Dynamic Routing with Security Considerations full report
#1

Dynamic Routing with Security Considerations
Abstract:
Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, An analytic study on the proposed algorithm is presented, and experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm.
Algorithm / Technique used:
Distance-vector-based algorithm for dynamic routing.

Algorithm Description:
A distance-vector-based algorithm for dynamic routing to improve the security of data transmission. We propose to rely on existing distance information exchanged among neighboring nodes (referred to as routers as well in this paper) for the seeking of routing paths. In many distance-vector-based implementations, e.g., those based on RIP, each node Ni maintains a routing table in which each entry is associated with a tuple and Next hop denote some unique destination node, an estimated minimal cost to send a packet to t, and the next node along the minimal-cost path to the destination node, respectively.


Existing System:

Existing work on security-enhanced data transmission includes the designs of cryptography algorithms and system infrastructures and security-enhanced routing methods. Their common objectives are often to defeat various threats over the Internet, including eavesdropping, spoofing, session hijacking, etc. Among many well-known designs for cryptography based systems, the IP Security (IPSec) and the Secure Socket Layer (SSL) are popularly supported and implemented in many systems and platforms. Although IPSec and SSL do greatly improve the security level for data transmission, they unavoidably introduce substantial overheads, especially on gateway/host performance and effective network bandwidth. For example, the data transmission overhead is 5 cycles/byte over an Intel

Pentium II with the Linux IP stack alone, and the overhead increases to 58 cycles/byte when Advanced Encryption Standard (AES) is adopted for encryption/decryption for IPSec.


Proposed System:

We will propose a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks, without introducing extra control messages.
Hardware Requirements

SYSTEM : Pentium IV 2.4 GHz
HARD DISK : 40 GB
FLOPPY DRIVE : 1.44 MB
MONITOR : 15 VGA colour
MOUSE : Logitech.
RAM : 256 MB
KEYBOARD : 110 keys enhanced.

Software Requirements


Operating system :- Windows XP Professional
Front End : - Java Technology.
read full report
http://ntur.lib.ntu.edu.tw/bitstream/246...8/1/15.pdf
http://scribddoc/23930131/Dynamic-Routing-With-Security-Considerations
http://whitepapers.zdnetabstract.aspx?docid=1155287
http://zdnetasiawhitepaper/dynamic-routing-with-security-considerations_wp-1155287.htm
Reply
#2
plz send me project source code of dynamic routing with security consideration
Reply
#3
I WANT TO KNOW ABOUT DYNAMIC ROUTING....
PLZZZZZZZZZZZZZZ
Reply
#4
hi
please go through the following thread for more details on ' Dynamic Routing with Security Considerations'
http://studentbank.in/report-dynamic-rou...ons--11716
Reply
#5
Hi,

Please send me the full project report and PPT of Dynamic Routing with Security Considerations. As early as possible to below mail id

saravanarajang[at]yahoo.com
Reply
#6
go through the following thread too..

http://studentbank.in/report-dynamic-rou...7#pid29087
Reply
#7
i need project coding,ppt and documentation
Reply
#8
hi please send a ppt on "dynamic routing with security consideration" plsssssss
Reply
#9
what is the input and outputs of "dynamic routing with security considerations".

Please post this information , it is urgent.........
please........................
Reply
#10
hi plzzz
send me details about the project like ppt documentation coding and the output....
send it fast
plzzzzzzzzzzzzzz............
padu_ini9028[at]yahoo.co.in
Reply
#11
please send me the project coding and implementation steps to mail azmal.66[at]gmail.com

if u can i will b so thankful to u
Reply
#12
Rainbow 
tell me in detail about the modules
Reply
#13
I want the Full Report of this Project"Dynamic Routing with security considerations
Reply
#14
please send me the source code for dynamic routing with security considerations to srinivaschakrapani87[at]gmail.com thanks in advance
Reply
#15
hi
you can refer these pages to get the details on dynamic routing with security considerations

