Preview

It230 Unit 3 Assignment 1

Powerful Essays
Open Document
Open Document
5629 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It230 Unit 3 Assignment 1
Student ID
Name
Signature
IT10086230
P.L.M.Madushanka

IT10103050
K.K.G.N.T.Wijethilake

IT10089064
D.G.M.Senadheera

IT10103814
I.C.K. Abeywikrama

DECLARATION

We declare that the this project proposal report or part of it was not a copy of a document done by any organization, university, any other institute or a previous student project group at SLIIT and was not copied from the Internet or other sources.

Project Details
Project Title
Developing a Secure Communication Algorithm for Vehicular Ad-hoc Networks
Project ID

ABSTRACT

Vehicular Ad hoc Network (VANET), a subclass deriving from Mobile Ad Hoc networks (MANET), is a promising approach for future intelligent transportation system
…show more content…
All messages may propagate everywhere, flooding the system with messages.

Selecting a routing protocol based on research studies that have been carried out before. Earlier mentioned various routing protocols that we have discovered while carrying out this phase, and noted various studies that have been carried out assessing these protocols [23] [24][25]. Among the large number only very few that meet up the requirements to become a VANET protocol such as the protocol being rapid and light weighted. It is now required to select the best that fits our requirement of the project goal.

General assessment of the selected routing protocol identify its functionality and how an algorithm should be developed to the specific routing protocol. After selecting a protocol best suited comparing the earlier studies relevant on the field, it is required to make an assessment of verification and properly understand in depth about the protocol to develop a suitable algorithm targeting it. Therefore using a suitable experimental environment, the protocol should be simulated under various conditions and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Penetration testing should be done to test the network for vulnerabilities. There are several types of penetration testing. “An automated port based scan is generally one of the first steps in a traditional penetration test because it helps obtain a basic overview of what may be available on the target network or host. Port based scanners check to determine whether a port on a remote host is able to receive a connection. Generally, this will involve the protocols which utilize IP (such as TCP, UDP, ICMP, etc.), However, ports on other network protocols could be present as well dependent on the environment (for example, it’s quite common in large mainframe environments for SNA to be in use). Typically, a port can have one of two possible states: open – the port is able to receive data and closed – the port is not able to receive data. A service based vulnerability scanner is one which utilizes specific protocols to communicate with open ports on a remote host, to determine…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The genome4u is a scientific study project at a large university that is intended to provide an order of the genomes of a hundred thousand volunteers. This genome lab setup has various amounts of routing protocols, in which the task would be getting the protocols interlinked so that design can be changed. The different Cisco switches represent the various VLANs that can be configured for the different project teams in the lab (Oppenheimer, 2005). Router-EIGRPs are the internal routers of the research lab network. Router-EIGRP/OSPFs and Router-EIGRP/RIPs are the routers that are at the Fundraising office interface and the Biology lab interface respectively. The file servers are where the volunteer’s data files will be stored. The design will now spread apart similar data to travel across it from different internet connections.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Wormhole

    • 9395 Words
    • 38 Pages

    References: [1] P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks,” presented at the SCS CNDS, San Antonio, TX, Jan. 27–31, 2002. [2] K. Sanzgiri, B. Dahill, B. Levine, and E. Belding-Royer, “A secure routing protocol for ad hoc networks,” in Proc. IEEE ICNP, 2002, pp. 78–87. [3] Y.-C. Hu, A. Perrig, and D. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks,” in Proc. IEEE INFOCOM, 2003, vol. 3, pp. 1976–1986.…

    • 9395 Words
    • 38 Pages
    Powerful Essays
  • Powerful Essays

    Ad Hoc Network Essay

    • 12496 Words
    • 50 Pages

    [7] W. G. LOL, “An Investigation of the Impact of Routing Protocols on MANETs using Simulation Modeling” Master Thesis, School of Computing and Mathematical Science, Auckland university of Technology, 2008.…

    • 12496 Words
    • 50 Pages
    Powerful Essays
  • Best Essays

    Routing in Manets

    • 2804 Words
    • 12 Pages

    Network Security Coursework Network and Information Security January/February 2012 K1161430@kingston.ac.uk, zacchybros@gmail.com Abstract – This report aims at presenting an evaluation of Proactive and Reactive routing protocols using some performance statistics as it applies to Mobile Ad hoc NETworks (MANETs). This report also presents an evaluation of these protocols based on the result of the simulations carried out as part of this work. The simulations were done using ViSim (a visual MANET simulator). But first, the concept of MANET is described which includes its modus operandi. The theories behind the routing protocols are also briefly presented. The report is concluded with recommendations based on the analysis of the simulation results. Reactive routing protocols with focus on the particular routing protocols that will be used for the simulation; Section 4 presents the simulation software and a description of the scenario that was simulated; Section 5 presents the analysis of the simulation results; and the conclusion is presented in Section 6.…

    • 2804 Words
    • 12 Pages
    Best Essays
  • Best Essays

    Laxmi Shrivastava, G.S.Tomar and Sarita S.Bhadauria, ”Secure and Congestion Adaptive Routing Mechanism with Load Balancing for MANET”, IJCSN, Vol.1, No 6,…

