Presentation is loading. Please wait.

Presentation is loading. Please wait.

Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki.

Similar presentations


Presentation on theme: "Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki."— Presentation transcript:

1 Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki Reddy Bali Reddy College of Engineering, Mylavaram Dr. G. Ram Murthy Mentor Dr.C.Nagaraju Professor &Head Mentee

2 2 Introduction  Recent Advances in Mobile Technology and Mobile Devices Mobile Computing has become an important part of our life. People are using wireless networks for their day-to-day work  The desire to be connected anytime, anywhere, anyhow has led to the development of wireless networks

3 Statement of the Problem  In this Proposed work, Focus has been put on the strategy to address the security issue A lot of emphasis has been given on the routing mechanism and Security Area has not been addressed adequately in Existing Research 3

4 Statement of the Problem  The Main Objective of the Proposed Work can be stated as – “ Modeling and Conceptualize a secure routing protocol for MANETs”.  In order to handle the above problem, the following outline is proposed Evaluation and Analysis of existing ad hoc routing protocols Design and development of the proposed routing protocol 4

5 Statement of the Problem  The New Protocol will be proposed after proper verification and validation through simulations 5

6 Protocol Classes 6 Ready to go Whole topology Updates changes Reactive On-demand Little maintenance Cell operations Proactive Overhead Costs Bandwidth Battery power Inflexible

7 Proposed Work  In our study the On-demand (Reactive) Protocols have a lower communication overhead because the roots are built only when required and there are no periodic updates required.  We consider a Routing Protocol, namely, Ad hoc On-Demand Distance Vector (AODV). The AODV is an on-demand routing protocol based on the concept of reactive routing 7

8 AODV  Improving the A d-hoc O n-demand D istance V ector  Charles E. Perkins, 1999 Reactive protocol Fast discovery Loop free On-demand 8

9 Security Mechanisms 9

10  A pseudo DNA (Deoxyribo Nucleic Acid) based cryptographic algorithm is used in order to secure the MANETs.  The pseudo DNA cryptography is a concept inspired from the field of life science and has been extended to the field of MANETs to secure them. 10

11 Introduction Encoding data “as in nature 11 Recombination algorithm InputOutput Molecular AI: DNA Computing

12 12 011001101010001ATGCTCGAAGCT

13 DNA Computing 13DNA (Deoxyribonucleic acid) Genetic Genetic information “memory” Nucleotides Nucleotides strung into polymer chains polymer chains (DNA Strands) Four classes of nucleotides: Adenine, Guanine, Cytosine, Thymine Adenine, Guanine, Cytosine, Thymine (A,C,G,T) DNA

14 DNA Computing The Structure of DNA 14 The double helix structure discovered by Watson and Crick

15 15 HPP... ATG ACG TGC CGA TAA GCA CGT 1 0 3 2 5 6 4 Solution PCR (Polymerase Chain Reaction) ATGTGCTAACGAACG ACGCGAGCATAAATGTGCCGT TAAACG CGACGT TAAACGGCAACG... CGACGTAGCCGT... ACGCGAGCATAAATGTGCCGT ACGCGTAGCCGT ACGCGT... ACGGCATAAATGTGCACGCGT ACGCGAGCATAAATGCGATGCCGT ACGCGAGCATAAATGTGCCGT... ACGCGAGCATAAATGTGCCGT Decoding Ligation Encoding Gel Electrophoresis Affinity Column ACGCGAGCATAAATGTGCACGCGT ACGCGAGCATAAATGCGATGCACGCGT ACGCGAGCATAAATGTGCACGCGT ACGCGAGCATAAATGCGATGCACGCGT 2 0 1 3 4 5 6

16 The Central Dogma of molecular biology 16

17 Pseudo DNA cryptography 17

18 Security Mechanisms  In proposed work, one potential key application will be used known as DNA- based molecular cryptography systems. it provides a much more compact storage medium, and An extremely small amount of DNA suffices even for huge one-time pads. 18

19 Conclusion  Finally,the New Routing Protocol will be validated through various simulation scenarios, 19

20 Thank U 20


Download ppt "Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki."

Similar presentations


Ads by Google