SlideShare a Scribd company logo
1 of 15
CONTENT
 INTRODUCTION
 OVER VIEW
 PROTOCOLS AND ATTACKS
 STATEFUL PROTOCOLS AND THEIR ATTACKS
 STATELESS PROTOCOLS AND THEIR ATTACKS
 CLEAN STATE SECURE ROUTING PROTOCOL (PLGP)
 MODULES
 CONCLUSION
INTRODUCTION
• Fundamental Issue
• Proposed Method Discusses Resource Depletion Attacks
• Minimal Exposure Paths
• An Algorithm Is Used
• Wireless Medium Allows An Attacker
OVER VIEW
• Communication In Terms Of Power
– The Carousel Attack (Allowing Single Packet)
– The Stretch Attack (Artificially Long Route)
Fig. 1 Fig. 2
PROTOCOLS AND ATTACKS
• Sleep Deprivation Torture
• Denial-of-sleep
• SYN Flood Attack
Conti..
Carousel Attack Stretch attack
Stateful Protocols and their
Attacks
• It Requires The Server
• Two Important Classes
– Olsr
– Dsdv
• Two Types Of Attacks
– Directional Antenna Attack
– Malicious Discovery Attack.
Stateless Protocols and their
Attacks
• It doesn’t requires the server
• Communication protocol
• Two types of attacks
– Carousel Attack
– Stretch attack
Clean State Secure Routing
Protocol (PLGP)
• Provable Security Against Vampire Attacks
– Definition 1
No- backtracking is satisfied
– Definition 2
The hop count of packet p received
Modules
A. Topology Discovery and Cluster Head Selection
Conti...
B.Tree Formation and Route Discovery
Conti…
C. Forwarding the Packets
CONCLUSION
helping the disabled in every manner in the field of transportation.

More Related Content

Viewers also liked

Quantum dots ppt
Quantum dots ppt Quantum dots ppt
Quantum dots ppt Amit Singh
 
Cloud Computing and your Data Warehouse
Cloud Computing and your Data WarehouseCloud Computing and your Data Warehouse
Cloud Computing and your Data Warehousedrluckyspin
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde9527604481
 
Technology in ECE
Technology in ECETechnology in ECE
Technology in ECECamillita
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technologysai krishna
 
Easy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry pptEasy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry pptSrilakshmi Iyengar
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt asharanick
 
Technology trends for 2016
Technology trends for 2016 Technology trends for 2016
Technology trends for 2016 albert joseph
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONjaisica
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless CommunicationShubham Srivastava
 
under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communicationDheeresh Kumar
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless TechnologyNiki Upadhyay
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 

Viewers also liked (16)

Quantum dots ppt
Quantum dots ppt Quantum dots ppt
Quantum dots ppt
 
Cloud Computing and your Data Warehouse
Cloud Computing and your Data WarehouseCloud Computing and your Data Warehouse
Cloud Computing and your Data Warehouse
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde
 
Technology in ECE
Technology in ECETechnology in ECE
Technology in ECE
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
 
Easy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry pptEasy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry ppt
 
Ece ppt[1]
Ece ppt[1]Ece ppt[1]
Ece ppt[1]
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
 
Nfc technology ppt
Nfc technology pptNfc technology ppt
Nfc technology ppt
 
Technology trends for 2016
Technology trends for 2016 Technology trends for 2016
Technology trends for 2016
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communication
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to CONFERENCE

Vasserman-TMC13-slide
Vasserman-TMC13-slideVasserman-TMC13-slide
Vasserman-TMC13-slidemanoj kumar s
 
Analysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queriesAnalysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on querieskavidhapr
 
Presentation on Long Reach Passive Optical Network (LR-PON)
Presentation on Long Reach Passive Optical Network (LR-PON) Presentation on Long Reach Passive Optical Network (LR-PON)
Presentation on Long Reach Passive Optical Network (LR-PON) Sourav Mondal
 
SPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptxSPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptxDeepakBaghel50
 
Introduction to Attacks on Bitcoin and Cryptos
Introduction  to Attacks on  Bitcoin and CryptosIntroduction  to Attacks on  Bitcoin and Cryptos
Introduction to Attacks on Bitcoin and Cryptosssuser18349f1
 
On Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio NetworksOn Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio NetworksShantanu Sharma
 

Similar to CONFERENCE (8)

Hardware Trojans
Hardware TrojansHardware Trojans
Hardware Trojans
 
Vasserman-TMC13-slide
Vasserman-TMC13-slideVasserman-TMC13-slide
Vasserman-TMC13-slide
 
Analysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queriesAnalysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queries
 
Presentation on Long Reach Passive Optical Network (LR-PON)
Presentation on Long Reach Passive Optical Network (LR-PON) Presentation on Long Reach Passive Optical Network (LR-PON)
Presentation on Long Reach Passive Optical Network (LR-PON)
 
SPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptxSPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptx
 
Introduction to Attacks on Bitcoin and Cryptos
Introduction  to Attacks on  Bitcoin and CryptosIntroduction  to Attacks on  Bitcoin and Cryptos
Introduction to Attacks on Bitcoin and Cryptos
 
Pilot protection
Pilot protectionPilot protection
Pilot protection
 
On Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio NetworksOn Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio Networks
 

CONFERENCE