Download presentation
Presentation is loading. Please wait.
Published byPierce Melton Modified over 9 years ago
1
Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki Reddy Bali Reddy College of Engineering, Mylavaram Dr. G. Ram Murthy Mentor Dr.C.Nagaraju Professor &Head Mentee
2
2 Introduction Recent Advances in Mobile Technology and Mobile Devices Mobile Computing has become an important part of our life. People are using wireless networks for their day-to-day work The desire to be connected anytime, anywhere, anyhow has led to the development of wireless networks
3
Statement of the Problem In this Proposed work, Focus has been put on the strategy to address the security issue A lot of emphasis has been given on the routing mechanism and Security Area has not been addressed adequately in Existing Research 3
4
Statement of the Problem The Main Objective of the Proposed Work can be stated as – “ Modeling and Conceptualize a secure routing protocol for MANETs”. In order to handle the above problem, the following outline is proposed Evaluation and Analysis of existing ad hoc routing protocols Design and development of the proposed routing protocol 4
5
Statement of the Problem The New Protocol will be proposed after proper verification and validation through simulations 5
6
Protocol Classes 6 Ready to go Whole topology Updates changes Reactive On-demand Little maintenance Cell operations Proactive Overhead Costs Bandwidth Battery power Inflexible
7
Proposed Work In our study the On-demand (Reactive) Protocols have a lower communication overhead because the roots are built only when required and there are no periodic updates required. We consider a Routing Protocol, namely, Ad hoc On-Demand Distance Vector (AODV). The AODV is an on-demand routing protocol based on the concept of reactive routing 7
8
AODV Improving the A d-hoc O n-demand D istance V ector Charles E. Perkins, 1999 Reactive protocol Fast discovery Loop free On-demand 8
9
Security Mechanisms 9
10
A pseudo DNA (Deoxyribo Nucleic Acid) based cryptographic algorithm is used in order to secure the MANETs. The pseudo DNA cryptography is a concept inspired from the field of life science and has been extended to the field of MANETs to secure them. 10
11
Introduction Encoding data “as in nature 11 Recombination algorithm InputOutput Molecular AI: DNA Computing
12
12 011001101010001ATGCTCGAAGCT
13
DNA Computing 13DNA (Deoxyribonucleic acid) Genetic Genetic information “memory” Nucleotides Nucleotides strung into polymer chains polymer chains (DNA Strands) Four classes of nucleotides: Adenine, Guanine, Cytosine, Thymine Adenine, Guanine, Cytosine, Thymine (A,C,G,T) DNA
14
DNA Computing The Structure of DNA 14 The double helix structure discovered by Watson and Crick
15
15 HPP... ATG ACG TGC CGA TAA GCA CGT 1 0 3 2 5 6 4 Solution PCR (Polymerase Chain Reaction) ATGTGCTAACGAACG ACGCGAGCATAAATGTGCCGT TAAACG CGACGT TAAACGGCAACG... CGACGTAGCCGT... ACGCGAGCATAAATGTGCCGT ACGCGTAGCCGT ACGCGT... ACGGCATAAATGTGCACGCGT ACGCGAGCATAAATGCGATGCCGT ACGCGAGCATAAATGTGCCGT... ACGCGAGCATAAATGTGCCGT Decoding Ligation Encoding Gel Electrophoresis Affinity Column ACGCGAGCATAAATGTGCACGCGT ACGCGAGCATAAATGCGATGCACGCGT ACGCGAGCATAAATGTGCACGCGT ACGCGAGCATAAATGCGATGCACGCGT 2 0 1 3 4 5 6
16
The Central Dogma of molecular biology 16
17
Pseudo DNA cryptography 17
18
Security Mechanisms In proposed work, one potential key application will be used known as DNA- based molecular cryptography systems. it provides a much more compact storage medium, and An extremely small amount of DNA suffices even for huge one-time pads. 18
19
Conclusion Finally,the New Routing Protocol will be validated through various simulation scenarios, 19
20
Thank U 20
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.