SlideShare a Scribd company logo
1 of 23
Download to read offline
Modified Topology-Hiding Multipath
Routing Protocol: Solution to the Topology Exposure
Problem in MANET
Presented By:
Akshay S. Phalke
1
Overview
• Introduction
• Objectives
• Literature Survey
• Problem Statement
• Mathematical Model
• System Architecture & Algorithm
• Results
• Conclusion & Future work
• References
2
Introduction
• Mobile ad hoc network is open wireless
network.
• Nodes are in mobile state.
• It is dynamically changing topology and lack
infrastructure network
3
Introduction (contd..)
Fig 1. Introduction Of MANET
4
Objectives
• Hide topology-not carry the link information
in route messages.
• Find node-disjoint routes-After construction of
any route to the destination it advertises the set
of node in that path.
• Exclude unreliable routes-M-THMR able to
detect the malicious as well as faulty node.
5
Literature Survey
6
Problem Statement
• To present the solution for topology exposure
problem and discussed its mitigation
technique.
7
Mathematical Model
8
System Architecture
9
MODIFIED TOPOLOGY-HIDING MULTIPATH
ROUTING PROTOCOL(M-THMR)
• ExNodeSet greatly reduces the probability that a
node is placed on more than one route.
• Every node independently makes routing
decisions by checking the reverse routes.
• Only the nodes that are placed on established
routes needs to rebroadcast the RREP message.
• Only two routes in routing table remains finally,
which means that the established routes are
bidirectional.
10
Proposed System: Algorithm
1.M-THMR:
Algorithm 1: Trust Value Calculation for Secure Route Discovery Mechanism:
• Input: Ti (trust value of nodes)
• Output: FaultNode [ ], TrustNode [ ].
• N [ ] = GetNeighbour[ ];//find all neighboring nodes
• For all node i in N [ ]
• CalculateTrust[ ]// obtain trust
• UpdateTrust () //
• If(Ti<TThreshold)
• FaultNode U node(i)
• else
• TrustNode U node(i)
• End for
11
Algorithm
• Algorithm 2: M-THMR Protocol at node I
• Method1: Route request Phase
• Upon receiving RREQ < S,D, seq, hopCt > from nj :
• if ni == D then
• set a timer TD
• /∗ enter Route Reply Phase upon timeout∗/
• return
• end if
• Insert < S,nj, hopCt + 1 > into RT /∗ reverse route ∗/
• if < S,seq > doesn’t exist in SNT then
• Insert < S,seq > into SNT
• if ni! = D then
• Rebroadcast RREQ < S,D, seq, hopCt + 1 >
• end if
• end if
12
Algorithm
• Method2: Route reply Phase
• Upon receiving RREP < S,D, seq, hopCt,
• exNodeSet, nextNode > from nj :
• for each route R in RT do
• if R.D == S and R.nextHop ∈ exNodeSet then
• Remove route R
• end if
• end for
• if nextNode == NULL or nextNode == ni then
• Insert < D,nj, hopCt + 1 > into RT
• /∗ two temporary parameters ∗/
• Set mHop = 65535 and R1 = NULL
• for each route R in RT do
• if R.D == S and R.hopCount < mHop then
• Set mHop = R.hopCount and R1 = R
• end if
• end for
13
Algorithm
• for each route R in RT do
• /∗ remove all reverse routes to source ∗/
• if R.D == S then
• Remove route R
• end if
• end for
• if R1! = NULL then
• Insert R1 into RT
• nextNode = R1.nextHop
• exNodeSet = {R1.nextHop} ∪ exNodeSet
• Broadcast RREP < S,D, seq, hopCt + 1,
• exNodeSet, nextNode >
• end if
• end if
14
Algorithm
• Method3: Route Probe Phase
• Upon Timeout at the Destination:
• Set exNodeSetmHop = NULL
• for each route R in RT do
• exNodeSet = {R.nextHop} ∪ exNodeSet
• end for
• Broadcast RREP < S,D, 0, exNodeSet,NULL >
15
Implementation Requirement
•Software Requirement:
i.MFS(Meta Exploid Frame Work)
ii.Netscan (Network Scan Tools)
iii.NS 2.35
iv.CAINK (Packet Inspect)
v.VMware player
• OS: Red Hat Enterprise Linux
• OS: a) Back Track b) Kali ( Hacking O.S.)
•Hardware Requirement:
i.512 Mb RAM, 80 GB HDD
ii.2 GHz Processor
iii.Packet Builder Radiator
16
Simulation Parameters
Table No 1. Simulation Parameters
17
Results
18
Results
19
Conclusion
• Proposed System states that
• M-THMR doesn’t degrade the performance
when there is no attack.
• In the adversarial scenario, the simulation
results show that M-THMR can resist attacks.
20
Future Work
• As for the future work, we plan to design the
data transmission strategy with fault detection
mechanism based on M-THMR
21
References
• Yujun Zhang, Guiling Wang, Qi Hu, "Design & Performance Study of a
Topology-Hiding Multipath routing Protocol for Mobile Ad Hoc networks”
IEEE 2014.
• C. K. Toh, A. N. Le, et al. Load balanced routing protocols for ad hoc
mobile wireless networks. IEEE Communications Magazine, 47(8):78–84,
2011.
• M. K. Marina, and S. R. Das. Ad Hoc On-demand Multipath Distance
Vector Routing. Wiley Wireless Communications and Mobile Computing,
6(7):969–988, 2014.
• L. Abusalah, A. Khokhar, et al. A Survey of Secure Mobile Ad Hoc
Routing Protocols. IEEE Communications Surveys and Tutorials,
10(4):78–93, 2013.
• E. Gerhards-Padilla, N. Aschenbruck, et al. Detecting Black Hole Attacks
in Tactical MANETs Using Topology Graphs. IEEE Conference on Local
Computer Networks (LCN), pages 1043–1052, 2011.
22
Thank you
Suggestions Are Welcomed…
23