http://studentbank.in/report-dynamic-rou...ull-report

http://studentbank.in/report-dynamic-rou...ons--11716
Reply
#16
Abstract
Security has become one of the major issues for data communication over wired and wireless networks. Different from thepast work on the designs of cryptography algorithms and system infrastructures, we will propose a dynamic routing algorithm that couldrandomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols,such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks,without introducing extra control messages. An analytic study on the proposed algorithm is presented, and a series of simulationexperiments are conducted to verify the analytic results and to show the capability of the proposed algorithm.Index Terms—Security-enhanced data transmission, dynamic routing, RIP, DSDV
INTRODUCTION
IN the past decades, various security-enhanced measureshave been proposed to improve the security of datatransmission over public networks. Existing work onsecurity-enhanced data transmission includes the designsof cryptography algorithms and system infrastructures andsecurity-enhanced routing methods. Their common objectivesare often to defeat various threats over the Internet,including eavesdropping, spoofing, session hijacking, etc.Among many well-known designs for cryptographybasedsystems, the IP Security (IPSec) [23] and the SecureSocket Layer (SSL) [21] are popularly supported andimplemented in many systems and platforms. AlthoughIPSec and SSL do greatly improve the security level for datatransmission, they unavoidably introduce substantial overheads[1], [7], [13], especially on gateway/host performanceand effective network bandwidth. For example, the datatransmission overhead is 5 cycles/byte over an IntelPentium II with the Linux IP stack alone, and the overheadincreases to 58 cycles/byte when Advanced EncryptionStandard (AES) [10] is adopted for encryption/decryptionfor IPSec [7].Another alternative for security-enhanced data transmissionis to dynamically route packets between each sourceand its destination so that the chance for system break-in,due to successful interception of consecutive packets for asession, is slim. The intention of security-enhanced routingis different from the adopting of multiple paths between asource and a destination to increase the throughput of datatransmission (see, e.g., [8] and [9]). In particular, Lou et al.[14], [15] proposed a secure routing protocol to improve thesecurity of end-to-end data transmission based on multiplepathdeliveries. The set of multiple paths between eachsource and its destination is determined in an onlinefashion, and extra control message exchanging is needed.Bohacek et al. [2] proposed a secure stochastic routingmechanism to improve routing security. Similar to the workproposed by Lou et al. [14], [15], a set of paths is discoveredfor each source and its destination in an online fashionbased on message flooding. Thus, a mass of controlmessages is needed. Yang and Papavassiliou [25] exploredthe trading of the security level and the traffic dispersion.They proposed a traffic dispersion scheme to reduce theprobability of eavesdropped information along the usedpaths provided that the set of data delivery paths isdiscovered in advance. Although excellent research resultshave been proposed for security-enhanced dynamic routing,many of them rely on the discovery of multiple pathseither in an online or offline fashion. For those online pathsearchingapproaches, the discovery of multiple pathsinvolves a significant number of control signals over theInternet. On the other hand, the discovery of paths in anoffline fashion might not be suitable to networks with adynamic changing configuration. Therefore, we will proposea dynamic routing algorithm to provide securityenhanceddata delivery without introducing any extracontrol messages.The objective of this work is to explore a securityenhanceddynamic routing algorithm based on distributedrouting information widely supported in existing wiredand wireless networks. We aim at the randomization ofdelivery paths for data transmission to provide considerablysmall path similarity (i.e., the number of common linksbetween two delivery paths) of two consecutive transmittedpackets. The proposed algorithm should be easy toimplement and compatible with popular routing protocols,such as the Routing Information Protocol (RIP) for wirednetworks [16] and Destination-Sequenced Distance Vector(DSDV) protocol for wireless networks [20], over existinginfrastructures. These protocols shall not increase thenumber of control messages if the proposed. An analytic study will be presented for theproposed routing algorithm, and a series of simulationstudy will be conducted to verify the analytic results and toshow the capability of the proposed algorithm.The rest of this paper is organized as follows: Section 2formally defines the problem under investigation. InSection 3, we propose a security-enhanced dynamic routingalgorithm to randomize the data delivery paths. An analyticstudy on the proposed algorithm is conducted. Section 4summarizes our experimental results to demonstrate thecapability of the proposed algorithm. Section 5 is theconclusion.
2 PROBLEM STATEMENT
The objective of this work is to explore a security-enhanceddynamic routing algorithm based on distributed routinginformation widely supported in existing networks. Ingeneral, routing protocols over networks could be classifiedroughly into two kinds: distance-vector algorithms andlink-state algorithms [11]. Distance-vector algorithms relyon the exchanging of distance information among neighboringnodes for the seeking of routing paths. Examples ofdistance-vector-based routing algorithms include RIP andDSDV. Link-state algorithms used in the Open ShortestPath First protocol [19] are for global routing in which thenetwork topology is known by all nodes. Our goal is topropose a distance-vector-based algorithm for dynamicrouting to improve the security of data transmission. Beforewe proceed with further discussions, our problem andsystem model shall be defined.A network could be modeled as a graph G ¼ ðN;LÞ,where N is a set of routers (also referred to as nodes) in thenetwork, and L is a set of links that connect adjacent routersin the network. A path p from a node s (referred to as asource node) to another node t (referred to as a destinationnode) is a set of links ðN1;N2ÞðN2;N3Þ _ _ _ ðNi;Niþ1Þ, wheres ¼ N1, Niþ1 ¼ t, Nj 2 N, and ðNj;Njþ1Þ 2 L for 1 _ j _ i.Let Ps;t denote the set of all potential paths between a sourcenode s and a destination node t. Note that the number ofpaths in Ps;t could be an exponential function of the numberof routers in the network, and we should not derive Ps;t inpractice for routing or analysis.Definition 1 (path similarity). Given two paths pi and pj, thepath similarity Simðpi; pjÞ for pi and pj is defined as thenumber of common links between pi and pj:Simðpi; pjÞ ¼ ðNx;NyÞjðNx;NyÞ 2 pi ^ ðNx;NyÞ 2 pj _ _ ____;where Nx and Ny are two nodes in the network.The path similarity between two paths is computedbased on the algorithm of Levenshtein distance [12].Definition 2 (the expected value of path similarity for anytwo consecutive delivered packets). Given a source node sand a destination node t, the expected value of path similarityof any two consecutive delivered packets is defined as follows:E½Sims;t_ ¼ X8pi;pj2Ps;tSimðpi; pjÞ _ ProbðpjjpiÞ _ ProbðpiÞ;where Ps;t is the set of all possible transmission paths betweena source node s and a destination node t. ProbðpjjpiÞ is theconditional probability of using pj for delivering the currentpacket, given that pi is used for the previous packet. ProbðpiÞis the probability of using pi for delivering the previouspacket.The purpose of this research is to propose a dynamicrouting algorithm to improve the security of data transmission.We define the eavesdropping avoidance problem asfollows:Given a graph for a network under discussion, a source node,and a destination node, the problem is to minimize the pathsimilarity without introducing any extra control messages, andthus to reduce the probability of eavesdropping consecutivepackets over a specific link.
3 SECURITY-ENHANCED DYNAMIC ROUTING
3.1 Notations and Data Structures

