Beruflich Dokumente
Kultur Dokumente
ACKNOWLEDGEMENT
First and foremost, we record our sincere thanks to Almighty GOD and our
beloved parents who provided us this chance during our tenure in college. We are
grateful to our college & Dr.PRINCIPAL NAME M.E, PhD,our beloved
principal.
We are also thankful to Mrs.HOD NAME B.Tech , Head of the Department
of Computer Science And Engineering for providing the necessary facilities during
the execution of our project work. We also thank for her valuable suggestions,
advice, guidance and constructive ideas in each and every step, which was indeed a
great need towards the successful completion of the project.
This project would not have been a success without my Internal guide. So, I
would extend my deep sense of gratitude to my Internal guide Ms. GUIDE NAME
B.Tech., for the effort she took in guiding me in all the stages of completion of my
project work..
We are very much indebted to our external guide Mr.XXXX B.E, project
guide of COMPANY NAME for relentlessly supporting us with technical
guidance throughout our project work .
PROJECT MEMBER1
PROJECT MEMEBER2
ABSTRACT
A handover authentication module in mobile networks enables mobile nodes to
securely and seamlessly roam over multiple access points. However, designing an
appropriate handover authentication protocol is a difficult task because wireless
networks are susceptible to attacks, and mobile nodes have limited power and
processing capability. In this article, we identify the security and efficiency
requirements of a good handover authentication protocol and analyze the existing
related protocols, and show that many such protocols are either insecure or in
efficient. Then we proposes the ecc-based encryption and proposed the conditions
in which the perfect secrecy is obtained. Security of data is an issue that is of
significant interest. In this paper, we propose ecc-based data encryption system.
ecc could also be treated as an encryption algorithm with good secrecy
LIST OF ABBREVIATIONS
SWNET - Social Wireless Networks
CP - Content Providers
EC - End Consumers
MANET - Mobile Ad-hoc Network
LRU - Least Recently Used
LFU - Least Frequently Used
BU - Boston University
ISP - Internet Service Provider
NLANR - National Lab for Applied Network Research
NS2 Network Simulator2
NGWS - Next Generation Window Service
CHAPTER 1- INTRODUCTION
1.1
Introduction
Vehicles:
Tomorrows cars will comprise many wireless communication systems
and mobility aware applications. Music, news, road conditions, weather reports,
and other broadcast information are received via digital audio broadcasting (DAB)
with 1.5 M-bits/s. For personal communication, a global system for mobile
communications (GSM) phone might be available offering voice and data
connectivity with 384 k-bits/s. For remote areas satellite communication can be
used, while the current position of the car is determined via global positioning
system (GPS). Additionally, cars driving in the same area build a local ad-hoc
network for fast information exchange in emergency situations or to help each
other keeping a safe distance. In case of an accident, not only will the airbag be
triggered, but also an emergency call to a service provider informing ambulance
and police. Cars with this technology are already available. Future cars will also
inform other cars about accidents via the ad hoc network to help them slow down
in time, even before a driver can recognize the accident. Buses, trucks, and train
are already transmitting maintenance and logistic information to their home base,
which helps o improve organization (fleet management), and thus save time and
money.
2.
Emergency:
Just imagine the possibilities of an ambulance with a high quality
4. Ease of research:
Research has been made easier, since users will go to the field and search for facts
and feed them back to the system. It has also made it easier for field officer and
researchers to collect and feed data from wherever they without making
unnecessary trip to and from the office to the field.
5. Entertainment:
Video and audio recordings can now be streamed on the go using mobile
computing. It's easy to access a wide variety of movies, educational and
informative material. With the improvement and availability of high speed data
connections at considerable costs, one is able to get all the entertainment they want
as they browser the internet for streamed data. One can be able to watch news,
movies, and documentaries among other entertainment offers over the internet.
This was not such before mobile computing dawned on the computing world.
6. Streamlining of Business Processes:
Business processes are now easily available through secured connections. Basing
on the factor of security, adequate measures have been put in place to ensure
authentication and authorization of the user accessing those services.
