SlideShare a Scribd company logo
Presented by
Rajat Soni
M.tech. WCT
Enrl.No.-140291
Secure Routing Protocol in Wireless Sensor
Networks
Supervisor
Prof. P.P. Bhattacharya
Co supervisor
Mr Deepak Sethi
Wireless Sensor Network
• WSNs consist of hundreds or thousands of low-power, low-cost nodes having a
computational unit, power source, radio and sensing elements.
• Power is the scarcest resource.
Features of WSN
 Self organizing
 Dynamic network topology
 Limited power
 Large scale deployment
Components Of Wireless Sensor Network
• Sensor Field
• Sensor Nodes
• Sink
• Base Station
Design Challenges
• Resource Constraints
• Ad-hoc Deployment
• Fault- Tolerance
• Scalability
• QoS
• Security
Application
of WSN
Military
Environme
ntal
Monitorin
g
Industrial
Manageme
nt
Health
Care
Disaster
Manageme
nt
Routing in Wireless Sensor
Network
• Many routing and data dissemination protocols have been specifically
designed for WSNs where energy awareness is an essential design
issue.
• Routing protocols might differ depending on the application and
network architecture
• The design of routing protocols is influenced by many challenging
factors caused by the nature of the WSNs.
some of these factors are
• Data delivery model
• Security
• Data aggregation
• Fault tolerance
Classification of Routing Protocols in
Wireless Sensor Networks
Security
Obstacles
 Limited resources
 Unreliable communication
 Unattended operation
Security Requirement
Primary goals
Data
Confidentiality
Data Integrity
Data Freshness
Authentication
Availability
Secondary goals
Self-Organization
Time
Synchronization
Secure Localization
Attacks in WSN
Attacks
By Spoofing, Altering, or Replaying routing information
Attacker can create loops, attract or repel network traffic, generate
false message, partition network, induce delay, etc.
 Selective forwarding
Malicious node forwards only some messages, drop others.
Attacker tries to be on the actual path of data flow
 Sinkhole Attacks 
• Main Reason : Specialized communication patterns supported by
WSN ; All packets have same destination i.e. base station
• Adversary tries to attract traffic from a particular area to pass
through a compromised node, thereby creating sinkhole with
adversary at the center
• A node may be made to look attractive to neighbors in some
routing algorithm
• Laptop class adversary provide a high quality route to base station
by transmitting at high power OR creating a wormhole
• Can enable other attacks e.g. selective forwarding
Sybil Attack
• Single node presents multiple identities to other nodes
• Significantly affect fault-tolerance schemes like distributed storage,
multi-path routing, topology maintenance
• Threat to geographical routing protocols
Wormholes
• tunnelling of messages over alternative low-latency links, e.g.
confuse the routing protocol, create sinkholes. etc.
• Exploit routing race condition
HELLO flood attack
• Some protocols require that nodes broadcast ‘hello’ packets to
advertise themselves
Acknowledgement spoofing
• Adversary can spoof ACKs for control packets and try to
convince the sender that a weak link is strong or a dead link is
alive; causing packet losses
Various Secure Routing Protocols
Distributed Security Framework (DSF)
Multipath Data Transfer protocol (MDTP)
Secure and Energy Efficient Disjoint Route (SEDR)
Data Centric Braided Multipath (DCBM)
Energy Efficient Secure Routing Protocol (EESRP)
Bio-inspired Self-Organized Secure Autonomous Routing
Protocol (BIOSARP)
Sink Toroidal Region Routing (STAR)
Distributed Security Framework
 Uses Hierarchical routing protocols
 Prevents network from Sybil, selective forwarding& worm hole
attacks
 Works for both mobile and static attackers
Limitations
 Consume high energy
 End to end delay is very high
Scope
 Improvement in success rate
 No defence mechanism for attack on gateway node
Energy Efficient Secure Routing
Protocol
