A Secure Protocol for
Spontaneous Wireless Ad Hoc Networks Creation
ABSTRACT:
This paper presents a secure protocol for
spontaneous wireless ad hoc networks which uses a hybrid symmetric/ asymmetric
scheme and the trust between users in order to exchange the initial data and to
exchange the secret keys that will be used to encrypt the data. Trust is based
on the first visual contact between users. Our proposal is a complete
self-configured secure protocol that is able to create the network and share
secure services without any infrastructure. The network allows sharing
resources and offering new services among users in a secure environment. The
protocol includes all functions needed to operate without any external support.
We have designed and developed it in devices with limited resources. Network
creation stages are detailed and the communication, protocol messages, and
network management are explained. Our proposal has been implemented in order to
test the protocol procedure and performance. Finally, we compare the protocol
with other spontaneous ad hoc network protocols in order to highlight its
features and we provide a security analysis of the system.
EXISTING SYSTEM:
The existing system objective is the
integration of services and devices in the same environment, enabling the user
to have instant service without any external infrastructure. Because these
networks are implemented in devices such as laptops, PDAs or mobile phones,
with limited capacities, they must use a lightweight protocol, and new methods
to control, manage, and integrate them. Methods based on imitating the behavior
of human relations facilitate secure integration of services in spontaneous
networks. Furthermore, cooperation among the nodes and quality of service for
all shared network services should be provided.
DISADVANTAGES
OF EXISTING SYSTEM:
·
All nodes may not be able to execute
routing and/or security protocols. Energy constraints, node variability, error
rate, and bandwidth limitations mandate the design and use of adaptive routing
and security mechanisms, for any type of devices and scenarios.
·
Dynamic networks with flexible
memberships, group signatures, and distributed signatures are difficult to
manage.
·
To achieve a reliable communication and
node authorization in mobile ad hoc networks, key exchange mechanisms for node
authorization and user authentication are needed security methods such as
pre-distribution key algorithms, symmetric and asymmetric algorithms,
intermediate node-based methods, and hybrid methods.
·
But these methods are not enough for
spontaneous networks because they need an initial configuration or external
authorities
PROPOSED SYSTEM:
The network and protocol proposed in
this paper can establish a secure self-configured environment for data
distribution and resources and services sharing among users. Security is
established based on the service required by the users, by building a trust
network to obtain a distributed certification authority. A user is able to join
the network because he/she knows someone that belongs to it. Thus, the
certification authority is distributed between the users that trust the new
user. The network management is also distributed, which allows the network to
have a distributed name service. We apply asymmetric cryptography, where each
device has a public-private key pair for device identification and symmetric
cryptography to exchange session keys between nodes. There are no anonymous
users, because confidentiality and validity are based on user identification.
ADVANTAGES
OF PROPOSED SYSTEM:
·
We presented the basis to setup a secure
spontaneous network
·
To solve mentioned security issues, we
used an authentication phase and a trust phase
·
We presented a mechanism to allow nodes
to check the authenticity of their IP addresses while not generating duplicated
IP addresses. The mechanism helps nodes to authenticate by using their IP
addresses. We have used this mechanism in the secure protocol presented in this
paper, but it can be replaced by any other IP address assignment mechanism.
ALGORITHMS USED:
ü Algorithm1-
Algorithm for joining a new node.
ü Algorithm2-
New network creation procedure.
ü Algorithm
3-Algorithm when data packets are received.
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
ü Processor - Pentium –IV
ü Speed - 1.1
Ghz
ü RAM - 256
MB(min)
ü Hard
Disk - 20
GB
ü Key
Board - Standard
Windows Keyboard
ü Mouse - Two
or Three Button Mouse
ü Monitor - SVGA
SOFTWARE CONFIGURATION:-
ü Operating System :
Windows XP
ü Programming Language : JAVA
ü Java Version : JDK 1.6 & above.
REFERENCE:
Raquel Lacuesta, Jaime Lloret, Senior
Member, IEEE, Miguel Garcia, Student Member, IEEE, and Lourdes Pen˜ alver-“ A
Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation”- IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, VOL. 24, NO. 4, APRIL 2013.