Anda di halaman 1dari 4

A

Seminar Report

On

“An Overlay approach to Data Security in Ad-hoc Networks”

(Seminar)

Submitted in partial fulfillment of the requirement

For the award of the Degree of

Bachelor of Technology

Computer Science

Submitted By

SAURAV GANGULY (06ESBCS049)

B.Tech VIII Sem.

APRIL 2010

Sri Balaji College of Engineering & Technology

Benad Road Macheda, Jaipur (Raj.)-302013


ACKNOWLEDGEMENT

The beatitude, bliss & euphoria that accompany the successful completion of any task would be
incomplete without the expression of the appreciation of simple virtues to the people who made
it possible. So, reverence, veneration and honors. I acknowledge all those whose guidance and
encouragement has made successful in winding up this. I owe a huge debt of thanks to a large
number of people without whom none of this would have been possible.

I am thankful to Mrs Sunita Mam (faculty CSE) for being our mentor and for valuable
suggestions and enthusiastic interest during the entire process of the preparation of Seminar

Lastly, I extend my heartiest thanks to all those who have contributed in making this project a
success.
INDEX

TOPIC PAGE NO.

0. Abstract 01

1. Introduction 02

2. Overlay performance in ad-hoc networks . 03

2.1. The HyperCast overlay software system 03

2.2. Measurements in a static ad-hoc network 04


2.2.1. Single-hop measurements (Unicast) 06
2.2.2. Single-hop measurements (Multicast) 09
2.2.3. Multi-hop measurements (Unicast) 09

3. Neighborhood key method 10

3.1. Authentication 10

3.2. Exchange of neighborhood keys and data encryption 12

3.3. Data confidentiality and integrity 14

3.4. Evaluation of security with neighborhood key method 15


3.4.1. Latency of authentication 15
3.4.2. Single-hop measurement with security 16
3.4.3. Multi-hop measurements with security 16

4. A spanning tree protocol for ad-hoc networks 19

4.1. Measuring link quality 20

4.2. Ancestor selection 21


4.2.1. Minimum hop count to core 22
4.2.2. Path quality to core 22
4.3. Evaluation of the SPT protocol 24

5. SPT protocol with data security 26

6. Conclusions 29

References 31

Anda mungkin juga menyukai