SlideShare une entreprise Scribd logo
1  sur  24
Final Year Defense
Presented by Supervised by
PERFORMANCE ANALYSIS AND PREVENTATION
OF SECURITY ATTACKS IN ROUTING PROTOCLOS
OF VEHICULAR AD-HOC NETWORK (VANET)
Md. Fahim Rahman
Id: 133-19-1518
Al-Amin Prince
Id: 141-19-1539
Md. Jakir Hossain
Id: 141-19-1545
Md. Taslim Arefin
Associate Professor
Department Of ETE
Daffodil International
University
26th December 2017
Final Year Defense
Presentation Outline
 Title Slide
 Introduction
 Aims and Objectives
 Problem Definition
 Methodology
 Simulation
 Result and Analysis
 Conclusion and future work.
2
Final Year Defense
Introduction
3
Wireless Ad-hoc:
-frequency hopping network.
- no pre-existing infrastructure
-nodes are free to move.
- application: MANET, VANET.
VANET
-3 types of communication.
-uses: safety management,
traffic controlling etc.
-internet services.
Final Year Defense
Aims and Objectives
4
• To establish an algorithm for stated problem of VANET.
• To simulate two real life scenario based on the problem.
• To apply the proposed algorithm along with another
routing protocols(AODV,DSR,B-AODV) in both scenario.
• To compare the resuts of both scenario.
• To find the advantage of proposed algorithm.
Final Year Defense
Problem Definition
5
• Due to mobility ad-hoc network is best solution for
communicating vehicle to vehicle. But packet drop is the major
issue for VANET (Vahicular Ad-hoc Network).
• This packet drop caused by malicious node.
• Malicius node receives the data but dont sent them to next hop.
This kind of attack is known as Black hole attack.
Final Year Defense
Methodology
6
Fig: Flowchart of proposed algorithm.
Final Year Defense
Methodology
7
• We establish an algorithm to determine malicious node and minimize the black hole
attack.
Pseudo Reply Packet (PRREP) {
t0 = get (current time value)
t1 = t0 + STR_Dur
while (CURRENT_TIME <= t1) {
Store P.Dest_Seq_No and P.NODE_ID In
RREP_Tab table
}
while (RREP_Tab is not empty) {
if (Dest_Seq_No >>>= Src_Seq_No) {
Mali_Node=Node_Id
discard entry from M_ table
}
}
select Packet q for Node_Id having
highest value of Dest_Seq_No
ReceiveReply(Packet q)
}
Final Year Defense
Methodology
8
• OMNeT++ is used for the simulation work.
• Here we will simulate two real life scenario of
highway.
• Scenario 1: A free highway. So the vehicle density
will be low and speed will be high.
• scenario 2: A busy highway . So the vehicle density
high and speed will be low.
Final Year Defense
Simulation
9
• For first scenario below input parameters are used
Total number of nodes 10
Max. node speed 60 km/h, 90 km/h
Packet type UDP(User Datagram Protocol)
Simulation time 100 s
Final Year Defense
Simulation
10
Final Year Defense
Simulation
11
Final Year Defense
Simulation
12
Final Year Defense
Simulation
13
Final Year Defense
Simulation
14
For first scenario below input parameters are used
Total number of nodes 20
No. of radio obstacles 4
Attenuation provided 20 dBm
Max. node speed 20 km/h, 40km/h
Packet type UDP (User Datagram Protocol)
Simulation time 100
Final Year Defense
Simulation
15
Final Year Defense
Simulation
16
Final Year Defense
Simulation
17
Final Year Defense
Simulation
18
Final Year Defense
Results
19
Basic AODV DSR B-AODV Proposed
algorithm
Packet collisions Scenario 1 (highway scenario) 8 4 11 7
Scenario 2 (city scenario) 10 22 22 20
Packets dropped Scenario 1 (highway scenario) 500 100 550 410
Scenario 2 (city scenario) 100 230 550 400
Throughput
(KB/s)
Scenario 1 (highway scenario) 230 100 120 255
Scenario 2 (city scenario) 140 120 70 150
Final Year Defense
Result analysis
20
0
5
10
15
20
25
Basic AODV DSR B-AODV Proposed algorithm
packet collisions for scenario 1 packet collisions for scenario 2
Packet collisions comparison scenario 1 vs scenario 2
Packetcollisions
Final Year Defense
21
0
100
200
300
400
500
600
Basic AODV DSR B-AODV Proposed
Algorithm
Packet Dropped in Scenario 1 Packet Dropped in Scenario 2
Result analysis
Packet Dropped comparison scenario 1 vs scenario 2
Packetdropped
Final Year Defense
22
Result analysis
0
50
100
150
200
250
300
Basic AODV DSR B-AODV Proposed Algorithm
Throughput kb/s for Scenario 1 Throughput kb/s for Scenario 2
Throughput kb/s comparison scenario 1 vs scenario 2
Throughputkb/s
Final Year Defense
23
Conclusion
• OMNeT++ simulation for these two protocol (AODV and
DSR) reveals that the proposed algorithm is much better
during black hole attack with reference to parameters such as
throughput, packet drop and collision rate.
• Proposed algorithm adapts faster to dynamic network
conditions with the help of various control messages.
Final Year Defense
Future work
24
The future work would be to make the network completely immune to
Black Hole Attacks using AODV routing protocol.

