A NOVEL SECURE COMMUNICATION PROTOCOL FOR ADHOC NETWORK (SCP) (CASE STUDY OF PLEASURE WORLD CAFE )

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU2350
  • Access Fee: ₦5,000 ($14)
  • Pages: 55 Pages
  • Format: Microsoft Word
  • Views: 421
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

ABSTRACT
Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing network conditions. Our communication protocol, Castor, occupies a unique point in the design space: It does not use any control messages except simple packet acknowledgements, and each node makes routing decisions locally and independently without exchanging any routing state with other nodes. Its novel design makes Castor resilient to a wide range of attacks and allows the protocol to scale to large network sizes and to remain efficient under high mobility. We compare Castor against four representative protocols from the literature. Our protocol achieves up to two times higher packet delivery rates, particularly in large and highly volatile networks, while incurring no or only limited additional overhead. At the same time, Castor is able to survive more severe attacks and recovers from them faster.


TABLE OF CONTENTS
TITLE PAGE                                   
CERTIFICATION                               
DEDICATION                                   
ACKNOWLEDGEMENT                           
ABSTRACT                                   
TABLE OF CONTENTS            

                   
CHAPTER ONE
INTRODUCTION                               
1.1    BACKGROUND OF THE STUDY                       
1.2    STATE OF THE PROBLEM                       
1.3    PURPOSE OF THE STUDY                       
1.4    AIMS AND OBJECTIVES                       
1.5    SCOPE OF STUDY                           
1.6    LIMITATIONS OF STUDY                       
1.7    ASSUMPTIONS                           
1.8    DEFINITION OF TERMS 
                      
CHAPTER TWO
LITERATURE REVIEW                           
CHAPTER THREE
3.1    DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM       
3.2    FACT FINDING METHOD USED                   
3.3    ORGANIZATION STRUCTURE                       
3.4    OBJECTIVES OF EXISTING SYSTEM               
3.5    INPUT, PROCESS AND OUTPUT ANALYSIS           
3.6    INFORMATION FLOW DIAGRAMS                   
3.7    PROBLEMS OF THE EXISTING SYSTEM               
3.8    JUSTIFICATION OF THE NEW SYSTEM    
           
CHAPTER FOUR
4.1    DESIGN OF THE NEW SYSTEM                   
4.2    INPUT SPECIFICATION AND DESIGN               
4.3    OUTPUT SPECIFICATION AND DESIGN               
4.4    FILE DESIGN                               
4.5    PROCEDURE CHART                           
4.6    SYSTEM FLOW CHART                       
4.6.1    SYSTEM REQUIREMENTS                           
4.7    IMPLEMENTATION                           
4.7.1    PROGRAM DESIGN                           
4.7.2    PROGRAM FLOWCHART                       
4.7.3    PSEUDO CODE                           
4.7.4    SOURCE PROGRAM: TEST RUN                   

CHAPTER FIVE   
5.0    DOCUMENTATION                           
5.1    RECOMMENDATION                           
5.2    CONCLUSION                               
BIBLIOGRAPHY                           


A NOVEL SECURE COMMUNICATION PROTOCOL FOR ADHOC NETWORK (SCP) (CASE STUDY OF PLEASURE WORLD CAFE )
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU2350
  • Access Fee: ₦5,000 ($14)
  • Pages: 55 Pages
  • Format: Microsoft Word
  • Views: 421
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU2350
    Fee ₦5,000 ($14)
    No of Pages 55 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to... Continue Reading
    ABSTRACT Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to... Continue Reading
    ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous... Continue Reading
    ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous... Continue Reading
    ABSTRACT IP multicast is facing a slow take-off although it has been a hotly debated topic for more than a decade. Many reasons are responsible for this status. Hence, the Internet is likely to be organized with both unicast and multicast enabled networks. Thus, it is of utmost importance to design protocols that allow the progressive deployment... Continue Reading
    ABSTRACT IP multicast is facing a slow take-off although it has been a hotly debated topic for more than a decade. Many reasons are responsible for this status. Hence, the Internet is likely to be organized with both unicast and multicast enabled networks. Thus, it is of utmost importance to design protocols that allow the progressive deployment... Continue Reading
    ABSTRACT Remote pc access are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing... Continue Reading
    ABSTRACT Remote pc access are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing... Continue Reading
    ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
    ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
    Call Us
    whatsappWhatsApp Us