The users awareness of their privacy made anonymity to get higher attention. The users can enjoy the pleasure of the network services without being tracked by anonymity. Although many anonymity related issues have been widely studied in payment based systems like peer-to-peer (P2P) systems and e-cash systems, a more effort has been dedicated to a Wireless Mesh Networks (WMNs). At the same time, Conditional anonymity is required for the network authority so the any misbehaving entities can be easily traced down.
Here, we are going to propose security architecture to make sure honest users have the privilege for unconditional anonymity whereas misbehaving users can be easily traced by the network authorities in Wireless Mesh Networks. The proposed architecture tries to solve the problems between anonymity and traceability. It also assures fundamental security requirements which include authentication, data integrity, confidentiality and non-repudiation. Very good analysis on efficiency and security is introduced, validating feasibility and effectiveness of the proposed architecture.
Table of Contents
INTRODUCTION
INTRODUCTION
1.1 OBJECTIVE
WMN is an assent technology and is much expected to spread widely because of its fever deployment feature and the wireless broadband service it holds, which indeed attracts both users and service providers. However, security issues built in WMNs or any wireless networks need to be taken into consideration before deployment and generation of the network, because it is unpleasant to subscribers to get the service without security and privacy guarantees. One main entity for anonymity is to unlink an honest user's identity to his specific activities, like how anonymity can be achieved in untraceable e-cash systems and other peer to peer systems. Also anonymity also required to hide the location details of an honest user to prevent movement tracing.
A global observer can easily escalate the traffic attacks by chasing the packet forward path in wireless commination. Therefore, routing anonymity is obvious, which cover the confidential communication relationship between the two users by constructing a mystery path between them. Although, unconditional anonymity will lead to induce insider attacks as the fake/misbehaving users will me not available anymore. Hence, it is strongly recommended for traceability in systems like e-cash machines etc. where the network authorities can identify these fake/misbehaving users.
LITERATURE REVIEW
LITERATURE REVIEW
LITERATURE SURVEY
One of the very important steps in any software development process will be Literature Survey. It is really important to determine the economy and the time factor before developing any tool. After setting up the time factor and economy then the next step is to find out which operating system and which coding language could be used for developing the tool. By the time when the programmer starts developing the tool he/she requires some external help. This help can be obtained from the websites or even from the books. Prior starting to build the system all the above steps should be taken into considerations for developing the proposed system.
Quite studies have been made on WMNs to system stability in the time escalating units like throughput or utility. Concluded, these measures account the system performance. The anonymity and traceability in WMN is complicated in wired network also, this is mainly because of the complicated connections in the network. There are few traditional systematic techniques are there, but this couldn't be applied directly to the WMN with WM flows. This is due to complex in discriminating the evacuation method at intermediate links
When I started to work on this project, I gone through several Mobile Ad Hoc multicasting papers and I've decided to do this work with the existing system, and I concluded that what could be done in the proposed system.
Existing System
A global observer can easily escalate the traffic attacks by chasing the packet forward path in wireless commination. Therefore, routing anonymity is obvious, which cover the confidential communication relationship between the two users by constructing a mystery path between them. Although, unconditional anonymity will lead to induce insider attacks as the fake/misbehaving users will me not available anymore. Hence, it is strongly recommended for traceability in systems like e-cash machines etc. where the network authorities can identify these fake/misbehaving users.
PROPOSED SYSTEM
All the security conflicts mentioned above, i.e. anonymity and traceability in the emerging Wireless Mesh Network (WMN) communication systems can be resolved. Initial design of our security architecture has already proposed, in which the applicability and feasibility of the architecture were not fully understood. So, I would like to indulge a detailed and much more efficient analysis in terms of communication, computation and storage to represent that Security Architecture Achieving Anonymity and Traceability (SAT) is in effect more feasible solution to the application scenario of interest. Here, in my work I use Blind signature technique from the payment systems to attain anonymity for the real users and the honest users. And the same blind signature technique to attain traceability of the misbehaving users and the fake users. Additionally, the blind signature technique will not expose the location information of the user.