Some business functions can be run over secure links and also the sharing of
information between business partners. Also it's worth noting that lengthy
travelling has been reduced, since there is the use of voice and video conferencing.
Meetings, seminars and other informative services can be conducted using the
video and voice conferencing. This cuts down on travel time and expenditure.
VEHICULAR AD HOC NETWORKS (VANETS)
Vehicular ad hoc networks (VANETs) have been quite a hot research area in the last few years.
Due to their unique characteristics such as high dynamic topology and predictable mobility,
VANETs attract so much attention of both academia and industry. In this paper, we provide an
overview of the main aspects of VANETs from a research perspective. This paper starts with the
basic architecture of networks, then discusses three popular research issues and general research
methods, and ends up with the analysis on challenges and future trends of VANETs.
INTRODUCTION
Recently, with the development of vehicle industry and wireless communication technology,
vehicular ad hoc networks are becoming one of the most promising research fields.
VANETs which use vehicles as mobile nodes are a subclass of mobile ad hoc networks
(MANETs) to provide communications among nearby vehicles and between vehicles and nearby
roadside equipment but apparently differ from other networks by their own characteristics.
Specifically, the nodes (vehicles) in VANETs are limited to road topology while moving, so if the
road information is available, we are able to predict the future position of a vehicle; what is
more, vehicles can afford significant computing, communication, and sensing capabilities as well
as providing continuous transmission power themselves to support these functions .
However, VANETs also come with several challenging characteristics, such as potentially large
scale and high mobility. Nodes in the vehicular environment are much more dynamic because
most cars usually are at a very high speed and change their position constantly. The high mobility
also leads to a dynamic network topology, while the links between nodes connect and disconnect
very often. Besides, VANETs have a potentially large scale which can include many participants
and extend over the entire road network .
It is precisely because of both of these unique attractive features and challenging characteristics
that VANETs could draw the attention from both industry and academia.
Therefore, several articles have tried to summarize the issues about vehicular networks. For
example, in the authors discuss the research challenges of routing in VANETs and then
summarize and compare the performance of routing protocols; Hartenstein and Laberteaux
present an overview on the communication and networking aspects of VANETs and summarize
the current state of the art at that time ; Raya and Hubaux address the security of VANETs
comprehensively and provide a set of security protocols as well ; in , the authors propose a
taxonomy of a large range of mobility models available for vehicular ad hoc networks. These
articles all reviewed specific research areas in VANETs. In addition, others papers like provide
comprehensive overview of applications, architectures, protocols, and challenges in VANETs and
especially introduce VANETs projects and standardization efforts in different regions (i.e., USA,
Japan, and Europe); Al-Sultan et al. provide detailed information for readers to understand the
main aspects and challenges related to VANETs, including network architecture, wireless access
technologies, characteristics, applications, and simulation tools .
Compared with these current articles, this paper adds the introduction of layered architecture for
VANETs so that the summary of network architecture is more complete. Also, we organize the
overview of the vehicular ad hoc networks in a novel way. That is, we introduce the VANETs
from the research perspective in the paper, including some current hot research issues and
general methods, which do good to the progress of VANETs. Moreover, we provide a more
comprehensive analysis on VANETs research challenges and future trends, beneficial for further
systematic research on VANETs. In summary, this paper covers basic architecture, some research
issues, general research methods of VANETs, and some key challenges and trends as well as
providing an overall reference on VANETs.
ARCHITECTURE
This part describes the system architecture of vehicular ad hoc networks. We first introduce the
main components of VANETs architecture from a domain view. Then, we explain their
interaction and introduce the communication architecture. Besides, we provide a presentation of
the layered architecture for VANETs.
MAIN COMPONENTS
According to the IEEE 1471-2000 and ISO/IEC 42010 architecture standard guidelines, we are
able to achieve the VANETs system by entities which can be divided into three domains: the
mobile domain, the infrastructure domain, and the generic domain .
