SlideShare a Scribd company logo
Modified Topology-Hiding Multipath
Routing Protocol: Solution to the Topology Exposure
Problem in MANET
Presented By:
Akshay S. Phalke
1
Overview
• Introduction
• Objectives
• Literature Survey
• Problem Statement
• Mathematical Model
• System Architecture & Algorithm
• Results
• Conclusion & Future work
• References
2
Introduction
• Mobile ad hoc network is open wireless
network.
• Nodes are in mobile state.
• It is dynamically changing topology and lack
infrastructure network
3
Introduction (contd..)
Fig 1. Introduction Of MANET
4
Objectives
• Hide topology-not carry the link information
in route messages.
• Find node-disjoint routes-After construction of
any route to the destination it advertises the set
of node in that path.
• Exclude unreliable routes-M-THMR able to
detect the malicious as well as faulty node.
5
Literature Survey
6
Problem Statement
• To present the solution for topology exposure
problem and discussed its mitigation
technique.
7
Mathematical Model
8
System Architecture
9
MODIFIED TOPOLOGY-HIDING MULTIPATH
ROUTING PROTOCOL(M-THMR)
• ExNodeSet greatly reduces the probability that a
node is placed on more than one route.
• Every node independently makes routing
decisions by checking the reverse routes.
• Only the nodes that are placed on established
routes needs to rebroadcast the RREP message.
• Only two routes in routing table remains finally,
which means that the established routes are
bidirectional.
10
Proposed System: Algorithm
1.M-THMR:
Algorithm 1: Trust Value Calculation for Secure Route Discovery Mechanism:
• Input: Ti (trust value of nodes)
• Output: FaultNode [ ], TrustNode [ ].
• N [ ] = GetNeighbour[ ];//find all neighboring nodes
• For all node i in N [ ]
• CalculateTrust[ ]// obtain trust
• UpdateTrust () //
• If(Ti<TThreshold)
• FaultNode U node(i)
• else
• TrustNode U node(i)
• End for
11
Algorithm
• Algorithm 2: M-THMR Protocol at node I
• Method1: Route request Phase
• Upon receiving RREQ < S,D, seq, hopCt > from nj :
• if ni == D then
• set a timer TD
• /∗ enter Route Reply Phase upon timeout∗/
• return
• end if
• Insert < S,nj, hopCt + 1 > into RT /∗ reverse route ∗/
• if < S,seq > doesn’t exist in SNT then
• Insert < S,seq > into SNT
• if ni! = D then
• Rebroadcast RREQ < S,D, seq, hopCt + 1 >
• end if
• end if
12
Algorithm
• Method2: Route reply Phase
• Upon receiving RREP < S,D, seq, hopCt,
• exNodeSet, nextNode > from nj :
• for each route R in RT do
• if R.D == S and R.nextHop ∈ exNodeSet then
• Remove route R
• end if
• end for
• if nextNode == NULL or nextNode == ni then
• Insert < D,nj, hopCt + 1 > into RT
• /∗ two temporary parameters ∗/
• Set mHop = 65535 and R1 = NULL
• for each route R in RT do
• if R.D == S and R.hopCount < mHop then
• Set mHop = R.hopCount and R1 = R
• end if
• end for
13
Algorithm
• for each route R in RT do
• /∗ remove all reverse routes to source ∗/
• if R.D == S then
• Remove route R
• end if
• end for
• if R1! = NULL then
• Insert R1 into RT
• nextNode = R1.nextHop
• exNodeSet = {R1.nextHop} ∪ exNodeSet
• Broadcast RREP < S,D, seq, hopCt + 1,
• exNodeSet, nextNode >
• end if
• end if
14
Algorithm
• Method3: Route Probe Phase
• Upon Timeout at the Destination:
• Set exNodeSetmHop = NULL
• for each route R in RT do
• exNodeSet = {R.nextHop} ∪ exNodeSet
• end for
• Broadcast RREP < S,D, 0, exNodeSet,NULL >
15
Implementation Requirement
•Software Requirement:
i.MFS(Meta Exploid Frame Work)
ii.Netscan (Network Scan Tools)
iii.NS 2.35
iv.CAINK (Packet Inspect)
v.VMware player
• OS: Red Hat Enterprise Linux
• OS: a) Back Track b) Kali ( Hacking O.S.)
•Hardware Requirement:
i.512 Mb RAM, 80 GB HDD
ii.2 GHz Processor
iii.Packet Builder Radiator
16
Simulation Parameters
Table No 1. Simulation Parameters
17
Results
18
Results
19
Conclusion
• Proposed System states that
• M-THMR doesn’t degrade the performance
when there is no attack.
• In the adversarial scenario, the simulation
results show that M-THMR can resist attacks.
20
Future Work
• As for the future work, we plan to design the
data transmission strategy with fault detection
mechanism based on M-THMR
21
References
• Yujun Zhang, Guiling Wang, Qi Hu, "Design & Performance Study of a
Topology-Hiding Multipath routing Protocol for Mobile Ad Hoc networks”
IEEE 2014.
• C. K. Toh, A. N. Le, et al. Load balanced routing protocols for ad hoc
mobile wireless networks. IEEE Communications Magazine, 47(8):78–84,
2011.
• M. K. Marina, and S. R. Das. Ad Hoc On-demand Multipath Distance
Vector Routing. Wiley Wireless Communications and Mobile Computing,
6(7):969–988, 2014.
• L. Abusalah, A. Khokhar, et al. A Survey of Secure Mobile Ad Hoc
Routing Protocols. IEEE Communications Surveys and Tutorials,
10(4):78–93, 2013.
• E. Gerhards-Padilla, N. Aschenbruck, et al. Detecting Black Hole Attacks
in Tactical MANETs Using Topology Graphs. IEEE Conference on Local
Computer Networks (LCN), pages 1043–1052, 2011.
22
Thank you
Suggestions Are Welcomed…
23