More Related Content

What's hot

Addressing mode and instruction set using 8051
Addressing mode and instruction set using 8051Addressing mode and instruction set using 8051
Addressing mode and instruction set using 8051logesh waran
 
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...Amr E. Mohamed
 
Some other Importent Question (Mix)
Some other Importent Question (Mix)Some other Importent Question (Mix)
Some other Importent Question (Mix)prabhatjon
 
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...Hsien-Hsin Sean Lee, Ph.D.
 
A Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB SimulinkA Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB SimulinkJaewook. Kang
 
Pt 51 kit - Peripheral self-test
Pt 51 kit - Peripheral self-testPt 51 kit - Peripheral self-test
Pt 51 kit - Peripheral self-testrajbabureliance
 
Programmable Logic Array(PLA), digital circuits
Programmable Logic Array(PLA), digital circuits Programmable Logic Array(PLA), digital circuits
Programmable Logic Array(PLA), digital circuits warda aziz
 
ClockSystem: Embedding Time in Smalltalk
ClockSystem: Embedding Time in SmalltalkClockSystem: Embedding Time in Smalltalk
ClockSystem: Embedding Time in SmalltalkESUG
 
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...Peter Breuer
 
Programmable array-logic-and-programmable-logic-array
Programmable array-logic-and-programmable-logic-arrayProgrammable array-logic-and-programmable-logic-array
Programmable array-logic-and-programmable-logic-arrayJher Carlson Atasan
 
PopMAG: Pop Music Accompaniment Generation
PopMAG: Pop Music Accompaniment GenerationPopMAG: Pop Music Accompaniment Generation
PopMAG: Pop Music Accompaniment Generationivaderivader
 
Feedback and Control Systems
Feedback and Control SystemsFeedback and Control Systems
Feedback and Control SystemsKristina Badec
 
Modeling and Mining Sequential Data
Modeling and Mining Sequential DataModeling and Mining Sequential Data
Modeling and Mining Sequential DataPhilipp Singer
 
8051 micro controllers Instruction set
8051 micro controllers Instruction set 8051 micro controllers Instruction set
8051 micro controllers Instruction set Nitin Ahire
 
Pipeline stalling in vhdl
Pipeline stalling in vhdlPipeline stalling in vhdl
Pipeline stalling in vhdlSai Malleswar
 
DickeyS_presentation_2015_3_26_2_1
DickeyS_presentation_2015_3_26_2_1DickeyS_presentation_2015_3_26_2_1
DickeyS_presentation_2015_3_26_2_1Sergey Dickey
 

What's hot (20)

Addressing mode and instruction set using 8051
Addressing mode and instruction set using 8051Addressing mode and instruction set using 8051
Addressing mode and instruction set using 8051
 
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
 
Some other Importent Question (Mix)
Some other Importent Question (Mix)Some other Importent Question (Mix)
Some other Importent Question (Mix)
 
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
 
A Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB SimulinkA Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB Simulink
 
Pt 51 kit - Peripheral self-test
Pt 51 kit - Peripheral self-testPt 51 kit - Peripheral self-test
Pt 51 kit - Peripheral self-test
 
Programmable Logic Array(PLA), digital circuits
Programmable Logic Array(PLA), digital circuits Programmable Logic Array(PLA), digital circuits
Programmable Logic Array(PLA), digital circuits
 
ClockSystem: Embedding Time in Smalltalk
ClockSystem: Embedding Time in SmalltalkClockSystem: Embedding Time in Smalltalk
ClockSystem: Embedding Time in Smalltalk
 