As is shown in Figure 1, the mobile domain consists of two parts: the vehicle domain and the
mobile device domain. The vehicle domain comprises all kinds of vehicles such as cars and
buses. The mobile device domain comprises all kinds of portable devices like personal
navigation devices and smartphones.
However, the development of VANETs architecture varies from region to region. In the CAR-2X communication system which is pursued by the CAR-2-CAR communication consortium, the
reference architecture is a little different. CAR-2-CAR communication consortium (C2C-CC) is
the major driving force for vehicular communication in Europe and published its manifesto in
2007. This system architecture comprises three domains: in-vehicle, ad hoc, and infrastructure
domain.
As shown in Figure 2, the in-vehicle domain is composed of an on-board unit (OBU) and one or
multiple application units (AUs). The connections between them are usually wired and
sometimes wireless. However, the ad hoc domain is composed of vehicles equipped with OBUs
and roadside units (RSUs). An OBU can be seen as a mobile node of an ad hoc network and RSU
is a static node likewise. An RSU can be connected to the Internet via the gateway; RSUs can
communicate with each other directly or via multihop as well. There are two types of
infrastructure domain access, RSUs and hot spots (HSs). OBUs may communicate with Internet
via RSUs or HSs. In the absence of RSUs and HSs, OBUs can also communicate with each other
by using cellular radio networks (GSM, GPRS, UMTS, WiMAX, and 4G) [2].
performance and especially drivers fatigue and drowsiness, which is critical for driver and
public safety.
Vehicle-to-vehicle (V2V) communication can provide a data exchange platform for the drivers to
share information and warning messages, so as to expand driver assistance.
LITERATURE SURVEY
1) Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh
Networks
AUTHORS: Minho Jo, Longzhe Han, Dohoon Kim, and Hoh Peter In
(EMAS),
which
enjoys
both
computational
efficiency
and
track their interested vehicles by collecting and analyzing their traffic messages.
Hence, anonymous message authentication is an essential requirement of VANETs.
On the other hand, when a vehicle is involved in a dispute event of warning
message, the certificate authority should be able to recover the real identity of this
vehicle. To deal with this issue, we propose a new privacy-preserving
authentication protocol with authority traceability using elliptic curve based
chameleon hashing. Compared with existing schemes, our approach possesses the
following features: (1) mutual and anonymous authentication, (2) unlinkability, (3)
authority tracking capability and (4) high efficiency. We also demonstrate the
merits of our proposed scheme through extensive security analysis and
performance evaluation.
no. 1, 2011) and a distributed reprogramming protocol in [3] (IEEE Trans. Ind.
Electron., vol. 59, no. 11, 2012) for wireless networks. Both protocols are based on
an identity-based signature scheme which is claimed to be secure yet efficient.
Very recently, He et al. pointed out that such a signature scheme is vulnerable to
the key compromised problem. They proposed a simple modification to fix this
problem without losing the efficiency and security of the scheme in both [2] (IEEE
Commun. Lett., vol. 16, no. 8, 2012) and [4] (IEEE Trans. Ind. Electron., to
appear). In this letter, we show that the proposed modification remains vulnerable
to the key compromised problem
PROBLEM OVERVIEW
Daojing
He,
Sammy
Chan,
and
Mohsen
Guizani proposed a
and
others need a
minimum
as within
key
cryptosystem.
Additionally,
with relevance security functions, compared to the schemes of HashHand relax the
idea that the APs square measure trustworthy and wouldn't disclose users privacyrelated data. Moreover, HashHand will resist the DoS attacks against the two-party
approach that severely have an effect on the provision of APs.
DISADVANTAGES
It occupy high memory
It has session key process, one time session key will be changed pervious
data should be loss
GENERAL REQUIREMENTS
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:-
Processor
-Pentium III
Speed
1.1 Ghz
RAM
256 MB(min)
Hard Disk
- 20 GB
Floppy Drive
1.44 MB
Key Board
Mouse
Monitor
SVGA
SOFTWARE REQUIREMENTS:
Operating System
: LINUX
Tool
: Network Simulator-2
Front End
Language)
SOFTWARE DESCRIPTION
NS2. This increases the confidence in it. Versions are available for FreeBSD,
Linux, Solaris, Windows and Mac OS X.
