anna university, chennai project viva final year mca(2010-2013) 04/07/2013

39
ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

Upload: everett-sullivan

Post on 01-Jan-2016

219 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

ANNA UNIVERSITY, CHENNAI

PROJECT VIVA

FINAL YEAR MCA(2010-2013)

04/07/2013

Page 2: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

KING COLLEGE OF TECHNOLOGY(Approved by AICTE and Affiliated to Anna University, Chennai)

Nallur, N.Pudupatty (PO), Namakkal – 637020.

JULY 2013

Page 3: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

A Security Architecture Achieving Anonymity and A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Traceability in Wireless Mesh

NetworksNetworks

Under The Guidance of

Mrs. P.NANDHINI MCA.,M.Phil,[Ph.D]Assistant Professor In Department of MCA

Done By

Student Name : M.Jerald

Reg. No : 104501607012

Year : Final Year MCA

Page 4: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

A Security Architecture Achieving Anonymity A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh and Traceability in Wireless Mesh

NetworksNetworks

Page 5: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

ABSTRACTABSTRACT

Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays.

Anonymity provides protection for users to enjoy network services without being traced.

While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs).

Page 6: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

EXISTING SYSTEMEXISTING SYSTEM

In wireless communication systems, it is easier for a global observer to mount traffic analysis attacks by following the packet forwarding path than in wired networks.

Therefore, traceability is highly desirable such as in e-cash systems where it is used for detecting and tracing double-spenders.

Page 7: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

PROPOSED SYSTEMPROPOSED SYSTEM We are motivated by resolving the above

security conflicts, namely anonymity and traceability, in the emerging WMN communication systems.

Furthermore, the proposed pseudonym technique renders user location information unexposed.

Page 8: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

SYSTEM SPECIFICATIONSYSTEM SPECIFICATION HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 256 Mb. SOFTWARE REQUIREMENTS:Operating system : Windows XP ProfessionalFront End : JAVA, Swing(JFC),J2METool : j2me wireless toolkit 2.5.2

Page 9: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

SOFTWARESOFTWARE SPECIFICATIONSPECIFICATION

Java TechnologyJava technology is both a

programming language and a platform. Secure High performance Interpreted Multithreaded Robust Dynamic

Page 10: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

JDBCJDBC Goals Goals

Java ProgramCompilersInterpreterMy Program

Page 11: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

PROJECTPROJECT DESCRIPTION DESCRIPTION

PROBLEM DEFINITION

A large number of studies on multi-hop wireless networks have been devoted to system stability while maximizing

These metrics measure the performance of a system over a long time-scale.

Page 12: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

OVERVIEW OF THE PROJECT

we analyze a multi-hop wireless network with multiple source-destination pairs, given routing and traffic information

Page 13: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

MODULE DESCRIPTIONMODULE DESCRIPTION

Blind SignatureTicket IssuanceFraud DetectionFundamental security objectives

Page 14: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

BLIND SIGNATUREBLIND SIGNATURE

Blind signature scheme such that the message being signed must contain encoded information.

user in the blind signature scheme to embed some account-related secret information into what is being signed by the bank

The restrictiveness property is essentially the guarantee for traceability in the restrictive blind signature systems.

Page 15: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

TICKET ISSUANCETICKET ISSUANCE

In order to maintain security of the network against attacks and the fairness among clients

Each client by issuing tickets based on the misbehavior history of the client

Ticket issuance occurs when the client initially attempts to access the network or when all previously issued tickets are depleted.

Page 16: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

FRAUD DETECTIONFRAUD DETECTION

Fraud is used interchangeably with misbehavior in this paper, which is essentially an insider attack.

which causes the server manager to constrain his ticket requests

Page 17: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

FUNDAMENTAL SECURITY FUNDAMENTAL SECURITY OBJECTIVESOBJECTIVES It is trivial to show that our security

architecture satisfies the security requirements for authentication, data integrity, and confidentiality

We are only left with the proof of non-repudiation in this category.

A fraud can be repudiated only if the client can provide a different representation, he knows of message from what is derived by the server manager

Page 18: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

SYSTEMSYSTEM DESIGN DESIGN

Architecture.

Page 19: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

Data Flow DiagramData Flow Diagram

Page 20: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

AdminAdmin

Login

Admin

view misusesviewblindmessage

Page 21: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

UserUserstartserver

client2client1client3 client4

Make transaction

send and receive messages

Page 22: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

SEQUENCE DIAGRAMSEQUENCE DIAGRAM

Page 23: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

AdminAdmin

Admin

Enter data to insert and delete

Enter username and password

view misusesview blindmesagesLOGIN

Page 24: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

UserUser

client2client1startserver client3 client4

startstart

startstart

Page 25: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

ACTIVITY DIAGRAMACTIVITY DIAGRAM

Page 26: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

AdminAdmin

Adminlogin

view blind message view misuses

Page 27: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

UserUser

Start server

client2 client4Client1 client3

Make transaction

Page 28: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

COMPONENT COMPONENT DIAGRAMDIAGRAM

Page 29: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

AdminAdmin

View blind message view misuses

Admin

Login

enter usernameand password

Page 30: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

UserUser

client4

make transaction

send and receive messages

Startserver

client1 client2 client3

Page 31: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

Output Screens:Output Screens:

Page 32: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013
Page 33: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013
Page 34: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013
Page 35: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013
Page 36: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

CONCLUSIONCONCLUSIONwe propose SAT, a security architecture

mainly consisting of the ticket-based protocols, which resolves the conflicting security requirements of unconditional anonymity for honest users and traceability of misbehaving users.

By utilizing the tickets, self-generated pseudonyms, and the hierarchical identity-based cryptography, the proposed architecture is demonstrated to achieve desired security objectives and efficiency.

Page 37: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

FUTURE ENHANCEMENTFUTURE ENHANCEMENT

In the WMNs considered here, the uplink from the client to the mesh router may rely on multihop communications

Peer clients act as relaying nodes to forward each other’s traffic to the mesh router, which forms a P2P networ

The notorious problem common in P2P communication systems is the free-riding

Page 38: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

THANK YOU

Page 39: ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013

Queries ?