Design And Implementation Of Instant Messaging Tool

1y ago
8 Views
2 Downloads
628.71 KB
5 Pages
Last View : 11d ago
Last Download : 3m ago
Upload by : Esmeralda Toy
Transcription

International Journal of Scientific & Engineering Research, Volume 5, Issue 6, June-2014ISSN 2229-55181596Design and Implementation of InstantMessaging tool for Battle Field ManagementSystem in CVRDEAmandeep Singh* , S.Chakravarthi #Under Graduate Student*, Associate Professor#Department of computer Science and EngineeringSaveetha School of EngineeringSaveetha UniversitySaveetha nagar, Thandalam, Chennai-602105, Indiauma.is95@gmail.com*, thepfusatuoalbert@gmail.com*, aman27892@gmail.com*Abstract— Instant Messaging (IM) is a type of communications service over the Internet that enables individualsto exchange text messages and track availability of a list of users in real-time. The existing instant messagingtechnology does not provide built-in support for security feature as proposed idea. And also in Battle FieldManagement System the most commonly used as means of communication is Walky-Talky, which we feel is muchunsecured. In this paper we propose a secured instant messaging system using identity-based cryptosystems whichprovide a strong authentication and secured communication for both IM client to IM server and IM client to IMclient. Identity-based cryptography is a type of public-key cryptography in which a publicly known stringrepresenting an individual or organization is used as public key. The public key string can be IP address, domainname or email address.IJSERKeywords: identity-based signature; identity-based encryption; identity-based key issuing; instantmessaging; bilinear pairings; combat vehicle research development & establishment(CVRDE).I INTRODUCTION1.1 General IntroductionInstant Messaging enable individual toexchange text messages and track availability of alist of users in real-time. IM worms and securecommunication are two safety issues of instantmessaging system. Most of the existing systemgive more scalability priority than that of securityservice. Instant messaging communication can bedone in following manner IM client to IM serverand IM client to IM client with the followingproperties of security areas: andconfidentiality. There are some existing IMsystems that only provide confidentiality service,for instance Kikuchi et al. some uses TLS/SSL toestablish a secure connection employing digitalcertificate. However it increases the privacyconcerns. And certificate management is complexand costly. In this paper we propose identity-Basedcryptosystem, a secure instant messaging systemfor Battle field Management system, which canprovide strong authentication and securecommunication for both instant messaging clientto instant messaging server and instant messagingclient to instant messaging client. Mostly usedcommunication for Battle field Management is thatof Walky-Talky which we prove it as moreunsecure. Propose a secure IM system by usingidentity-based cryptosystems. The system consistsof a group of private key generators (PKGs), whichgenerate the master key according to securedistributed key generation protocol to avoidkey agreement problem. In propose an identitybased cryptosystems, the public key of an entitycan be easily calculated from his identityinformation (e.g. e-mail address, IP address, IMaccount, etc.),and private key is generated by atrusted third party named as private key generator(PKG),which is transferred via a secure channelfrom the PKG to the client.1.2 Identity-Based CryptosystemIdentity-Based Cryptosystem is variouscryptography combinations of keys used bycryptographic group of community. Identity-basedcryptography is a type of public-key cryptographyin which a publicly known string representing anindividual or organization is used as public key.The public key string can be IP address, domainname or email address. Identity-Based systemallows any party to generate a public key from aknown identity value. Trusted third party, calledprivate key generator (PKG) generates the privatekey. To operate the PKG first publish a master keyand retain the master private key. A user submitshis identity ID to the PKG. The PKG computes theIJSER 2014http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 5, Issue 6, June-2014ISSN 