STRUCTURE OF NS2
NS2 is built using object oriented methods in C++ and OTcl (object oriented
variant of Tcl.
made available to the OTcl interpreter through an OTcl linkage (tclcl) which maps
methods and member variables of the C++ object to methods and variables of the
linked OTcl object. The C++ objects are controlled by OTcl objects. It is possible
to add methods and member variables to a C++ linked OTcl object.
FUNCTIONALITIES OF NS2.33
Functionalities for wired, wireless networks, tracing, and visualization are
available in NS2.
Support for the wired world include
Routing DV, LS, and PIM-SM.
Transport protocols: TCP and UDP for unicast and SRM for multicast.
Traffic sources: web, ftp, telnet, cbr (constant bit rate), stochastic, real audio.
Different types of Queues: drop-tail, RED, FQ, SFQ, DRR.
Quality of Service: Integrated Services and Differentiated Services.
Emulation.
Support for the wireless world include
Ad hoc routing with different protocols, e.g. AODV, DSR, DSDV, TORA
Wired-cum-wireless networks
Mobile IP
Directed diffusion
Satellite
Senso-MAC
Multiple propagation models (Free space, two-ray ground, shadowing)
Energy models
Tracing
Visualization
Network Animator (NAM)
Trace Graph
Utilities
Mobile Movement Generator
and from a wireless channel etc. A major difference between them, though, is that a
MobileNode is not connected by means of Links to other nodes or mobilenodes. In
this section we shall describe the internals of MobileNode, its routing mechanisms,
the routing protocols dsdv, aodv, tora and dsr, creation of network stack allowing
channel access in MobileNode, brief description of each stack component, trace
support and movement/traffic scenario generation for wireless simulations.
MOBILE NODE: CREATING WIRELESS TOPOLOGY
MobileNode is the basic nsNode object with added functionalities like movement,
ability to transmit and receive on a channel that allows it to be used to create
mobile, wireless simulation environments. The class MobileNode is derived from
the base class Node. MobileNode is a split object. The mobility features including
node movement, periodic position updates, maintaining topology boundary etc are
implemented in C++ while plumbing of network components within MobileNode
itself (like classifiers, dmux , LL, Mac, Channel etc) have been implemented in
Otcl.
Table 5.1: Available Options For Node Configuration
Option
Available Values
Default
General
Address type
Flat, Hierarchical
Flat
MPLS
ON,OFF
OFF
ON,OFF
OFF
II Type
LL,LL/sat
OFF
Mac Type
Mac/802_11,Mac/Csma/Ca,
OFF
Mac/Sat/Unslotted/Aloha,Mac/Tdma
ifq Type
Queue/DropTail,
OFF
Queue/Droptail/PriQueue
Phy Type
Phy/wirelessPhy,Physat
Option
Available Values
OFF
Default
Satellite Oriented
satNodeType
Polar,Geo,Terminal,Geo-repeater
OFF
downlinkBW
OFF
Wireless Oriented
Adhoc Routing
DIFFUSION/RATE,DIFFUSION/PROB,
OFF
DSDV,FLOODING,OMNICAST,AODV,TORA
propType
Propagation/2RayGround,Propagation Shadowing
OFF
propInstance
Propagation/2RayGround,Propagation Shadowing
OFF
antType
Antenna/Omni Antenna
OFF
Channel
Channel/Wireless Channel,Channel/sat
OFF
topoInstance
<toplogy file>
OFF
MobileIP
ON,OFF
OFF
Energy model
Energy model
OFF
Initial Energy
<value in joules>
OFF
rxPower
<value in W>
OFF
txPower
<value in W>
OFF
Idle Power
<value in W>
OFF
AgentTrace
ON,OFF
OFF
routerTrace
ON,OFF
OFF
macTrace
ON,OFF
OFF
movementTrace
ON,OFF
OFF
Errproc
UniformErrorProc
OFF
FECProc
toraDebug
ON,OFF
?
