Project 2'A Extending NS2 to support encryptiondecryption - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Project 2'A Extending NS2 to support encryptiondecryption

Description:

Implementation of security on NS-2 is necessary in network simulation. ... Jess Garms, Daniel Somerfield (2001). Professional Java Security. ISBN 1-861004-25-7 ... – PowerPoint PPT presentation

Number of Views:249
Avg rating:3.0/5.0
Slides: 12
Provided by: sce9
Learn more at: http://sce.uhcl.edu
Category:

less

Transcript and Presenter's Notes

Title: Project 2'A Extending NS2 to support encryptiondecryption


1
Project 2.AExtending NS-2 to support
encryption/decryption
  • Date 04/07/2005
  • Course CSCI 5931
  • Name Sam Tran
  • Tuan Nguyen

2
Extending NS-2 to support encryption/decryption
  • Abstract
  • Approach
  • How to add new security features in NS-2
  • General design encryption/decryption in NS-2
  • Implementation
  • Simple demonstration
  • Conclusion
  • References

3
1. Abstract
  • Implementation of security on NS-2 is necessary
    in network simulation. However, currently, NS-2
    does not support these features. Our project will
    aim to solve this issue.

4
2. Approach
  • NS-2 is open source network simulation
    application.
  • NS-2 currently supports IP protocol suite and
    various standard routing protocols for wire and
    wireless network.
  • To add security functions. We have to
    modify/build new packet formats.

5
3. Add new security features in NS-2
  • Define a new packet format.
  • Derive new class from Agent class for processing
    this new packet format.
  • Processing includes
  • Encrypting function.
  • Decrypting function.
  • Message digest generation function.
  • E.t.c

6
4. General design flow for security packet in NS-2
Figure1 Steps to add new packet to NS-2 and
testing results
7
5. Implementation
Figure 2 Logical design of the
encryption/decryption system
8
5. Implementation (cont.)
  • Hash function
  • Polynomial Algorithm.
  • Encryption function
  • Input String of plain text
  • Algorithm CESAR cipher with pre-shared key of 3
  • Output Encrypted text.
  • Decryption function
  • Input string of encrypted text
  • Algorithm CESAR cipher with pre-shared key of 3
  • Output decrypted text.

9
6. Simple demonstration
Figure 3 Outcome of simple demonstration script.
10
7. Conclusion
  • The project shows a method to add security
    functions into NS-2.
  • With this approach, we can build standard
    security components into NS-2 using industrial
    standard algorithm such as SHA-1, MD5 for hash
    function and DES,3DES and AES for
    encryption/decryption.
  • Project can be extended to support asymmetric key
    encryption/decryption.

11
8. References
  • Marc Greis (2005). Tutorial for the network
    simulator ns. Retrieved 3/28/05 from
    http//www.isi.edu/nsnam/ns/tutorial/index.html
  • Free Information Society (2005). Hash Table
    Class. Retrieved 4/4/05 from http//www.freeinfos
    ociety.com/computers/programs/cpp/hashtable.h
  • Jess Garms, Daniel Somerfield (2001).
    Professional Java Security. ISBN 1-861004-25-7
  • Hash function implemented in C with polynomial
    algorithm. Retrieved 4/14/05 from
    http//wikisource.org/wiki/Polynomial_hash_functio
    n
Write a Comment
User Comments (0)
About PowerShow.com