Contenu connexe

Tendances

KARNAUGH MAP using OpenGL (KMAP)
KARNAUGH MAP using OpenGL (KMAP)KARNAUGH MAP using OpenGL (KMAP)
KARNAUGH MAP using OpenGL (KMAP)Sagar Uday Kumar
 
SW/HW co-design for near-term quantum computing
SW/HW co-design for near-term quantum computingSW/HW co-design for near-term quantum computing
SW/HW co-design for near-term quantum computinginside-BigData.com
 
Towards a Framework for Multidirectional Model Transformations
Towards a Framework for Multidirectional Model TransformationsTowards a Framework for Multidirectional Model Transformations
Towards a Framework for Multidirectional Model TransformationsNuno Macedo
 
32-bit unsigned multiplier by using CSLA & CLAA
32-bit unsigned multiplier by using CSLA &  CLAA32-bit unsigned multiplier by using CSLA &  CLAA
32-bit unsigned multiplier by using CSLA & CLAAGanesh Sambasivarao
 
Performance Analysis on 802.11
Performance Analysis on 802.11Performance Analysis on 802.11
Performance Analysis on 802.11Soonmok Kwon
 
Sparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesSparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesAndrea Tassi
 
Implementation of Low Power and Area Efficient Carry Select Adder
Implementation of Low Power and Area Efficient Carry Select AdderImplementation of Low Power and Area Efficient Carry Select Adder
Implementation of Low Power and Area Efficient Carry Select Adderinventionjournals
 
TuringSlashPython - Undergraduate Final Year Project
TuringSlashPython - Undergraduate Final Year ProjectTuringSlashPython - Undergraduate Final Year Project
TuringSlashPython - Undergraduate Final Year ProjectAlex Psarras
 
Algorithm Analysis
Algorithm AnalysisAlgorithm Analysis
Algorithm AnalysisMegha V
 
Leakage power optimization for ripple carry adder
Leakage power optimization for ripple carry adder Leakage power optimization for ripple carry adder
Leakage power optimization for ripple carry adder NAVEEN TOKAS
 
Travelling salesman problem
Travelling salesman problemTravelling salesman problem
Travelling salesman problemhamza haseeb
 
141031_Lagrange Relaxation Based Method for the QoS Routing Problem
141031_Lagrange Relaxation Based Method for the QoS Routing Problem 141031_Lagrange Relaxation Based Method for the QoS Routing Problem
141031_Lagrange Relaxation Based Method for the QoS Routing Problem Eunice Lin
 
Optimization Techniques
Optimization TechniquesOptimization Techniques
Optimization TechniquesAjay Bidyarthy
 

Tendances (20)

KARNAUGH MAP using OpenGL (KMAP)
KARNAUGH MAP using OpenGL (KMAP)KARNAUGH MAP using OpenGL (KMAP)
KARNAUGH MAP using OpenGL (KMAP)
 
SW/HW co-design for near-term quantum computing
SW/HW co-design for near-term quantum computingSW/HW co-design for near-term quantum computing
SW/HW co-design for near-term quantum computing
 
Towards a Framework for Multidirectional Model Transformations
Towards a Framework for Multidirectional Model TransformationsTowards a Framework for Multidirectional Model Transformations
Towards a Framework for Multidirectional Model Transformations
 
32-bit unsigned multiplier by using CSLA & CLAA
32-bit unsigned multiplier by using CSLA &  CLAA32-bit unsigned multiplier by using CSLA &  CLAA
32-bit unsigned multiplier by using CSLA & CLAA
 