OFF
PROPOSED SYSTEM:
We identify the security and efficiency requirements of a good handover
authentication protocol and analyze the existing related protocols, and show
that many such protocols are either insecure or inefficient. Then we review
a recently proposed protocol named ECC, which has been shown to
outperform all other protocols on security and efficiency.
Furthermore, we propose a ECC Based secure handover in cellular
network ,which
FLOW DIAGRAM
MODULES:
Network Formation
Key Generation
Key Sharing
Authentication verification
Performance Evaluation
MODULES DESCRIPTION:
Network Formation
We were able to secure a relatively strong signal strength in line of sight.
We were careful to ensure that devices were connected to the particular
target sector for the test scenario. We ensured that all the BSs were locked to
a particular carrier frequency throughout the experiments.
We ensured that the BSs were in the middle of each of the sectors we
measured, and that the radio environments for each of the BSs was as similar
as possible, while maintaining a half-wavelength separation between BSs.
Key Generation
A public key Q = (xQ,yQ) associated with a domain parameter
Key Sharing
Entity A has domain parameters D = (q, a, b, G, n, h) and
public key QA and private key dA. And entity B has authentic
If s = 0 then go to step 1.
IMPLEMENTATION ENVIRONMENT
Network simulator 2 is used as the simulation tool in this project. NS was chosen
as the simulator partly because of the range of features it provides and partly
because it has an open source code that can be modified and extended. There are
different versions of NS and the latest version is ns-2.1b9a while ns-2.1b10 is
under development
language program approach is that it allows for fast generation of large scenarios.
To simply use the simulator, it is sufficient to know
OTcl. On the other hand, one disadvantage is that modifying and extending the
simulator requires programming and debugging in both languages.
NS can simulate the following:
1. Topology: Wired, wireless
2. Sheduling Algorithms: RED, Drop Tail,
3. Transport Protocols: TCP, UDP
4. Routing: Static and dynamic routing
5. Application: FTP, HTTP, Telnet, Traffic generators
OTcl
Interpreter
Simulation
Results
C++
Libraries
Figure 5.1 Block diagram of Architecture of NS-2
NETWORK COMPONENTS
The root of the hierarchy is the TclObject class that is the super class of
all OTcl library objects (scheduler, network components, timers and the other
objects including NAM related ones). As an ancestor class of TclObject, NsObject
class is the super class of all basic network component objects that handle packets,
which may compose compound network objects such as nodes and links. The basic
network components are further divided into two subclasses, Connector and
Classifier, based on the number of the possible output DATA paths. The basic
network and
objects that have only one output DATA path are under the Connector class, and
switching objects that have possible multiple output DATA paths are under the
Classifier class.
CLASS TCL
The class Tcl encapsulates the actual instance of the OTcl interpreter and
provides the methods to access and communicate with that interpreter, code. The
class provides methods for the following operations:
1.obtain a reference to the Tel instance
2.invoke OTcl procedures through the interpreter
3.retrieve, or pass back results to the interpreter
4.report error situations and exit in an uniform manner
5.store and lookup "TclObjects"
6.acquire direct access to the interpreter.
1.Passing
+ method, it expects the result back in the private member variable, tcl-> result.
2.Error
by explicitly invoking the procedure, specifying the desired operation as the first
argument, or implicitly, as if
there were an instance procedure of the same name as the desired operation. Most
simulation scripts will use the latter form.
Consider the distance computation in SRM is done by the compiled
object. It is often used by the interpreted object. It is usually invoked as
$srmObject distance? (Agent Address)If there is no instance procedure called
distance? the interpreter will invoke the instance procedure unknown{}, defined in
the base class TclObject. The unknown procedure then invokes
$srmObject cmd distance? (agentAddress)
to execute the operation through the compiled object's command()
procedure. The user could explicitly invoke the operation directly. One reason for
this might be to overload the operation by using an instance procedure of the same
name.
