the design
Existing methods are not enough because they need an initial
configuration (i.e., network configuration) or external authorities (for
example, central authorities)
9. The network and protocol proposed can establish a secure self-configured
environment for distribution of data and sharing of resources and services
among users.
A user is able to join the network because he/she knows someone that
belongs to it, and hence in this way the certification authority is distributed
between the users that trust the new user
The network management is also distributed, which allows the network to
have a distributed name service
A mechanism is suggested which allows nodes to check the authenticity of
their IP addresses while not generating duplicated IP addresses.
Asymmetric cryptography is applied for device identification , where each
device has a public-private key pair and symmetric cryptography to exchange
session keys between nodes
10. Secure Spontaneous Network
Network members and services may vary because devices are free to
join or leave the network
Steps for the creation of a network
1. Joining Procedure
2. Services Discovery
3. Establishing trusted chain and changing trust level
11. Joining Procedure
System is based on the use of an IDentity Card (IDC) and a certificate
IDC contains public and private components
Public component contains a Logical Identity (LID), which is unique for
each user and allows nodes to identify it
LID includes information such as name, photograph, user’s public key (Ki),
the creation and expiration dates, an IP proposed by the user, and the
user signature
The user signature is generated using the Secure Hash Algorithm (SHA-1)
on the previous data to obtain the data summary
Data summary is signed with the user’s private key
Private component contains the private key (ki)
12. Certificate Cij of the user i consists of a validated IDC, signed
by a user j that gives its validity
No central certification authority is used to validate IDC
The certification authority for a node could be any of the trusted
nodes
All nodes can be both clients and servers, can request or serve
requests for information or authentication of other nodes
The first node creates the spontaneous network and generates
a random session key, which will be exchanged with new nodes
after the authentication phase
13. When node B wants to join an existing network, it must choose a node
within communication range to authenticate with(e.g., node A)
A will send its public key
Then, B will send its IDC signed by A’s public key
Next, A validates the received data
Finally, A will send its IDC data to B
This data will be signed by B’s public key will validate A’s IDC and will
establish the trust
If A does not reply to the joining request, B must select another
network node (if one exists)
14. Symmetric key is used as a session key to cipher the confidential
messages between trust nodes
It has less energy requirements than the asymmetric key
The asymmetric key encryption scheme is used for distribution of the
session key and for the user authentication process
15. Services discovery
A user can ask other devices in order to know the available services.
It has an agreement to allow access to its services and to access the
services offered by other nodes
The fault tolerance of the network has to be maintained
Services provided by B are available only if there is a path to B, and
disappear when B leaves the network
16. Establishing trusted chain and changing
trust level
There are only two trust levels
Node A either trusts node B
Node A does not trust node B.
If node A do not establish trust level with node B directly, it can be
established through trusted chains
If A trusts C and C trusts B, then A may trust B
Trust relationship can be asymmetric
Trust level can change over time
Node A may decide not to trust node B although A still trusts C and C trusts B
It can also stop trusting if it discovers that previous trust chain does not exist
anymore
17. Protocol and Network Management
Avoids the need for a central server, making the tasks of building the
network and adding new members very easy
Each node is identified by an IP address
Services are shared using TCP connections
Short-range technology (Bluetooth) is used to allow authentication of
nodes when they join the network
After the authentication process, each node learns the public
information about other nodes
18. Depending on the type of service, each node requests the services
From all the nodes that it trusts
From all nodes in the network
Request to multiple nodes is made through diffusion processes
Protocol prioritizes access to information through trusted nodes
When the information cannot be obtained through these nodes, it can
then ask other nodes
Nodes may request information from other nodes
The node replying to this request must sign this data ensuring the
authenticity
19. Network Creation
The first node in the network will be responsible for setting the global
settings of the spontaneous network (SSID, session key, ...)