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
 
Programmable array-logic-and-programmable-logic-array
Programmable array-logic-and-programmable-logic-arrayProgrammable array-logic-and-programmable-logic-array
Programmable array-logic-and-programmable-logic-array
 
microprocessors
microprocessorsmicroprocessors
microprocessors
 
PopMAG: Pop Music Accompaniment Generation
PopMAG: Pop Music Accompaniment GenerationPopMAG: Pop Music Accompaniment Generation
PopMAG: Pop Music Accompaniment Generation
 
Feedback and Control Systems
Feedback and Control SystemsFeedback and Control Systems
Feedback and Control Systems
 
Modeling and Mining Sequential Data
Modeling and Mining Sequential DataModeling and Mining Sequential Data
Modeling and Mining Sequential Data
 
8051 micro controllers Instruction set
8051 micro controllers Instruction set 8051 micro controllers Instruction set
8051 micro controllers Instruction set
 
Instruction types
Instruction typesInstruction types
Instruction types
 
8051 Timers
8051 Timers8051 Timers
8051 Timers
 
Basic openfoa mtutorialsguide
Basic openfoa mtutorialsguideBasic openfoa mtutorialsguide
Basic openfoa mtutorialsguide
 
Pipeline stalling in vhdl
Pipeline stalling in vhdlPipeline stalling in vhdl
Pipeline stalling in vhdl
 
DickeyS_presentation_2015_3_26_2_1
DickeyS_presentation_2015_3_26_2_1DickeyS_presentation_2015_3_26_2_1
DickeyS_presentation_2015_3_26_2_1
 

Similar to Topology hiding Multipath Routing Protocol in MANET

FPGA_Logic.pdf
FPGA_Logic.pdfFPGA_Logic.pdf
FPGA_Logic.pdfwafawafa52
 
Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)
Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)
Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)Takahiro Harada
 
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1aishwaryaarrao3
 
Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)kike2005
 
Lucio marcenaro tue summer_school
Lucio marcenaro tue summer_schoolLucio marcenaro tue summer_school
Lucio marcenaro tue summer_schoolJun Hu
 
Routing Presentation
Routing PresentationRouting Presentation
Routing PresentationMohsin Ali
 
destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...Ashish Gupta
 
project_NathanWendt
project_NathanWendtproject_NathanWendt
project_NathanWendtNathan Wendt
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRPDmitry Figol
 
PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...
PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...
PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...Dongmin Lee
 
Queuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depthQueuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depthIdcIdk1
 

Similar to Topology hiding Multipath Routing Protocol in MANET (20)

FPGA_Logic.pdf
FPGA_Logic.pdfFPGA_Logic.pdf
FPGA_Logic.pdf
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)
Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)
Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)
 
Switching units
Switching unitsSwitching units
Switching units
 
routing
routingrouting
routing
 
Routing
RoutingRouting
Routing
 
distance_matrix_ch
distance_matrix_chdistance_matrix_ch
distance_matrix_ch
 
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
 
Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)
 
Lucio marcenaro tue summer_school
Lucio marcenaro tue summer_schoolLucio marcenaro tue summer_school
Lucio marcenaro tue summer_school
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
Network_Layer.ppt
Network_Layer.pptNetwork_Layer.ppt
Network_Layer.ppt
 
destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...
 
4g lte matlab
4g lte matlab4g lte matlab
4g lte matlab
 
Shortest path algorithm
Shortest  path algorithmShortest  path algorithm
Shortest path algorithm
 
project_NathanWendt
project_NathanWendtproject_NathanWendt
project_NathanWendt
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRP
 
PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...
PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...
PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...
 
Queuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depthQueuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depth
 
Hadoop classes in mumbai
Hadoop classes in mumbaiHadoop classes in mumbai
Hadoop classes in mumbai
 