 This protocol makes uses the sink-oriented grid structure for providing
better delivery ratio.
 It employs the farthest-highest energy dissemination node search to
find an efficient path from the source to the sink.
 use three different key for security.
 prevents from Sybil, black hole& worm hole attacks,
 Latency is high.
 Packet drop ratio is high.
Secure and Energy Efficient Disjoint Route
 In this protocol messages are
communicated by secret sharing,
by way of dividing them into
packets and by random
forwarding.
 Transmit packets to the sink node
by using least hop routing
 enhances the energy efficiency of
the network
 Prevents from black hole attack
Data Centric Braided Multipath
 Concentrate on the non-hierarchical approach
 Works on Reverse-path-based forwarding
 Normally using previous information, but detecting loops and
dismantling them soon after their formation
 Monitoring data delivery and limiting refreshes to the
neighbourhood of paths to sources with poor delivery quality
 Maintaining braided multiple paths from sources to the sink
 Highly energy efficient
Multipath Data Transfer Protocol
 Data route is decided by updated local table
 Provide data confidentiality
Scope
 Security mechanism for routing
 Improvements on end to end delay
Bio-inspired Self-Organized Secure
Autonomous Routing Protocol
 Based on ant colony optimization
 On demand routing protocol
 can be practically implemented for environmental monitoring or
battlefield surveillance.
 suitable for a large-scale self-organizing system
Scope
Can be designed by involving the mobility factor and
Autonomous security mechanism based on an artificial immune system
(AIS).
Sink Toroidal Region Routing
 Employs grid network structure and single path routing
 Addresses passive attacks like location privacy or eavesdropping
Limitation
 Works for passive attacks only
 Low delivery ratio
 End to end delay is high
Scope
 To remove collisions in the network
 Defense mechanism for active attacks
Conclusion and Future Scope
Routing is of pivotal importance in getting information from one node to
another. usually from the data collecting nodes or source to the base station
or sink is the primary objective. However, in military and medical
applications just getting the data across the network is not the only desired
focus. In these applications security is of utmost importance due to the
sensitive nature of the data that is transported. Hence, information security
measures must be placed in these types of WSNs.
In near future we are approaching to develop a new routing approach
based on multiple routes and provide security for possible threats using
MATLAB simulator which will have low energy consumption and high
delivery ratio with strong security mechanism.
REFRENCES
 Himali Saxena, Chunyu Ai, Marco Valero, Yingshu Li, and Raheem Beyah “DSF - A Distributed Security
Framework for Heterogeneous Wireless Sensor Networks” Military Communications Conference Cyber
Security and Network Management 2010.
 Shobha Poojary, Manohara “Multipath Data Transfer in Wireless Multimedia Sensor Network” Pai
Information and Communication Technology, Manipal Institute of Technology.2010.
 Anfeng Liu, Zhongming Zheng, Chao Zhang, Zhigang Chen, Member, IEEE, and Xuemin (Sherman)
Shen, “Secure and Energy-Efficient Disjoint Multipath Routing for WSNs”, IEEE ,2012.
 Alexander Aronsky and Adrian Segall “A Multipath Routing Algorithm for Mobile Wireless Sensor
Networks” Department of Electrical Engineering, Technion IIT, Haifa, Israel.
 Huei-Wen Ferng and Dian Rachmarini “A Secure Routing Protocol for Wireless Sensor Networks with
Consideration of Energy Efficiency” IEEE 2012.
 Kashif Saleem Norsheila Fisal, M. Ariff Baharudin “A Real-Time Empirical Study of BIOSARP based
Wireless Sensor Network Test bed” IEEE 2012.
 Leron Lightfoot, Yun Li, Jian Ren “Preserving Source-Location Privacy in Wireless Sensor Network using
STaR Routing” IEEE Globecom 2010.
Thank you