Advantage:
All earlier work in WMNs had uncommon hierarchical topologies and were strongly dependent on wireless links. But, the work which we are going to do is different. Therefore, the scheme i.e. the original anonymity scheme required for payment systems encompassed by banks, stores and customers cannot be applied directly. Authentication, key establishment and revocation will be very important in all WMNs to assure the right application of the anonymity scheme. Furthermore we apply the most commonly used pseudonym approach to assure network access anonymity and location privacy, this approach is independent on central authority. For example, the broker, the domain authority etc. can extract the user's information from his pseudonyms and can immoderately trace the real/honest users. Overall, the system is not motivated for getting routing anonymity, which could be consolidated as an improvement.
FEASIBILITY Study
In this stage the feasibility of the project is investigated and the business proposal is made with a broad device for the project and also with cost estimates. The feasibility study of the proposed system is carried out during the system analysis stage. All these are carried to make sure that the proposed system should not be any obstruction to the company. In order to understand feasibility well getting knowledge of some major requirements for the system is needed.
In feasibility analysis there are three main key considerations, they are:
Economic Feasibility
Technical Feasibility
Social Feasibility
ECONOMIC FEASIBILITY
In any Organization the Economic Feasibility study is made in order to control/audit the economic impact that system will have on the organization. The budget for the Research and Development (R&D) in an organization will be confined. And there should be a genuine explanation for all the expenditures. By using most of the freely available technologies the developed system will fall within the budget. Only few customized/licensed products had to be purchased. Many of the free technologies are available online and licensed technologies had to purchase online or through offline (May be in store).
OPERATIONAL FEASIBILITY
The acceptance level of the system is studied in operational feasibility. Operational feasibility also includes the course of educating the users to make use the system with no effort. The acceptance level by the users barely depends on the techniques that are used to train the user about the system and to make the user well known with it. The user should accept the system as a necessity and must not feel unprotected by it. Some constructive criticism can be achieved by constructing the confidence level in the users.
TECHNICAL FEASIBILITY
All the technical requirements of the systems are carried out in this technical feasibility study. High demand on the obtainable technical resources in the system will head to high demand on the obtainable technical resources. So this should not be there in the system developed. If not, this will lead to increase in the demands allocated on the client. If the system developed has moderate requirements like only minimum or zero changes will be appropriate for implementing the system.
METHODOLOGY
METHODOLOGY
Networking:
Networking is the way of establishing the communication that sends data from one place to another with a fusion of hardware and software.
Before 1990, OSI(open systems Interconnection) model dominated the communication and networking literature. The OSI was not implemented fully thus the TCP/IP protocol became the dominant commercial architecture.
Open System is set of protocols, which communicate between two different systems regardless of underlying architecture.
The open system interconnection model is not just a protocol, but it is a model to understand and design the network architecture which has the characteristics like interoperable, flexible and interoperable.
Before researching on the OSI model, TCP/IP protocol suite was already developed. It is a protocol with interactive modules. And each of the interactive modules brings a specific functionality. The term hierarchical means each upper layer protocol is supported by one or lower layer protocols.
TCP/IP at transport layer defines protocols like:
TCP (Transmission control Protocol)
UDP (User Datagram Protocol)
TCP:
TCP is a reliable connection oriented protocol. TCP provides logic to provide the connection-oriented protocol above IP datagram. Two processes can communicate through virtual circuit which is provided by TCP.
UDP:
UDP is unreliable and connectionless oriented protocol. UDP is a process to process Protocol that integrates port addresses, checksum and length information to the data from upper layer.
IP datagram's
It is a unreliable and connectionless with no error checking and tracking. It considers the deception of the underlying layers and it will do its best go make transmission to the destination.
IP transport the data in packets called datagrams which are furnished by its higher layers. The IP layer provides a checksum which has its own header. The header is accommodated with the source address and destination address. For splitting the large datagrams into small ones IP layers are responsible. The splitting is done for transmission. And even IP layers are responsible for reassembling the split datagrams. Routing is done through Internet.
Internet addresses
The host which uses the internet services can be determined with the unique address. The address will be of 32 bit length of integer type which is referred as IP address. No two or more visible hosts and publicly addressed can have the same IP address on the internet. Addressing and network ID is encoded by this. Based on the size of the network address the Network ID is categorized into many classes.
Network address
Class A: For the network address class A uses 8 bits.
Class B: For the network address class B uses 16 bits.
Class C: For the network address class C uses 24 bits.
Class D: For the network address class D uses 32 bits.
Subnet address
The network is divided into sub networks. It is built on one sub network and the addressing style is 10-bit addressing which allows 1024 distinct hosts.
Host address
For the host address the final 8 bits will be used. There is a limit of 256 host machines in a sub network.
