Presentation is loading. Please wait.

Presentation is loading. Please wait.

ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013.

Similar presentations


Presentation on theme: "ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013."— Presentation transcript:

1 ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

2 KING COLLEGE OF TECHNOLOGY (Approved by AICTE and Affiliated to Anna University, Chennai) Nallur, N.Pudupatty (PO), Namakkal – 637020. JULY 2013

3 A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks Under The Guidance of Mrs. P.NANDHINI MCA.,M.Phil,[Ph.D] Assistant Professor In Department of MCA Done By Student Name : M.Jerald Reg. No: 104501607012 Year : Final Year MCA

4 A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks

5 ABSTRACT Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs).

6 EXISTING SYSTEM In wireless communication systems, it is easier for a global observer to mount traffic analysis attacks by following the packet forwarding path than in wired networks. Therefore, traceability is highly desirable such as in e-cash systems where it is used for detecting and tracing double-spenders.

7 PROPOSED SYSTEM PROPOSED SYSTEM We are motivated by resolving the above security conflicts, namely anonymity and traceability, in the emerging WMN communication systems. Furthermore, the proposed pseudonym technique renders user location information unexposed.

8 SYSTEM SPECIFICATION SYSTEM SPECIFICATION HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk: 40 GB. Floppy Drive: 1.44 Mb. Monitor: 15 VGA Colour. Mouse: Logitech. Ram: 256 Mb. SOFTWARE REQUIREMENTS: Operating system : Windows XP Professional Front End : JAVA, Swing(JFC),J2ME Tool : j2me wireless toolkit 2.5.2

9 SOFTWARE SPECIFICATION SOFTWARE SPECIFICATION Java Technology Java technology is both a programming language and a platform.  Secure High performance  Interpreted  Multithreaded  Robust  Dynamic

10 JDBC Goals Java Program Compilers Interpreter My Program

11 PROJECT DESCRIPTION PROBLEM DEFINITION A large number of studies on multi-hop wireless networks have been devoted to system stability while maximizing These metrics measure the performance of a system over a long time-scale.

12 OVERVIEW OF THE PROJECT we analyze a multi-hop wireless network with multiple source-destination pairs, given routing and traffic information

13 MODULE DESCRIPTION Blind Signature Ticket Issuance Fraud Detection Fundamental security objectives

14 BLIND SIGNATURE Blind signature scheme such that the message being signed must contain encoded information. user in the blind signature scheme to embed some account-related secret information into what is being signed by the bank The restrictiveness property is essentially the guarantee for traceability in the restrictive blind signature systems.

15 TICKET ISSUANCE In order to maintain security of the network against attacks and the fairness among clients Each client by issuing tickets based on the misbehavior history of the client Ticket issuance occurs when the client initially attempts to access the network or when all previously issued tickets are depleted.

16 FRAUD DETECTION Fraud is used interchangeably with misbehavior in this paper, which is essentially an insider attack. which causes the server manager to constrain his ticket requests

17 FUNDAMENTAL SECURITY OBJECTIVES FUNDAMENTAL SECURITY OBJECTIVES It is trivial to show that our security architecture satisfies the security requirements for authentication, data integrity, and confidentiality We are only left with the proof of non- repudiation in this category. A fraud can be repudiated only if the client can provide a different representation, he knows of message from what is derived by the server manager

18 SYSTEM DESIGN  Architecture.

19 Data Flow Diagram

20 Admin

21 User

22 SEQUENCE DIAGRAM

23 Admin

24 User

25 ACTIVITY DIAGRAM ACTIVITY DIAGRAM

26 Admin

27 User

28 COMPONENT DIAGRAM COMPONENT DIAGRAM

29 Admin

30 User

31 Output Screens:

32

33

34

35

36 CONCLUSION we propose SAT, a security architecture mainly consisting of the ticket-based protocols, which resolves the conflicting security requirements of unconditional anonymity for honest users and traceability of misbehaving users. By utilizing the tickets, self-generated pseudonyms, and the hierarchical identity- based cryptography, the proposed architecture is demonstrated to achieve desired security objectives and efficiency.

37 FUTURE ENHANCEMENT In the WMNs considered here, the uplink from the client to the mesh router may rely on multihop communications Peer clients act as relaying nodes to forward each other’s traffic to the mesh router, which forms a P2P networ The notorious problem common in P2P communication systems is the free-riding

38 THANK YOU

39 Queries ?


Download ppt "ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013."

Similar presentations


Ads by Google