The objective of this section is to propose a distance-vectorbasedalgorithm for dynamic routing to improve thesecurity of data transmission. We propose to rely on existingdistance information exchanged among neighboring nodes(referred to as routers as well in this paper) for the seeking ofrouting paths. In many distance-vector-based implementations,e.g., those based on RIP, each node Ni maintains arouting table (see Table 1a) in which each entry is associatedwith a tuple ðt;WNi ;t;NexthopÞ, where t, WNi;t, and Nexthopdenote some unique destination node, an estimated minimalcost to send a packet to t, and the next node along theminimal-cost path to the destination node, respectively.With the objective of this work in the randomization ofrouting paths, the routing table shown in Table 1a isextended to accommodate our security-enhanced dynamicrouting algorithm. In the extended routing table (seeTable 1b), we propose to associate each entry with a tupleðt;WNi ;t; CNit ;HNit Þ. CNit is a set of node candidates for thenexthop (note that the candidate selection will be elaboratedin Procedure 2 of Section 3.2), where one of thenexthop candidates that have the minimal cost is marked.HNit , a set of tuples, records the history for packet deliveriesthrough the node Ni to the destination node t. Each tupleðNj; hNj Þ in HNit is used to represent that Ni previouslyused the node hNj as the nexthop to forward the packetfrom the source node Nj to the destination node t. Let Nbriand wNi;Nj denote the set of neighboring nodes for anode Ni and the cost in the delivery of a packet between Niand a neighboring node Nj, respectively. Each node Ni alsomaintains an array (referred to as a page link table) in which eachentry corresponds to a neighboring node Nj 2 Nbri andcontains the cost wNi;Nj for a packet delivery.