Total address
The length of total address is 32 bit, which will be written in four integers parted by dots. In the IP address 164.192.68.8; 164.192 is the network, 11 is the subnet and 13 is the host.
Port addresses
The port address is a 16 bit address. Port address identifies the port that is present on the host. If we want to communicate any message to a server you have to send it to the port.
Sockets
The system handles the network connections through a socket which is maintained as a data structure. A socket of data structure can be create using call socket, this returns an integer like a file descriptor. In windows, Read File and Write File functions will handle functionality of socket.
Socket will be created over a network between the two processes when they communicate. T
JFree Chart
JFree chart consists the features which are well documented. It is an open source. It is a design which can be easily extended and uses server side and client side applications as well. Swing components, output types, image files and vector graphic files are supported by this.
Map Visualizations:
Charts are represented by the values that can relate to geographical areas which can include
Income per capita for each country
Life Population density in each state
prediction in every country
The task includes;
Establishing the convenient dataset interface.
Getting freely new distributable vector outlines for every country.
Adding this with current XYPlot class in JFreeChart.
Time Series Chart Interactivity
The new feature interactive time series for JFreeChart is to show an abstracted containment which shows a smaller version of every time series data. The sliding view rectangle gives you the choice to opt the subset of the time series data to show it in the central or main chart
Dashboards
The dash boards build an adjustable dash board which backs the subset of chart types (such as dials, pies, bars, line series, thermometers, time series) and JFreeChart which can be delivered very easily through the java web start and also through an applet. Currently there is tremendous interest going on dash board displays.
Property Editors
J2ME (Java 2 Micro edition):
The property editor mechanism in JFreeChart only handles a small subset of the properties that can be set for charts. A greater end-user control over the appearance of the charts can be provided by Extending or re-implementing mechanism.
J2ME has been defined by the Sun Microsystems as "A highly optimized Java run-time environment targeting a wide range of consumer products, including pagers, screen-phones, digital set-top boxes, cellular phones, and car navigation systems".
This announcement was made on June 1999. J2ME tries to fetch the cross platform functionality to a smaller device.
General J2ME architecture
The Java Runtime Environment (JRE) can be customized by using the configurations and profiles of J2ME. It includes a configuration which identifies the Java Virtual Machine used.
The configuration characterizes the essential run time environment. The picture depicts the relation between the configurations, virtual machines and the profiles.
C:\Users\Velli\Desktop\c5.PNG
Java 2 micro edition moves in synchronous with J2SE API and its relative JVM. J2SE VM is associated to java virtual machine. The J2ME VM is also one of the subsets of JVM.
Developing J2ME applications
We have to consider some key points while developing applications for smaller devices. The system where the compiler is involved when using J2se in order to compile the J2ME applications, deployment, analyzing packages are in this.
Design considerations for small devices
The strategical plans are required before developing applications for small devices during the design phase
Here are some design strategies:
Keep it simple, remove unnecessary features
Smaller is better.
Minimizing the run time memory usage. By making use of scalar types we can minimize the memory usage.
Configurations overview
The essential run time environment is defined by the configuration. There are two configurations for J2ME.
Connected Limited Device Configuration (CLDC): CLDC is used for developing small J2ME applications
Connected Device Configuration (CDC): This configuration is used for 32 bit architectures which requires more than 2 megabytes memory. It is used with CVM.
J2ME profile
The type which the device is going to support is defined by the profile. The classes for cellular phones are defined by Mobile Information Device Profile. It integrates the domain specific classes to the configuration to characterize the similar devices.
There are 2 profiles defined for J2ME which are built upon CLDC, They are;
KJava
MIDP
Depends on the configuration profiles are built, so that profiles are definite to the volume of the device where the application runs. Profiles are correlated with configurations.
KJava:
KJava is a Sun's trade mark and includes KJava API. KJava includes a sun specific API which runs on Palm Operating system. The KJava API has many similarities with J2SE AWT. The KVM and KJava VM both accept same class file format and byte codes similar to J2SE virtual machine.
MIDP:
MIDP is equipped with mobile devices like mobile phones etc. MIDP is an industry standard profile for mobile devices. It is completely supported for the development of mobile application.
The following are the packages in MIDP;
java.lang
java.util
javax.microedition.midlet
javax.microedition.io
javax.microedition.rms
java.io
javax.microedition.lcdui