22-03-2011, 02:30 PM
Presented by:
B.BRINDHA
R.HEMALATHA
B.V.S.PAVITHRA
[attachment=10746]
ABSTRACT
• To optimize traffic anonymity protocol used in wireless networks.
EXISTING SYSTEM
• Suitable for wireless wide area networks
• Assumes multiple links in wide area networks.
• This makes easy for the adversary to identify the physical location of the sender and receiver and also their network identity.
PROPOSED SYSTEM
• To introduce an approach for Enhanced anonymous routing in broadcast networks.
• It focuses on hiding the source and destination of a packet along with the content of the packet.
• Describes new protocols that preserve security with better performance, adequately addressing the requirements of security-critical environments.
MODULES
• Software Modules
– Connection Establishment
– Key Distribution
– Packet transmission
– Performance Check
CONCLUSION
• Finally it provides secured anonymous routing.
• The analytical and experimental results suggest that these protocols are realistic and sufficiently efficient to be useful in practice for many applications