Performance Analysis on 802.11
Performance Analysis on 802.11Performance Analysis on 802.11
Performance Analysis on 802.11
 
Ofdma 1
Ofdma 1Ofdma 1
Ofdma 1
 
Sparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesSparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast Services
 
Implementation of Low Power and Area Efficient Carry Select Adder
Implementation of Low Power and Area Efficient Carry Select AdderImplementation of Low Power and Area Efficient Carry Select Adder
Implementation of Low Power and Area Efficient Carry Select Adder
 
TuringSlashPython - Undergraduate Final Year Project
TuringSlashPython - Undergraduate Final Year ProjectTuringSlashPython - Undergraduate Final Year Project
TuringSlashPython - Undergraduate Final Year Project
 
Discussion of PMCMC
Discussion of PMCMCDiscussion of PMCMC
Discussion of PMCMC
 
Algorithm Analysis
Algorithm AnalysisAlgorithm Analysis
Algorithm Analysis
 
Exact Algorithms for Minimum Edge Dominating Set and Lowest Edge Dominating Set
Exact Algorithms for Minimum Edge Dominating Set and Lowest Edge Dominating SetExact Algorithms for Minimum Edge Dominating Set and Lowest Edge Dominating Set
Exact Algorithms for Minimum Edge Dominating Set and Lowest Edge Dominating Set
 
Leakage power optimization for ripple carry adder
Leakage power optimization for ripple carry adder Leakage power optimization for ripple carry adder
Leakage power optimization for ripple carry adder
 
8783733
87837338783733
8783733
 
Travelling salesman problem
Travelling salesman problemTravelling salesman problem
Travelling salesman problem
 
141031_Lagrange Relaxation Based Method for the QoS Routing Problem
141031_Lagrange Relaxation Based Method for the QoS Routing Problem 141031_Lagrange Relaxation Based Method for the QoS Routing Problem
141031_Lagrange Relaxation Based Method for the QoS Routing Problem
 
W4408123126
W4408123126W4408123126
W4408123126
 
Deep Learning for Computer Vision: Software Frameworks (UPC 2016)
Deep Learning for Computer Vision: Software Frameworks (UPC 2016)Deep Learning for Computer Vision: Software Frameworks (UPC 2016)
Deep Learning for Computer Vision: Software Frameworks (UPC 2016)
 
Optimization Techniques
Optimization TechniquesOptimization Techniques
Optimization Techniques
 
Linkedin_PowerPoint
Linkedin_PowerPointLinkedin_PowerPoint
Linkedin_PowerPoint
 

Similaire à Performance Analysis and Prevention of Security Attacks in Routing Protocols of Vehicular Ad-Hoc Networks (VANETs

Reliability analysis of wireless automotive applications with transceiver red...
Reliability analysis of wireless automotive applications with transceiver red...Reliability analysis of wireless automotive applications with transceiver red...
Reliability analysis of wireless automotive applications with transceiver red...rchulyada
 
Reality based mobility model Analyzed over reactive and proactive routing pro...
Reality based mobility model Analyzed over reactive and proactive routing pro...Reality based mobility model Analyzed over reactive and proactive routing pro...
Reality based mobility model Analyzed over reactive and proactive routing pro...ijsrd.com
 
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...IRJET Journal
 
IRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET Journal
 
Timing verification of automotive communication architecture using quantile ...
Timing verification of automotive communication  architecture using quantile ...Timing verification of automotive communication  architecture using quantile ...
Timing verification of automotive communication architecture using quantile ...RealTime-at-Work (RTaW)
 
Qo s based mac protocol for medical wireless body area sensor networks
Qo s based mac protocol for medical wireless body area sensor networksQo s based mac protocol for medical wireless body area sensor networks
Qo s based mac protocol for medical wireless body area sensor networksIffat Anjum
 
AQM performance for VOIP
AQM performance for VOIPAQM performance for VOIP
AQM performance for VOIPMakkawy khair
 
performance evaluation of TCP varients in Mobile ad-hoc Network
performance evaluation of TCP varients in Mobile ad-hoc Networkperformance evaluation of TCP varients in Mobile ad-hoc Network
performance evaluation of TCP varients in Mobile ad-hoc Networkခ်စ္​ စု
 
