![Page 1: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/1.jpg)
ANNA UNIVERSITY, CHENNAI
PROJECT VIVA
FINAL YEAR MCA(2010-2013)
04/07/2013
![Page 2: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/2.jpg)
KING COLLEGE OF TECHNOLOGY(Approved by AICTE and Affiliated to Anna University, Chennai)
Nallur, N.Pudupatty (PO), Namakkal – 637020.
JULY 2013
![Page 3: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/3.jpg)
A Security Architecture Achieving Anonymity and A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Traceability in Wireless Mesh
NetworksNetworks
Under The Guidance of
Mrs. P.NANDHINI MCA.,M.Phil,[Ph.D]Assistant Professor In Department of MCA
Done By
Student Name : M.Jerald
Reg. No : 104501607012
Year : Final Year MCA
![Page 4: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/4.jpg)
A Security Architecture Achieving Anonymity A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh and Traceability in Wireless Mesh
NetworksNetworks
![Page 5: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/5.jpg)
ABSTRACTABSTRACT
Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays.
Anonymity provides protection for users to enjoy network services without being traced.
While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs).
![Page 6: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/6.jpg)
EXISTING SYSTEMEXISTING SYSTEM
In wireless communication systems, it is easier for a global observer to mount traffic analysis attacks by following the packet forwarding path than in wired networks.
Therefore, traceability is highly desirable such as in e-cash systems where it is used for detecting and tracing double-spenders.
![Page 7: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/7.jpg)
PROPOSED SYSTEMPROPOSED SYSTEM We are motivated by resolving the above
security conflicts, namely anonymity and traceability, in the emerging WMN communication systems.
Furthermore, the proposed pseudonym technique renders user location information unexposed.
![Page 8: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/8.jpg)
SYSTEM SPECIFICATIONSYSTEM SPECIFICATION HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 256 Mb. SOFTWARE REQUIREMENTS:Operating system : Windows XP ProfessionalFront End : JAVA, Swing(JFC),J2METool : j2me wireless toolkit 2.5.2
![Page 9: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/9.jpg)
SOFTWARESOFTWARE SPECIFICATIONSPECIFICATION
Java TechnologyJava technology is both a
programming language and a platform. Secure High performance Interpreted Multithreaded Robust Dynamic
![Page 10: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/10.jpg)
JDBCJDBC Goals Goals
Java ProgramCompilersInterpreterMy Program
![Page 11: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/11.jpg)
PROJECTPROJECT DESCRIPTION DESCRIPTION
PROBLEM DEFINITION
A large number of studies on multi-hop wireless networks have been devoted to system stability while maximizing
These metrics measure the performance of a system over a long time-scale.
![Page 12: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/12.jpg)
OVERVIEW OF THE PROJECT
we analyze a multi-hop wireless network with multiple source-destination pairs, given routing and traffic information
![Page 13: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/13.jpg)
MODULE DESCRIPTIONMODULE DESCRIPTION
Blind SignatureTicket IssuanceFraud DetectionFundamental security objectives
![Page 14: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/14.jpg)
BLIND SIGNATUREBLIND SIGNATURE
Blind signature scheme such that the message being signed must contain encoded information.
user in the blind signature scheme to embed some account-related secret information into what is being signed by the bank
The restrictiveness property is essentially the guarantee for traceability in the restrictive blind signature systems.
![Page 15: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/15.jpg)
TICKET ISSUANCETICKET ISSUANCE
In order to maintain security of the network against attacks and the fairness among clients
Each client by issuing tickets based on the misbehavior history of the client
Ticket issuance occurs when the client initially attempts to access the network or when all previously issued tickets are depleted.
![Page 16: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/16.jpg)
FRAUD DETECTIONFRAUD DETECTION
Fraud is used interchangeably with misbehavior in this paper, which is essentially an insider attack.
which causes the server manager to constrain his ticket requests
![Page 17: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/17.jpg)
FUNDAMENTAL SECURITY FUNDAMENTAL SECURITY OBJECTIVESOBJECTIVES It is trivial to show that our security
architecture satisfies the security requirements for authentication, data integrity, and confidentiality
We are only left with the proof of non-repudiation in this category.
A fraud can be repudiated only if the client can provide a different representation, he knows of message from what is derived by the server manager
![Page 18: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/18.jpg)
SYSTEMSYSTEM DESIGN DESIGN
Architecture.
![Page 19: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/19.jpg)
Data Flow DiagramData Flow Diagram
![Page 20: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/20.jpg)
AdminAdmin
Login
Admin
view misusesviewblindmessage
![Page 21: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/21.jpg)
UserUserstartserver
client2client1client3 client4
Make transaction
send and receive messages
![Page 22: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/22.jpg)
SEQUENCE DIAGRAMSEQUENCE DIAGRAM
![Page 23: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/23.jpg)
AdminAdmin
Admin
Enter data to insert and delete
Enter username and password
view misusesview blindmesagesLOGIN
![Page 24: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/24.jpg)
UserUser
client2client1startserver client3 client4
startstart
startstart
![Page 25: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/25.jpg)
ACTIVITY DIAGRAMACTIVITY DIAGRAM
![Page 26: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/26.jpg)
AdminAdmin
Adminlogin
view blind message view misuses
![Page 27: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/27.jpg)
UserUser
Start server
client2 client4Client1 client3
Make transaction
![Page 28: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/28.jpg)
COMPONENT COMPONENT DIAGRAMDIAGRAM
![Page 29: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/29.jpg)
AdminAdmin
View blind message view misuses
Admin
Login
enter usernameand password
![Page 30: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/30.jpg)
UserUser
client4
make transaction
send and receive messages
Startserver
client1 client2 client3
![Page 31: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/31.jpg)
Output Screens:Output Screens:
![Page 32: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/32.jpg)
![Page 33: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/33.jpg)
![Page 34: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/34.jpg)
![Page 35: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/35.jpg)
![Page 36: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/36.jpg)
CONCLUSIONCONCLUSIONwe propose SAT, a security architecture
mainly consisting of the ticket-based protocols, which resolves the conflicting security requirements of unconditional anonymity for honest users and traceability of misbehaving users.
By utilizing the tickets, self-generated pseudonyms, and the hierarchical identity-based cryptography, the proposed architecture is demonstrated to achieve desired security objectives and efficiency.
![Page 37: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/37.jpg)
FUTURE ENHANCEMENTFUTURE ENHANCEMENT
In the WMNs considered here, the uplink from the client to the mesh router may rely on multihop communications
Peer clients act as relaying nodes to forward each other’s traffic to the mesh router, which forms a P2P networ
The notorious problem common in P2P communication systems is the free-riding
![Page 38: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/38.jpg)
THANK YOU
![Page 39: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013](https://reader036.vdocuments.net/reader036/viewer/2022062422/56649ec05503460f94bcbc0f/html5/thumbnails/39.jpg)
Queries ?