SlideShare a Scribd company logo
A Secure Protocol for Spontaneous Wireless Ad Hoc
Networks Creation
ABSTRACT:
This paper presents a secure protocol for spontaneous wireless ad hoc networks
which uses a hybrid symmetric/ asymmetric scheme and the trust between users in
order to exchange the initial data and to exchange the secret keys that will be used
to encrypt the data. Trust is based on the first visual contact between users. Our
proposal is a complete self-configured secure protocol that is able to create the
network and share secure services without any infrastructure. The network allows
sharing resources and offering new services among users in a secure environment.
The protocol includes all functions needed to operate without any external support.
We have designed and developed it in devices with limited resources. Network
creation stages are detailed and the communication, protocol messages, and
network management are explained. Our proposal has been implemented in order
to test the protocol procedure and performance. Finally, we compare the protocol
with other spontaneous ad hoc network protocols in order to highlight its features
and we provide a security analysis of the system.
EXISTING SYSTEM:
The existing system objective is the integration of services and devices in the same
environment, enabling the user to have instant service without any external
infrastructure. Because these networks are implemented in devices such as laptops,
PDAs or mobile phones, with limited capacities, they must use a lightweight
protocol, and new methods to control, manage, and integrate them. Methods based
on imitating the behavior of human relations facilitate secure integration of
services in spontaneous networks. Furthermore, cooperation among the nodes and
quality of service for all shared network services should be provided.
DISADVANTAGES OF EXISTING SYSTEM:
All nodes may not be able to execute routing and/or security protocols.
Energy constraints, node variability, error rate, and bandwidth limitations
mandate the design and use of adaptive routing and security mechanisms, for
any type of devices and scenarios.
Dynamic networks with flexible memberships, group signatures, and
distributed signatures are difficult to manage.
To achieve a reliable communication and node authorization in mobile ad
hoc networks, key exchange mechanisms for node authorization and user
authentication are needed security methods such as pre-distribution key
algorithms, symmetric and asymmetric algorithms, intermediate node-based
methods, and hybrid methods.
But these methods are not enough for spontaneous networks because they
need an initial configuration or external authorities
PROPOSED SYSTEM:
The network and protocol proposed in this paper can establish a secure self-
configured environment for data distribution and resources and services sharing
among users. Security is established based on the service required by the users, by
building a trust network to obtain a distributed certification authority. A user is
able to join the network because he/she knows someone that belongs to it. Thus,
the certification authority is distributed between the users that trust the new user.
The network management is also distributed, which allows the network to have a
distributed name service. We apply asymmetric cryptography, where each device
has a public-private key pair for device identification and symmetric cryptography
to exchange session keys between nodes. There are no anonymous users, because
confidentiality and validity are based on user identification.
ADVANTAGES OF PROPOSED SYSTEM:
We presented the basis to setup a secure spontaneous network
To solve mentioned security issues, we used an authentication phase and a
trust phase
We presented a mechanism to allow nodes to check the authenticity of their
IP addresses while not generating duplicated IP addresses. The mechanism
helps nodes to authenticate by using their IP addresses. We have used this
mechanism in the secure protocol presented in this paper, but it can be
replaced by any other IP address assignment mechanism.
ALGORITHMS USED:
 Algorithm1- Algorithm for joining a new node.
 Algorithm2- New network creation procedure.
 Algorithm 3-Algorithm when data packets are received.
Algorithm1- Algorithm for joining a new node.
Algorithm2- New network creation procedure
A secure protocol for spontaneous wireless ad hoc networks creation
Algorithm 3-Algorithm when data packets are received.
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Raquel Lacuesta, Jaime Lloret, Senior Member, IEEE, Miguel Garcia, Student
Member, IEEE, and Lourdes Pen˜ alver-“ A Secure Protocol for Spontaneous
Wireless Ad Hoc Networks Creation”- IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 4, APRIL 2013.

More Related Content

DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
PPS
Iuwne10 S04 L02
PPTX
Wireless Network security
PPTX
Wireless network security
PDF
Privacypreservingdelegatedaccesscontrolinpublicclouds
PDF
Privacy Preserving Delegated Access Control in Public Clouds
DOCX
Security analysis of a privacy preserving decentralized key-policy attribute-...
A secure protocol for spontaneous wireless ad hoc networks creation
Iuwne10 S04 L02
Wireless Network security
Wireless network security
Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacy Preserving Delegated Access Control in Public Clouds
Security analysis of a privacy preserving decentralized key-policy attribute-...

