You are on page 1of 14

Mahavir Polytechnic, Nashik

(Year: 2023-2024)
Micro Project

Program: _________________________________________________

Semester: ___________________________________________________

Course: ___________________________________________________

Course Code: ___________________________________________________

Title of the Project: _________________________________________________

______________________________________________

Members of the Group

1. _______________________________ Roll No. __________

2. _______________________________ Roll No. __________

3. _______________________________ Roll No. __________

1
Mahavir Polytechnic

Vision

We strive to educate students to become industry ready engineers having professional attitude and
groomed personality.

Mission

 To provide well defined system to ensure quality education by strengthening teaching learning processes
through innovative practices
 To provide a platform where students are exposed to the industry, up bridged with the industry standards
and requirements.
 To train students by teaching them leadership and teamwork skills.
 To groom students enriching their personality and social values

IT Department

Vision
IT Department strives to educate students to become Industry ready Engineers having Professional attitude and
groomed personality.

Mission
 To provides well defined system to ensure quality education by strengthening teaching learning processes
through innovative practices.

 To provides a platform where students are exposed to the Industry, up bridged with the industry standards
and requirements.

 To train students by teaching them leadership and teamwork skills.

 To groom students enriching their personality and social values.

2
PART A
1.0 Brief Introduction

The project on "Security in Mobile Ad-hoc Networks (MANETs)" holds paramount importance in the
contemporary landscape of wireless communication. As MANETs become increasingly pervasive in applications
like emergency response and military operations, their vulnerability to security threats cannot be overstated.
This project addresses the critical need to fortify MANETs against potential risks, safeguarding the integrity,
confidentiality, and reliability of communication. By delving into the intricacies of MANET security, we aim to
equip students with practical skills, ensuring they emerge as industry-ready engineers with a profound
understanding of cybersecurity challenges in decentralized mobile networks.

2.0 Aim/Benefits of the Micro – Project

This Micro - Project aims at:


This Micro-Project aims to enhance students' understanding of cybersecurity challenges in Mobile Ad-
hoc Networks (MANETs) and develop practical skills in addressing these issues. By focusing on the security
aspects of MANETs, the project seeks to empower students with hands-on experience in analyzing,
implementing, and improving security protocols. The benefits extend beyond theoretical knowledge, providing
a platform for students to cultivate problem-solving abilities, teamwork, and effective communication skills.
Ultimately, the aim is to produce industry-ready engineers equipped to contribute meaningfully to the secure
and efficient functioning of decentralized mobile networks.

3.0 Course Outcomes Addressed

1. Comprehensive Understanding of MANETs:


 Develop a deep understanding of the principles, characteristics, and challenges associated with Mobile
Ad-hoc Networks (MANETs).
 Gain insights into the dynamic nature of MANETs, including their self-organizing capabilities and the
implications for security.
2.Security Analysis and Evaluation:
 Acquire the ability to conduct thorough security analyses of MANETs, identifying vulnerabilities and
potential threats.
 Learn to critically evaluate existing security mechanisms and protocols within the context of
decentralized mobile networks.
3. Practical Implementation of Security Measures:
 Apply theoretical knowledge to practical scenarios by implementing and testing security measures
within simulated MANET environments.
 Demonstrate proficiency in deploying and customizing security protocols to address specific
vulnerabilities and enhance network resilience.
4. Teamwork and Communication Skills:
 Cultivate effective teamwork and communication skills through collaborative efforts within the project.
 Engage in group activities that mirror real-world industry dynamics, emphasizing the importance of
clear communication and coordination in addressing complex security challenges in MANETs.

3
4.0 Proposed Methodology

The methodology for this microproject involves a multifaceted approach, integrating


theoretical understanding with hands-on practical experience. Initially, students will
undergo an in-depth study of MANETs, focusing on their characteristics and security
challenges. This theoretical foundation will be followed by the exploration of existing
security mechanisms through literature review and analysis. Subsequently, students will
engage in simulated environments, utilizing tools such as NS-3, to implement and
evaluate security protocols. Emphasis will be placed on collaborative work, mirroring
industry dynamics, to foster teamwork and effective communication. The iterative
nature of the project will allow for continuous improvement, ensuring students gain
practical skills and a comprehensive understanding of MANET security.

Progress Report / Weekly Report

Week Duration Sign of the


Date Work / Activity Performed
No in Hrs. Faculty
Project Overview
1
( Project Title , Project Team Members )

2 Conducted literature review

3 Identified MANET challenges

4 Selected security protocols

5 Set up NS-3 simulation

6 Implemented security measures

7 Collaborated on team tasks

8 Finalized technical report

4
5.0 Resources Required (major resources such as PC, some machining facility, Software etc.)