More Related Content

What's hot

Addressing mode and instruction set using 8051
Addressing mode and instruction set using 8051Addressing mode and instruction set using 8051
Addressing mode and instruction set using 8051
logesh waran
 
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Amr E. Mohamed
 
Some other Importent Question (Mix)
Some other Importent Question (Mix)Some other Importent Question (Mix)
Some other Importent Question (Mix)
prabhatjon
 
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
Hsien-Hsin Sean Lee, Ph.D.
 
A Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB SimulinkA Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB Simulink
Jaewook. Kang
 
Pt 51 kit - Peripheral self-test
Pt 51 kit - Peripheral self-testPt 51 kit - Peripheral self-test
Pt 51 kit - Peripheral self-test
rajbabureliance
 
Programmable Logic Array(PLA), digital circuits
Programmable Logic Array(PLA), digital circuits Programmable Logic Array(PLA), digital circuits
Programmable Logic Array(PLA), digital circuits
warda aziz
 
ClockSystem: Embedding Time in Smalltalk
ClockSystem: Embedding Time in SmalltalkClockSystem: Embedding Time in Smalltalk
ClockSystem: Embedding Time in Smalltalk
ESUG
 
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
Peter Breuer
 
Programmable array-logic-and-programmable-logic-array
Programmable array-logic-and-programmable-logic-arrayProgrammable array-logic-and-programmable-logic-array
Programmable array-logic-and-programmable-logic-array
Jher Carlson Atasan
 
PopMAG: Pop Music Accompaniment Generation
PopMAG: Pop Music Accompaniment GenerationPopMAG: Pop Music Accompaniment Generation
PopMAG: Pop Music Accompaniment Generation
ivaderivader
 
Feedback and Control Systems
Feedback and Control SystemsFeedback and Control Systems
Feedback and Control Systems
Kristina Badec
 
Modeling and Mining Sequential Data
Modeling and Mining Sequential DataModeling and Mining Sequential Data
Modeling and Mining Sequential Data
Philipp Singer
 
8051 micro controllers Instruction set
8051 micro controllers Instruction set 8051 micro controllers Instruction set
8051 micro controllers Instruction set
Nitin Ahire
 
Instruction types
Instruction typesInstruction types
Instruction types
JyotiprakashMishra18
 
