Upload
satish-reddy
View
195
Download
1
Tags:
Embed Size (px)
Citation preview
Design & Implementation of Dynamic
Routing In Wireless Networks
K.V.Satish Reddy
M.Tech (W.M.C)
09881D6513
Objective
Security Enhanced Dynamic Routing
methodology in Wireless Networks.
Performance Evaluation of various
Dynamic Routing methodologies.
Design of Cryptography based
System.
IP Security
SSL
System Infrastructures.
Security Enhanced Routing
Methods.
Internetwork Security
To route, a router needs to know:
Destination addresses
Sources it can learn from
Possible routes
Best route
What is Routing?
172.16.1.010.120.2.0
Source Destination
Network
Protocol
Destination
Network
Connected
Learned
10.120.2.0
172.16.1.0
172.17.1.0
Exit
Interface
E0
S0
S1
Routers must learn destination network thatare not directly connected.
172.16.1.010.120.2.0 E0
S0
What is Routing? (cont.)
Source DestinationS1
Packet
Routing Methods
Two forms of Routing in Packet Switching
Networks.
Static Routing
Dynamic Routing
Routing Table.
Routing Algorithms.
Routing Protocols.
Intra-domain routing.
Distance vector algorithms
Protocols
(RIP,DSDV)
Link state algorithms
Protocol
(OSPF)
Inter-domain routing.
Path vector algorithms
Protocol
(BGP)
Internetwork Routing
Switching Techniques for Data
Transmission
Circuit Switching
Source
Destination
172.16.1.010.120.2.0
Data
A
C
DataData
Data Data
Data
Data
Data
Store and Forward Switching
Message Switching
Packet Switching
Datagram service
Virtual Circuit Services
1.STATIC ROUTING
Manually
Configured Routing.
Used in Small
Networks.
Monitoring data
Continuously.
Secure Data transfer.
Manually
Path is selected
ACK
Static Routing Execution Model
Select file to send.
File is Encrypted.
Select path to send file.
Enter private key for security.
Enter path to receive.
Enter Private Key.
Static Routing Execution Model
Received File is Encrypted.
Decrypt to get original file sent.
2.DYNAMIC ROUTING
Use of Algorithms and Protocols for
configuring the network to route data.
Large Networks we go for Dynamic
Routing.
Secure Routing over large networks.
Routing Protocols such as
(RIP,OSPF,BGP,DSDV and AODV).
2.1 SPRA – Dynamic Routing
SPRA- Shortest Path
Routing Algorithm.
Based on Link state
Algorithm used over
OSPF protocol.
One path with Minimal
Cost is selected using
Dijkstra Algorithm.
R2
R3
R1
R4
R5
R6
9
9
2
5
11
14
15
1
10
Network for SPRA
1. Select the source
node. Ex (H7)
2. Select the
destination node.
Ex (H12)
3. Click SPRA to
route the data
from source node
H7 to destination
node H12.
Data route path when SPRA is clicked.
Data route path when SPRA is clicked.
2.2 ECMP – Dynamic Routing
ECMP- Equal Cost Multi-
Path Routing Algorithm.
Based on Distance vector
Algorithm used over RIP
protocol.
More than one path is
selected for routing the
data.
R2
R3
R1
R4
R5
R6
9
9
2
5
11
14
15
1
10
9
Network for ECMP
1. Select the source
node. Ex (H7)
2. Select the
destination node.
Ex (H14)
3. Click ECMP to
route the data
from source node
H7 to destination
node H14.
Data route path when ECMP is clicked.
Data route path when ECMP is clicked.
3. Dynamic Routing In Ad-Hoc Network
All nodes are mobile and are
connected dynamically.
Every node acts as router and
forward traffic.
AODV algorithm follows single
path routing of data.
MARA algorithm follows
multiple path routing of data.
R2
R3
R1
R4
R5
R6
Destination
Source
R2
R3
R6
R4
R1
Source
Destination
R5
AODVMARA
Network changes instantly in Mobile Ad-hoc Network.
Network changes instantly in Mobile Ad-hoc Network.
Network changes instantly in Mobile Ad-hoc Network.
Data route path when AODV is clicked.
Data route path when MARA is clicked.
4.Eavesdropping of Packets in
SPRA,ECMP,AODV and MARA
As the packets are transferred in streams in
the above existing algorithms, packets are
dropped at instances while routing to
destination.
Eavesdropping, Spoofing and Session
hijacking are some of the attacks on
internetwork.
Eavesdropping of packets over
Internetwork
Source DestinationEavesdropper
Stream of packets are eavesdropped over a specific link (R3-R2).
Eavesdropping of packets over
Internetwork
Stream of packets are eavesdropped over a specific link (R1-R2).
Source DestinationEavesdropper
Eavesdropping of packets
Execution Model
Enter the Packets to send from
source to destination.
Packets at Router end
5.Existing System’s Disadvantages
The discovery of paths in an online fashion with extra
control signals exchanging with neighboring nodes.
Having the same route for consecutive packets.
Easy to predict the data transfer path and having the
possibility of loss of data.
Route discovery latency.
Various security threats over internet like Spoofing,
Session hijacking and Eavesdropping of packets.
6. DDRA – Dynamic Routing
DDRA- Distributed Dynamic Routing
Algorithm.
Based on Distance vector algorithm
compatible with the popular routing
protocols RIP and DSDV.
Every consecutive packet routed to different
nodes to reach destination.
Network for DDRA
Node 4
Node 3
Node 9
Node 10
Node 8
Node 5
Node 7
Node 6
Node 2
Node 1
Destination
Source
12345
1
2
4
4
Network for DDRA
Node 4
Node 3
Node 9
Node 10
Node 8
Node 5
Node 7
Node 6
Node 2
Node 1
Destination
Source
Destination Node (t) Cost Next hop
N1 5 N5
N2 2 N7
N3 3 N4
.