More Related Content

What's hot

Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Darwin Nesakumar
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
Teced Ce
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
Prof Ansari
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
Meena S Pandi
 
Chapter
ChapterChapter
Chapter
Rajat Soni
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
Kapil Dev
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
Muhammad Kaife Uddin
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
Kunal Prajapati
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
Jayesh Rane
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
Murtadha Alsabbagh
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
Aarthi Raghavendra
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
Tosha Shah
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
Pawan Kumar Tiwari
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
Braj Raj Singh
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
Tejas Wasule
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
studying telecommuciation engineering
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
915086731
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
Deepak Kumar Dhal
 

What's hot (20)

Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
Chapter
ChapterChapter
Chapter
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 

Viewers also liked

wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
Eisha Madhwal
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Ali Habeeb
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
 
Routing
RoutingRouting
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
sourabhshivtiwari
 
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
ketaki19deshmukh
 
Những động từ mà động từ theo sau nó phải là to infinitive
Những động từ mà động từ theo sau nó phải là to infinitiveNhững động từ mà động từ theo sau nó phải là to infinitive
Những động từ mà động từ theo sau nó phải là to infinitiveconvitden_67
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
Spandan Spandy
 
Sinkholes in karst environments
Sinkholes in karst environmentsSinkholes in karst environments
Sinkholes in karst environments
Hanumanthappa Ramdurg
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
sashar86
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
Habibur Rahman
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
Ganesh Khadsan
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
divya_prabha
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
Piyush Mittal
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
Karthik
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
Muqeed Abdul
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
rajatmal4
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
SlideShare
 

Viewers also liked (20)

wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Routing
RoutingRouting
Routing
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
 
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
 
Những động từ mà động từ theo sau nó phải là to infinitive
Những động từ mà động từ theo sau nó phải là to infinitiveNhững động từ mà động từ theo sau nó phải là to infinitive
Những động từ mà động từ theo sau nó phải là to infinitive
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
Sinkholes in karst environments
Sinkholes in karst environmentsSinkholes in karst environments
Sinkholes in karst environments
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 

Similar to Presentation1

firewall simenar ppt.pptx
firewall simenar ppt.pptxfirewall simenar ppt.pptx
firewall simenar ppt.pptx
mayurbankar2
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsn
GOWTHAMMS6
 
Manet
ManetManet
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
Darpan Dekivadiya
 
Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)
Pawan Kumar Tiwari
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
IOSR Journals
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
Elanthendral Mariappan
 
Design and development of anonymous location based routing for mobile ad-hoc...
Design and development of anonymous location based routing  for mobile ad-hoc...Design and development of anonymous location based routing  for mobile ad-hoc...
Design and development of anonymous location based routing for mobile ad-hoc...
IJECEIAES
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
IOSR Journals
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
MohitKumarSingh71
 
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Umang Singh
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
idescitation
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
IJERA Editor
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
RamprakashSingaravel1
 
G0933443
G0933443G0933443
G0933443
IOSR Journals
 
Ns2422412247
Ns2422412247Ns2422412247
Ns2422412247
IJERA Editor
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
IJMER
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
BRNSSPublicationHubI
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
Rajesh Karumanchi
 

Similar to Presentation1 (20)

firewall simenar ppt.pptx
firewall simenar ppt.pptxfirewall simenar ppt.pptx
firewall simenar ppt.pptx
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsn
 
Manet
ManetManet
Manet
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
Design and development of anonymous location based routing for mobile ad-hoc...
Design and development of anonymous location based routing  for mobile ad-hoc...Design and development of anonymous location based routing  for mobile ad-hoc...
Design and development of anonymous location based routing for mobile ad-hoc...
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
 
G0933443
G0933443G0933443
G0933443
 
Ns2422412247
Ns2422412247Ns2422412247
Ns2422412247
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 

More from Rajat Soni

Generation of mobile
Generation of mobileGeneration of mobile
Generation of mobile
Rajat Soni
 
Generation of mobile networks
Generation of mobile networksGeneration of mobile networks
Generation of mobile networks
Rajat Soni
 
Shree cement
Shree cementShree cement
Shree cement
Rajat Soni
 
matlab coding for All propagation model using rayleigh
matlab coding for All propagation model using rayleighmatlab coding for All propagation model using rayleigh
matlab coding for All propagation model using rayleigh
Rajat Soni
 
Presentation on emc testing and measurement
Presentation on emc testing and measurementPresentation on emc testing and measurement
Presentation on emc testing and measurement
Rajat Soni
 
