ACTIVE SOURCE ROUTING PROTOCOL FOR
NETWORK
ABSTRACT
A
location based routing is a collection of mobile nodes that are dynamically and
arbitrarily located in such a manner that the interconnections between nodes
are capable of changing on a continual basis.
The primary goal of this routing is correct
and efficient route establishment between a pair of nodes so that messages may
be delivered in a timely manner. LAR is an on-demand protocol who is based on
the DSR (Dynamic Source Routing). The Location Aided Routing protocol uses
location information to reduce routing overhead of the ad-hoc network! Normally
the LAR protocol uses the GPS (Global Positioning System) to get these location
information’s. With the availability of GPS, the mobile hosts knows there
physical location.
Unlike traditional distance networks, networks
do not rely on any fixed infrastructure. Instead, hosts rely on each other to
keep the network connected. The military tactical and other security-sensitive
operations are still the main applications of ad hoc networks, although there
is a trend to adopt ad hoc networks for commercial uses due to their unique
properties.
One
main challenge in design of these networks is their vulnerability to security
attacks. In this paper, we study the threats an ad hoc network faces and the
security goals to be achieved.
We
identify the new challenges and opportunities posed by this new networking
environment and explore new approaches to secure its communication. In
particular, we take advantage of the inherent redundancy in ad hoc networks —
multiple routes between nodes — to defend routing against denial of service
attacks. We also use replication and new cryptographic schemes, such as
threshold cryptography, to build a highly secure and highly available key
management service, which forms the core of our security framework.
The
networks are a new paradigm of wireless communication for mobile hosts (which
we call nodes). In this routing, there is no fixed infrastructure such as base
stations or mobile switching centers. Mobile nodes that are within each other’s
radio range communicate directly via wireless links, while those that are far
apart rely on other nodes to relay messages as routers. Node mobility in an ad
hoc network causes frequent changes of the network topology. Figure 1 shows
such an example: initially, nodes A and D have a
direct link between them. When D moves out of A’s radio
range, the link is broken.
However,
the network is still connected, because A can reach D through C, E, and F. Military
tactical operations are still the main application of ad hoc networks today.
For example, military units (e.g., soldiers, tanks, or planes), equipped with
wireless communication devices, could form an ad hoc network when they roam in
a battlefield. The networks can also be used for emergency, law enforcement,
and rescue missions. Since an ad hoc network can be deployed rapidly with
relatively low cost, it becomes an attractive option for commercial uses such
as sensor networks or virtual classrooms.
REQUIREMENT
SPECIFICATION
Software
Requirements
Language : Java1.5
Front End Tool : Swing
Operating
System :
Windows 98.
Hardware Requirements
Processor : Intel Pentium III
Processor
Random
Memory : 128MB
Hard Disk :
20GB
Processor Speed : 300 min
No comments:
Post a Comment