Congestion Control Technique with Safety Transmission of Messages in Vehicula...
Congestion Control Technique with Safety Transmission of Messages in Vehicula...Congestion Control Technique with Safety Transmission of Messages in Vehicula...
Congestion Control Technique with Safety Transmission of Messages in Vehicula...IRJET Journal
 
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET Journal
 
TCT Final Project Presentation
TCT Final Project  PresentationTCT Final Project  Presentation
TCT Final Project PresentationAsif Ali Channa
 
Timing verification of real-time automotive Ethernet networks: what can we ex...
Timing verification of real-time automotive Ethernet networks: what can we ex...Timing verification of real-time automotive Ethernet networks: what can we ex...
Timing verification of real-time automotive Ethernet networks: what can we ex...RealTime-at-Work (RTaW)
 
My Final Year B.Tech Research Project
My Final Year B.Tech Research ProjectMy Final Year B.Tech Research Project
My Final Year B.Tech Research ProjectEeshan Srivastava
 
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...IRJET Journal
 
COMPARISON OF HIGH SPEED CONGESTION CONTROL PROTOCOLS
COMPARISON OF HIGH SPEED CONGESTION CONTROL PROTOCOLSCOMPARISON OF HIGH SPEED CONGESTION CONTROL PROTOCOLS
COMPARISON OF HIGH SPEED CONGESTION CONTROL PROTOCOLSIJNSA Journal
 
Presentation - Dynamic Tuning of RTS Threshold
Presentation - Dynamic Tuning of RTS ThresholdPresentation - Dynamic Tuning of RTS Threshold
Presentation - Dynamic Tuning of RTS ThresholdMohammad Saiful Islam
 
Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)	Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET) Benyamin Moadab
 
Performance Evaluation of High Speed Congestion Control Protocols
Performance Evaluation of High Speed Congestion Control  ProtocolsPerformance Evaluation of High Speed Congestion Control  Protocols
Performance Evaluation of High Speed Congestion Control ProtocolsIOSR Journals
 

Similaire à Performance Analysis and Prevention of Security Attacks in Routing Protocols of Vehicular Ad-Hoc Networks (VANETs (20)

Reliability analysis of wireless automotive applications with transceiver red...
Reliability analysis of wireless automotive applications with transceiver red...Reliability analysis of wireless automotive applications with transceiver red...
Reliability analysis of wireless automotive applications with transceiver red...
 
Reality based mobility model Analyzed over reactive and proactive routing pro...
Reality based mobility model Analyzed over reactive and proactive routing pro...Reality based mobility model Analyzed over reactive and proactive routing pro...
Reality based mobility model Analyzed over reactive and proactive routing pro...
 
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...
 
IRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing Algorithms
 
Timing verification of automotive communication architecture using quantile ...
Timing verification of automotive communication  architecture using quantile ...Timing verification of automotive communication  architecture using quantile ...
Timing verification of automotive communication architecture using quantile ...
 
Qo s based mac protocol for medical wireless body area sensor networks
Qo s based mac protocol for medical wireless body area sensor networksQo s based mac protocol for medical wireless body area sensor networks
Qo s based mac protocol for medical wireless body area sensor networks
 
AQM performance for VOIP
AQM performance for VOIPAQM performance for VOIP
AQM performance for VOIP
 
performance evaluation of TCP varients in Mobile ad-hoc Network
performance evaluation of TCP varients in Mobile ad-hoc Networkperformance evaluation of TCP varients in Mobile ad-hoc Network
performance evaluation of TCP varients in Mobile ad-hoc Network
 
Congestion Control Technique with Safety Transmission of Messages in Vehicula...
Congestion Control Technique with Safety Transmission of Messages in Vehicula...Congestion Control Technique with Safety Transmission of Messages in Vehicula...
Congestion Control Technique with Safety Transmission of Messages in Vehicula...
 
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
 
TCT Final Project Presentation
TCT Final Project  PresentationTCT Final Project  Presentation
TCT Final Project Presentation
 
4g lte matlab
4g lte matlab4g lte matlab
4g lte matlab
 
Timing verification of real-time automotive Ethernet networks: what can we ex...
Timing verification of real-time automotive Ethernet networks: what can we ex...Timing verification of real-time automotive Ethernet networks: what can we ex...
Timing verification of real-time automotive Ethernet networks: what can we ex...
 