Presentation on health hazards by em waves
Presentation on health hazards by em  wavesPresentation on health hazards by em  waves
Presentation on health hazards by em waves
Rajat Soni
 

More from Rajat Soni (6)

Generation of mobile
Generation of mobileGeneration of mobile
Generation of mobile
 
Generation of mobile networks
Generation of mobile networksGeneration of mobile networks
Generation of mobile networks
 
Shree cement
Shree cementShree cement
Shree cement
 
matlab coding for All propagation model using rayleigh
matlab coding for All propagation model using rayleighmatlab coding for All propagation model using rayleigh
matlab coding for All propagation model using rayleigh
 
Presentation on emc testing and measurement
Presentation on emc testing and measurementPresentation on emc testing and measurement
Presentation on emc testing and measurement
 
Presentation on health hazards by em waves
Presentation on health hazards by em  wavesPresentation on health hazards by em  waves
Presentation on health hazards by em waves
 

Recently uploaded

CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 

Recently uploaded (20)

CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 

Presentation1

  • 1. Presented by Rajat Soni M.tech. WCT Enrl.No.-140291 Secure Routing Protocol in Wireless Sensor Networks Supervisor Prof. P.P. Bhattacharya Co supervisor Mr Deepak Sethi
  • 2. Wireless Sensor Network • WSNs consist of hundreds or thousands of low-power, low-cost nodes having a computational unit, power source, radio and sensing elements. • Power is the scarcest resource. Features of WSN  Self organizing  Dynamic network topology  Limited power  Large scale deployment
  • 3. Components Of Wireless Sensor Network • Sensor Field • Sensor Nodes • Sink • Base Station Design Challenges • Resource Constraints • Ad-hoc Deployment • Fault- Tolerance • Scalability • QoS • Security
  • 5. Routing in Wireless Sensor Network • Many routing and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. • Routing protocols might differ depending on the application and network architecture • The design of routing protocols is influenced by many challenging factors caused by the nature of the WSNs. some of these factors are • Data delivery model • Security • Data aggregation • Fault tolerance
  • 6. Classification of Routing Protocols in Wireless Sensor Networks
  • 7. Security Obstacles  Limited resources  Unreliable communication  Unattended operation Security Requirement Primary goals Data Confidentiality Data Integrity Data Freshness Authentication Availability Secondary goals Self-Organization Time Synchronization Secure Localization
  • 9. Attacks By Spoofing, Altering, or Replaying routing information Attacker can create loops, attract or repel network traffic, generate false message, partition network, induce delay, etc.  Selective forwarding Malicious node forwards only some messages, drop others. Attacker tries to be on the actual path of data flow  Sinkhole Attacks  • Main Reason : Specialized communication patterns supported by WSN ; All packets have same destination i.e. base station • Adversary tries to attract traffic from a particular area to pass through a compromised node, thereby creating sinkhole with adversary at the center • A node may be made to look attractive to neighbors in some routing algorithm • Laptop class adversary provide a high quality route to base station by transmitting at high power OR creating a wormhole • Can enable other attacks e.g. selective forwarding
  • 10. Sybil Attack • Single node presents multiple identities to other nodes • Significantly affect fault-tolerance schemes like distributed storage, multi-path routing, topology maintenance • Threat to geographical routing protocols Wormholes • tunnelling of messages over alternative low-latency links, e.g. confuse the routing protocol, create sinkholes. etc. • Exploit routing race condition HELLO flood attack • Some protocols require that nodes broadcast ‘hello’ packets to advertise themselves Acknowledgement spoofing • Adversary can spoof ACKs for control packets and try to convince the sender that a weak link is strong or a dead link is alive; causing packet losses
  • 11. Various Secure Routing Protocols Distributed Security Framework (DSF) Multipath Data Transfer protocol (MDTP) Secure and Energy Efficient Disjoint Route (SEDR) Data Centric Braided Multipath (DCBM) Energy Efficient Secure Routing Protocol (EESRP) Bio-inspired Self-Organized Secure Autonomous Routing Protocol (BIOSARP) Sink Toroidal Region Routing (STAR)