For example,
Agent/SRM/Adaptive instproc distance? addr {
$self instvar distanceCache_($addr)
if![info exists distanceCache_($addr)] {
set distanceCache_($addr) [$self cmd distance? $addr]
}
set distanceCache_($addr)
}
The
following
shows
how
the
command()
method
using
SRMAgent::command()
'
}
}
return (SRMAgent::command(argc, argv));
are passed as strings. They must be converted to the appropriate data type. If the
operation is successfully matched, the match should return the result of the
operation, command () it must return either TCL_OK or TCL_ERROR to indicate
success or failure as its return code. If matched in this method, it must invoke its
parent's command method, and return the corresponding result. This permits the
user to conceive of operations as having the same inheritance properties as instance
procedures or compiled methods. In the event that this command method is defined
for a class with multiple inheritances, one of two implementations can be chosen
1.Either they can invoke one of the parent's command methods, and return the
result of that invocation.
2.They can each of the parent's command methods in some sequence, and return
the result of the first invocation that is successful. If none of them are successful,
then they should return an error.
MOBILE NETWORKING IN NS
The wireless model essentially consists of the Mobile Node at the core with
additional supporting features that allows simulations of multi-hop ad-hoc
networks, wireless LANs etc. The Mobile Node object is a split object. The C++
class Mobile Node is derived from parent class Node. A Mobile Node thus is the
basic Node object with added functionalities of a wireless and mobile node like
ability to move within a given topology, ability to receive and transmit signals to
and from a wireless channel etc. A major difference between them is that a mobile
Node is not connected by means of Links to other nodes or mobile nodes.
Mobile Node is the basic nsNode object with added functionalities like
movement, ability to transmit and receive on a channel that allows it to be used to
create mobile, wireless simulation environments. The class Mobile Node is derived
from the base class Node. The four ad-hoc routing protocols that are currently
supported are, Dynamic Source Routing (DSR), Temporally ordered Routing
Algorithm (TORA) and Adhoc On-demand Distance Vector (AODV).
-topolnstance $topo
-wiredRouting OFF
-agentTrace ON
-routerTrace OFF
-macTrace OFF
The above API configures for a mobile node with all the given values of
ad hoc-routing protocol, network stack, channel, topography, propagation model,
with wired routing turned on or off (required for wired-cum-wireless scenarios)
and tracing turned on or off at different levels (router, mac, agent).
VALUE
Protocols
ECC
Simulation Time
200 S
Number of nodes
50,48
Simulation Area
1000 m x 1000 m
Pause Time
0s
Network Simulator
NS 2.34
PERFORMANCE EVALUATION
In this section, evaluate the performance of simulation. We are using the
xgraph for evaluate the performance. We choose the some evaluation metrics:
Packet delivery ratio the ratio of the total number of packets received by the
destination node to the number of packet sent by the source, Packet loss the total
number of packet losses, during the data transmission, End-to-End delay the time
taken to be data transmitted from source node to destination node.
CONCLUSION
In this article, we have discussed the security and efficiency requirements of
handover authentication protocols. We have reviewed the recent developments of
such protocols. Although ECC outperforms all other proposed protocols, it Elliptic
curve cryptography can be a substitute for HashHand in efficacious applications
because of its efficiency in software as well as in hardware realizations. ECC offers
an enhanced security with shorter bit sizes than other cryptography functions.
Shorter key length is useful to save bandwidth, power, and it improves the
performance. The recent sensor devices have restricted computational power. In
order to realize 80 bit of security in ECC, it requirements 160bit parameters size,
and offers the same security level presented by 1024 bit RSA. Unlike the past,
combination in ECC catches the attention of experts because it can be used to build
cryptographic schemes that cannot be built in any other way.
[15] D. Freeman, Converting Pairing-Based Cryptosystems from CompositeOrder Groups to Prime-Order Groups, Proc. EUROCRYPT, vol. 6110 of
LNCS, 2010, pp. 44-61.