SlideShare a Scribd company logo
1 of 25
GURUNANAK INSTITUTE OF TECHNOLOGY
SODEPUR -700114
DEPARTMENT OF COMPUTER SCIENCE AND
ENGINEERING(MTECH.)
Thesis on:-
“Secure and Reliable Routing Protocols
for Heterogeneous Multihop Wireless
Networks”
Under The Guidance Of
Mrs. SRABANI KUNDU
BY:- DEVDUTTA CHAKRABARTI
Roll No-14311214001
Contents
 Wireless Ensor networks
 Advantage and Disadvantage of WSN
 Java
 Literature Survey
 Introduction
 E-Star Architecture
 Related Works
 Comparison
 Existing System
 Proposed System
 System Models
 Security Analysis
 Route Establishment Phase
 Test Cases
 Advantages
 Conclusion
References
6/17/2016
2
GNIT_CSE(M.TECH)
Wireless Sensor Networks
 A wireless sensor network (WSN) are spatially distributed
autonomous sensors to monitor physical conditions such as
temperature, sound, pressure etc. and to cooperatively pass
their data through the network to a main location.
 A collection of sensing devices that can communicate
wirelessly.
6/17/20163 GNIT_CSE(M.TECH)
Advantages of WSN
 It avoids a lot of wiring .
 It can accommodate new devices at any time .
 It's flexible to go through physical partitions .
 It can be accessed through a centralized
monitor
6/17/20164 GNIT_CSE(M.TECH)
Disadvantages of WSN
 Lower speed compared to wired network.
 Still Costly at large.
 More complex to configure than wired network.
 It does not reduce costs for installation of
sensors.
6/17/20165 GNIT_CSE(M.TECH)
Introduction to Java
 Java
 Features of Java
6/17/20166 GNIT_CSE(M.TECH)
Literature Survey
 An Efficient Anonymous Communication Protocol for
Wireless Sensor Networks
 A Survey on Various Manet Routing Protocols Based on
Anonymous Communication
 Selective Acknowledgement Scheme to Mitigate Routing
Misbehavior in Mobile Ad Hoc Network
 LogitTrust: A Logit Regression-based Trust Model for
Mobile Ad Hoc Networks
 Performance of Swarm Based Intrusion Detection System
Under Different Mobility Conditions in MANET
 The Role of Trust Management in Distributed Systems
Security
 An Acknowledgement-Based Approach for the Detection
of Routing Misbehaviour in MANETS 6/17/20167 GNIT_CSE(M.TECH)
Introduction
 In multihop wireless networks, when a mobile node
wants to communicate with a destination, it relies on the
other nodes to forward the packets. This multihop
packet transmission can extend the network coverage
area using limited power and improve area distance
efficiency.
 E-STAR integrates the payment and trust systems with
the routing protocol with the goal of enhancing route
reliability and stability.
 The payment system describes to charge the nodes that
send packets and reward those forwarding packets.6/17/20168 GNIT_CSE(M.TECH)
E-Star Architecture
6/17/20169
GNIT_CSE(M.TECH)
E-Star
 E-STAR has three main phases.
1. Data Transmission phase:- the source node
sends messages to the destination node.
2. Update Credit-Account and Trust Values
phases:- TP determines the charges and
rewards of the nodes and updates the node’s
trust values.
3. Route Establishment phase:- Trust-based and
energy-aware routing protocol establishes
stable communication routes.
6/17/201610 GNIT_CSE(M.TECH)
Related works
Reputation-Based Schemes
 Reputation-based schemes attempt to identify the malicious nodes that drop packets with
a rate more than a predefined threshold in order to avoid them in routing. these schemes
cannot guarantee route stability or reliability in HMWNs.
Payment Schemes
 Payment schemes use credits to encourage the nodes to relay others’ packets . Since
relaying packets consumes energy and other resources, packet relaying is treated as a
service which can be charged. The nodes earn credits for relaying others’ packets and
spend them to get their packets delivered.
Trust system
 The main goal is to enable the nodes to indirectly build trust relationships using
exclusively monitored information.
Comparison
 Different from reputation-based schemes that aim to identify the malicious nodes, E-
STAR does not suffer from false accusations because it aims to identify the competent
nodes in packet relaying and select them in routing.
6/17/2016
11
GNIT_CSE(M.TECH)
6/17/2016
12
GNIT_CSE(M.TECH)
Existing System
 The multihop wireless network implemented in
many useful applications such as data sharing
and multimedia data transmission. It can
establish a network to communicate, distribute
files, and share information.
 Disadvantages of Existing System:
 Less security.
 Probability of breaking the route is highly
possible.
 Nodes do not have sufficient energy. 6/17/201613 GNIT_CSE(M.TECH)
Proposed System
 We develop two routing protocols to direct traffic through
those highly-trusted nodes having sufficient energy to
minimize the probability of breaking the route. By this
way, E-STAR can stimulate the nodes not only to relay
packets, but also to maintain route stability and report
correct battery energy capability.
Advantages of Proposed System:
 Reduce the probability of breaking the routes.
 E-STAR integration can deliver messages through
reliable routes and allow the source nodes to prescribe
their required level of trust.
6/17/201614 GNIT_CSE(M.TECH)