Each node must configure its own data (including the first node) such
as IP, port, user data
This information will allow the node to become part of the network
After this data are set in the first node, it changes to standby mode
The second node first configures its user data
20. Then, the greeting process starts
Find a device that will give trust to it
The node that belongs to the network, and is responsible for validating
the new node’s data, will perform a diffusion process
These nodes will forward the received packets to their neighbours until
the data reach all nodes in the network
This process verifies uniqueness of the new node’s data
It authenticates against the first node
Each additional node authenticates with any node in the network
21. Illustration
Steps for authentication of new device B
The receiver node A validates the received data
It then sends a broadcast message to check if these data are not used in
the network (even the IP address)
This IP checking packet is sent randomly to all devices
When the authentication device receives the IP checking reply, it sends
the authentication reply to the new device
If any step is wrong, an error message is sent to the new device
When the node is authenticated, it is able to perform several tasks
22. Tasks performed by authenticated node
The authenticated node can perform the following tasks
Display nodes
Modify trust of nodes
Update the information
• Allows a node to learn about other nodes in the network
• update could be for only one user or for all users in the network
Process an authentication request
• Reply to an information request requested information will be sent directly to
the requesting node or routed if the node is not on the communication range
23. Forward an information request
• The request will be forwarded if it is a broadcast message
Send data to one node
• It can be sent symmetrically or asymmetrically encrypted, or unencrypted
Send data to all nodes
• Done by flooding system
• It can be sent symmetrically encrypted or unencrypted
Leave the network
24. Protocol Implementation
Developed 16 packets for the proper running of the protocol
To join a spontaneous network start the process by sending a
Discovery request packet (01)
Contains the Logical IDentity of the user in order to let the destinations know the
sender device
Receivers will reply with the Discovery reply packet (02)
Contains Logical Identity and their IP address
Authentication request packet (03) - used for the new device
authentication
25. Authentication reply packet (04) - confirms that the proposed IP and
the email are unique, so the new device is authenticated
In case of duplication - error packet sent
IP and e-mail checking packet (05) – used by the authenticator device
verifies that no one in the network has the same email or IP address as
the one proposed by the new device
IP and e-mail checking reply packet (06) - sent to authenticator
device
verify that the IP and e-mail are unique
26. If IP is duplicated, device must restart the authentication process
after the generation of a new IP
Update request to one node (07) - to request information to a specific
known node
Update reply from one node (08) - to reply with information
requested by update request packet to one node
Update request to all network nodes packet(09) – request made from
all nodes in the network, by flooding
Update reply to all network nodes packet (10) - reply with the
information requested
27. Certificate request to trusted nodes (11) - request the certificate
from all trusted nodes
Certificate request to known nodes (12) - request the certificate from
all known nodes
Certificate reply packet (13) – Reply to above two packets
Data are sent using the Packet for sending data (14)
Error packet (15) - to indicate that this operation is not possible
Authentication has failed
Node does not have the required data
Acknowledge packet(16) - to confirm to sender that the packet has
arrived at its destination correctly
28. ID Packet Name Description
01 P_DISCOVERY Discovery request
02 R_DISCOVERY Discovery reply
03 P_AUTHENT Authentication request
04 R_AUTHENT Authentication reply
05 P_IP IP and Email checking
06 R_IP Ip and Email checking reply
07 P_ACTUALIZA Update request to one node
08 R_ACTUALIZA Update request from one node
09 P_BROADCAST Update request to all network node
10 R_BROADCAST Update reply to all network node
11 P_NODO_CONF Certificate request to trusted node
12 P_NODO Certificate request to known node
13 R_NODO Certificate reply
14 P_DATOS Packet for sending data
15
16
P_ERROR
P_ACK
Error
Acknowledge
29. Session Key Revocation
Session key has an expiration time, so it is revoked periodically
A node that leaves the spontaneous network will keep the session key
until it expires
It will let the user return to the network if it has joined previously(the
spontaneous network is usually set up for a limited period of time)
However, if a node is disconnected from the network during the
period of time when the session key has been renewed, it will not be
able to access the network until it is authenticated again with
someone from the network
30. PERFORMANCE ANALYSIS
Java programming
Protocol may work on devices with limited resources, Java 2 Platform,
Micro Edition (J2ME) is used
Also has a small and fast virtual machine (KVM) that allows us to run
the software without overloading the device
Devices must have a minimum of 160 KB memory to store theJava
technology stack
It can run when there are computing and process limitations, and for
low-power devices
Allows the implementation of communication protocols over both
WiFi and Bluetooth technologies
31. CONCLUSION
We show the design of a protocol that allows the creation and
management of a spontaneous wireless ad hoc network
A user without advanced technical knowledge can set up and
participate in a spontaneous network
Storage and volatile memory needs are quite low and the protocol can
be used in regular resource-constrained devices (cell phones, PDAs...)
32. References
[1].Raquel Lacuesta, Jaime Lloret, Miguel Garcia, Lourdes Pen ˜alver , “A
Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation” IEEE
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 4,
APRIL 2013
[2]. https://en.wikipedia.org/wiki/Wireless_ad_hoc_network
[3]. https://www.youtube.com/watch?v=Jmfd4KPGPp0
[4]. http://www.cs.jhu.edu/~cs647/intro_adhoc.pdf