My Final Year B.Tech Research Project
My Final Year B.Tech Research ProjectMy Final Year B.Tech Research Project
My Final Year B.Tech Research Project
 
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
 
COMPARISON OF HIGH SPEED CONGESTION CONTROL PROTOCOLS
COMPARISON OF HIGH SPEED CONGESTION CONTROL PROTOCOLSCOMPARISON OF HIGH SPEED CONGESTION CONTROL PROTOCOLS
COMPARISON OF HIGH SPEED CONGESTION CONTROL PROTOCOLS
 
Presentation - Dynamic Tuning of RTS Threshold
Presentation - Dynamic Tuning of RTS ThresholdPresentation - Dynamic Tuning of RTS Threshold
Presentation - Dynamic Tuning of RTS Threshold
 
Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)	Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)
 
cscn1819.pdf
cscn1819.pdfcscn1819.pdf
cscn1819.pdf
 
Performance Evaluation of High Speed Congestion Control Protocols
Performance Evaluation of High Speed Congestion Control  ProtocolsPerformance Evaluation of High Speed Congestion Control  Protocols
Performance Evaluation of High Speed Congestion Control Protocols
 

Plus de Limon Prince

Elements of Public Speaking.pptx
Elements of Public Speaking.pptxElements of Public Speaking.pptx
Elements of Public Speaking.pptxLimon Prince
 
Quantitative and qualitative variables
Quantitative and qualitative variables Quantitative and qualitative variables
Quantitative and qualitative variables Limon Prince
 
Microwave engineering
Microwave engineeringMicrowave engineering
Microwave engineeringLimon Prince
 
The best Restaurant my experience
The best Restaurant my experienceThe best Restaurant my experience
The best Restaurant my experienceLimon Prince
 
Electrical generator
Electrical generatorElectrical generator
Electrical generatorLimon Prince
 
Application of differential equation in ETE
Application of differential equation in ETEApplication of differential equation in ETE
Application of differential equation in ETELimon Prince
 
Application of linear algebra in ETE
Application of linear algebra in ETEApplication of linear algebra in ETE
Application of linear algebra in ETELimon Prince
 
Amplitude modulation
Amplitude modulationAmplitude modulation
Amplitude modulationLimon Prince
 
Broadcast technology
Broadcast technologyBroadcast technology
Broadcast technologyLimon Prince
 

Plus de Limon Prince (15)

Elements of Public Speaking.pptx
Elements of Public Speaking.pptxElements of Public Speaking.pptx
Elements of Public Speaking.pptx
 
Quantitative and qualitative variables
Quantitative and qualitative variables Quantitative and qualitative variables
Quantitative and qualitative variables
 
Microwave engineering
Microwave engineeringMicrowave engineering
Microwave engineering
 
Kirchhoff's Laws
Kirchhoff's  LawsKirchhoff's  Laws
Kirchhoff's Laws
 
The best Restaurant my experience
The best Restaurant my experienceThe best Restaurant my experience
The best Restaurant my experience
 
Transistor
TransistorTransistor
Transistor
 
Transistor
TransistorTransistor
Transistor
 
Electrical generator
Electrical generatorElectrical generator
Electrical generator
 
Application of differential equation in ETE
Application of differential equation in ETEApplication of differential equation in ETE
Application of differential equation in ETE
 
Application of linear algebra in ETE
Application of linear algebra in ETEApplication of linear algebra in ETE
Application of linear algebra in ETE
 
Logic gates
Logic gatesLogic gates
Logic gates
 
Amplitude modulation
Amplitude modulationAmplitude modulation
Amplitude modulation
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Broadcast technology
Broadcast technologyBroadcast technology
Broadcast technology
 
Pharmacy Bile
Pharmacy BilePharmacy Bile
Pharmacy Bile
 

Dernier

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Dernier (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Performance Analysis and Prevention of Security Attacks in Routing Protocols of Vehicular Ad-Hoc Networks (VANETs

