Trust based Dynamic MANET On-demand Routing Protocol (TDRP) Under the guidance of Dr. P. Samundiswary Asst. Professor By J Naveen Reg. No. 13304033 M.Tech.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Page 1 Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc Networks Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc.
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Security in Mobile Ad Hoc Networks
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Multicasting in Mobile Ad Hoc Networks Ravindra Vaishampayan Department of Computer Science University of California Santa Cruz, CA 95064, U.S.A. Advisor:
Tseng:1 Introduction to Ad Hoc Networking Perkin’s book: Ch 1 and Ch 2. Some data collected from the Internet by Prof. Yu-Chee Tseng.
Oliver Pankiewicz EEL 6935 Embedded Systems
Design and Implementation of the OLSR Protocol in an Ad Hoc Framework Juan Gutiérrez Plaza Supervisor: Raimo Kantola Instructor: José Costa Requena Networking.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Multicasting in Mobile Ad-Hoc Networks (MANET)
Progress Report Wireless Routing By Edward Mulimba.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
Routing Security in Ad Hoc Networks
Secure Routing in Ad Hoc Wireless Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Wireless Sensor Network Security Anuj Nagar CS 590.
Computer Networks: Wireless Networks Ivan Marsic Rutgers University Chapter 6 – Wireless Networks.
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Mobile Adhoc Network: Routing Protocol:AODV
Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.
PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW IJCSMC, Vol. 2, Issue. 6, June 2013, pg.359 – 362 Suchita.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
2003/04/24AARON LEE 1 An Efficient K-hop Clustering Routing Scheme for Ad-Hoc Wireless Networks S. F. Hwang, C. R. Dow Journal of the Internet Technology,
Ch 4. Routing in WMNs Myungchul Kim
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Ordering in Time: A New Routing Approach for Wireless Networks Stephen Dabideen and J.J. Garcia-Luna-Aceves Department of Computer Engineering University.
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Fundamentals of Computer Networks ECE 478/578
Fast and Slow Hopping MAC Protocol for Single-hop Ad Hoc Wireless Networks Khaled Hatem Almotairi, Xuemin (Sherman) Shen Department of Electrical and Computer.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Jim Parker CMSC691t Spring 2000 “Ad-hoc On-Demand Distance Vector Routing” A dynamic routing algorithm for mobile ad-hoc networks.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Energy Efficiency Energy consumption is the most important factor to determine the life of sensor network. since sensors networks has low power resources,
12-CRS-0106 REVISED 8 FEB 2013 Session Title : Wireless Communication-1 Paper ID : 35 6/29/
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Straight Line Routing for Wireless Sensor Networks Cheng-Fu Chou, Jia-Jang Su, and Chao-Yu Chen Computer Science and Information Engineering Dept., National.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
IMPROVEMENT OF NETWORK LIFETIME BY IMPROVING ROUTE DISCOVERY PHASE IN MULTI-PATH DSR USING HYBRID ANT COLONY OPTIMIZATION.
AODV-OLSR Scalable Ad hoc Routing
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Sensor Network Routing
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
Routing In Wireless Mesh Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad-hoc On-demand Distance Vector
Ad hoc Routing Protocols
by Saltanat Mashirova & Afshin Mahini
Routing Metrics for Wireless Mesh Networks
Subject Name: Computer Networks - II Subject Code: 10CS64
Majid Alshammari and Khaled Elleithy
Proactive vs. Reactive Routing
ITIS 6010/8010 Wireless Network Security
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
Computer Networks: Wireless Networks
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Trust based Dynamic MANET On-demand Routing Protocol (TDRP) Under the guidance of Dr. P. Samundiswary Asst. Professor By J Naveen Reg. No M.Tech (Electronics) Department of Electronics Engineering Pondicherry University

Contents  Objective  Introduction  Routing protocols  Existing model  Proposed model  Work plan  References

Objective To Study and analyze the performance of Zigbee based WSN using Trust based Dynamic MANET On-demand (DYMO) Routing Protocol (TDRP).