2229-5518user’s public key and user gets his private keywhich is returned by PKG.1.2.1 Identity-Based encryptionIt is a type of public key encryption inwhich the public key of a user is some uniqueinformation about the identity of the user, forinstance e-mail id, IP address and IM accountetc., which was proposed by Adi shamir in1984.1.2.2 Identity-Based decryptionIdentity-Based decryption is computed bythe PKG based on the ID associated with thereceiver and secret master key. Once the privatedecryption key from the PKG, the receiver uses ittogether with the element r p and bilinear map tocompute the secret message key, which is thenused to decrypt the original senders’ message.1.2.3 Identity-Based signatureIdentity-based signature depends on theassumption that secret keys are secured absolutely.If a secret key is exposed, secret key have to bereissued. Thus limiting the impact key exposure ofsecret key in Identity-Based signature is animportant task.1597secure and confidentiality proposed DeffieHellman protocol suitable for Instant Messagingsystem. Identity-Based public key cryptography(cryptosystem) was proposed which was firstintroduced by Shamir.In an identity-based cryptosystems, thepublic key of an entity can be easily computedfrom his identity information for e.g. e-mailaddress, IP address, IM account, etc., and thecorresponding private key is generated by a trustedthird party named as private key generator (PKG),the private key is transferred from the PKG to theuser through a secure channel. The system consistsof a group of private key generators (PKGs), whichgenerate the master key according to securedistributed key generation protocol to avoid keyescrow problem. IM service provider functions asa registration authority, answers for authenticatinguser information and signing authenticated users’information to PKGs.2.4 Advantage of Proposed SystemThe Main advantages of using theproposed IM system are as follows:i). Gives more priority on security than scalability.ii).IM system support security features likeIntegrity, Authentication, Non-repudiation andConfidentiality etc. by using Identity-BasedCryptosystem.iii). Generation of private key on request is verysecure.iv). In an identity-based cryptosystems, the publickey of an entity can be easily computed from hisidentity information for e.g. IP address, domainname or email address.IJSERII SYSTEM ANALYSIS2.1 Existing SystemThe existing IM technology does notprovide built-in support security features. Most ofthe existing IM services were design givingscalability priority over security. Some IMemploys TSL/SSL to establish a secure connectionbetween client and a server by digital certificate.However TLS/SSL will increase privacy concern.Some only provide confidentiality service e.g.Kikuchi. And in Battle field management systemmost commonly used is walky-Talky, which wefeel is very unsecure.2.2 Disadvantage of Existing SystemThere are various disadvantages in theexisting. Some of them are as follows:i) Giving more scalability priority over security.ii) There is no built in support (like confidentiality,integrity, authentication and non-repudiation).2.3 Proposed SystemWe propose a secure IM system by usingIdentity-Based Cryptosystem, which can providestrong authentication and secure communicationfor both IM client to IM client and IM client to IMserver. Secure communications includes theProperties of: Authentication, Integrity, NonRepudiation, Integrity and confidentiality. ForIII SYSTEM SPECIFICATION3.1 Technologies Used.NET as a set of software technology ofMicrosoft for rapidly building and integratingXML Theb services, Microsoft Windows-basedapplication, and Theb solution.3.1.1 Visual Studio PlatformMicrosoft Visual Studio is an integrateddevelopment environment (IDE) from Microsoft.Microsoft Visual Studio platform includes a codeeditor supporting IntelliSense code as well asrefactoring code. Other tools include form designerfor building GUI applications, web designer,and database designer of schema. Plug-ins areaccepted that enhance functionality at almost everylevel-including support and adding new toolsetslike editors and visual designers for domainspecific languages or toolsets for other aspects ofthe software development lifecycle (like that ofthe TeamFoundationServer client:Team