    • 3772 Words
    • 16 Pages
    Best Essays
  • Powerful Essays

    Leave Management System

    • 2393 Words
    • 10 Pages

    The Routing Information Protocol (RIP) is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and used to deprecate inaccessible, inoperable, or otherwise undesirable routes in the selection process.…

    • 2393 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Abstract- Amongst many different communication paradigms, Vehicular ad hoc networks (VANET’s) are an area of developing techniques. It has become an upcoming technology of this modern world in vehicular communications. The main reason of using VANET is to exchange live messages regarding traffic congestions. A Trusted authority (TA) is designed to provide authentication services for users and managing keys of several users. Like in any other networks in VANET also there is a necessity to maintain authentication and confidentiality among the users. To authenticate the users the authority classifies users into primary,…

    • 1582 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Third, protocols provide a basis for error checking and measuring network performance. This is done by comparing measured results against expectations. For example, performance measures pertaining to storage access times, data transmission rates and modulation frequencies are critical to control the network’s function. Thus, the identification and correction of errors depend on protocol standards that define acceptable performance.…

    • 1343 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Santivanez et al, have introduced scalability metric in MANETs as sum of header and a least of load traffic. The analysis provided an improvement for simple flooding algorithms in high mobility scenarios with vague monitoring of connections [8]. In [9] a protocol is offered based on AODV. In the paper, high reliable nodes are used in order to increasing reliability. Authors have tried to use high reliable nodes in routing and rout discovery. Indeed, multipath routing is applied to prevent bottlenecks. Complexity of using high reliable nodes in implementation and large delay of multipath routing through reliable nodes are the limitation of this research. In [10], Heusse et al proved that if a low number of nodes operate in bandwidth, efficiency would be decreased. In [11], three techniques is studied to increase reliability: Retransmission of data link layer, Placement of low quality connections in black list and using reliability metrics in order to increase reliability in packet…

    • 1612 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    References: Akyildiz IF, Su W, Sankarasubramaniam Y, and Cayirci E (2002) Wireless sensor networks: A survey. Journal of Computer Networks, vol. 38, pp.393-422. Bacco GD, Melodia T, and Cuomo F (2004) A MAC protocol for delay-bounded applications in wireless sensor networks. In Proc. of the Third Annual Mediterranean Ad Hoc Networking Workshop (MedHoc '04), June 27-30. Bandyopadhyay S, and Coyle EJ (2003) An energy efficient hierarchical clustering algorithm for wireless sensor networks. In Proc. of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), vol. 3, 30 March - 3 April. Crossbow Tech. (2005) Avoiding RF interference between WiFi and Zigbee, Crossbow Technical Report. Ha J, Kwon WH, Kim JJ, Kim YH, and Shin YH (2005) Feasibility analysis and implementation of the IEEE 802.15.4 multi-hop beacon-enabled network. In Proc. of the 15th Joint Conference on Communications & Info, Jun. 2005. He T, Stankovic JA, Lu C, Abdelzaher T (2003) SPEED: A stateless protocol for real-time communication in sensor networkss. In Proc. of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS '03): 46-55. Howitt I, and Gutierrez JA (2003) IEEE 802.15.4 low rate-wireless personal area network coexistence issues. IEEE Wireless Communications and Networking Conference (WCNC '03), vol. 3, pp. 1481- 1486, 16-20 Mar. 2003. Hwang L, Sheu ST, Shih YY, and Cheng YC (2005) Grouping strategy for solving hidden terminal problem in IEEE 802.15.4 LR-WPAN. In Proc. of the 1st International Conference on Wireless Internet (WICON '05), pp. 26-32. IEEE 802.11 Specification (1999) IEEE Standards for Information Technology, Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Network - Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.…

    • 5272 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    algorithms with DSR, we design a new routing protocol, QoSAware Source Routing (QASR), to meet the QoS requirements…

    • 4518 Words
    • 27 Pages
    Powerful Essays
  • Satisfactory Essays

    Bluetooth

    • 866 Words
    • 4 Pages

    Purpose and Specifications Communication Protocols Disadvantages and Advantages in certain scenarios Application comparison, consumer criteria, business analysts…

    • 866 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    It is a discreet event simulator targeted at networking research and provides substantial support for simulation of routing, multicast protocols and IP protocols, such as UDP, TCP, RTP and SRM over wired and wireless (local and satellite) networks. It has many advantages that make it a useful tool, such as support for multiple protocols and the capability of graphically detailing network traffic. Additionally, NS2 supports several algorithms in routing and queuing. LAN routing and broadcasts are part of routing algorithms. Queuing algorithms include fair queuing, deficit round-robin and…

    • 1086 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Wireless Networks

    • 8002 Words
    • 33 Pages

    Wireless ad hoc networks have emerged to support applications, in which it is required/desired to have wireless variety of devices without relying on communications among a any infrastructure or central management. In ad hoc networks, wireless devices, simply called nodes, have limited transmission range. Therefore, each node can directly communicate with only those within its transmission range (i.e., its neighbours) and requires other nodes to act as routers in order to communicate with out-of-range destinations.…

    • 8002 Words
    • 33 Pages
    Powerful Essays