  • 12. Distributed Security Framework  Uses Hierarchical routing protocols  Prevents network from Sybil, selective forwarding& worm hole attacks  Works for both mobile and static attackers Limitations  Consume high energy  End to end delay is very high Scope  Improvement in success rate  No defence mechanism for attack on gateway node
  • 13. Energy Efficient Secure Routing Protocol  This protocol makes uses the sink-oriented grid structure for providing better delivery ratio.  It employs the farthest-highest energy dissemination node search to find an efficient path from the source to the sink.  use three different key for security.  prevents from Sybil, black hole& worm hole attacks,  Latency is high.  Packet drop ratio is high.
  • 14. Secure and Energy Efficient Disjoint Route  In this protocol messages are communicated by secret sharing, by way of dividing them into packets and by random forwarding.  Transmit packets to the sink node by using least hop routing  enhances the energy efficiency of the network  Prevents from black hole attack
  • 15. Data Centric Braided Multipath  Concentrate on the non-hierarchical approach  Works on Reverse-path-based forwarding  Normally using previous information, but detecting loops and dismantling them soon after their formation  Monitoring data delivery and limiting refreshes to the neighbourhood of paths to sources with poor delivery quality  Maintaining braided multiple paths from sources to the sink  Highly energy efficient
  • 16. Multipath Data Transfer Protocol  Data route is decided by updated local table  Provide data confidentiality Scope  Security mechanism for routing  Improvements on end to end delay
  • 17. Bio-inspired Self-Organized Secure Autonomous Routing Protocol  Based on ant colony optimization  On demand routing protocol  can be practically implemented for environmental monitoring or battlefield surveillance.  suitable for a large-scale self-organizing system Scope Can be designed by involving the mobility factor and Autonomous security mechanism based on an artificial immune system (AIS).
  • 18. Sink Toroidal Region Routing  Employs grid network structure and single path routing  Addresses passive attacks like location privacy or eavesdropping Limitation  Works for passive attacks only  Low delivery ratio  End to end delay is high Scope  To remove collisions in the network  Defense mechanism for active attacks
  • 19. Conclusion and Future Scope Routing is of pivotal importance in getting information from one node to another. usually from the data collecting nodes or source to the base station or sink is the primary objective. However, in military and medical applications just getting the data across the network is not the only desired focus. In these applications security is of utmost importance due to the sensitive nature of the data that is transported. Hence, information security measures must be placed in these types of WSNs. In near future we are approaching to develop a new routing approach based on multiple routes and provide security for possible threats using MATLAB simulator which will have low energy consumption and high delivery ratio with strong security mechanism.
  • 20. REFRENCES  Himali Saxena, Chunyu Ai, Marco Valero, Yingshu Li, and Raheem Beyah “DSF - A Distributed Security Framework for Heterogeneous Wireless Sensor Networks” Military Communications Conference Cyber Security and Network Management 2010.  Shobha Poojary, Manohara “Multipath Data Transfer in Wireless Multimedia Sensor Network” Pai Information and Communication Technology, Manipal Institute of Technology.2010.  Anfeng Liu, Zhongming Zheng, Chao Zhang, Zhigang Chen, Member, IEEE, and Xuemin (Sherman) Shen, “Secure and Energy-Efficient Disjoint Multipath Routing for WSNs”, IEEE ,2012.  Alexander Aronsky and Adrian Segall “A Multipath Routing Algorithm for Mobile Wireless Sensor Networks” Department of Electrical Engineering, Technion IIT, Haifa, Israel.  Huei-Wen Ferng and Dian Rachmarini “A Secure Routing Protocol for Wireless Sensor Networks with Consideration of Energy Efficiency” IEEE 2012.  Kashif Saleem Norsheila Fisal, M. Ariff Baharudin “A Real-Time Empirical Study of BIOSARP based Wireless Sensor Network Test bed” IEEE 2012.  Leron Lightfoot, Yun Li, Jian Ren “Preserving Source-Location Privacy in Wireless Sensor Network using STaR Routing” IEEE Globecom 2010.