Recently uploaded

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 

Topology hiding Multipath Routing Protocol in MANET

  • 1. Modified Topology-Hiding Multipath Routing Protocol: Solution to the Topology Exposure Problem in MANET Presented By: Akshay S. Phalke 1
  • 2. Overview • Introduction • Objectives • Literature Survey • Problem Statement • Mathematical Model • System Architecture & Algorithm • Results • Conclusion & Future work • References 2
  • 3. Introduction • Mobile ad hoc network is open wireless network. • Nodes are in mobile state. • It is dynamically changing topology and lack infrastructure network 3
  • 4. Introduction (contd..) Fig 1. Introduction Of MANET 4
  • 5. Objectives • Hide topology-not carry the link information in route messages. • Find node-disjoint routes-After construction of any route to the destination it advertises the set of node in that path. • Exclude unreliable routes-M-THMR able to detect the malicious as well as faulty node. 5
  • 7. Problem Statement • To present the solution for topology exposure problem and discussed its mitigation technique. 7
  • 10. MODIFIED TOPOLOGY-HIDING MULTIPATH ROUTING PROTOCOL(M-THMR) • ExNodeSet greatly reduces the probability that a node is placed on more than one route. • Every node independently makes routing decisions by checking the reverse routes. • Only the nodes that are placed on established routes needs to rebroadcast the RREP message. • Only two routes in routing table remains finally, which means that the established routes are bidirectional. 10
  • 11. Proposed System: Algorithm 1.M-THMR: Algorithm 1: Trust Value Calculation for Secure Route Discovery Mechanism: • Input: Ti (trust value of nodes) • Output: FaultNode [ ], TrustNode [ ]. • N [ ] = GetNeighbour[ ];//find all neighboring nodes • For all node i in N [ ] • CalculateTrust[ ]// obtain trust • UpdateTrust () // • If(Ti<TThreshold) • FaultNode U node(i) • else • TrustNode U node(i) • End for 11
  • 12. Algorithm • Algorithm 2: M-THMR Protocol at node I • Method1: Route request Phase • Upon receiving RREQ < S,D, seq, hopCt > from nj : • if ni == D then • set a timer TD • /∗ enter Route Reply Phase upon timeout∗/ • return • end if • Insert < S,nj, hopCt + 1 > into RT /∗ reverse route ∗/ • if < S,seq > doesn’t exist in SNT then • Insert < S,seq > into SNT • if ni! = D then • Rebroadcast RREQ < S,D, seq, hopCt + 1 > • end if • end if 12
  • 13. Algorithm • Method2: Route reply Phase • Upon receiving RREP < S,D, seq, hopCt, • exNodeSet, nextNode > from nj : • for each route R in RT do • if R.D == S and R.nextHop ∈ exNodeSet then • Remove route R • end if • end for • if nextNode == NULL or nextNode == ni then • Insert < D,nj, hopCt + 1 > into RT • /∗ two temporary parameters ∗/ • Set mHop = 65535 and R1 = NULL • for each route R in RT do • if R.D == S and R.hopCount < mHop then • Set mHop = R.hopCount and R1 = R • end if • end for 13
  • 14. Algorithm • for each route R in RT do • /∗ remove all reverse routes to source ∗/ • if R.D == S then • Remove route R • end if • end for • if R1! = NULL then • Insert R1 into RT • nextNode = R1.nextHop • exNodeSet = {R1.nextHop} ∪ exNodeSet • Broadcast RREP < S,D, seq, hopCt + 1, • exNodeSet, nextNode > • end if • end if 14
  • 15. Algorithm • Method3: Route Probe Phase • Upon Timeout at the Destination: • Set exNodeSetmHop = NULL • for each route R in RT do • exNodeSet = {R.nextHop} ∪ exNodeSet • end for • Broadcast RREP < S,D, 0, exNodeSet,NULL > 15
  • 16. Implementation Requirement •Software Requirement: i.MFS(Meta Exploid Frame Work) ii.Netscan (Network Scan Tools) iii.NS 2.35 iv.CAINK (Packet Inspect) v.VMware player • OS: Red Hat Enterprise Linux • OS: a) Back Track b) Kali ( Hacking O.S.) •Hardware Requirement: i.512 Mb RAM, 80 GB HDD ii.2 GHz Processor iii.Packet Builder Radiator 16
  • 17. Simulation Parameters Table No 1. Simulation Parameters 17
  • 20. Conclusion • Proposed System states that • M-THMR doesn’t degrade the performance when there is no attack. • In the adversarial scenario, the simulation results show that M-THMR can resist attacks. 20
  • 21. Future Work • As for the future work, we plan to design the data transmission strategy with fault detection mechanism based on M-THMR 21
  • 22. References • Yujun Zhang, Guiling Wang, Qi Hu, "Design & Performance Study of a Topology-Hiding Multipath routing Protocol for Mobile Ad Hoc networks” IEEE 2014. • C. K. Toh, A. N. Le, et al. Load balanced routing protocols for ad hoc mobile wireless networks. IEEE Communications Magazine, 47(8):78–84, 2011. • M. K. Marina, and S. R. Das. Ad Hoc On-demand Multipath Distance Vector Routing. Wiley Wireless Communications and Mobile Computing, 6(7):969–988, 2014. • L. Abusalah, A. Khokhar, et al. A Survey of Secure Mobile Ad Hoc Routing Protocols. IEEE Communications Surveys and Tutorials, 10(4):78–93, 2013. • E. Gerhards-Padilla, N. Aschenbruck, et al. Detecting Black Hole Attacks in Tactical MANETs Using Topology Graphs. IEEE Conference on Local Computer Networks (LCN), pages 1043–1052, 2011. 22
  • 23. Thank you Suggestions Are Welcomed… 23