Professional Documents
Culture Documents
(Year: 2023-2024)
Micro Project
Program: _________________________________________________
Semester: ___________________________________________________
Course: ___________________________________________________
______________________________________________
1
Mahavir Polytechnic
Vision
We strive to educate students to become industry ready engineers having professional attitude and
groomed personality.
Mission
To provide well defined system to ensure quality education by strengthening teaching learning processes
through innovative practices
To provide a platform where students are exposed to the industry, up bridged with the industry standards
and requirements.
To train students by teaching them leadership and teamwork skills.
To groom students enriching their personality and social values
IT Department
Vision
IT Department strives to educate students to become Industry ready Engineers having Professional attitude and
groomed personality.
Mission
To provides well defined system to ensure quality education by strengthening teaching learning processes
through innovative practices.
To provides a platform where students are exposed to the Industry, up bridged with the industry standards
and requirements.
2
PART A
1.0 Brief Introduction
The project on "Security in Mobile Ad-hoc Networks (MANETs)" holds paramount importance in the
contemporary landscape of wireless communication. As MANETs become increasingly pervasive in applications
like emergency response and military operations, their vulnerability to security threats cannot be overstated.
This project addresses the critical need to fortify MANETs against potential risks, safeguarding the integrity,
confidentiality, and reliability of communication. By delving into the intricacies of MANET security, we aim to
equip students with practical skills, ensuring they emerge as industry-ready engineers with a profound
understanding of cybersecurity challenges in decentralized mobile networks.
3
4.0 Proposed Methodology
4
5.0 Resources Required (major resources such as PC, some machining facility, Software etc.)
Name Of
Sr. No Specifications Quantity Remarks
Resource/Material
5
MICROPROJECT REPORT
1.0 Rationale
This project is pivotal in addressing the critical need for fortified security in Mobile Ad-hoc Networks (MANETs).
As MANETs become ubiquitous in emergency response and military applications, understanding and mitigating
security threats are paramount. This initiative equips students with practical skills, ensuring they emerge as
adept engineers well-versed in securing decentralized mobile networks.
This Micro - Project aims at: This micro-project aims to deepen students' comprehension of MANET security
challenges, offering practical experience in analyzing, implementing, and enhancing security protocols. By
focusing on real-world applications, it cultivates problem-solving skills and teamwork. The benefits extend
beyond theoretical knowledge, fostering industry-ready engineers capable of fortifying the security
infrastructure of dynamic mobile networks
The literature review delves into existing research, providing insights into the security landscape of Mobile Ad-
hoc Networks (MANETs). Analyzing pertinent studies and articles, it identifies common security challenges, such
as routing attacks and resource constraints. Moreover, the review highlights current security mechanisms and
protocols employed in MANETs, forming a foundation for the project's exploration of innovative approaches to
enhance the security posture of these dynamic, decentralized networks
6
4.0 Actual Methodology
The methodology involves a multi-phased approach. Starting with an in-depth literature review to understand
existing security protocols, the project transitions to hands-on implementation using simulation tools like NS-3.
This phase includes setting up and customizing MANET scenarios, implementing selected security measures, and
conducting iterative simulations. Simultaneously, the team collaborates on analysis and documentation,
ensuring a comprehensive understanding of security challenges and practical skills in proposing and evaluating
security enhancements for MANETs. Regular team meetings and feedback loops contribute to an iterative and
dynamic project methodology.
5.0 Actual Resources Used (major resources such as PC, some machining facility, Software etc.)
Name Of
Sr. No Specifications Quantity Remarks
Resource/Material
7
6.0 Outputs of the Micro-Projects
Wireshark
Any host generating traffic within a network should have three identifiers: a MAC address, an IP address and
a hostname.
Our first pcap for this tutorial is Wireshark-tutorial-identifying-hosts-and-users-1-of-5.pcap. This pcap is based
on traffic to and from an Ethernet address at f8:ff:c2:04:a5:7b.
Using our basic web filter, we can correlate the IP address at 172.16.1[.]38 with its associated MAC address
at f8:ff:c2:04:a5:7b, as shown below in Figure 2.
8
Figure 2. Correlating an IP address with a MAC address.
DHCP traffic might reveal the hostname using this IP address. First, type dhcp in the Wireshark filter bar to filter
for DHCP traffic, as shown below in Figure 3.
Select the first frame in the results, the one that displays DHCP Request in the Info column. Then go to the frame
details section and expand the line for Dynamic Host Configuration Protocol (Request), as shown below in Figure
4.
9
Figure 4. Expanding the Dynamic Host Configuration Protocol line from a DHCP request.
Scroll down the frame details section, then expand the lines for Option: (50) Requested IP Address and Option:
(12) Host Name as indicated below in Figure 5. This reveals the client’s MAC address at f8:ff:c2:04:a5:7b with
hostname jeremiahs-MBP and a requested IP address of 172.16.1[.]38.
Figure 5. Correlating the MAC address, IP address and hostname from DHCP traffic.
By default, Wireshark attempts to resolve the first 3 bytes of a MAC address to a vendor identification. In Figure
5, the vendor identification of the MAC address shows Apple_. That and the hostname ending with MBP indicate
this might be an Apple MacBook Pro. This pcap also contains traffic to various Apple domains, further indicating
this is an Apple host.
However, mobile devices often anonymize MAC addresses and users can easily change these to spoof different
vendors. Due to anonymization and spoofing, we should never base host identification solely on a MAC address.
Depending on how frequently a DHCP lease is renewed, we might not have DHCP traffic in our pcap.
Fortunately, we can use NBNS traffic to identify hostnames for computers running Microsoft Windows or Apple
hosts running macOS.
Filter on nbns for our first pcap and review details under the Info column. This should reveal the same hostname
we previously found in the DHCP traffic, displaying JEREMIAHS-MBP, as noted below in Figure 6.
Fig
ure 6. Finding the hostname from NBNS traffic in our first pcap.
To examine NBNS traffic from a Windows host, open our second pcap Wireshark-tutorial-identifying-hosts-and-
users-2-of-5.pcap and filter on nbns.
This pcap is from a MAC address at 78:c2:3b:b8:93:e8 using an internal IP address of 172.16.1[.]101. The
Windows hostname is DESKTOP-HVKYP4S as shown below in Figure 7.
10
Figure
7. Correlating the MAC address, IP address and hostname filtering on NBNS traffic.
Unencrypted HTTP traffic to a web browser can reveal the OS. This information is contained in the User-Agent
line from the HTTP request headers.
11
7.0 Skill Developed / Learning outcome of this Micro-Project
Technical Proficiency
Outcome: Acquired a proficient understanding of MANETs, including security challenges and the implementation of
security protocols using tools like NS-3.
Problem-Solving Skills:
Outcome: Developed the ability to identify and address security vulnerabilities in dynamic, decentralized networks
through systematic problem-solving approaches.
Communication Skills
Outcome: Enhanced communication skills through the creation of comprehensive reports, presentations, and the
articulation of complex security concepts to peers and faculty.
12
Teacher Evaluation Sheet for Micro Project
1. Relevance to course
2. Literature survey
3. Project proposal
4. Completion of target
Analysis &
5.
representation of data
Quality of
6.
Prototype/Model
7. Report preparation
8. Presentation
9. Defense
Marks:-
Marks obtained
Marks for Total
by the
Roll No. Name Of Student Group Work Marks
individual based
(06) (10)
on viva (04)
Signature: ________________________________________________
13
Maharashtra State Board of Technical Education, Mumbai
CERTIFICATE
Institute Seal
14