International Journal of Scientific & Engineering Research, Volume 5, Issue 6, June-2014ISSN 2229-5518Explorer). Microsoft Visual Studio supportsvarious different languages by means of serviceslanguage that allows debugger and code editor tosupport (to varying degrees) nearly any languageof programming language service exists. Supportfor other languages such as Ruby, M, and Pythonare among other available through languageprogramming service separately installed. Visualstudio also exists as an individual languagespecific version which provides more limitedlanguage services to the user: Microsoft VB,Visual C#, and Visual C etc.3.1.2 Brief to C#.NETC# is built on the syntax and semantics ofC , allowing C programmer to take advantageousof .NET. The development team is lead by AndersHejlsberg. The most recent version is C# 5.0released in August 15, 2012. It was a languagebuilt intended for simple, general purpose, modern,and object-oriented language. The language wasbuilt for intention to develop software components.3.1.3 Microsoft SQL Server R2Microsoft SQL Server is a relationalDBMS. It is a software product whose function isto store and it retrieve data’s as requestedapplication software, be it on same computer orrunning on other computer across a network. SQLServer includes better features lie compression,which helps in improving scalability. SQL Server2008 R2 adds certain features to SQL Server 2008including a master data management systembranded as Master Data, and a master data entitiesand hierarchies.1598right output must be developed ensuring that eachoutput element is design so that people will findthe system can use easily and effectively.4.3 Code DesignThe code is designed to execute usingC#.NET as front end to use execute data leakage inCVRDE by using SQL server as back end. Adesign code is a document that sets rules for thedesign of a development freshly. It is aprogramming tool which is used for design andprocess of planning, however it goes further andmore regulatory than other forms of guidance. Itshould be accompanied by a design rationale thatexplains objectives, the design code providinginstruction to the appropriate degree or precision ofthe more detailed design work. In this way adesign code may be a tool which helps ensure thatthe aspirations for quality and quantity for housingestablishing, for large scale project particularly.4.4. Architecture DiagramArchitectural block diagram is a diagramfor a system, where principal parts or functions arerepresented by blocks and connected by lines thatshow the relationships of the blocks.IJSERIV SYSTEM DESIGN4.1. Input DesignThe input design is the link between thesystem and the user. It comprises of Text, Videoand audio Messaging. After successful login usercan have a life chat in form Text, video, andAudio. User need to have his/her account createdto access the life chat.4.2. Output DesignA quality output is one, which meets therequirements of the end user and information arepresent clearly. The result of any systemprocessing is communicated to the user and to theother system through. In output design it isdetermined how the information is to be displacedfor immediate need. It is the most important anddirect source to the user. Intelligent and efficientdesign output improves the system’s relationshipto help user in decision making. Computer outputdesigning should proceed in organized and theFig. 4.4.1Propose IM System ModelThe figure shows how the actual workingprinciples take place of Instant Messaging Systemin Battle Field Management System.V SYSTEM IMPLEMENTATION5.1 System Description (Work flow)The goal the system is to protect datafrom unauthorized person. It implements theconcept Identity-Based Cryptosystem. Private keyis generated by the Private Key Generator (PKGs)on request by the IM client which is more securethan the considered public key. There are threeIJSER 2014http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 5, Issue 6, June-2014ISSN 2229-55181599participants in our secure IM model: IM clients,IM Server, PKGs.IM server is in charge givingauthentication to all users of the system and willallow only those users to use its resource. The IMserver keeps track of the status for instance onlineand off-line from computer of each user and storessufficient information about them to allow anotheruser to set up a peer-to-peer communicationchannel with them. IM server at the serviceprovider’s end know that the user is online andready to receive messages, and the current status ofeach of their contacts is also downloaded to hisclient.The IM client is a user that can use tosend message. Its basic function is to log in the IMserver and send message and manage contact list.When a user wishes to send a message to anotheruser, IM client first contacts the IM server toobtain the IP address of the user and the port onwhich he is listening for incoming messages. TheIM client then initiates a TCP connection to thatclient and sends the secure message by usingidentity-based cryptosystems. Once the one-to-onecommunication channel between users has beenestablished, the IM server plays no further part butjust to inform the IM clients of updates to thestatus of their contacts.The PKGs generate the master key. IMservice provider functions as a registrationauthority, answers for authenticating userinformation and signing authenticated users’information to PKGs. User can get his private keycorresponding to his IM account by performing ablind key issuing protocol with any PKGs.Finally, secure connection between IM client andIM client, IM client and IM Server, which can beproposed using identity-based encryption scheme,identity-based signature scheme, identity-basedsigncryption or identity-based authenticated keyagreement scheme. A user, with an identity IDperforms required steps to get his private keyaccording to anonymous key issuing protocol foridentity-based cryptosystems. The password isuser’s chosen password during authentication andthe tuple i.e ID,password is stored in IM serviceprovider database corresponding to his public key.User can obtain his private key from PKG by typehis ID and password at client side.5.2.1 Authentication ModuleUser will be permitted to give theusername and password in the login page. If theuser name and password is correct means user willallow to accessed the application. If the user nameand password is not valid, user will not allowaccessing the application.A user with valid user ID which IMservice provider provides will be able to access theservice and perform various chat according tohis/her preference.5.2 Module DescriptionIn software, a module is a part ofprograms. Programs are composed of one or moreindependently developed modules that are notcombined until the linked in program. A modulecan contain one or several routines. In hardware, amodule is a self-contained component.5.2.4 IM Text ModuleAfter successfully login to the Textmodule, the use of life Text chat can start. It willdisplay user mood in the chat. Sending textmessages and receiving is performed in thismodule. For instance availability of user can bedisplay.Fig. 5.2.1.1 Authentication Module5.2.2 Registration ModuleUser who is new member need to firstobtain his private keys by providing his/her publickey. By filling various required field in theregistration module and after submittingsuccessfully, the new user can use the system.IJSERFig .5.2.2.1 Registration Module5.2.3 IM Text/video/Audio ModuleAfter successfully login to the chatmodule, the following (i.e. Text/Audio/Video) arethe option that can be selected for communicationdepending to user ways and mode ofcommunicationFig. 5.2.3.1 Text/video/Audio Module

