SlideShare une entreprise Scribd logo
1  sur  38
60-564  Security & Privacy on the Internet Instructor: Dr. Aggarwal Survey New Developments on Ad-hoc Network Security Presenters:  Amar B. Patel , Mohammed F. Mokbel & Shushan Zhao November 25 th   , Fall 2007 School of Computer Science University of Windsor
Outline of the Presentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Survey of routing protocols in MANET ,[object Object],[object Object],[object Object]
Survey of routing protocols in MANET ,[object Object],[object Object]
Survey of routing protocols in MANET ,[object Object],[object Object],[object Object]
Weakness of  AODV & SAODV  Protocol ,[object Object],[object Object],[object Object]
Fuzzy Logic- based Security Level( FLSL) Routing Protocol ,[object Object],[object Object]
MODIFIED FEATURES of FLSL ,[object Object],[object Object]
MODIFIED FEATURES of FLSL ,[object Object]
NEW FEATURES of FLSL ,[object Object],[object Object],[object Object],[object Object]
Security-Level of Mobile Host ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security-Level of Mobile Host ,[object Object]
Security-Level of Mobile Host For each entry in  rules table
Security-Level of Mobile Host ,[object Object]
Security-Level of Route ,[object Object],[object Object]
RREQ Packet Transmission
RREP Packet Transmission
Simulation in NS2 ,[object Object],S: Source Node D: Destination Node   Step 1Node 0  Node 10Step 2:Node 10  Node 15 Node10  Node 4 Step 3: Node 4  Node 17 (RREQ 4  is firstly arrived packet) Step 4: Node 15  Node 17 (RREQ 15  is secondly arrived packet) Two available routes: 0  10  15  17  0  10  4  17
Simulation in NS2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simulation  ,[object Object],[object Object],[object Object],[object Object]
Our Improvement to FLSL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Our Improvement to FLSL ,[object Object],[object Object],[object Object]
Our Improvement to FLSL ,[object Object],[object Object],[object Object],[object Object]
Our Improvement to FLSL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Our Improvement to FLSL ,[object Object],[object Object]
Our Improvement to FLSL ,[object Object],[object Object],[object Object]
Self Adjusted Security Archit. ,[object Object],[object Object],[object Object],[object Object],[object Object]
MANET Topology: Security… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prposed Security Architectyre ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Partitioning the Network into clusters ,[object Object],Β θ   γ α α : CH  |   β :Warrant node  |   γ : GW  |   θ : Regular node Β θ   γ α Β θ   γ α Β θ   γ α Β θ   γ α Β θ   γ α Β θ   γ α Β θ   γ α Β θ   γ α Β θ   γ α
Performance Evaluation ,[object Object],[object Object],[object Object],[object Object]
Weaknesses & Possible Improvements ,[object Object],[object Object],[object Object],[object Object]
Cont’. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cont’. ,[object Object],[object Object],[object Object],[object Object]
Discussions & Conclusion ,[object Object],[object Object],[object Object]
Cont’. ,[object Object],[object Object]
Questions ,[object Object]
References ,[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocolsRio Nguyen
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocolamigurumi21
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsAnuj Parajuli
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Hamidreza Bolhasani
 
RACH procedure in LTE
RACH procedure in LTERACH procedure in LTE
RACH procedure in LTEdebamoha
 
Alternative Transport Protocols
Alternative Transport ProtocolsAlternative Transport Protocols
Alternative Transport ProtocolsPeter R. Egli
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)Fatbardh Hysa
 
Introduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPIntroduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPVIJAY SHARMA
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH ProcedureAalekh Jain
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layerVikram Nandini
 
Point-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN pptPoint-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN pptNiaz Shaikh
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaNitish Jadia
 

Tendances (20)

Introduction to PPP
Introduction to PPPIntroduction to PPP
Introduction to PPP
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Jt2517251731
Jt2517251731Jt2517251731
Jt2517251731
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocol
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & Characteristics
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
RACH procedure in LTE
RACH procedure in LTERACH procedure in LTE
RACH procedure in LTE
 
Alternative Transport Protocols
Alternative Transport ProtocolsAlternative Transport Protocols
Alternative Transport Protocols
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 
Introduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPIntroduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDP
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH Procedure
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
 
Point-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN pptPoint-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN ppt
 
Mobile network layer
Mobile network layerMobile network layer
Mobile network layer
 
Ospf
OspfOspf
Ospf
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish Jadia
 

Similaire à 564 patel mokbel_shushanz_survey_slides

A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETIJNSA Journal
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
Administrator&trust based routing protocol
Administrator&trust based routing protocolAdministrator&trust based routing protocol
Administrator&trust based routing protocolNinad Samel
 
Protecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control ListProtecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control ListEditor IJCATR
 
Security improvements Zone Routing Protocol in Mobile Ad Hoc Network
Security improvements Zone Routing Protocol in Mobile Ad Hoc NetworkSecurity improvements Zone Routing Protocol in Mobile Ad Hoc Network
Security improvements Zone Routing Protocol in Mobile Ad Hoc NetworkEditor IJCATR
 
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...IJCNCJournal
 
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...IJCNCJournal
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...eSAT Publishing House
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applicationsRajesh Ishida
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
Secure multipath routing scheme using key
Secure multipath routing scheme using keySecure multipath routing scheme using key
Secure multipath routing scheme using keyijfcstjournal
 
A survey on trust based secure routing in manet
A survey on trust based secure routing in manetA survey on trust based secure routing in manet
A survey on trust based secure routing in manetcsandit
 
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET A SURVEY ON TRUST BASED SECURE ROUTING IN MANET
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET cscpconf
 
Collision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular Communication  Collision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular Communication Editor IJCATR
 

Similaire à 564 patel mokbel_shushanz_survey_slides (20)

A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANET
 
Ijetr021145
Ijetr021145Ijetr021145
Ijetr021145
 
Ijetr021145
Ijetr021145Ijetr021145
Ijetr021145
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
Administrator&trust based routing protocol
Administrator&trust based routing protocolAdministrator&trust based routing protocol
Administrator&trust based routing protocol
 
Protecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control ListProtecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control List
 
Security improvements Zone Routing Protocol in Mobile Ad Hoc Network
Security improvements Zone Routing Protocol in Mobile Ad Hoc NetworkSecurity improvements Zone Routing Protocol in Mobile Ad Hoc Network
Security improvements Zone Routing Protocol in Mobile Ad Hoc Network
 
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...
 
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Secure multipath routing scheme using key
Secure multipath routing scheme using keySecure multipath routing scheme using key
Secure multipath routing scheme using key
 
A survey on trust based secure routing in manet
A survey on trust based secure routing in manetA survey on trust based secure routing in manet
A survey on trust based secure routing in manet
 
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET A SURVEY ON TRUST BASED SECURE ROUTING IN MANET
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET
 
Collision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular Communication  Collision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular Communication
 

564 patel mokbel_shushanz_survey_slides

  • 1. 60-564 Security & Privacy on the Internet Instructor: Dr. Aggarwal Survey New Developments on Ad-hoc Network Security Presenters: Amar B. Patel , Mohammed F. Mokbel & Shushan Zhao November 25 th , Fall 2007 School of Computer Science University of Windsor
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Security-Level of Mobile Host For each entry in rules table
  • 14.
  • 15.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.