Introduction ZigBee is an IEEE based wireless sensor network standard. ZigBee is a low-cost, low-power, and low memory wireless mesh network standard. It is having typical of 60 KB and 256 KB flash memory. Operates in the Industrial, Scientific and Medical (ISM) radio bands. i.e., 868 MHz in Europe, 915 MHz in the USA and Australia and 2.4 GHz in most jurisdictions worldwide. Data transmission rates: 20 kbps at 868 MHz frequency band and 250 kbps at 2.4 GHz frequency

Routing protocols A routing protocol specifies how routers should communicate with each other in network. Routing algorithm determines the efficient use of resources. Types of routing protocols Proactive (Table driven) Reactive (On demand) Hybrid protocols

Reactive protocols These protocols are based on source initiated on-demand reactive routing. This type of routing discovers routes only when a node requires a route to a destination. Eg: DSR, AODV, DYMO, LAR Adv : Saves energy & B.W during in activity period, good for low traffic. Disadv : High latency time in route finding, Excessive flooding can lead to network clogging.

DYMO…… DYMO is purely based on sequence numbers assigned to all packets. During route discovery, the source node initiates a Route Request (RREQ) throughout the network to find a route to the destination node. During this hop-by-hop dissemation process, each intermediate node records a route to the source node.

What is Trust… A Trust is the degree of belief’s about the behaviour of other ones. In order to ensure that the network provides its services without any problem, a trust based protocol helps to resolve this issue. Based on trust level each node communicates with its neighbours. A Trust which can also used to reduce the size of the data sent from node to node and thus decrease the needed power consumption. If the trust factor is high, low cryptography can take place and this leads to reduce the amount of bandwidth.

Existing model The trust concept applied to DSDV protocol helps to increase the security level of the network as it will avoid any misbehaving actions and denying malicious nodes. The trust factors including network-ack, data confidentiality, data integrity and drop ratio.

Calculation of Trust factor Trust factor 10 means that node 2 is completely trusted by node 1 and the value of data is low. if node 1 has a trust factor of 5 for node 2 and the value of data is medium, node 1 is going to use high encryption. HighMediumLow 9 & 10Medium Encryption No Encryption 6,7 & 8High EncryptionMedium Encryption No Encryption 2,3,4 & 5High Encryption No Encryption 0 & 1---

A scenario of trusted and untrusted nodes in the network.

Proposed model In proposed model, the Trust based model is applied to the existing DYMO based reactive protocol.

Work plan Time LineDescription Review 0 (14 th -15 th July) Problem definition and literature survey Review I (3 rd week of August) Performance analysis with the help of software on existing model and progress towards proposed model Review II (2 nd week of October) Power consumption of proposed model and power consumption comparison between existing and proposed models 14 th November, 2014Submission of Softcopy Phase I Report to Dept. Project Supervisor 25 th November, 2014Submission of hard copy of the report to Department 27 th November, 2014Viva-Voce Examination

References Marwah Almasri, Khaled Elleithy, Anas Bushang, and Remah Alshinina.,“A Trusted and Energy Efficient Routing Protocol for Wireless Sensor Networks,” IEEE International Symposium on Distributed Simulation., , Zahariadis, T.; Trakadas, P.; Leligou, H.; Karkazis, P.; Voliotis, S.,"Implementing a Trust-Aware Routing Protocol in Wireless Sensor Nodes," Developments in E-systems Engineering (DESE), 2010pp.47,52, 6- 8 Sept Pushpa, A.M., “Trust based secure routing in AODV routing protocol,” Internet Multimedia Services Architecture and Applications (IMSAA),2009 IEEE International Conference on, vol., no., pp.1,6, 9-11 Dec A rif, M. Z., & Shrivastava, G. (2012). Trusted Destination Sequenced Distance Vector Routing Protocol for Mobile Ad-hoc Network. International Journal of Computer Application, 15,

Thank you