18
IMPROVING SCALABILITY AND SECURITY USING REGION BASED ROUTING PROTOCOL IN MOBILE AD HOC NETWORK A Thesis Presentation Presented in partial fulfillment of the requirement for the award of degree of MASTER OF TECHNOLOGY IN INFORMATION TECHNOLOGY Presented By () Under the supervision of Assistant Professor 201x-201x Department of Computer Science & Engineering and Information Technology Madhav Institute of Technology & Science, Gwalior-474005 1

IMPROVING SCALABILITY AND SECURITY USING REGION BASED ROUTING PROTOCOL IN MOBILE AD HOC NETWORK

Embed Size (px)

Citation preview

IMPROVING SCALABILITY AND SECURITY USING REGION BASED ROUTING

PROTOCOL IN MOBILE AD HOC NETWORK

A

Thesis Presentation

Presented in partial fulfillment of the requirement for the award of degree of

MASTER OF TECHNOLOGY

IN

INFORMATION TECHNOLOGY

Presented By

()

Under the supervision of

Assistant Professor

201x-201x

Department of Computer Science & Engineering and Information Technology

Madhav Institute of Technology & Science, Gwalior-474005

1

Content • Introduction

• Literature Survey

• Problem Statement

• Proposed Methodology

• Result Analysis

• Conclusion

• Future Work

• References

• List of Publications

2

Introduction

• A Mobile Ad-hoc Network is an infra-structure less, self-configuringnetwork, formed by several wireless nodes.

• In recent days due to its faster network installation and mobility atlower costs, MANETS have gained importance in research areas toovercome its limited resource related issues and security relatedissues.

• Due to the absence of central authority any node can listen andparticipate to partially or fully crash the network. Due to thisMANETS are vulnerable to attacks than wired networks. There aremainly 3 types of protocols for routing in MANETS. They arereactive, proactive and hybrid protocols [1].

3

Characteristics of MANET

The characteristics of these networks are summarized as follows [2]:

• Communication via wireless means.• Nodes can perform the roles of both hosts and routers. • No centralized controller and infrastructure. Intrinsic mutual trust. • Dynamic network topology.• Frequent routing updates. • Autonomous, no infrastructure needed.• Can be set up anywhere.• Energy constraints • Limited security

4

Security Requirement in MANET

• Availability

• Authentication

• Data confidentiality

• Data integrity

• Non-repudiation

5

Literature Survey

• Banoth Rajkumar et al. in this paper many trust establishment solutions in mobile ad hocnetworks (MANETs) rely on public key certificates. Therefore, they should beaccompanied by an efficient mechanism for certificate revocation and validation. Inorder to reduce the hazards from nodes and to enhance the security of network wepropose to develop a CA distribution and a Trust based threshold revocation method.Initially the trust value is computed from the direct and indirect trust values. And thecertificate authorities distributes the secret key to al the nodes. Followed by this a trustbased threshold revocation method is computed. Here the misbehaving nodes areeliminated [3].

• Hui Xia et al have presented a dynamic trust prediction model to evaluate thetrustworthiness of nodes, which is based on the nodes’ historical behaviours, as well asthe future behaviours via extended fuzzy logic rules prediction. They have alsointegrated the proposed trust predication model into the Source Routing Mechanism.Their novel on demand trust-based unicast routing protocol for MANETs, termed asTrust-based Source Routing protocol (TSR), provides a flexible and feasible approach tochoose the shortest route that meets the security requirement of data packetstransmission. TSR improves packet delivery ratio and reduces average end-to-endlatency [4].

6

Cont…

• Wei Liu et al has proposed a new method to enhance the

effectiveness and efficiency of the certificate accusation and

recovery mechanism by employing a threshold based approach

to restore a node’s accusation ability and to ensure sufficient

normal nodes to accuse malicious nodes in MANETs. This

new method can effectively improve the performance of

certificate revocation [5] .

7

Problem Statement

• In existing technique author apply RSS (ReceiveSignal Strength) technique in which nodecalculates trust on the basis of signal strength.

• But it’s not a correct procedure becausemalicious node drop packet by using the identityof other nodes.

• So on the basis of this approach we does notrecognize exact malicious node.

8

Proposed Methodology

• To overcome this problem we are applying Region Based Routing inthe network. Region based routing is used to select some region fordata forwarding and it eliminates the duplicate entry from therouting table.

• This makes it suitable for large network as in this we are onlyconcerned with the small region. Scalability can be achieved by thismethod.

• Firstly the source node adds the address of the destination node inthe packets. Now the region is formed by calculating the distancebetween source and destination.

• Then the intermediate nodes forward the data to the neighboringnodes within the region formed and reached to destination.

9

Fig.1 Proposed Algorithm Flowchart10

Proposed Algorithm

• Input: Source location (), Destination location (), Data• Output: Trust value, Trusted Nodes, Security

– Initialize network– Select source and destination nodes– Now put the destination address in the HELLO packet– Apply region based routing protocol to find the suitable area– Calculate distance between the source and intermediate node

by Euclidean Distance– Update routing table– Calculate the trust value of each node – Then forward the data into that particular region– Data reached to the destination through the trusted nodes– Exit

11

Result Analysis

Fig.2 Packet delivery ratio 12

Contd...

Fig.3 Throughput 13

Contd...

Fig.4 Packet Drop14

Conclusion

• A mobile ad hoc network (MANET) is a collection of two or morenodes equipped with wireless communications and networkingcapability.

• We proposed a technique which generate one region then transferthe data from that particular area. This improves the scalability ofthe network and also provides the secure path for the data transfer.

• Our results show that we enhanced the network performance byincreasing the throughput and packet delivery ratio.

• It decreases the packet dropping in the network which improvesthe efficiency of the network.

15

Future Work

• In the future, we can apply more security in the region based

routing protocol for the better sending of data towards the

destination.

16

References

[1]Janakiraman.S., Gayathri.D “Trust Implementation in AODV Protocol: A Survey”

International Journal of Software and Web Sciences (IJSWS) 2014.

[2]Mohammad A. Mikki, ―Energy Efficient Location Aided Routing Protocol for

wireless MANETs, in International Journal of Computer Science and Information

Security, Vol 4, No. 1&2, 2009.

[3] Banoth Rajkumar, Dr.G.Narsimha “Trust Based Certificate Revocation for Secure

Routing in MANET” 2nd International Conference on Intelligent Computing,

Communication & Convergence (ICCC-2016).

[4] Hui Xia, Zhiping Jia, Xin Li, Lei Ju, Edwin H.-M. Sha, “Trust prediction and trust-

based source routing in mobile ad hoc networks”, Ad Hoc Networks 11 (2013). 9.

Hisham Dahshan, Fatma Elsayed, Alaa Rohiem, Aly Elmoghazy and James Irvine,

“ATrust Based Threshold Revocation Scheme for MANETs”, 2013 IEEE.

[5] Liu, Wei, et al, "A study on certificate revocation in mobile ad hoc networks,"

Communications (ICC), 2011 IEEE International Conference on. IEEE, 2011.

17

18

Thank you