What's hot (19)

PPTX
Lecture 07 networking
PPTX
Wireless Network Security
PDF
a famework for analyzing template security and privacy in biometric authenti...
DOCX
message passing interface
PPTX
Wireless network security
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
PPTX
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
PPTX
IP Protocol Security
DOCX
Control cloud data access privilege and
DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
DOCX
privacy-preserving and content-protecting location based queries
PPTX
Analysis the Privacy preserving and content protecting location based on queries
DOC
Privacy preserving and content-protecting location based queries
PPTX
PROTOCOL MECHNISM FOR SECURITY ppt
DOCX
Attribute based encryption with verifiable outsourced decryption
DOCX
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
PPTX
Wireless security
PPTX
Attributes based encryption with verifiable outsourced decryption
Lecture 07 networking
Wireless Network Security
a famework for analyzing template security and privacy in biometric authenti...
message passing interface
Wireless network security
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
IP Protocol Security
Control cloud data access privilege and
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
privacy-preserving and content-protecting location based queries
Analysis the Privacy preserving and content protecting location based on queries
Privacy preserving and content-protecting location based queries
PROTOCOL MECHNISM FOR SECURITY ppt
Attribute based encryption with verifiable outsourced decryption
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
Wireless security
Attributes based encryption with verifiable outsourced decryption
Ad

Viewers also liked (17)

DOCX
Security analysis of a single sign on mechanism for distributed computer netw...
DOCX
A privacy leakage upper bound constraint based approach for cost-effective pr...
DOCX
A method for mining infrequent causal associations and its application in fin...
DOCX
A decentralized service discovery approach on peer to-peer networks
DOCX
Protecting sensitive labels in social network data anonymization
DOCX
Dcim distributed cache invalidation method for maintaining cache consistency ...
DOCX
Mobi sync efficient time synchronization for mobile underwater sensor networks
DOCX
An efficient and robust addressing protocol for node auto configuration in ad...
DOCX
Privacy preserving data sharing with anonymous id assignment
DOCX
A system for denial of-service attack detection based on multivariate correla...
DOCX
Qos ranking prediction for cloud services
PDF
2013 2014 ieee dotnet project titles
DOCX
Optimizing cloud resources for delivering iptv services through virtualization
DOC
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
DOCX
Optimal client server assignment for internet distributed systems
DOCX
Cloud ftp a case study of migrating traditional applications to the cloud
DOCX
Query adaptive image search with hash codes
Security analysis of a single sign on mechanism for distributed computer netw...
A privacy leakage upper bound constraint based approach for cost-effective pr...
A method for mining infrequent causal associations and its application in fin...
A decentralized service discovery approach on peer to-peer networks
Protecting sensitive labels in social network data anonymization
Dcim distributed cache invalidation method for maintaining cache consistency ...
Mobi sync efficient time synchronization for mobile underwater sensor networks
An efficient and robust addressing protocol for node auto configuration in ad...
Privacy preserving data sharing with anonymous id assignment
A system for denial of-service attack detection based on multivariate correla...
Qos ranking prediction for cloud services
2013 2014 ieee dotnet project titles
Optimizing cloud resources for delivering iptv services through virtualization
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
Optimal client server assignment for internet distributed systems
Cloud ftp a case study of migrating traditional applications to the cloud
Query adaptive image search with hash codes
Ad

Similar to A secure protocol for spontaneous wireless ad hoc networks creation (20)

DOCX
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A secure protocol for spontaneous...
PDF
Cn36539543
PDF
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
PDF
Enhanced security in spontaneous wireless ad hoc
PDF
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
PDF
ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENC...
PDF
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
DOCX
Secure final
PDF
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
PDF
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
PDF
Protecting location privacy in sensor networks against a global eavesdropper
PDF
Protecting location privacy in sensor networks against a global eavesdropper
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
DOCX
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
PDF
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
DOCX
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
DOCX
Providing user security guarantees in public infrastructure clouds
PPTX
Ecommerce final ppt
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
PPTX
Information Technology Strategy by Group 3
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A secure protocol for spontaneous...
Cn36539543
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
Enhanced security in spontaneous wireless ad hoc
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENC...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Secure final
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
Providing user security guarantees in public infrastructure clouds
Ecommerce final ppt
Two Aspect Validation Control Frameworks for Online Distributed Services
Information Technology Strategy by Group 3

Recently uploaded (20)

PPTX
master seminar digital applications in india
PDF
01-Introduction-to-Information-Management.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Pre independence Education in Inndia.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Basic Mud Logging Guide for educational purpose
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Cell Types and Its function , kingdom of life
master seminar digital applications in india
01-Introduction-to-Information-Management.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
VCE English Exam - Section C Student Revision Booklet
Pre independence Education in Inndia.pdf
Anesthesia in Laparoscopic Surgery in India
2.FourierTransform-ShortQuestionswithAnswers.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Institutional Correction lecture only . . .
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Sports Quiz easy sports quiz sports quiz
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPH.pptx obstetrics and gynecology in nursing
Basic Mud Logging Guide for educational purpose
O5-L3 Freight Transport Ops (International) V1.pdf
Classroom Observation Tools for Teachers
Cell Types and Its function , kingdom of life

A secure protocol for spontaneous wireless ad hoc networks creation

  • 1. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation ABSTRACT: This paper presents a secure protocol for spontaneous wireless ad hoc networks which uses a hybrid symmetric/ asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. Trust is based on the first visual contact between users. Our proposal is a complete self-configured secure protocol that is able to create the network and share secure services without any infrastructure. The network allows sharing resources and offering new services among users in a secure environment. The protocol includes all functions needed to operate without any external support. We have designed and developed it in devices with limited resources. Network creation stages are detailed and the communication, protocol messages, and network management are explained. Our proposal has been implemented in order to test the protocol procedure and performance. Finally, we compare the protocol with other spontaneous ad hoc network protocols in order to highlight its features and we provide a security analysis of the system.
  • 2. EXISTING SYSTEM: The existing system objective is the integration of services and devices in the same environment, enabling the user to have instant service without any external infrastructure. Because these networks are implemented in devices such as laptops, PDAs or mobile phones, with limited capacities, they must use a lightweight protocol, and new methods to control, manage, and integrate them. Methods based on imitating the behavior of human relations facilitate secure integration of services in spontaneous networks. Furthermore, cooperation among the nodes and quality of service for all shared network services should be provided. DISADVANTAGES OF EXISTING SYSTEM: All nodes may not be able to execute routing and/or security protocols. Energy constraints, node variability, error rate, and bandwidth limitations mandate the design and use of adaptive routing and security mechanisms, for any type of devices and scenarios. Dynamic networks with flexible memberships, group signatures, and distributed signatures are difficult to manage. To achieve a reliable communication and node authorization in mobile ad hoc networks, key exchange mechanisms for node authorization and user authentication are needed security methods such as pre-distribution key
  • 3. algorithms, symmetric and asymmetric algorithms, intermediate node-based methods, and hybrid methods. But these methods are not enough for spontaneous networks because they need an initial configuration or external authorities PROPOSED SYSTEM: The network and protocol proposed in this paper can establish a secure self- configured environment for data distribution and resources and services sharing among users. Security is established based on the service required by the users, by building a trust network to obtain a distributed certification authority. A user is able to join the network because he/she knows someone that belongs to it. Thus, the certification authority is distributed between the users that trust the new user. The network management is also distributed, which allows the network to have a distributed name service. We apply asymmetric cryptography, where each device has a public-private key pair for device identification and symmetric cryptography to exchange session keys between nodes. There are no anonymous users, because confidentiality and validity are based on user identification. ADVANTAGES OF PROPOSED SYSTEM: We presented the basis to setup a secure spontaneous network
  • 4. To solve mentioned security issues, we used an authentication phase and a trust phase We presented a mechanism to allow nodes to check the authenticity of their IP addresses while not generating duplicated IP addresses. The mechanism helps nodes to authenticate by using their IP addresses. We have used this mechanism in the secure protocol presented in this paper, but it can be replaced by any other IP address assignment mechanism. ALGORITHMS USED:  Algorithm1- Algorithm for joining a new node.  Algorithm2- New network creation procedure.  Algorithm 3-Algorithm when data packets are received.
  • 5. Algorithm1- Algorithm for joining a new node.
  • 6. Algorithm2- New network creation procedure
  • 8. Algorithm 3-Algorithm when data packets are received.
  • 9. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 10. SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above. REFERENCE: Raquel Lacuesta, Jaime Lloret, Senior Member, IEEE, Miguel Garcia, Student Member, IEEE, and Lourdes Pen˜ alver-“ A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation”- IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 4, APRIL 2013.