170 likes | 400 Views
Proposal Presentation. A Secure On-Demand MANET for Communication during a Disaster Situation for DMC. Authors. G. N. K. Wickremasinghe - IT 11 1026 56 K . L. B. Perera - IT 11 1021 06 G. M. V. Kalpani - IT 11 2264 06 B. S. Weerakoon - IT 11 1005 08. Introduction.
E N D
Proposal Presentation A Secure On-Demand MANET for Communication during a Disaster Situation for DMC
Authors • G. N. K. Wickremasinghe - IT 11 1026 56 • K. L. B. Perera - IT 11 1021 06 • G. M. V. Kalpani - IT 11 2264 06 • B. S. Weerakoon - IT 11 1005 08
Introduction • The main research idea of the authors is the establishment of the security for the information which is sent through a communication network in an emergency disaster situation in Sri Lanka. • This is done specially to conform the requirements provided by the DMC Sri Lanka. 14-104 1
Background • DMC has the major responsibility to provide daily situational reports to respective parties. • Currently use a web application for the communication. • The whole national communication system can be break down due to various disasters that occurs from time to time. • The main focus area of the research is to secure the information transmitting through MANET that uses the OLSR protocol. 14-104 2
Current Systems 14-104 3
Research Problem • Whenall communication methodshaveshutdownduringa disastersituation, how can a MANET be used for reliable communication? 14-104 4
Objectives • A routing algorithm for a MANET to find the shortest path to the destination. • Direct message broadcasts towards the destination only. • Secure the information in transit. • Authenticate the senders. • Android mobile application for operation. • Communicate within the premises of a single building. 14-104 5
System Design Search for a peer who can understand the protocol and encrypt the message. Forward the encrypted message to the discovered peer. The receiver authenticates the sender as a valid sender and repeats the process within the MANET until the destination is reached. Once the message is received at the destination, it is decrypted. 14-104 6
Methodology • Technologies used • MANET simulating software such as NS2 and OPNET • IDEs such as Visual Studio and eclipse • Proposed project implementation flow • Design and application to end points • Design android application to normal users 14-104 7
Expected Outcome • Once you complete the system what is the usage? • Application software to sender and receiver • Android application 14-104 8
Summary • Introduction • background • Research Gap • Research Problem • Objectives • System Design • Methodology • Expected Outcome 14-104 9
Thank you! Any questions?
References • Amanpreet Kaur, Basant Raj Singh Gill, and Gurpreet Kaur Deol, “Secure Optimized Link State Routing Protocol (SOLSR)”, 2005. [PDF] Available: http://www.rimtengg.com/coit2008/proceedings/NW30.pdf [Accessed: 2014-02-03] • Andreas Hafslund, Andreas Tønnesen, Roar Bjørgum Rotvik, Jon Andersson and Øivind Kure, “Secure Extension to the OLSR protocol”, 2004_-_Papers.html, 2004. [PDF]. Available: http://www.olsr.org/docs/solsr_paper.pdf [Accessed: 2014-02-06] • Yih-Chun Hu, Adrian Perrig, and David B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks”, 2002. [PDF]. Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.132.4609&rep=rep1&type=pdf [Accessed: 2014-02-10]