Name Of
Sr. No Specifications Quantity Remarks
Resource/Material

1 Personal Computers (PC) Adequate specifications for 1 Ensure all team


simulation and software members have
requirements access.
2 NS-3 Simulation Tool Version - Ns-3.39 released 1 (Shared Essential for creating
among team) and analyzing MANET
scenarios.

3 Security Analysis Software Wireshark , Nmap 2 Required for


identifying
vulnerabilities.

4 Documentation Tools Google Docs 1 For creating project


reports and
documentation.

Sign of Course Teacher

5
MICROPROJECT REPORT
1.0 Rationale

This project is pivotal in addressing the critical need for fortified security in Mobile Ad-hoc Networks (MANETs).
As MANETs become ubiquitous in emergency response and military applications, understanding and mitigating
security threats are paramount. This initiative equips students with practical skills, ensuring they emerge as
adept engineers well-versed in securing decentralized mobile networks.

2.0 Aim/Benefits of the Micro – Project

This Micro - Project aims at: This micro-project aims to deepen students' comprehension of MANET security
challenges, offering practical experience in analyzing, implementing, and enhancing security protocols. By
focusing on real-world applications, it cultivates problem-solving skills and teamwork. The benefits extend
beyond theoretical knowledge, fostering industry-ready engineers capable of fortifying the security
infrastructure of dynamic mobile networks

COs addressed by the Micro Project:

CO1: Comprehensive Understanding of MANETs

CO2: Security Analysis and Evaluation:

CO3: Practical Implementation of Security Measures:

CO4: Teamwork and Communication Skills:

3.0 Literature Review

The literature review delves into existing research, providing insights into the security landscape of Mobile Ad-
hoc Networks (MANETs). Analyzing pertinent studies and articles, it identifies common security challenges, such
as routing attacks and resource constraints. Moreover, the review highlights current security mechanisms and
protocols employed in MANETs, forming a foundation for the project's exploration of innovative approaches to
enhance the security posture of these dynamic, decentralized networks

6
4.0 Actual Methodology

The methodology involves a multi-phased approach. Starting with an in-depth literature review to understand
existing security protocols, the project transitions to hands-on implementation using simulation tools like NS-3.
This phase includes setting up and customizing MANET scenarios, implementing selected security measures, and
conducting iterative simulations. Simultaneously, the team collaborates on analysis and documentation,
ensuring a comprehensive understanding of security challenges and practical skills in proposing and evaluating
security enhancements for MANETs. Regular team meetings and feedback loops contribute to an iterative and
dynamic project methodology.

5.0 Actual Resources Used (major resources such as PC, some machining facility, Software etc.)

Name Of
Sr. No Specifications Quantity Remarks
Resource/Material

1 Personal Computers (PC) Adequate specifications for 1 Ensure all team


simulation and software members have
requirements access.
2 NS-3 Simulation Tool Version - Ns-3.39 released 1 (Shared Essential for creating
among team) and analyzing MANET
scenarios.

3 Security Analysis Software Wireshark , Nmap 2 Required for


identifying
vulnerabilities.

4 Documentation Tools Google Docs 1 For creating project


reports and
documentation.

7
6.0 Outputs of the Micro-Projects
Wireshark

Host Information from Dynamic Host Configuration Protocol (DHCP) Traffic

Any host generating traffic within a network should have three identifiers: a MAC address, an IP address and
a hostname.

Our first pcap for this tutorial is Wireshark-tutorial-identifying-hosts-and-users-1-of-5.pcap. This pcap is based
on traffic to and from an Ethernet address at f8:ff:c2:04:a5:7b.

Using our basic web filter, we can correlate the IP address at 172.16.1[.]38 with its associated MAC address
at f8:ff:c2:04:a5:7b, as shown below in Figure 2.

8
Figure 2. Correlating an IP address with a MAC address.

DHCP traffic might reveal the hostname using this IP address. First, type dhcp in the Wireshark filter bar to filter
for DHCP traffic, as shown below in Figure 3.

Figure 3. Filtering on DHCP traffic in Wireshark.

Select the first frame in the results, the one that displays DHCP Request in the Info column. Then go to the frame
details section and expand the line for Dynamic Host Configuration Protocol (Request), as shown below in Figure
4.

9
Figure 4. Expanding the Dynamic Host Configuration Protocol line from a DHCP request.

Scroll down the frame details section, then expand the lines for Option: (50) Requested IP Address and Option:
(12) Host Name as indicated below in Figure 5. This reveals the client’s MAC address at f8:ff:c2:04:a5:7b with
hostname jeremiahs-MBP and a requested IP address of 172.16.1[.]38.

Figure 5. Correlating the MAC address, IP address and hostname from DHCP traffic.

By default, Wireshark attempts to resolve the first 3 bytes of a MAC address to a vendor identification. In Figure
5, the vendor identification of the MAC address shows Apple_. That and the hostname ending with MBP indicate
this might be an Apple MacBook Pro. This pcap also contains traffic to various Apple domains, further indicating
this is an Apple host.

However, mobile devices often anonymize MAC addresses and users can easily change these to spoof different
vendors. Due to anonymization and spoofing, we should never base host identification solely on a MAC address.

Host Information from NetBIOS Name Service (NBNS) Traffic

Depending on how frequently a DHCP lease is renewed, we might not have DHCP traffic in our pcap.
Fortunately, we can use NBNS traffic to identify hostnames for computers running Microsoft Windows or Apple
hosts running macOS.

Filter on nbns for our first pcap and review details under the Info column. This should reveal the same hostname
we previously found in the DHCP traffic, displaying JEREMIAHS-MBP, as noted below in Figure 6.

Fig
ure 6. Finding the hostname from NBNS traffic in our first pcap.

To examine NBNS traffic from a Windows host, open our second pcap Wireshark-tutorial-identifying-hosts-and-
users-2-of-5.pcap and filter on nbns.

This pcap is from a MAC address at 78:c2:3b:b8:93:e8 using an internal IP address of 172.16.1[.]101. The
Windows hostname is DESKTOP-HVKYP4S as shown below in Figure 7.

10
Figure

7. Correlating the MAC address, IP address and hostname filtering on NBNS traffic.

Device Models and Operating System (OS) from HTTP Traffic

Unencrypted HTTP traffic to a web browser can reveal the OS. This information is contained in the User-Agent
line from the HTTP request headers.

11
7.0 Skill Developed / Learning outcome of this Micro-Project
Technical Proficiency
Outcome: Acquired a proficient understanding of MANETs, including security challenges and the implementation of
security protocols using tools like NS-3.

Problem-Solving Skills:
Outcome: Developed the ability to identify and address security vulnerabilities in dynamic, decentralized networks
through systematic problem-solving approaches.

Teamwork and Collaboration


Outcome: Cultivated effective teamwork and collaboration skills through regular team meetings, collaborative
decision-making, and shared responsibilities.

Communication Skills
Outcome: Enhanced communication skills through the creation of comprehensive reports, presentations, and the
articulation of complex security concepts to peers and faculty.

8.0 Applications of this Micro-Project


Cybersecurity Education:
The micro-project serves as an educational resource for students and professionals interested in cybersecurity,
providing practical insights into securing Mobile Ad-hoc Networks (MANETs).
Research and Development:
Findings and methodologies can be valuable for researchers working on enhancing the security of dynamic and
decentralized networks, contributing to advancements in the field.
Industry-Relevant Skills:
The skills developed in the micro-project, including security analysis, simulation, and documentation, align with
industry needs, preparing students for careers in cybersecurity and network engineering.
Network Design and Deployment:
The project outcomes can inform the design and deployment of secure mobile ad-hoc networks in practical
applications, such as emergency response systems and military communication networks. Security Protocols
Enhancement: The proposed enhancements to security protocols can be considered by practitioners working on
improving the security of MANETs in real-world applications. Educational Materials for Workshops and Courses:

12
Teacher Evaluation Sheet for Micro Project

Rubrics for Assessment of Micro-Project

Average Good Excellent


Characteristic to be Poor
Sr. No (Marks 9-
Assessed (Marks 1-3)
(Marks 4-5) (Marks 6-8)
10)

1. Relevance to course

2. Literature survey

3. Project proposal

4. Completion of target
Analysis &
5.
representation of data
Quality of
6.
Prototype/Model
7. Report preparation

8. Presentation

9. Defense
Marks:-

Marks obtained
Marks for Total
by the
Roll No. Name Of Student Group Work Marks
individual based
(06) (10)
on viva (04)

Name and designation of Faculty Member_______________________________________

Signature: ________________________________________________
13
Maharashtra State Board of Technical Education, Mumbai

CERTIFICATE

This is to certify that Mr. /Ms __________________________________________

Roll No. ________of _____ Semester of Diploma in _______________Engineering of

Mahavir Polytechnic has completed the Micro Project satisfactorily in course

________________________________________ (___________) for the academic

year 20__-20__ as prescribed in the curriculum.

Place ______________ Enrolment No ______________________

Date _______________ Exam Seat No _______________________

Course Coordinator HOD Principal

Institute Seal

14

You might also like