8051 Timers
8051 Timers8051 Timers
Basic openfoa mtutorialsguide
Basic openfoa mtutorialsguideBasic openfoa mtutorialsguide
Basic openfoa mtutorialsguide
Luis Fernando Rua Mojica
 
Pipeline stalling in vhdl
Pipeline stalling in vhdlPipeline stalling in vhdl
Pipeline stalling in vhdlSai Malleswar
 
DickeyS_presentation_2015_3_26_2_1
DickeyS_presentation_2015_3_26_2_1DickeyS_presentation_2015_3_26_2_1
DickeyS_presentation_2015_3_26_2_1Sergey Dickey
 

What's hot (20)

Addressing mode and instruction set using 8051
Addressing mode and instruction set using 8051Addressing mode and instruction set using 8051
Addressing mode and instruction set using 8051
 
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
 
Some other Importent Question (Mix)
Some other Importent Question (Mix)Some other Importent Question (Mix)
Some other Importent Question (Mix)
 
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
 
A Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB SimulinkA Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB Simulink
 
Pt 51 kit - Peripheral self-test
Pt 51 kit - Peripheral self-testPt 51 kit - Peripheral self-test
Pt 51 kit - Peripheral self-test
 
Programmable Logic Array(PLA), digital circuits
Programmable Logic Array(PLA), digital circuits Programmable Logic Array(PLA), digital circuits
Programmable Logic Array(PLA), digital circuits
 
ClockSystem: Embedding Time in Smalltalk
ClockSystem: Embedding Time in SmalltalkClockSystem: Embedding Time in Smalltalk
ClockSystem: Embedding Time in Smalltalk
 
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
 
Programmable array-logic-and-programmable-logic-array
Programmable array-logic-and-programmable-logic-arrayProgrammable array-logic-and-programmable-logic-array
Programmable array-logic-and-programmable-logic-array
 
microprocessors
microprocessorsmicroprocessors
microprocessors
 
PopMAG: Pop Music Accompaniment Generation
PopMAG: Pop Music Accompaniment GenerationPopMAG: Pop Music Accompaniment Generation
PopMAG: Pop Music Accompaniment Generation
 
Feedback and Control Systems
Feedback and Control SystemsFeedback and Control Systems
Feedback and Control Systems
 
Modeling and Mining Sequential Data
Modeling and Mining Sequential DataModeling and Mining Sequential Data
Modeling and Mining Sequential Data
 
8051 micro controllers Instruction set
8051 micro controllers Instruction set 8051 micro controllers Instruction set
8051 micro controllers Instruction set
 
Instruction types
Instruction typesInstruction types
Instruction types
 
8051 Timers
8051 Timers8051 Timers
8051 Timers
 
Basic openfoa mtutorialsguide
Basic openfoa mtutorialsguideBasic openfoa mtutorialsguide
Basic openfoa mtutorialsguide
 
Pipeline stalling in vhdl
Pipeline stalling in vhdlPipeline stalling in vhdl
Pipeline stalling in vhdl
 
DickeyS_presentation_2015_3_26_2_1
DickeyS_presentation_2015_3_26_2_1DickeyS_presentation_2015_3_26_2_1
DickeyS_presentation_2015_3_26_2_1
 

Similar to Topology hiding Multipath Routing Protocol in MANET

FPGA_Logic.pdf
FPGA_Logic.pdfFPGA_Logic.pdf
FPGA_Logic.pdf
wafawafa52
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
Jayaprasanna4
 
Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)
Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)
Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)
Takahiro Harada
 
Switching units
Switching unitsSwitching units
Switching units
Syed Zaid Irshad
 
routing
routingrouting
routing
radhika477746
 
Routing
RoutingRouting
Routing
Saima Azam
 
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
aishwaryaarrao3
 
Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)kike2005
 
Lucio marcenaro tue summer_school
Lucio marcenaro tue summer_schoolLucio marcenaro tue summer_school
Lucio marcenaro tue summer_schoolJun Hu
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
Mohsin Ali
 
destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...
Ashish Gupta
 
Network_Layer.ppt
Network_Layer.pptNetwork_Layer.ppt
Network_Layer.ppt
RajSingh52036
 
