Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Vulnerability of Network Traffic Using Joint Security and Routing Analysis
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Abstract:
Joint analysis of security and routing protocols in wireless networks reveals vulnerabilities of secure network traffic that remain undetected when security and routing protocols are analyzed independently. We formulate a class of continuous metrics to evaluate the vulnerability of network traffic as a function of security and routing protocols used in wireless networks. We demonstrate vulnerability evaluation using the proposed.metrics and node capture attacks using the GNAVE algorithm.
hi
i need the project report of the evaluting vulneability network traffic using joint security and routing analysis


plz forward the report to my mail id

srikanth.1240[at]gmail.com
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
When the security and routing protocols are analyzed independently several vulnerabilities of the secure network traffic remains undetected. A joint analysis of security and routing protocols in wireless networks reveals these vulnerabilities of secure network traffic. a class of continuous metrics is developed for evaluating the vulnerability of the network traffic as a function of the routing protocols and security protocols used in the network. The set theory and the circuit theory is used to develop two complementary interpretations of security in the network. a network analyst or an adversary can then easily determine the weaknesses in the secure network. a nonlinear integer programming minimization problem is used to model the node capture attacks using the vulnerability metric. The Greedy Node capture Approximation using Vulnerability Evaluation (GNAVE) algorithm is proposed.

Get the report here:
http://wnss.sv.cmu.edu/papers/tdsc-09.pdf
Hi...
iam doing a project on the topic "Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis"...Could anyone pls help me out with this?i want the source code and report...kindly send me d details to starlets4[at]gmail.com