  • 1. Final Year Defense Presented by Supervised by PERFORMANCE ANALYSIS AND PREVENTATION OF SECURITY ATTACKS IN ROUTING PROTOCLOS OF VEHICULAR AD-HOC NETWORK (VANET) Md. Fahim Rahman Id: 133-19-1518 Al-Amin Prince Id: 141-19-1539 Md. Jakir Hossain Id: 141-19-1545 Md. Taslim Arefin Associate Professor Department Of ETE Daffodil International University 26th December 2017
  • 2. Final Year Defense Presentation Outline  Title Slide  Introduction  Aims and Objectives  Problem Definition  Methodology  Simulation  Result and Analysis  Conclusion and future work. 2
  • 3. Final Year Defense Introduction 3 Wireless Ad-hoc: -frequency hopping network. - no pre-existing infrastructure -nodes are free to move. - application: MANET, VANET. VANET -3 types of communication. -uses: safety management, traffic controlling etc. -internet services.
  • 4. Final Year Defense Aims and Objectives 4 • To establish an algorithm for stated problem of VANET. • To simulate two real life scenario based on the problem. • To apply the proposed algorithm along with another routing protocols(AODV,DSR,B-AODV) in both scenario. • To compare the resuts of both scenario. • To find the advantage of proposed algorithm.
  • 5. Final Year Defense Problem Definition 5 • Due to mobility ad-hoc network is best solution for communicating vehicle to vehicle. But packet drop is the major issue for VANET (Vahicular Ad-hoc Network). • This packet drop caused by malicious node. • Malicius node receives the data but dont sent them to next hop. This kind of attack is known as Black hole attack.
  • 6. Final Year Defense Methodology 6 Fig: Flowchart of proposed algorithm.
  • 7. Final Year Defense Methodology 7 • We establish an algorithm to determine malicious node and minimize the black hole attack. Pseudo Reply Packet (PRREP) { t0 = get (current time value) t1 = t0 + STR_Dur while (CURRENT_TIME <= t1) { Store P.Dest_Seq_No and P.NODE_ID In RREP_Tab table } while (RREP_Tab is not empty) { if (Dest_Seq_No >>>= Src_Seq_No) { Mali_Node=Node_Id discard entry from M_ table } } select Packet q for Node_Id having highest value of Dest_Seq_No ReceiveReply(Packet q) }
  • 8. Final Year Defense Methodology 8 • OMNeT++ is used for the simulation work. • Here we will simulate two real life scenario of highway. • Scenario 1: A free highway. So the vehicle density will be low and speed will be high. • scenario 2: A busy highway . So the vehicle density high and speed will be low.
  • 9. Final Year Defense Simulation 9 • For first scenario below input parameters are used Total number of nodes 10 Max. node speed 60 km/h, 90 km/h Packet type UDP(User Datagram Protocol) Simulation time 100 s
  • 14. Final Year Defense Simulation 14 For first scenario below input parameters are used Total number of nodes 20 No. of radio obstacles 4 Attenuation provided 20 dBm Max. node speed 20 km/h, 40km/h Packet type UDP (User Datagram Protocol) Simulation time 100
  • 19. Final Year Defense Results 19 Basic AODV DSR B-AODV Proposed algorithm Packet collisions Scenario 1 (highway scenario) 8 4 11 7 Scenario 2 (city scenario) 10 22 22 20 Packets dropped Scenario 1 (highway scenario) 500 100 550 410 Scenario 2 (city scenario) 100 230 550 400 Throughput (KB/s) Scenario 1 (highway scenario) 230 100 120 255 Scenario 2 (city scenario) 140 120 70 150
  • 20. Final Year Defense Result analysis 20 0 5 10 15 20 25 Basic AODV DSR B-AODV Proposed algorithm packet collisions for scenario 1 packet collisions for scenario 2 Packet collisions comparison scenario 1 vs scenario 2 Packetcollisions
  • 21. Final Year Defense 21 0 100 200 300 400 500 600 Basic AODV DSR B-AODV Proposed Algorithm Packet Dropped in Scenario 1 Packet Dropped in Scenario 2 Result analysis Packet Dropped comparison scenario 1 vs scenario 2 Packetdropped
  • 22. Final Year Defense 22 Result analysis 0 50 100 150 200 250 300 Basic AODV DSR B-AODV Proposed Algorithm Throughput kb/s for Scenario 1 Throughput kb/s for Scenario 2 Throughput kb/s comparison scenario 1 vs scenario 2 Throughputkb/s
  • 23. Final Year Defense 23 Conclusion • OMNeT++ simulation for these two protocol (AODV and DSR) reveals that the proposed algorithm is much better during black hole attack with reference to parameters such as throughput, packet drop and collision rate. • Proposed algorithm adapts faster to dynamic network conditions with the help of various control messages.
  • 24. Final Year Defense Future work 24 The future work would be to make the network completely immune to Black Hole Attacks using AODV routing protocol.