Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Computer Network - Secure Address Resolution Protocol - College Report by wahid311

Computer Network - Secure Address Resolution Protocol - College Report by wahid311

Ratings: (0)|Views: 138|Likes:
Published by Abdul Wahid Khan
This is a college report for Computer Networks subject on Secure Address Resolution Protocol for 6th semester IT department for implementation of a research paper on the topic Secure-ARP by wahid311.
This is a college report for Computer Networks subject on Secure Address Resolution Protocol for 6th semester IT department for implementation of a research paper on the topic Secure-ARP by wahid311.

More info:

Published by: Abdul Wahid Khan on Mar 10, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/06/2014

pdf

text

original

 
Network Lab Synopsis : S-ARP Page 1
NETWORKS LAB MINI PROJECT SYNOPSIS
on
S-ARP : a Secure Address Resolution Protocol
Submitted by
Abdul Wahid Khan, 08IT03Jithu John Varghese, 08IT31
Under Guidance of 
Mr. Dinesh Nayak Assistant Professor, NITK Surathkal 
 
Network Lab Synopsis : S-ARP Page 2
CONTENTS
1.
Abstract…….……………………………………………………………………………………….
12.
Existing Methodology………………………………………………………………………...
23.
New Methodology………………………………………………………………………………
34. Why this topic?.................................................................................... 45.
Objectives and Scope of the Project……………………………………………………
56.
List of References……………………………………………………………………………….
67.
Paper Attached…………………………………………………………………………………..
7
 
Network Lab Synopsis : S-ARP Page 3
ABSTRACT
This paper presents a secure version of ARP that provides protection against ARPpoisoning. Each host has a public/private key pair certified by a local trusted partyon the LAN, which acts as a Certification Authority. Messages are digitally signedby the sender, thus preventing the injection of spurious and/or spoofedinformation. As a proof of concept, the proposed solution will be implemented ona Linux box. Performance measurements predict that PKI based strongauthentication is feasible to secure even low level protocols, as long as theoverhead for key validity verification is kept small.
 

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->