International Journal of Scientific & Engineering Research, Volume 5, Issue 6, June-2014ISSN 2229-55181600REFERENCESFig. 5.2.4.1 Talk (Text) Module[1]. M. Mannan and P. C. Oorschot did the studyon Instant messaging worms, analysis andcountermeasures. 2005 ACM workshop.5.2.5 IM Video ModuleOnce login into the video module, usercan have a life video conference on the go. Face toface on the go is communicated at this module.[2]. H. Kikuchi, M. Tada & S. Naanishi did thestudy on Secure instant messaging protocolpreserving confidentiality against administrator.2004 at 18th international conference.Fig. 5.2.5.1 Video Module[3]. M. D. Raimondo, R. Gennaro and H. rawczykdid the study on Secure of-the Record Messaging.ACM 2005 worshop.5.2.6 IM Audio ModuleOnce login into the Audio module, usercan communicate one another through talk, it doesnot involved text or video.[4].M. H.Eldefrawy, . Alghathbar, M.K. Khan, H.Elkamchouchi did study on Secure InstantMessaging Protocol Centralized CommunicationGroup. 20114th IFIP International Conference.[5]. A. Shamir did study on Identity-BasedCryptosystems and Signature Schemes. 1985 atCRYPTO Springer-Verlag.IJSERFig. 5.2.4.1 Audio Module5.2.7 About(Contact) ModuleThis module contain about the details likecontacts and other information of the managementof Battle field management system. It containsvarious key personal contacts.[6]. R. Gennaro, et al did study on SecureDistributed key Generation for Discrete-Log BasedCryptosystems. 2007 journal of Cryptology.[7]. C.J. Wang, Q. Li, X.Y. Yang did study onImprovement On Sui et al’s, that is separable andanonymous key protocol issuing in ID-basedCryptosystem. 2006 IJCS.VII CONCLUSIONIn today’s era Internet as a means ofcommunication using Instant Messaging is a veryimportant application. However IM which has veryless usage in Battle Field Management System.Most of these existing instant messaging serviceswere designed giving scalability priority oversecurity. We proposed a secured instant messagingsystem by using identity-based Cryptosystem,which can further provides secured strongauthentication and secured communication forboth instant messaging. The proposed instantmessaging for usage in Battle Field Managementsystem will help secured the communication to alarge extent rather the used of Walky-Talky.VIII FUTURE ENHANCEMENTFuture is the stage of the project when thetheoretical design is turned out into a systemworking principal. And also further the applicationcan be integrated with features like the combatvehicles sensors and detectors. The futureenhancement of this project can also implementroute maps and enemies combat vehicles detectors.[8]. D. Boneh & M. Franlin did study on IdentityBased Encryption from the Weil pairing. 2001Springer-Verlag.[9]. J.C. Cha & J.H. Cheon did study on AnIdentity-Based Signature from Gap Diffie-Hellmangroups. 2003 at PKC, Springer-Verlag.[10]. M. Barreto, et al. did study on Efficient andProvably Secure Identity-Based Signature &Signcryption from Bilinear Maps. 2005 atASIACRYPT, Springer-Verlag.[11]. Y.J. Choie, E. Jeong, & E. Lee did ement protocol from pairings. 2006 at AppliedMathematics and Computation.[12]. A. Shamir did study on How to Share aSecret communication at ACM, 1979.[13]. T. P.Pedersen did study on A ThresholdCryptosystem without a Trusted Party. 1991 atEUROCRYPT, Springer-Verlag.IJSER 2014http://www.ijser.org