4g lte matlab
4g lte matlab4g lte matlab
4g lte matlab
Hakim Zentani
 
Shortest path algorithm
Shortest  path algorithmShortest  path algorithm
Shortest path algorithm
Subrata Kumer Paul
 
project_NathanWendt
project_NathanWendtproject_NathanWendt
project_NathanWendtNathan Wendt
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRP
Dmitry Figol
 
PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...
PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...
PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...
Dongmin Lee
 
Queuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depthQueuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depth
IdcIdk1
 
Hadoop classes in mumbai
Hadoop classes in mumbaiHadoop classes in mumbai
Hadoop classes in mumbai
Vibrant Technologies & Computers
 

Similar to Topology hiding Multipath Routing Protocol in MANET (20)

FPGA_Logic.pdf
FPGA_Logic.pdfFPGA_Logic.pdf
FPGA_Logic.pdf
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)
Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)
Introduction to Monte Carlo Ray Tracing, OpenCL Implementation (CEDEC 2014)
 
Switching units
Switching unitsSwitching units
Switching units
 
routing
routingrouting
routing
 
Routing
RoutingRouting
Routing
 
distance_matrix_ch
distance_matrix_chdistance_matrix_ch
distance_matrix_ch
 
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
 
Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)
 
Lucio marcenaro tue summer_school
Lucio marcenaro tue summer_schoolLucio marcenaro tue summer_school
Lucio marcenaro tue summer_school
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...
 
Network_Layer.ppt
Network_Layer.pptNetwork_Layer.ppt
Network_Layer.ppt
 
4g lte matlab
4g lte matlab4g lte matlab
4g lte matlab
 
Shortest path algorithm
Shortest  path algorithmShortest  path algorithm
Shortest path algorithm
 
project_NathanWendt
project_NathanWendtproject_NathanWendt
project_NathanWendt
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRP
 
PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...
PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...
PRM-RL: Long-range Robotics Navigation Tasks by Combining Reinforcement Learn...
 
Queuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depthQueuing theory and traffic analysis in depth
Queuing theory and traffic analysis in depth
 
Hadoop classes in mumbai
Hadoop classes in mumbaiHadoop classes in mumbai
Hadoop classes in mumbai
 

Recently uploaded

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 

Recently uploaded (20)