SYSTEM MODELS
 Network Model
The considered HMWN has mobile nodes and offline
trusted party whose public key is known to all the
nodes. The mobile nodes have different hardware
and energy capabilities.
 Adversary Model
The adversaries have full control on their nodes.
They can change the node’s normal operation and
obtain the cryptographic credentials.
6/17/201615 GNIT_CSE(M.TECH)
Route Establishment Phase
 In this section, we present two routing protocols
called the shortest reliable route and the best
available route. SRR establishes the shortest
route that can satisfy the source node’s trust,
energy, and route-length requirements, but the
destination node selects the best route in the
BAR protocol.
 The routing protocols have three processes:
1) route request packet (RREQ) delivery
2) Route selection and 6/17/201616 GNIT_CSE(M.TECH)
Srr
 RREQ :It contains the packet type identifier “RREQ”, the
identities of the source and destination nodes IDS and
IDD, the maximum number of intermediate nodes (Hmax),
the time stamp of the route establishment (ts), the trust
and energy requirements ðTr ¼ ½tð1Þ; tð2Þ; tð3Þ; tð4Þ
and ErÞ, and the source node’s signature and certificate.
Hmax can limit the propagation area of the packet and ts
can ensure the freshness of the request.
 Route selection: If there is a route that can satisfy the
source node’s requirements, the destination node receives
at least one RREQ packet.
 RREP: The RREP packet contains the packet type
identifier “RREP”, the identities of the nodes in the route
ðRÞ, h0, the destination node’s certificate, and the nodes’
authentication code.h0 is the root of the hash chain
created by the destination node 6/17/201617 GNIT_CSE(M.TECH)
BAR Routing Protocol
RREQ: The RREQ packet contains IDS; IDD;
ts;Hmax, the source node’s certificate and
signature ðSigSÞ, and the number of messages it
needs to send ðErðSÞÞ.
Route selection. After receiving the first RREQ
packet, the destination node waits for a while to
receive more RREQ packets if there are. Then, it
selects the best available route if a set of feasible
routes are found.
RREP: This phase is identical to that of the SRR
routing protocol 6/17/201618 GNIT_CSE(M.TECH)
SECURITY ANALYSIS
 Securing the payment and trust calculation are based
on the following well known cryptographic properties:
1) forging or modifying a signature without knowing the
private key is infeasible
2) deriving the private keys from the public ones is
infeasible
3) computing the hash value of a signature without
computing the signature is infeasible.
4) computing the hash function’s input from its output is
infeasible.
6/17/201619 GNIT_CSE(M.TECH)
6/17/201620
GNIT_CSE(M.TECH)
Cont..
6/17/201621 GNIT_CSE(M.TECH)
Advantages
 Data is fully secure
 Can not be hacked by hacker
6/17/201622 GNIT_CSE(M.TECH)
Conclusion
We have proposed E-STAR that uses payment/trust systems with trust-
based and energy-aware routing protocol to establish stable/reliable routes in
HMWNs. E-STAR stimulates the nodes not only to relay other’s packets but
also to maintain the route stability. It also punishes the nodes that report
incorrect energy capability by decreasing their chance to be selected by the
routing protocol. We have proposed SRR and BAR routing protocols and
evaluated them in terms of overhead and route stability. Our protocols can
make informed routing decisions by considering multiple factors, including
the route length, the route reliability based on the node’s past behavior, and
the route lifetime based on the node’s energy capability. SRR establishes
routes that can meet source node’s trust/energy requirements. It is useful in
establishing routes that avoid the low-trust nodes, e.g., malicious nodes, with
low overhead. For BAR, destination nodes establish the most reliable routes
but with more overhead comparing to SRR. The analytical results have
demonstrated that E-STAR can secure the payment and trust calculation
without false accusations. Moreover, the simulation results have
6/17/201623 GNIT_CSE(M.TECH)
References
[1] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-
Generation Wireless Access Networks,” Bell Labs Technical J., vol. 13, no. 4,
pp. 175-193, 2009.
[2] C. Chou, D. Wei, C. Kuo, and K. Naik, “An Efficient Anonymous
Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc
Networks,” IEEE J. Selected Areas in Comm., vol. 25, no. 1, Jan. 2007.
[3] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in
Mobile Ad Hoc Networks,” Proc. ACM MobiCom’00, pp. 255-265, Aug. 2000.
[4] X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak, “Autoregressive
Trust Management in Wireless Ad Hoc Networks,” Ad Hoc & Sensor Wireless
Networks, vol. 16, no. 1-3, pp. 229-242, 2012.
[5] G. Indirania and K. Selvakumara, “A Swarm-Based Efficient Distributed
Intrusion Detection System for Mobile Ad Hoc Networks (MANET),” Int’l J.
Parallel, Emergent and Distributed Systems, vol. 29, pp. 90-103, 2014.
[6] H. Li and M. Singhal, “Trust Management in Distributed Systems,” Computer,
vol. 40, no. 2, pp. 45-53, Feb. 2007.
6/17/201624 GNIT_CSE(M.TECH)
Thank
you!!
6/17/201625 GNIT_CSE(M.TECH)

More Related Content

What's hot

An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...IAEME Publication
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Yayah Zakaria
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTCLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTijassn
 
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks Reliability Evaluation and Analysis of Mobile Ad Hoc Networks
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks IJECEIAES
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONIAEME Publication
 
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...IJEACS
 
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...ijcncs
 
Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyData Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyIJCNCJournal
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsIAEME Publication
 
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...Eswar Publications
 

What's hot (19)

Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Ns2422412247
Ns2422412247Ns2422412247
Ns2422412247
 
An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...
 
Ant
AntAnt
Ant
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
 
ant2
ant2ant2
ant2
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTCLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
 
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks Reliability Evaluation and Analysis of Mobile Ad Hoc Networks
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
 
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
 
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
 
Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyData Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane ts
 
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
 

Viewers also liked

Secure and reliable routing protocols for heterogeneous multihop wireless net...
Secure and reliable routing protocols for heterogeneous multihop wireless net...Secure and reliable routing protocols for heterogeneous multihop wireless net...
Secure and reliable routing protocols for heterogeneous multihop wireless net...Pvrtechnologies Nellore
 
Turundus ja müügistrateegiad 2012
Turundus ja müügistrateegiad 2012Turundus ja müügistrateegiad 2012
Turundus ja müügistrateegiad 2012Kristi Aru
 
Creating Animated PPT presentations
Creating Animated PPT presentationsCreating Animated PPT presentations
Creating Animated PPT presentationsSOAP Presentations
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 

Viewers also liked (6)

Secure and reliable routing protocols for heterogeneous multihop wireless net...
Secure and reliable routing protocols for heterogeneous multihop wireless net...Secure and reliable routing protocols for heterogeneous multihop wireless net...
Secure and reliable routing protocols for heterogeneous multihop wireless net...
 
Turundus ja müügistrateegiad 2012
Turundus ja müügistrateegiad 2012Turundus ja müügistrateegiad 2012
Turundus ja müügistrateegiad 2012
 
Secure communication over optical networks
Secure communication over optical networksSecure communication over optical networks
Secure communication over optical networks
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Creating Animated PPT presentations
Creating Animated PPT presentationsCreating Animated PPT presentations
Creating Animated PPT presentations
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 

Similar to Secure and reliable routing protocols

secureandreliableroutingprotocols-160617064034.pdf
secureandreliableroutingprotocols-160617064034.pdfsecureandreliableroutingprotocols-160617064034.pdf
secureandreliableroutingprotocols-160617064034.pdfNajafAli87
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksSecure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksIRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivityiosrjce
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networkscsandit
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
 

Similar to Secure and reliable routing protocols (20)

secureandreliableroutingprotocols-160617064034.pdf
secureandreliableroutingprotocols-160617064034.pdfsecureandreliableroutingprotocols-160617064034.pdf
secureandreliableroutingprotocols-160617064034.pdf
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksSecure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc Networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
I017616468
I017616468I017616468
I017616468
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networks
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
 

More from Devdutta Chakrabarti

More from Devdutta Chakrabarti (6)

Internet of things
Internet of thingsInternet of things
Internet of things
 
Transmission efficient ppt
Transmission efficient pptTransmission efficient ppt
Transmission efficient ppt
 
Bluejack seminar by Devdutta Chakrabarti
Bluejack seminar by Devdutta ChakrabartiBluejack seminar by Devdutta Chakrabarti
Bluejack seminar by Devdutta Chakrabarti
 
Cellular automata by Devdutta Chakrabarti
Cellular automata by Devdutta ChakrabartiCellular automata by Devdutta Chakrabarti
Cellular automata by Devdutta Chakrabarti
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Cloud by dev
Cloud by devCloud by dev
Cloud by dev
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

Secure and reliable routing protocols

  • 1. GURUNANAK INSTITUTE OF TECHNOLOGY SODEPUR -700114 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING(MTECH.) Thesis on:- “Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks” Under The Guidance Of Mrs. SRABANI KUNDU BY:- DEVDUTTA CHAKRABARTI Roll No-14311214001
  • 2. Contents  Wireless Ensor networks  Advantage and Disadvantage of WSN  Java  Literature Survey  Introduction  E-Star Architecture  Related Works  Comparison  Existing System  Proposed System  System Models  Security Analysis  Route Establishment Phase  Test Cases  Advantages  Conclusion References 6/17/2016 2 GNIT_CSE(M.TECH)
  • 3. Wireless Sensor Networks  A wireless sensor network (WSN) are spatially distributed autonomous sensors to monitor physical conditions such as temperature, sound, pressure etc. and to cooperatively pass their data through the network to a main location.  A collection of sensing devices that can communicate wirelessly. 6/17/20163 GNIT_CSE(M.TECH)
  • 4. Advantages of WSN  It avoids a lot of wiring .  It can accommodate new devices at any time .  It's flexible to go through physical partitions .  It can be accessed through a centralized monitor 6/17/20164 GNIT_CSE(M.TECH)
  • 5. Disadvantages of WSN  Lower speed compared to wired network.  Still Costly at large.  More complex to configure than wired network.  It does not reduce costs for installation of sensors. 6/17/20165 GNIT_CSE(M.TECH)
  • 6. Introduction to Java  Java  Features of Java 6/17/20166 GNIT_CSE(M.TECH)
  • 7. Literature Survey  An Efficient Anonymous Communication Protocol for Wireless Sensor Networks  A Survey on Various Manet Routing Protocols Based on Anonymous Communication  Selective Acknowledgement Scheme to Mitigate Routing Misbehavior in Mobile Ad Hoc Network  LogitTrust: A Logit Regression-based Trust Model for Mobile Ad Hoc Networks  Performance of Swarm Based Intrusion Detection System Under Different Mobility Conditions in MANET  The Role of Trust Management in Distributed Systems Security  An Acknowledgement-Based Approach for the Detection of Routing Misbehaviour in MANETS 6/17/20167 GNIT_CSE(M.TECH)
  • 8. Introduction  In multihop wireless networks, when a mobile node wants to communicate with a destination, it relies on the other nodes to forward the packets. This multihop packet transmission can extend the network coverage area using limited power and improve area distance efficiency.  E-STAR integrates the payment and trust systems with the routing protocol with the goal of enhancing route reliability and stability.  The payment system describes to charge the nodes that send packets and reward those forwarding packets.6/17/20168 GNIT_CSE(M.TECH)
  • 10. E-Star  E-STAR has three main phases. 1. Data Transmission phase:- the source node sends messages to the destination node. 2. Update Credit-Account and Trust Values phases:- TP determines the charges and rewards of the nodes and updates the node’s trust values. 3. Route Establishment phase:- Trust-based and energy-aware routing protocol establishes stable communication routes. 6/17/201610 GNIT_CSE(M.TECH)
  • 11. Related works Reputation-Based Schemes  Reputation-based schemes attempt to identify the malicious nodes that drop packets with a rate more than a predefined threshold in order to avoid them in routing. these schemes cannot guarantee route stability or reliability in HMWNs. Payment Schemes  Payment schemes use credits to encourage the nodes to relay others’ packets . Since relaying packets consumes energy and other resources, packet relaying is treated as a service which can be charged. The nodes earn credits for relaying others’ packets and spend them to get their packets delivered. Trust system  The main goal is to enable the nodes to indirectly build trust relationships using exclusively monitored information. Comparison  Different from reputation-based schemes that aim to identify the malicious nodes, E- STAR does not suffer from false accusations because it aims to identify the competent nodes in packet relaying and select them in routing. 6/17/2016 11 GNIT_CSE(M.TECH)
  • 13. Existing System  The multihop wireless network implemented in many useful applications such as data sharing and multimedia data transmission. It can establish a network to communicate, distribute files, and share information.  Disadvantages of Existing System:  Less security.  Probability of breaking the route is highly possible.  Nodes do not have sufficient energy. 6/17/201613 GNIT_CSE(M.TECH)
  • 14. Proposed System  We develop two routing protocols to direct traffic through those highly-trusted nodes having sufficient energy to minimize the probability of breaking the route. By this way, E-STAR can stimulate the nodes not only to relay packets, but also to maintain route stability and report correct battery energy capability. Advantages of Proposed System:  Reduce the probability of breaking the routes.  E-STAR integration can deliver messages through reliable routes and allow the source nodes to prescribe their required level of trust. 6/17/201614 GNIT_CSE(M.TECH)
  • 15. SYSTEM MODELS  Network Model The considered HMWN has mobile nodes and offline trusted party whose public key is known to all the nodes. The mobile nodes have different hardware and energy capabilities.  Adversary Model The adversaries have full control on their nodes. They can change the node’s normal operation and obtain the cryptographic credentials. 6/17/201615 GNIT_CSE(M.TECH)
  • 16. Route Establishment Phase  In this section, we present two routing protocols called the shortest reliable route and the best available route. SRR establishes the shortest route that can satisfy the source node’s trust, energy, and route-length requirements, but the destination node selects the best route in the BAR protocol.  The routing protocols have three processes: 1) route request packet (RREQ) delivery 2) Route selection and 6/17/201616 GNIT_CSE(M.TECH)
  • 17. Srr  RREQ :It contains the packet type identifier “RREQ”, the identities of the source and destination nodes IDS and IDD, the maximum number of intermediate nodes (Hmax), the time stamp of the route establishment (ts), the trust and energy requirements ðTr ¼ ½tð1Þ; tð2Þ; tð3Þ; tð4Þ and ErÞ, and the source node’s signature and certificate. Hmax can limit the propagation area of the packet and ts can ensure the freshness of the request.  Route selection: If there is a route that can satisfy the source node’s requirements, the destination node receives at least one RREQ packet.  RREP: The RREP packet contains the packet type identifier “RREP”, the identities of the nodes in the route ðRÞ, h0, the destination node’s certificate, and the nodes’ authentication code.h0 is the root of the hash chain created by the destination node 6/17/201617 GNIT_CSE(M.TECH)
  • 18. BAR Routing Protocol RREQ: The RREQ packet contains IDS; IDD; ts;Hmax, the source node’s certificate and signature ðSigSÞ, and the number of messages it needs to send ðErðSÞÞ. Route selection. After receiving the first RREQ packet, the destination node waits for a while to receive more RREQ packets if there are. Then, it selects the best available route if a set of feasible routes are found. RREP: This phase is identical to that of the SRR routing protocol 6/17/201618 GNIT_CSE(M.TECH)
  • 19. SECURITY ANALYSIS  Securing the payment and trust calculation are based on the following well known cryptographic properties: 1) forging or modifying a signature without knowing the private key is infeasible 2) deriving the private keys from the public ones is infeasible 3) computing the hash value of a signature without computing the signature is infeasible. 4) computing the hash function’s input from its output is infeasible. 6/17/201619 GNIT_CSE(M.TECH)
  • 22. Advantages  Data is fully secure  Can not be hacked by hacker 6/17/201622 GNIT_CSE(M.TECH)
  • 23. Conclusion We have proposed E-STAR that uses payment/trust systems with trust- based and energy-aware routing protocol to establish stable/reliable routes in HMWNs. E-STAR stimulates the nodes not only to relay other’s packets but also to maintain the route stability. It also punishes the nodes that report incorrect energy capability by decreasing their chance to be selected by the routing protocol. We have proposed SRR and BAR routing protocols and evaluated them in terms of overhead and route stability. Our protocols can make informed routing decisions by considering multiple factors, including the route length, the route reliability based on the node’s past behavior, and the route lifetime based on the node’s energy capability. SRR establishes routes that can meet source node’s trust/energy requirements. It is useful in establishing routes that avoid the low-trust nodes, e.g., malicious nodes, with low overhead. For BAR, destination nodes establish the most reliable routes but with more overhead comparing to SRR. The analytical results have demonstrated that E-STAR can secure the payment and trust calculation without false accusations. Moreover, the simulation results have 6/17/201623 GNIT_CSE(M.TECH)
  • 24. References [1] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next- Generation Wireless Access Networks,” Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009. [2] C. Chou, D. Wei, C. Kuo, and K. Naik, “An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 25, no. 1, Jan. 2007. [3] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom’00, pp. 255-265, Aug. 2000. [4] X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak, “Autoregressive Trust Management in Wireless Ad Hoc Networks,” Ad Hoc & Sensor Wireless Networks, vol. 16, no. 1-3, pp. 229-242, 2012. [5] G. Indirania and K. Selvakumara, “A Swarm-Based Efficient Distributed Intrusion Detection System for Mobile Ad Hoc Networks (MANET),” Int’l J. Parallel, Emergent and Distributed Systems, vol. 29, pp. 90-103, 2014. [6] H. Li and M. Singhal, “Trust Management in Distributed Systems,” Computer, vol. 40, no. 2, pp. 45-53, Feb. 2007. 6/17/201624 GNIT_CSE(M.TECH)