Instant Messaging enable individual to exchange text messages and track availability of a list of users in real-time. IM worms and secure communication are two safety issues of instant messaging system. Most of the existing system give more scalability priority than that of security service. Instant messaging communication can be

Related Documents:

carla h Pittsburg KS US Instant Win--iPod Touch 8GB Lisa M Danbury CT US Instant Win--iPod Touch 8GB Jaime G Chula Vista CA US Instant Win--iPod Touch 8GB shannon B Olathe KS US Instant Win--Sony Bloggie HD Camcorder 8GB 1080p - 13.0 MP - Helene C Sterling CO US Instant Win--iPod Touch 8GB Anthony S Chambly QC CA Instant Win--Sony Bloggie HD .

Your Instant Net subscription has been created and is ready for you to begin. Click the Invite icon for your Instant Net conference. Select Instant Meeting and Instant Net conference Complete the To and Subject fields and click Send. Participant receives your Email Invitation with the meeting information. Leader's name SW4511 12345

instant messenger module has an instant messenger process and a networked device process, the instant messenger pro cess being operable to provide instant messaging functions and services to a user and the networked device process being operable to provide data from networked devices to the instant messenger server. 9 Claims, 13 Drawing Sheets it.

Instant messaging IM Images (transfer of inline images in Instant message conversations) Voice chat Game requests File transfers File sharing Instant Messaging Instant messaging is simply the passing of HTML-encoded clear text messages from one user to another, via a central BOS server. The message is not encrypted and is always routed over the

Card Ordering Screen 3 (Names to Emboss – 1 Name) 8. At this point, use Instant Issue (F14) to enter the Instant Card Issue screen to process the order. The Instant Card Issuescreens are identical to the screens used to order an ATM or debit card. Instant Card Issue processing steps star

May 14, 2020 · 2. Use only the Instant Pot Duo lid with the Instant Pot Duo pressure cooker base. Using any other pressure cooker lids may cause injury and/or damage. 3. To reduce the risk of pressure leakage, cook only in an authorized stainless steel Instant Pot inner pot. DO NOT use the appliance without the removable inner pot installed. 4.

or sold by Schumacher Electric Corporation may result in damage to the unit or personal injury. Never operate the Instant Power if it is damaged. If someone else uses the Instant Power, ensure they are well informed on how to use it safely, and have read and understood the operating instructions. The Instant Power is NOT designed .

API 526 provides effective discharge areas for a range of sizes in terms of letter designations, “D” through “T.” 3.19 Flutter Fluttering is where the PRV is open but the dynamics of the system cause abnormal, rapid reciprocating motion of the moveable parts of the PRV. During the fluttering, the disk does not contact the seat but reciprocates at the frequency of the flutter. 3.19 .