Visvesvaraya Technological University Jnana Sangam

Please download to get full document.

View again

of 4
9 views
PDF
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Document Description
VISVESVARAYA TECHNOLOGICAL UNIVERSITY Jnana Sangam, BELGAUM 590014 A Technical seminar report on “Security Threats in Ad-hoc Networks” BACHELOR OF ENGINEERING In Submitted in the partial fulfilment of the requirement for the award of degree INFORMATION SCIENCE ENGINEERING Submitted by: NISHANT KUMAR [1ST08IS067] Dept of Information science Engineering SAMBHRAM INSTITUTE OF TECHNOLOGY M.S Palya, Bangalore-560097 SAMBHRAM INSTITUTE OF TECHNOLOGY M.S Palya, Bangalore-560097 DEPARTMENT OF I
Document Share
Documents Related
Document Tags
Document Transcript
   VISVESVARAYA TECHNOLOGICAL UNIVERSITY  Jnana Sangam, BELGAUM 590014   A Technical seminar report on “ Security Threats in Ad-hoc Networks ”  Submitted in the partial fulfilment of the requirement for the award of degree BACHELOR OF ENGINEERING   In   INFORMATION SCIENCE ENGINEERING   Submitted by: NISHANT KUMAR [1ST08IS067]   Dept of Information science Engineering  SAMBHRAM INSTITUTE OF TECHNOLOGY M.S Palya, Bangalore-560097   SAMBHRAM INSTITUTE OF TECHNOLOGY M.S Palya, Bangalore-560097   DEPARTMENT OF INFORMATION SCIENCE ENGINEERING.   CERTIFICATE   This is to certify that the SEMINAR entitled “ Security Threats in Ad-hoc Networks ” has been successfully presented by NISHANT KUMAR(1ST08IS067 ) student of finalsemester B.E (Electronics & Communication) for the fulfillment of the requirement forthe graduate degree in Electronics & Communication Engineering of  VISVESVARAYATECHNOLOGICAL UNIVERSITY during the academic year 2011-2012 .   Seminar Co-ordinator HOD,ECE   ( ) ( )   ABSTRACT   Ad-hoc networks are an emerging area of mobile computing. There are variouschallenges that are faced in the Ad-hoc environment. These are mostly due to theresource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set upelaborate networks. Ad-hoc networks therefore throw up new requirements andproblems in all areas of networking. The solutions for conventional networks areusually not sufficient to provide efficient Ad-hoc operations. The wireless natureof communication and lack of any security infrastructure raise several securityproblems. In this paper we attempt to analyze the demands of Ad-hocenvironment. We focus on three areas of Ad-hoc networks, key exchange andmanagement, Ad-hoc routing, and intrusion detection. The key issues concerningthese areas have been addressed here. We have tried to compile solutions tothese problems that have been active areas of research. Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish tocommunicate without any fixed infrastructure and pre determinedorganization of available links. The nodes in MANET themselves are responsible fordynamicallydiscovering other nodes to communicate. Although the on going trend is toadopt adhoc networks for commercial uses due to their certain unique properties, the mainchallenge is the vulnerability to security attacks. A number of challenges like openpeer-to-peer network architecture, stringent resource constraints, sharedwirelessmedium, dynamic network topology etc. are posed in MANET. AsMANET is quicklyspreading for the property of its capability in formingtemporary network without the aidof any established infrastructure or centralizedadministration, security challenges has become a primary concern to providesecure communication. In this thesis, we identify the existent security threats an ad  hoc network faces, the security services required to be achieved and thecountermeasures for attacks in each layer. To accomplish our goal, we have doneliterature survey in gathering information related to various types of attacks andsolutions, as well as we have made comparative study to address the threats indifferent layers. Finally, we have identified the challenges and proposed solutionsto overcome them. In our study, we have found that necessity of secure routingprotocol is still a burning question.   Contents   1.Introduction . 1.1 Security Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..1 1.2 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 1.3 KeyManagement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.4 Secure Routing . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... 2 2. Key Agreement in Wireless Ad-hocNetworks   2.1 New key agreement scenario…………………………………….….3 2.2Password based Authenticated Key Exchange……………...……..3 2.3 Password authenticated Diffie - Hellman key exchange…………..6 3. Secure routing in Ad-hocnetworks 3.1 Problems associated with Ad- hoc routing……………………..........9 3.2 Solutions to problems in Ad-hoc-r outing…………………………...13 4. Intrusiondetection in wireless ad-hoc networks 4.1 Need for intrusion detection………………………………………….27 4.2 Generaloverview……………………………………………………..27 4.3 Unsuitability of the Current IDS techniques for Ad- hoparadigm…….28 4.4 New propose d architecture………………………………….………...29 4.5 Anomal detection in wireless ad- hoc netwok………………………....31 5.Conclusion …………………………………………………………………………………………..33   6. References ................................................................................................34  
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks