SlideShare a Scribd company logo
Secure Location BasedSecure Location Based
Routing For Mobile AdHocRouting For Mobile AdHoc
NetworksNetworks
Nitish Srivastava(9910103552)Nitish Srivastava(9910103552)
Sanchit Khurana (9910103519)Sanchit Khurana (9910103519)
INTRODUCTIONINTRODUCTION
• An ad-hoc mobile network is a collection of mobile nodes that areAn ad-hoc mobile network is a collection of mobile nodes that are
dynamically and arbitrarily located in such a manner that thedynamically and arbitrarily located in such a manner that the
interconnections between nodes are capable of changing on a continualinterconnections between nodes are capable of changing on a continual
basis.basis.
• The primary goal of such an ad-hoc network routing protocol is correct andThe primary goal of such an ad-hoc network routing protocol is correct and
efficient route establishment between a pair of nodes so that messages mayefficient route establishment between a pair of nodes so that messages may
be delivered in a timely manner.be delivered in a timely manner.
A short literature study over papers on ad hoc networking shows that manyA short literature study over papers on ad hoc networking shows that many
of the new generation ad hoc networking proposals are not yet able toof the new generation ad hoc networking proposals are not yet able to
address the security problems and they face.address the security problems and they face.
Thus, a proof of concept has been provided in the following report whichThus, a proof of concept has been provided in the following report which
uses the location based routing scheme to locate nodes within range ofuses the location based routing scheme to locate nodes within range of
each other and thus pass messages or files as and when requiredeach other and thus pass messages or files as and when required
EXISTING SYSTEMEXISTING SYSTEM
• The first problem is the requirement of a third fixed partyThe first problem is the requirement of a third fixed party
(a base station) that will hand over the offered traffic(a base station) that will hand over the offered traffic
from a station to another, as illustrated in Figure 1. Thefrom a station to another, as illustrated in Figure 1. The
same entity will regulate the attribution of radiosame entity will regulate the attribution of radio
resources, for instance. When a node S wishes toresources, for instance. When a node S wishes to
communicate to a node D, the former notifies the basecommunicate to a node D, the former notifies the base
station, which eventually establishes a communicationstation, which eventually establishes a communication
with the destination node. At this point, thewith the destination node. At this point, the
communicating nodes do not need to know of a route forcommunicating nodes do not need to know of a route for
one to each other. All that matters is that both nodesone to each other. All that matters is that both nodes
source and destination are within the transmission rangesource and destination are within the transmission range
of the base station. If one of them fails to fulfill thisof the base station. If one of them fails to fulfill this
condition, the communication will abort.condition, the communication will abort.
Pictorial view of the existing System
PROPOSEDPROPOSED SYSTEMSYSTEM
• The second approach, called the Ad-Hoc, doesThe second approach, called the Ad-Hoc, does
not rely on any stationary infra structure. Thenot rely on any stationary infra structure. The
concept behind these infra-structurelessconcept behind these infra-structureless
networks is the collaboration between itsnetworks is the collaboration between its
participating members, i.e, instead of makingparticipating members, i.e, instead of making
data transit through a fixed base station, nodesdata transit through a fixed base station, nodes
consequentially forward data packets from oneconsequentially forward data packets from one
to another until a destination node is finallyto another until a destination node is finally
reached. Typically, a packet may travel throughreached. Typically, a packet may travel through
a number of network points before arriving at itsa number of network points before arriving at its
destination.destination.
DATA SECURITYDATA SECURITY
i) Message Encryptioni) Message Encryption
ii) Message Decryptionii) Message Decryption
DATA SECURITY USING RSADATA SECURITY USING RSA
• Source sends the encrypted data packet to theSource sends the encrypted data packet to the
destination through the route discovered.destination through the route discovered.
• Destination decrypts the data packet receivedDestination decrypts the data packet received
from the source and sends thefrom the source and sends the
acknowledgement.acknowledgement.
EXPAND RING SEARCHEXPAND RING SEARCH
ALGORITHMALGORITHM
CORE RESOLUTIONCORE RESOLUTION
ALGORITHMALGORITHM
Core finding:
If the core node and user defined destination node are
same then it transmit the file to the corresponding
destination node
After route discovery, to find the core node of the system
then compares core node and user defined node in core
class
Re-Core Selection:
To select the re-core node address for finding the
destination address.
Re-Core selection is used when the core process is not
able to find the destination address.
THRESHOLD CRYPTOGRAPHYTHRESHOLD CRYPTOGRAPHY
Threshold cryptography is the process of encrypting the plain text into
cipher text and decrypting the cipher text into original plain text using
the fixed key and math function. Converted data code can be securely
transmitted over a network. Here the actual content is converted into
Hex-code for transmission.
TESTINGTESTING
Test Cases
Test Id : T1
Input : IP Address of the Destination machine
Expected Output : Connection successfully established
Test Id : T2
Input : Discover route by expand ring search algorithm
Expected Output : Check for the systems in the range of the initiator node
and traverse a path until a successful pat h to the destination is found.
Test Id : T3
Input : Encryption of the message bearing the file to be sent or requested
Expected Output : Implementation of the RSA key Algorithm and
encryption of the message.
Test Id : T4
Input : Decryption of the contents of the message bearing the file at the
receiving or the initiator’s end.
Expected Output : Message received from the containing node is
decrypted at the receiving end.
LIMITATION OF THELIMITATION OF THE
SOLUTIONSOLUTION
No accurate definition of packet size.
The system introduces added communication overhead, since in order for
an edge outer to know the rate at which its packets are leaving the network, it
must exchange feedback with other edge routers.
System sometimes hang due to loss of connection to database.
CONCLUSIONCONCLUSION
The successful transmission of files describes how routing algorithms could be
easily used to reduce the routing overhead in ad hoc networks. These protocols
limit the search for a route to the so-called request zone, determined based on
the expected location of the destination node at the time of route discovery.
Results indicate that using location information results in significantly lower
routing overhead, as compared to an algorithm that does not use location
information. We also suggested several optimizations on the basic LAR
schemes which may improve performance. Further work is required to evaluate
efficacy of these optimizations, and also to develop other ways of using location
information in ad hoc networks, for instance to improve performance of reactive
algorithms such as or to implement location-based multicasting. Security issues
in the transmission were also considered and taken care of by using encrypting
and decrypting techniques which thereby helps in secure transmission of data.
FUTURE WORKFUTURE WORK
There is current and future need for dynamic ad hoc networking technology.
The emerging field of mobile and nomadic computing, with its current
emphasis on mobile IP operation, should gradually broaden and require
highly-adaptive mobile networking technology to effectively manage
multihop, ad hoc network clusters which can operate autonomously or,
more than likely, be attached at some points to the fixed Internet.
The cryptographic algorithm that has been used will be further enhanced
and modified thus providing greater security in terms of routing of
messages and data. Threshold cryptography can now be taken a step
further and SHA-1 algorithm could be implemented in secure transmission
of the data.
THANK YOUTHANK YOU

More Related Content

What's hot

A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
ijasa
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
Editor IJCATR
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
eSAT Publishing House
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...Mumbai Academisc
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
IAEME Publication
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...
ijctet
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
idescitation
 
Ijnsa050211
Ijnsa050211Ijnsa050211
Ijnsa050211
IJNSA Journal
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
IOSR Journals
 
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGAN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
Sreelekshmi S
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
IJNSA Journal
 
Grayhole
GrayholeGrayhole
Grayhole
Kumud Dixit
 
Shortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkShortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless Network
IJERA Editor
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
eSAT Journals
 
Wormhole globecom
Wormhole globecomWormhole globecom
Wormhole globecom
Zep Lao
 
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
pharmaindexing
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
IJNSA Journal
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
pijans
 

What's hot (18)

A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
Ijnsa050211
Ijnsa050211Ijnsa050211
Ijnsa050211
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGAN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
 
Grayhole
GrayholeGrayhole
Grayhole
 
Shortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkShortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless Network
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Wormhole globecom
Wormhole globecomWormhole globecom
Wormhole globecom
 
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 

Viewers also liked

Manet
ManetManet
Mobile adhoc network
Mobile adhoc networkMobile adhoc network
Mobile adhoc network
Subiya Nadar
 
Manet
ManetManet
MANET
MANETMANET
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 

Viewers also liked (8)

Manet
ManetManet
Manet
 
Mobile adhoc network
Mobile adhoc networkMobile adhoc network
Mobile adhoc network
 
Manet
ManetManet
Manet
 
MANET
MANETMANET
MANET
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Manet
ManetManet
Manet
 

Similar to SECURE LOCATION BASED ROUTING FOR MANETS

“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
chennaijp
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
Sharon Roberts
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
Amanda Brady
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
Iaetsd Iaetsd
 
Packet switching
Packet switchingPacket switching
Packet switchingVikash Dhal
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...
swathi78
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
cscpconf
 
E0942531
E0942531E0942531
E0942531
IOSR Journals
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
Editor IJMTER
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
IJCNCJournal
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologies
evelyn
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networksevelyn
 
Network the 4th layer
Network the 4th layerNetwork the 4th layer
Network the 4th layer
kachbourimed
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
IJERA Editor
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
IJERA Editor
 

Similar to SECURE LOCATION BASED ROUTING FOR MANETS (20)

“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
Packet switching
Packet switchingPacket switching
Packet switching
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
E0942531
E0942531E0942531
E0942531
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Router bridge
Router bridgeRouter bridge
Router bridge
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologies
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networks
 
Network the 4th layer
Network the 4th layerNetwork the 4th layer
Network the 4th layer
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 

Recently uploaded

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
Nettur Technical Training Foundation
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 

Recently uploaded (20)

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 

SECURE LOCATION BASED ROUTING FOR MANETS

  • 1. Secure Location BasedSecure Location Based Routing For Mobile AdHocRouting For Mobile AdHoc NetworksNetworks Nitish Srivastava(9910103552)Nitish Srivastava(9910103552) Sanchit Khurana (9910103519)Sanchit Khurana (9910103519)
  • 2. INTRODUCTIONINTRODUCTION • An ad-hoc mobile network is a collection of mobile nodes that areAn ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that thedynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continualinterconnections between nodes are capable of changing on a continual basis.basis. • The primary goal of such an ad-hoc network routing protocol is correct andThe primary goal of such an ad-hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages mayefficient route establishment between a pair of nodes so that messages may be delivered in a timely manner.be delivered in a timely manner. A short literature study over papers on ad hoc networking shows that manyA short literature study over papers on ad hoc networking shows that many of the new generation ad hoc networking proposals are not yet able toof the new generation ad hoc networking proposals are not yet able to address the security problems and they face.address the security problems and they face. Thus, a proof of concept has been provided in the following report whichThus, a proof of concept has been provided in the following report which uses the location based routing scheme to locate nodes within range ofuses the location based routing scheme to locate nodes within range of each other and thus pass messages or files as and when requiredeach other and thus pass messages or files as and when required
  • 3. EXISTING SYSTEMEXISTING SYSTEM • The first problem is the requirement of a third fixed partyThe first problem is the requirement of a third fixed party (a base station) that will hand over the offered traffic(a base station) that will hand over the offered traffic from a station to another, as illustrated in Figure 1. Thefrom a station to another, as illustrated in Figure 1. The same entity will regulate the attribution of radiosame entity will regulate the attribution of radio resources, for instance. When a node S wishes toresources, for instance. When a node S wishes to communicate to a node D, the former notifies the basecommunicate to a node D, the former notifies the base station, which eventually establishes a communicationstation, which eventually establishes a communication with the destination node. At this point, thewith the destination node. At this point, the communicating nodes do not need to know of a route forcommunicating nodes do not need to know of a route for one to each other. All that matters is that both nodesone to each other. All that matters is that both nodes source and destination are within the transmission rangesource and destination are within the transmission range of the base station. If one of them fails to fulfill thisof the base station. If one of them fails to fulfill this condition, the communication will abort.condition, the communication will abort.
  • 4. Pictorial view of the existing System
  • 5. PROPOSEDPROPOSED SYSTEMSYSTEM • The second approach, called the Ad-Hoc, doesThe second approach, called the Ad-Hoc, does not rely on any stationary infra structure. Thenot rely on any stationary infra structure. The concept behind these infra-structurelessconcept behind these infra-structureless networks is the collaboration between itsnetworks is the collaboration between its participating members, i.e, instead of makingparticipating members, i.e, instead of making data transit through a fixed base station, nodesdata transit through a fixed base station, nodes consequentially forward data packets from oneconsequentially forward data packets from one to another until a destination node is finallyto another until a destination node is finally reached. Typically, a packet may travel throughreached. Typically, a packet may travel through a number of network points before arriving at itsa number of network points before arriving at its destination.destination.
  • 6. DATA SECURITYDATA SECURITY i) Message Encryptioni) Message Encryption ii) Message Decryptionii) Message Decryption DATA SECURITY USING RSADATA SECURITY USING RSA • Source sends the encrypted data packet to theSource sends the encrypted data packet to the destination through the route discovered.destination through the route discovered. • Destination decrypts the data packet receivedDestination decrypts the data packet received from the source and sends thefrom the source and sends the acknowledgement.acknowledgement.
  • 7. EXPAND RING SEARCHEXPAND RING SEARCH ALGORITHMALGORITHM
  • 8. CORE RESOLUTIONCORE RESOLUTION ALGORITHMALGORITHM Core finding: If the core node and user defined destination node are same then it transmit the file to the corresponding destination node After route discovery, to find the core node of the system then compares core node and user defined node in core class Re-Core Selection: To select the re-core node address for finding the destination address. Re-Core selection is used when the core process is not able to find the destination address.
  • 9. THRESHOLD CRYPTOGRAPHYTHRESHOLD CRYPTOGRAPHY Threshold cryptography is the process of encrypting the plain text into cipher text and decrypting the cipher text into original plain text using the fixed key and math function. Converted data code can be securely transmitted over a network. Here the actual content is converted into Hex-code for transmission.
  • 10. TESTINGTESTING Test Cases Test Id : T1 Input : IP Address of the Destination machine Expected Output : Connection successfully established Test Id : T2 Input : Discover route by expand ring search algorithm Expected Output : Check for the systems in the range of the initiator node and traverse a path until a successful pat h to the destination is found. Test Id : T3 Input : Encryption of the message bearing the file to be sent or requested Expected Output : Implementation of the RSA key Algorithm and encryption of the message. Test Id : T4 Input : Decryption of the contents of the message bearing the file at the receiving or the initiator’s end. Expected Output : Message received from the containing node is decrypted at the receiving end.
  • 11. LIMITATION OF THELIMITATION OF THE SOLUTIONSOLUTION No accurate definition of packet size. The system introduces added communication overhead, since in order for an edge outer to know the rate at which its packets are leaving the network, it must exchange feedback with other edge routers. System sometimes hang due to loss of connection to database.
  • 12. CONCLUSIONCONCLUSION The successful transmission of files describes how routing algorithms could be easily used to reduce the routing overhead in ad hoc networks. These protocols limit the search for a route to the so-called request zone, determined based on the expected location of the destination node at the time of route discovery. Results indicate that using location information results in significantly lower routing overhead, as compared to an algorithm that does not use location information. We also suggested several optimizations on the basic LAR schemes which may improve performance. Further work is required to evaluate efficacy of these optimizations, and also to develop other ways of using location information in ad hoc networks, for instance to improve performance of reactive algorithms such as or to implement location-based multicasting. Security issues in the transmission were also considered and taken care of by using encrypting and decrypting techniques which thereby helps in secure transmission of data.
  • 13. FUTURE WORKFUTURE WORK There is current and future need for dynamic ad hoc networking technology. The emerging field of mobile and nomadic computing, with its current emphasis on mobile IP operation, should gradually broaden and require highly-adaptive mobile networking technology to effectively manage multihop, ad hoc network clusters which can operate autonomously or, more than likely, be attached at some points to the fixed Internet. The cryptographic algorithm that has been used will be further enhanced and modified thus providing greater security in terms of routing of messages and data. Threshold cryptography can now be taken a step further and SHA-1 algorithm could be implemented in secure transmission of the data.