Download full report
http://ntur.lib.ntu.edu.tw/bitstream/246...8/1/15.pdf
Reply
#17
please send me the full report of the project " Dynamic routing with security considerations"
Reply
#18
please send me the full report and source code for the project " Dynamic routing with security considerations"
bhagyarkh[at]yahoo.co.in" class="mycode_email
Reply
#19
Dynamic Routing with Security Considerations
The security of the data is one of the major issues in the case of data in wireless and wired networks. a dynamic routing algorithm that could
randomize delivery paths for data transmission is discussed in this article. This is a step apart from the previous works done on cryptography algorithms and system infrastructures. This algorithm has the advantage that it is easily implementable and is very much compatible with popular routing protocols. One such protocol is the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks. This can be achieved without introducing any extra control messages.The efficiency of the algorithm is verified by using simulations and the analytic results are verified to underline the capability of the described algorithm. a security-enhanced dynamic routing algorithm based on distributed routing information widely supported in existing networks is attempted. distance-vector algorithms and link-state algorithms are the two kinds of protocols currently used in the networks.

Get the full report here:
http://ntur.lib.ntu.edu.tw/bitstream/246...8/1/15.pdf

Reports is also posted in the previous pages of this thread. Please browse through all the pages of this thread.
Reply
#20
Dynamic Routing with Security Considerations
(Heightening Security for Data Transmission through Routing)
Abstract:

In this project we deal fully about the Security which has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, we will propose a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks, without introducing extra control messages. An analytic study on the proposed algorithm is presented, and a series of simulation experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm. In the past decades, various security-enhanced measures have been proposed to improve the security of data transmission over public networks. Existing work on security-enhanced data transmission includes the designs of cryptography algorithms and system infrastructures and security-enhanced routing methods. The main objective of the project is to propose a dynamic routing algorithm to improve the security of data transmission.


