Active Source Routing Protocol For Mobile Networks (Synopsis)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Secured Data Transmission in Mobile Ad-hoc Network

ABSTRACT

An ad-hoc mobile network is a collection of mobile nodes that are dynamically and
arbitrarily located in such a manner that the interconnections between nodes are capable of
changing on a continual basis. The primary goal of such an ad-hoc network routing protocol is
correct and efficient route establishment between a pair of nodes so that messages may be
delivered in a timely manner. LAR is an on-demand protocol who is based on the DSR(Dynamic
Source Routing). The Location Aided Routing protocol uses location information to reduce routing
overhead of the ad-hoc network! Normally the LAR protocol uses the GPS(Global Positioning System)
to get these location informations. With the availability of GPS, the mobile hosts knows there
physical location.

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike
traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure.
Instead, hosts rely on each other to keep the network connected. The military tactical and other
security-sensitive operations are still the main applications of ad hoc networks, although there is a
trend to adopt ad hoc networks for commercial uses due to their unique properties. One main
challenge in design of these networks is their vulnerability to security attacks. In this paper, we study
the threats an ad hoc network faces and the security goals to be achieved. We identify the new
challenges and opportunities posed by this new networking environment and explore new
approaches to secure its communication. In particular, we take advantage of the inherent
redundancy in ad hoc networks multiple routes between nodes to defend routing against
denial of service attacks. We also use replication and new cryptographic schemes, such as

EXISTING SYSTEM

Infra-structured Networks

The first one is to introduce a third fixed party (a base station) that will hand over the
offered traffic from a station to another, as illustrated in Figure 1. The same entity will regulate the
attribution of radio resources, for instance. When a node S wishes to communicate to a node D, the
former notifies the base station, which eventually establishes a communication with the destination
node. At this point, the communicating nodes do not need to know of a route for one to each other.
All that matters is that both nodes source and destination are within the transmission range of the
base station. If one of them fails to fulfill this condition, the communication will abort.




Here the base stations range is illustrated by the oval. The two nodes S and D which want to
communicate are in the range of the base station. S send the message to the base station which in
BASE STATION
S D
E (OUT OF RANGE)
Infra structured Network
turn forwards it to destination node D. Thus communication is carried out with help of a base
station. All messages have to pass through the base station. Node E is out of the range of the base
station this prevents it from communicating to other nodes in the network. When node E wants to
communicate to any node in the network it has to contact the base station. Since it is out of range
communication is not possible.

What happens if the base station is unavailable? Or what happens if we are in a situation where such
an infrastructure does not exist at the first place?
The answer is that we simply do not communicate! This is where the second approach is useful.
JNote however that this form of centralized administration is very popular among wide cellular
networks such as GSM etc.
PROPOSED SYSTEM

Infra-structure-less Networks (Ad Hoc)

The second approach, called the Ad-Hoc, does not rely on any stationary infra structure. The
concept behind these infra-structureless networks is the collaboration between its participating
members, i.e, instead of making data transit through a fixed base station, nodes consequentially
forward data packets from one to another until a destination node is finally reached. Typically, a
packet may travel through a number of network points before arriving at its destination.

Ad-hoc networking introduces a completely new flavor of network formation. The term Ad-Hoc
means, in this instance, a type instantaneous network connecting various mobile devices without
the intervention of fixed infrastructure. The routers and hosts are free to move randomly and
organize themselves in an arbitrary fashion, thus the network topology changes rapidly and
unpredictably. Absence of a supporting structure in mobile ad-hoc networks, to a certain extent,
invalidates almost all of the existing techniques developed for routine network controls in the
existing wireless networks.

A MANET consists of mobile platforms (e.g., a router with multiple hosts and wireless
communications devices)--herein simply referred to as "nodes"--which are free to move about
arbitrarily. The nodes may be located in or on airplanes, ships, trucks, cars, perhaps even on people
or very small devices, and there may be multiple hosts per router. A MANET is an autonomous
system of mobile nodes. The system may operate in isolation, or may have gateways to and
interface with a fixed network.










SOFTWARE REQUIREMENTS

Language : Java1.3
Front End Tool: Swing
Operating System: Windows 98.

HARDWARE REQUIREMENTS

Processor : Intel Pentium III Processor
Random Memory: 128MB
` Hard Disk :20GB
Processor Speed: 300 min

You might also like