.
.
.
.
.
Destination Node
(t)
Cost Next hop
Candidates
History record of packet
deliveries to destination node t
N1 4 {N6,N9,N4) {(N2,N6),(N7,N9),(N3,N4)….}
N2 5 {N8,N4} {(N5,N8),(N10,N8),(N6,N4)…}
N3 7 {N6} {(N4,N6),(N2,N6),(N9,N6)….}
.
.
.
.
.
.
.
.
Routing Table
(a)
(b)
a) Normal Routing table of adistance vector based routingalgorithm.
b) Extended Routing table of asecurity enhanced routingalgorithm.
Flowchart for DDRA
Network for DDRA (Model-1)
Node 4
Node 3
Node 9
Node 10
Node 8
Node 5
Node 7
Node 6
Node 2
Node 1
Source
Destination
1. Login to server node. Ex (node1)
2. Here server node is the source end.
3. As distributed datarouting we see onesource node andmultiple clientnodes to reachdestination node.
DDRA Execution Model(Distributed Dynamic Routing Algorithm)
Enter the Client Nodes
Enter client nodes.Ex (node2,3,5)
Here client node 2 is our destination node.
Client Nodes Connection
All client nodes used are connected to server node.
Links between Server and Client’s Nodes
Link cost of all client nodes to server node.
Network for DDRA
Node 4
Node 3
Node 9
Node 10
Node 8
Node 5
Node 7
Node 6
Node 2
Node 1
Source
Destination
Transfer of File from Source to
Destination Node
Select file to transfer from source to destination node.
Consecutive Packets routed to Different
Client Nodes
Selected File is divided in to 21 packets & consecutive Packets are distributed
between client nodes 2,3 & 5 at server node 1 and routed.
Packets Received at Node- 3,5 &2
Some Packets are routed directly to node 2 (destination node) from node 1 and other packets
via node 3 & 5.
File taken at node 1 for routing
Packets received to nodes 3 & 5 are routed to the destination node 2 .
Nodes 3 & 5 starts routing to
Destination node 2
All Packets reached to destination node 2
All Packets received at destination node 2 Via nodes 1, 3 & 5 .
File received to destination node 2
File transferred from source node 1, received at the destination node 2 .
Client-A
Client-B
Client-F Client-G
Client-C
Client-D
Client-H
Server
Source
Destination
Network for DDRA (Model-2)
Source
Destination
A
E
D
B
C
Destination
S.P.R.AE.C.M.PD.D.R.A
Source
DestinationPath Selection of Dynamic Routing Algorithms
(S.P.R.A),(E.C.M.P) & (D.D.R.A)
7. Path Similarity of Dynamic Routing
Algorithms1. DDRA based methodology greatly
outperform SPRA and ECRA for all
l (length of the minimal-cost path)
values.
2. The average path similarity for
SPRA, ECRA, and DDRA increase
as l increases. The increasing rates
for SPRA and ECRA are much
larger than those for DDRA
especially when l is large.
3. DDRA shows wide path variation as
the data is distributed.0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
0
1
2
3
4
5
6
7
Length of The Minimal Cost Path (l)
Avera
ge P
ath
Sim
ilarity
SPRA
ECMP
DDRA
8. Throughput of Dynamic Routing
Algorithms
1. The throughput will be degraded
when the number of TCP flows
increases (i.e., the traffic load)
having same bandwidth & traffic
load on all paths.
2. Multiple paths increase the
throughput of data transmission.
3. The performance of DDRA on
the throughput is superior as
compared with that of ECRA
and SPRA. 1 2 3 4 5 6 7 8 9 100
1
2
3
4
5
6
7
8
9
10
TCP Flows (Traffic Load)
Thro
ughput
SPRA
ECMP
DDRA
9. Proposed System Advantages
Consecutive packets are routed dynamically.
Less path similarity of packets transferred.
Better throughput due to path variation of packets.
The discovery of paths in an offline fashion, as
history of packet deliveries are maintained.
Probability of packet loss due various security
attack like eavesdropping of packets is less.
10. Future Scope
Our Security enhanced dynamic routing could be used with
cryptography based system designs to further improve the
security of data transmission over networks.
Satellite network capacity, adaptability, and responsiveness
are enhanced with onboard capabilities for packet
switching and dynamic bandwidth resource allocation
which facilitate uplink and downlink spectral reuse.
W. Lou and Y. Fang, “A Multipath Routing Approach for Secure Data
Delivery,” Proc. IEEE Military Comm. Conf. (MilCom).
J.Yang and S. Papavassiliou, “Improving Network Security by Multipath
Traffic Dispersion,” Proc. IEEE Military Comm. Conf. (MilCom).
S. Bohacek, J.P. Hespanha, K. Obraczka, J. Lee, and C. Lim,“Enhancing
Security via Stochastic Routing,” Proc. 11th Int’l Conf.Computer Comm. and
Networks (ICCCN).
I. Gojmerac, T. Ziegler, F. Ricciato, and P. Reichl, “Adaptive Multipath
Routing for Dynamic Traffic Engineering,” Proc. IEEE Global
Telecommunications Conf. (GLOBECOM).
W. Lou, W. Liu, and Y. Fang, “SPREAD: Improving Network Security by
Multipath Routing,” Proc. IEEE Military Comm. Conf. (MilCom).
J.F. Kurose and K.W. Ross, Computer Networking—A Top-Down Approach
Featuring the Internet. Addison Wesley.
11.References
Thank “U” All