Sei sulla pagina 1di 11

Tolerant Networks

Project Guide : Mr.K.Vijay


Project Team :
G. Maneesha
(316136410038)
Ch. Niharika
(316136410019)
V. Lakshmi Mounica
(316136410138)
K. Shyamala
(316136410056)

Department of Computer Science of


Engineering
Dr. Lankapalli Bullayya College of Enginee
(for Women)
Abstract
Delay tolerant networking (DTN) is an approach to computer network architecture that seeks to
address the technical issues in heterogeneous networks that may lack continuous network
connectivity. It is necessary in provenance-based system to defend against attackers who may
modify or drop messages including provenance information or disseminate fake information. For
achieving peer-to-peer trust assessment and maximize the delivery of correct messages received
by destination nodes we propose PROVEST(PROVEnance-baSed Trust model) which minimizes
message delay and communication cost under resource-constrainted network environments. It
leverages high trust accuracy using provenance information embedded in a message during its
delivery. It concentrates on a privacy between information source and the information itself. This is
achieved using PROVEST. This is used in PROVEST because of efficient representation of large
states. In PROVEST legitimate members communicate through a symmetric key. A node encrypts
the entire packet using a symmetric key given to the legitimate members. Message Authentication
Code is generated for every single node to avoid duplication. Stimulation result shows our proposed
PROVEST provide better delay free and energy efficient.
Software Requirement Specification Table
A software requirements specification is a complete description of the behavior of the system to be developed. It
includes a set use cases which are known as functional requirements, that describe all the interactions of owner
and user will be having with the software. In addition, SRS also contains non-functional requirements that define
constraints of design and implementation .
S.NO Requirement Number Requirement Name Essential / Description
Desirable

1 RS1 Source Node Essential Sends packets to destination


through intermediate nodes

2 RS2 Intermediate Node Essential Data is sent from sender to receiver


through the nodes

3 RS3 Router Essential To detect malicious nodes and to


view the path

4 RS4 Destination Node Essential Receives packets sent by source


node via optimal growth
USE CASE DIAGRAM
A use case diagram in the Unified Modelling Language(UML) is a type of behavioural diagram defined by
and created from a use-case analysis. Its purpose is to present a graphical overview of the functionality
provided by a system in terms of actors, their goals ( represented as use case), and any dependencies
between those use cases. The main purpose of a use case diagram is to show what system functions are
performed for which actor. Roles of the actors in the system can be depicted.
Algorithm :
The algorithm is given below:

Step 1: Router is initialized first.

Step 2: The sender and receiver nodes are initialized with the centralized router.

Step 3: The sender tries to choose a valid data and converts the data into packets and then generates
hash key for individual packets.

Step 4: The sender or source node will request the best path from the provenance router.

Step 5: The router will generate a best path using AODV based on cost and sends to the sender.

Step 6: The packets are sent to the router and in turn to receiver in a dedicated manner.

Step 7: The receiver verifies the received packets and tries to observe if there is any attack occurred
during communication and then identifies the delay time and throughput time.

Step 8: Exit
Database
A database is an organized collection of data, generally stored and accessed electronically from a
computer system. Where databases are more complex they are often developed using formal design and
modeling techniques.

The database management system (DBMS) is the software that interacts with end users, applications,
and the database itself to capture and analyze the data. The DBMS software additionally encompasses
the core facilities provided to administer the database. The sum total of the database, the DBMS and the
associated applications can be referred to as a "database system". Often the term "database" is also
used to loosely refer to any of the DBMS, the database system or an application associated with the
database.
Test Cases
Test Cases
Test Cases
Test Cases
Conclusion
A provenance-based trust model called PROVEST which evaluates trust of a node by

leveraging the provenance information added by each intermediate message carrier as indirect

evidence during message forwarding. PROVEST performs adaptive control based on the

historical pattern of evidence such as positive or negative evidence. This feature excels in

identifying bad nodes in the network where trust evidence is uncertain. Provenance-based

approach significantly reduces the communication cost while maintaining a high correct message

delivery ratio

Potrebbero piacerti anche