DOC PREVIEW
MASON ECE 646 - Secure Routing in Ad Hoc Networks

This preview shows page 1 out of 3 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Secure Routing in Ad Hoc NetworksFinal Project specifications for Class 646 ProjectSubmitted byMehul RevankarIntroduction to Ad Hoc Networks:Project Specification:Secure Ad-Hoc Routing – final draft Secure Routing in Ad Hoc Networks Final Project specifications for Class 646 Project Submitted by Mehul Revankar 1Secure Ad-Hoc Routing – final draft Introduction to Ad Hoc Networks: An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure. Each node participating in the network acts both as a host and a router. A number of routing protocols like Dynamic Source Routing (DSR), Ad Hoc On-Demand Distance Vector Routing (AODV), and Destination-Sequenced Distance-Vector (DSDV) have been implemented. Though, these protocols work well in routing the wireless traffic but they are vulnerable to many attacks. Therefore, there is a need of protocol, which not only provides the routing but also the security to the network and user data. In this paper, I explore the working and performance of secure extensions to these protocols. Project Specification: 1. I am planning to understand, analyze and compare protocols that provide security in Mobile Ad-Hoc networks. Ariadne, SEAD, ARAN. 2. I would like to evaluate to each protocol on the following grounds  Basic Underlying Assumptions • Conditions assumed for successful operation of protocol. • Key Setup assumptions.  Efficiency • Computational resources required • Energy Consumption • Average execution time for generation and authentication of keys  Security against following attacks • Attacks Using Modification • Attacks Using Impersonation • Attacks Using Fabrication • Advanced Attacks 1. Wormholes 2. Black holes 3. Rushing 4. Gray Hole 5. Partition of Network 6. Gratuitous Detour  Viability from Implementation point of view 2Secure Ad-Hoc Routing – final draft 3. I will try to identify the most secure and efficient protocol and try to propose guidelines to implement the same. 4. Format of tentative Final Report • Introduction to Ad-hoc Networks • Existing Ad-Hoc Protocols • Security Objectives • Threats and Attacks • Secure Routing Protocols • Security against Advanced Attacks • Analysis of Protocols • Conclusion • References 5. Time Schedule • Oct 7th - Study of all basic Protocols • Oct 15th - Review of other protocols that could be considered. • Oct 29th - Compare Protocols for security • Nov 12th - Comparison of protocols for Performance • Dec 3rd - Final Progress Report 6. Possible Changes I am not sure about the possible changes, but if I am able to implement ARAN I would like to conduct experiments on each protocol evaluate them for different parameters. 7. List of Literature • Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks”, MobiCom 2002, September 23-28, 2002, Atlanta, Georgia, USA • Yih-Chun Hu, David B. Johnson, Adrian Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Routing for Mobile Wireless Ad Hac Networks”, Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), pp. 3-13, IEEE, Calicoon, NY, June 2002 • http://signl.cs.umass.edu/arand/ • www.ece.cmu.edu/~adrian/projects/tesla-cryptobytes/ tesla-cryptobytes.pdf


View Full Document

MASON ECE 646 - Secure Routing in Ad Hoc Networks

Documents in this Course
Load more
Download Secure Routing in Ad Hoc Networks
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Secure Routing in Ad Hoc Networks and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Secure Routing in Ad Hoc Networks 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?