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 

Topology hiding Multipath Routing Protocol in MANET

  • 1. Modified Topology-Hiding Multipath Routing Protocol: Solution to the Topology Exposure Problem in MANET Presented By: Akshay S. Phalke 1
  • 2. Overview • Introduction • Objectives • Literature Survey • Problem Statement • Mathematical Model • System Architecture & Algorithm • Results • Conclusion & Future work • References 2
  • 3. Introduction • Mobile ad hoc network is open wireless network. • Nodes are in mobile state. • It is dynamically changing topology and lack infrastructure network 3
  • 4. Introduction (contd..) Fig 1. Introduction Of MANET 4
  • 5. Objectives • Hide topology-not carry the link information in route messages. • Find node-disjoint routes-After construction of any route to the destination it advertises the set of node in that path. • Exclude unreliable routes-M-THMR able to detect the malicious as well as faulty node. 5
  • 7. Problem Statement • To present the solution for topology exposure problem and discussed its mitigation technique. 7
  • 10. MODIFIED TOPOLOGY-HIDING MULTIPATH ROUTING PROTOCOL(M-THMR) • ExNodeSet greatly reduces the probability that a node is placed on more than one route. • Every node independently makes routing decisions by checking the reverse routes. • Only the nodes that are placed on established routes needs to rebroadcast the RREP message. • Only two routes in routing table remains finally, which means that the established routes are bidirectional. 10
  • 11. Proposed System: Algorithm 1.M-THMR: Algorithm 1: Trust Value Calculation for Secure Route Discovery Mechanism: • Input: Ti (trust value of nodes) • Output: FaultNode [ ], TrustNode [ ]. • N [ ] = GetNeighbour[ ];//find all neighboring nodes • For all node i in N [ ] • CalculateTrust[ ]// obtain trust • UpdateTrust () // • If(Ti<TThreshold) • FaultNode U node(i) • else • TrustNode U node(i) • End for 11
  • 12. Algorithm • Algorithm 2: M-THMR Protocol at node I • Method1: Route request Phase • Upon receiving RREQ < S,D, seq, hopCt > from nj : • if ni == D then • set a timer TD • /∗ enter Route Reply Phase upon timeout∗/ • return • end if • Insert < S,nj, hopCt + 1 > into RT /∗ reverse route ∗/ • if < S,seq > doesn’t exist in SNT then • Insert < S,seq > into SNT • if ni! = D then • Rebroadcast RREQ < S,D, seq, hopCt + 1 > • end if • end if 12
  • 13. Algorithm • Method2: Route reply Phase • Upon receiving RREP < S,D, seq, hopCt, • exNodeSet, nextNode > from nj : • for each route R in RT do • if R.D == S and R.nextHop ∈ exNodeSet then • Remove route R • end if • end for • if nextNode == NULL or nextNode == ni then • Insert < D,nj, hopCt + 1 > into RT • /∗ two temporary parameters ∗/ • Set mHop = 65535 and R1 = NULL • for each route R in RT do • if R.D == S and R.hopCount < mHop then • Set mHop = R.hopCount and R1 = R • end if • end for 13
  • 14. Algorithm • for each route R in RT do • /∗ remove all reverse routes to source ∗/ • if R.D == S then • Remove route R • end if • end for • if R1! = NULL then • Insert R1 into RT • nextNode = R1.nextHop • exNodeSet = {R1.nextHop} ∪ exNodeSet • Broadcast RREP < S,D, seq, hopCt + 1, • exNodeSet, nextNode > • end if • end if 14
  • 15. Algorithm • Method3: Route Probe Phase • Upon Timeout at the Destination: • Set exNodeSetmHop = NULL • for each route R in RT do • exNodeSet = {R.nextHop} ∪ exNodeSet • end for • Broadcast RREP < S,D, 0, exNodeSet,NULL > 15
  • 16. Implementation Requirement •Software Requirement: i.MFS(Meta Exploid Frame Work) ii.Netscan (Network Scan Tools) iii.NS 2.35 iv.CAINK (Packet Inspect) v.VMware player • OS: Red Hat Enterprise Linux • OS: a) Back Track b) Kali ( Hacking O.S.) •Hardware Requirement: i.512 Mb RAM, 80 GB HDD ii.2 GHz Processor iii.Packet Builder Radiator 16
  • 17. Simulation Parameters Table No 1. Simulation Parameters 17
  • 20. Conclusion • Proposed System states that • M-THMR doesn’t degrade the performance when there is no attack. • In the adversarial scenario, the simulation results show that M-THMR can resist attacks. 20
  • 21. Future Work • As for the future work, we plan to design the data transmission strategy with fault detection mechanism based on M-THMR 21
  • 22. References • Yujun Zhang, Guiling Wang, Qi Hu, "Design & Performance Study of a Topology-Hiding Multipath routing Protocol for Mobile Ad Hoc networks” IEEE 2014. • C. K. Toh, A. N. Le, et al. Load balanced routing protocols for ad hoc mobile wireless networks. IEEE Communications Magazine, 47(8):78–84, 2011. • M. K. Marina, and S. R. Das. Ad Hoc On-demand Multipath Distance Vector Routing. Wiley Wireless Communications and Mobile Computing, 6(7):969–988, 2014. • L. Abusalah, A. Khokhar, et al. A Survey of Secure Mobile Ad Hoc Routing Protocols. IEEE Communications Surveys and Tutorials, 10(4):78–93, 2013. • E. Gerhards-Padilla, N. Aschenbruck, et al. Detecting Black Hole Attacks in Tactical MANETs Using Topology Graphs. IEEE Conference on Local Computer Networks (LCN), pages 1043–1052, 2011. 22
  • 23. Thank you Suggestions Are Welcomed… 23