Professional Documents
Culture Documents
Faces: Friend-Based Ad Hoc Routing Using Challenges To Establish Security in Manets Systems
Faces: Friend-Based Ad Hoc Routing Using Challenges To Establish Security in Manets Systems
TEAM MEMBERS
MaduraDevi.V Sharmila.R Vaishnavi.R
Shanthoshini.R
Guide :Ms VanathiPriyadharshini AP
Adhoc
Secure
routing in ad hoc mobile Networks Effectively Isolate The Malicious Nodes Reduces The Overhead On Network
Design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne. Ariadne prevents attackers or compromised nodes from tampering with uncompromised nodes Prevents from Denial-of-Service attacks.
This works by sending challenges and sharing friend Lists to provide a list of trusted nodes to the source node through which data transmission finally takes place. Provides a Robust mechanism For Thwarting attacks by isolating malicious nodes in the network
The nodes in the friend list are rated on the basis of the amount of data transmission they accomplish and their friendship with other nodes in the network. The result of this scheme of operation, the network is able to effectively isolate the malicious nodes which are left with no role to play in the ad hoc network. No proper security provided. cryptography is used for high security, the hackers can hack the data of single letter encryption. Time Delay is high.
Secure
routing protocols for ad hoc networks. Describe several new attacks on ad hoc network routing protocols Describe Ariadne- withstands node compromise and relies only on highly efficient symmetric cryptography.
Our goal is to design simple and efficient mechanisms achieving high attack robustness High security is maintained due to the encryption in every word using this Ariadne Protocol method with eavesdropping.
Software Requirements
Operating system : Windows XP Professional Environment : Visual Studio .NET 2008/2005 .NET framework : Version 3.5 Language : C#.NET Backend : SQL SERVER 2005
Thank you