Introduction
In the past decades, various security-enhanced measures have been proposed to improve the security of data transmission over public networks. Existing work on security-enhanced data transmission includes the designs of cryptography algorithms and system infrastructures and security-enhanced routing methods. Their common objectives are often to defeat various threats over the Internet, including eavesdropping, spoofing, session hijacking, etc.Among many well-known designs for cryptograph based systems, the IP Security (IPSec) [23] and the Secure Socket Layer (SSL) [21] are popularly supported and implemented in many systems and platforms. Although IPSec and SSL do greatly improve the security level for data transmission, they unavoidably introduce substantial overheads [1], [7], [13], especially on gateway/host performance and effective network bandwidth. For example, the data transmission overhead is 5 cycles/byte over an Intel Pentium II with the Linux IP stack alone, and the overhead increases to 58 cycles/byte when Advanced Encryption Standard (AES) [10] is adopted for encryption/decryption for IPSec. Another alternative for security-enhanced data transmission is to dynamically route packets between each source and its destination so that the chance for system break-in, due to successful interception of consecutive packets for a session, is slim. The intention of security-enhanced routing is different from the adopting of multiple paths between a source and a destination to increase the throughput of data transmission.
In particular, Lou et al. proposed a secure routing protocol to improve the security of end-to-end data transmission based on multiple path deliveries. The set of multiple paths between each source and its destination is determined in an online fashion, and extra control message exchanging is needed. Bohacek et al. [2] proposed a secure stochastic routing mechanism to improve routing security. Similar to the work proposed by Lou et al. [14], [15], a set of paths is discovered for each source and its destination in an online fashion based on message flooding. Thus, a mass of control messages is needed. Yang and Papavassiliou [25] explored the trading of the security level and the traffic dispersion. They proposed a traffic dispersion scheme to reduce the probability of eavesdropped information along the used paths provided that the set of data delivery paths is discovered in advance. Although excellent research results have been proposed for security-enhanced dynamic routing, many of them rely on the discovery of multiple paths either in an online or offline fashion. For those online path searching approaches, the discovery of multiple paths involves a significant number of control signals over the Internet.
On the other hand, the discovery of paths in an offline fashion might not be suitable to networks with a dynamic changing configuration. Therefore, we will propose a dynamic routing algorithm to provide security enhanced data delivery without introducing any extra control messages. The objective of this work is to explore a security enhanced dynamic routing algorithm based on distributed routing information widely supported in existing wired and wireless networks. We aim at the randomization of delivery paths for data transmission to provide considerably small path similarity (i.e., the number of common links between two delivery paths) of two consecutive transmitted packets.
The proposed algorithm should be easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol (RIP) for wired networks [16] and Destination-Sequenced Distance Vector (DSDV) protocol for wireless networks [20], over existing infrastructures. These protocols shall not increase the number of control messages if the proposed algorithm is adopted. An analytic study will be presented for the proposed routing algorithm, and a series of simulation study will be conducted to verify the analytic results and to show the capability of the proposed algorithm.

Scope of the project
The objective of this work is to explore a security enhanced dynamic routing algorithm based on distributed routing information widely supported in existing wired and wireless networks. We aim at the randomization of delivery paths for data transmission to provide considerably small path similarity (i.e., the number of common links between two delivery paths) of two consecutive transmitted packets. The proposed algorithm should be easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol (RIP) for wired networks [16] and Destination-Sequenced Distance Vector (DSDV) protocol for wireless networks [20], over existing infrastructures. These protocols shall not increase the number of control messages if the proposed algorithm is adopted. An analytic study will be presented for the proposed routing algorithm, and a series of simulation study will be conducted to verify the analytic results and to show the capability of the proposed algorithm.

[attachment=13967]
[attachment=13968]
Reply
#21
hi,
i want uml diagrams for dynamic routing with security considerations.
can u help me out!

Reply
#22
The full code and documentation of dynamic routing with security considerations

http://4sharedget/BocfeTxi/6Dynamic_Routing_with_Security.html
Reply
#23
please send ppt for dynamic routing with security considerations
Reply
#24

To get more information about the topic "Dynamic Routing with Security Considerations full report " please refer the page link below

http://4sharedget/BocfeTxi/6Dynamic_Routing_with_Security.html
Reply
#25
what is the password for login please tell me..???
please tell me the password for login ......
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: dynamic routing with security consideration with ppt, introduction for dynamic routing with security considerations, dynamic routing with security considerations project ppt, scope of dynamic routing with security considerations project, introduction about dynamic routing with security considerations wiki, seminar dynamic routing with security considerations, is dynamic routing with security considerations implemented,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,759 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 46,890 08-01-2018, 02:33 PM
Last Post: RaymondGom
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,576 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 832 14-02-2017, 04:56 PM
Last Post: jaseela123d
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,768 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 42,902 03-09-2016, 11:20 AM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Employee Cubicle Management System full report computer science technology 4 5,122 07-04-2016, 11:37 AM
Last Post: dhanabhagya
  e-Post Office System full report computer science technology 27 25,992 30-03-2016, 02:56 PM
Last Post: dhanabhagya
  college website project full report project report tiger 28 67,217 29-11-2015, 02:37 PM
Last Post: Guest

Forum Jump: