Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Dynamic Routing with Security Considerations full report
#1

Dynamic Routing with Security Considerations
(Heightening Security for Data Transmission through Routing)
Abstract:

In this project we deal fully about the Security which has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, we will propose a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks, without introducing extra control messages. An analytic study on the proposed algorithm is presented, and a series of simulation experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm. In the past decades, various security-enhanced measures have been proposed to improve the security of data transmission over public networks. Existing work on security-enhanced data transmission includes the designs of cryptography algorithms and system infrastructures and security-enhanced routing methods. The main objective of the project is to propose a dynamic routing algorithm to improve the security of data transmission.

Introduction
In the past decades, various security-enhanced measures have been proposed to improve the security of data transmission over public networks. Existing work on security-enhanced data transmission includes the designs of cryptography algorithms and system infrastructures and security-enhanced routing methods. Their common objectives are often to defeat various threats over the Internet, including eavesdropping, spoofing, session hijacking, etc.Among many well-known designs for cryptograph based systems, the IP Security (IPSec) [23] and the Secure Socket Layer (SSL) [21] are popularly supported and implemented in many systems and platforms. Although IPSec and SSL do greatly improve the security level for data transmission, they unavoidably introduce substantial overheads [1], [7], [13], especially on gateway/host performance and effective network bandwidth. For example, the data transmission overhead is 5 cycles/byte over an Intel Pentium II with the Linux IP stack alone, and the overhead increases to 58 cycles/byte when Advanced Encryption Standard (AES) [10] is adopted for encryption/decryption for IPSec. Another alternative for security-enhanced data transmission is to dynamically route packets between each source and its destination so that the chance for system break-in, due to successful interception of consecutive packets for a session, is slim. The intention of security-enhanced routing is different from the adopting of multiple paths between a source and a destination to increase the throughput of data transmission.
In particular, Lou et al. proposed a secure routing protocol to improve the security of end-to-end data transmission based on multiple path deliveries. The set of multiple paths between each source and its destination is determined in an online fashion, and extra control message exchanging is needed. Bohacek et al. [2] proposed a secure stochastic routing mechanism to improve routing security. Similar to the work proposed by Lou et al. [14], [15], a set of paths is discovered for each source and its destination in an online fashion based on message flooding. Thus, a mass of control messages is needed. Yang and Papavassiliou [25] explored the trading of the security level and the traffic dispersion. They proposed a traffic dispersion scheme to reduce the probability of eavesdropped information along the used paths provided that the set of data delivery paths is discovered in advance. Although excellent research results have been proposed for security-enhanced dynamic routing, many of them rely on the discovery of multiple paths either in an online or offline fashion. For those online path searching approaches, the discovery of multiple paths involves a significant number of control signals over the Internet.
On the other hand, the discovery of paths in an offline fashion might not be suitable to networks with a dynamic changing configuration. Therefore, we will propose a dynamic routing algorithm to provide security enhanced data delivery without introducing any extra control messages. The objective of this work is to explore a security enhanced dynamic routing algorithm based on distributed routing information widely supported in existing wired and wireless networks. We aim at the randomization of delivery paths for data transmission to provide considerably small path similarity (i.e., the number of common links between two delivery paths) of two consecutive transmitted packets.
The proposed algorithm should be easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol (RIP) for wired networks [16] and Destination-Sequenced Distance Vector (DSDV) protocol for wireless networks [20], over existing infrastructures. These protocols shall not increase the number of control messages if the proposed algorithm is adopted. An analytic study will be presented for the proposed routing algorithm, and a series of simulation study will be conducted to verify the analytic results and to show the capability of the proposed algorithm.

Scope of the project
The objective of this work is to explore a security enhanced dynamic routing algorithm based on distributed routing information widely supported in existing wired and wireless networks. We aim at the randomization of delivery paths for data transmission to provide considerably small path similarity (i.e., the number of common links between two delivery paths) of two consecutive transmitted packets. The proposed algorithm should be easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol (RIP) for wired networks [16] and Destination-Sequenced Distance Vector (DSDV) protocol for wireless networks [20], over existing infrastructures. These protocols shall not increase the number of control messages if the proposed algorithm is adopted. An analytic study will be presented for the proposed routing algorithm, and a series of simulation study will be conducted to verify the analytic results and to show the capability of the proposed algorithm.

[attachment=13967]
[attachment=13968]
Reply

#2
Dynamic Routing with Security Considerations
Abstract:
Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, An analytic study on the proposed algorithm is presented, and experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm.
Algorithm / Technique used:
Distance-vector-based algorithm for dynamic routing.

Algorithm Description:
A distance-vector-based algorithm for dynamic routing to improve the security of data transmission. We propose to rely on existing distance information exchanged among neighboring nodes (referred to as routers as well in this paper) for the seeking of routing paths. In many distance-vector-based implementations, e.g., those based on RIP, each node Ni maintains a routing table in which each entry is associated with a tuple and Next hop denote some unique destination node, an estimated minimal cost to send a packet to t, and the next node along the minimal-cost path to the destination node, respectively.

Existing System:

Existing work on security-enhanced data transmission includes the designs of cryptography algorithms and system infrastructures and security-enhanced routing methods. Their common objectives are often to defeat various threats over the Internet, including eavesdropping, spoofing, session hijacking, etc. Among many well-known designs for cryptography based systems, the IP Security (IPSec) and the Secure Socket Layer (SSL) are popularly supported and implemented in many systems and platforms. Although IPSec and SSL do greatly improve the security level for data transmission, they unavoidably introduce substantial overheads, especially on gateway/host performance and effective network bandwidth. For example, the data transmission overhead is 5 cycles/byte over an Intel

Pentium II with the Linux IP stack alone, and the overhead increases to 58 cycles/byte when Advanced Encryption Standard (AES) is adopted for encryption/decryption for IPSec.


Proposed System:

We will propose a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks, without introducing extra control messages.
Hardware Requirements

SYSTEM : Pentium IV 2.4 GHz
HARD DISK : 40 GB
FLOPPY DRIVE : 1.44 MB
MONITOR : 15 VGA colour
MOUSE : Logitech.
RAM : 256 MB
KEYBOARD : 110 keys enhanced.

Software Requirements


Operating system :- Windows XP Professional
Front End : - Java Technology.
read full report
http://ntur.lib.ntu.edu.tw/bitstream/246...8/1/15.pdf
http://scribddoc/23930131/Dynamic-Routin...iderations
http://whitepapers.zdnetabstract.aspx?docid=1155287
http://zdnetasiawhitepaper/dynamic-routi...155287.htm
Reply

#3
Dynamic Routing with Security Considerations
The security of the data is one of the major issues in the case of data in wireless and wired networks. a dynamic routing algorithm that could
randomize delivery paths for data transmission is discussed in this article. This is a step apart from the previous works done on cryptography algorithms and system infrastructures. This algorithm has the advantage that it is easily implementable and is very much compatible with popular routing protocols. One such protocol is the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks. This can be achieved without introducing any extra control messages.The efficiency of the algorithm is verified by using simulations and the analytic results are verified to underline the capability of the described algorithm. a security-enhanced dynamic routing algorithm based on distributed routing information widely supported in existing networks is attempted. distance-vector algorithms and link-state algorithms are the two kinds of protocols currently used in the networks.

Get the full report here:
http://ntur.lib.ntu.edu.tw/bitstream/246...8/1/15.pdf

Reports is also posted in the previous pages of this thread. Please browse through all the pages of this thread.
Reply

#4
to get the topic dynamic routing with security considerations full report , ppt and related topics refer the page link bellow
http://seminarsprojects.net/Thread-dynam...ull-report

http://seminarsprojects.net/Thread-dynam...ons--11716

http://seminarsprojects.net/Thread-dynam...ort?page=4
Reply

#5
hi
you can refer these pages to get the details on dynamic routing with security considerations

http://seminarsprojects.net/Thread-dynam...ull-report

http://seminarsprojects.net/Thread-dynam...ons--11716
Reply

#6
To get more information about the topic "Dynamic Routing with Security Considerations full report " please refer the page link below

http://4sharedget/BocfeTxi/6Dynamic_Rout...urity.html
Reply

#7
hi
please go through the following thread for more details on ' Dynamic Routing with Security Considerations'
http://seminarsprojects.net/Thread-dynam...ons--11716
Reply

#8
to get information about the topic"Dynamic Routing with Security Considerations" refer the page link bellow

http://4sharedget/BocfeTxi/6Dynamic_Rout...urity.html
Reply

#9
please send me the full report and source code for the project " Dynamic routing with security considerations"
[email protected]
Reply

#10
Hi,

Please send me the full project report and PPT of Dynamic Routing with Security Considerations. As early as possible to below mail id

[email protected]
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.