Académique Documents
Professionnel Documents
Culture Documents
• Web service
• Route Discovery Time
• Transmit packet
• Generator function
• Packet Loss
WEB SERVICE
• Find out the all the nodes that are
available within its limit
• Monitors for a steady flow of actions
performed in a specific node
• Helps to communicate from the
transporting system to the transmitting
system
ROUTE DISCOVERY TIME
• Find the time taken to transmit the
packet through each system
• Data acquired in this will be
helpful in filling the status table
SAMPLE N/W
STATUS TABLE
TRANSMIT PACKET
• Average time that is calculated and
recorded in the status table
• Transporting system starts sending
packets to the destination system through
the friend system
GENERATOR FUNCTION
• Used for packet transmission
• GF function is incremented by 1 for
successful transmission
• GF function is decremented by 1 for
failure of transmission
• Packet is transmitted through the system
which is having maximum GF value
PACKET LOSS
• Takes care of the security issue of the
packets that are being transmitted
• MTMR is best in terms of number of
malicious nodes detected, number of
hops, route discovery time and packet
loss
• This is done by maintaining the trust level
IMPLEMENTATION
MONITORING
PINGING
SELECTING A NODE
SELECTING NODES FOR
TRANSMITTING
CONCLUSION
• A secure route discovery protocol is
proposed to prevent hidden channel and
worm hole attacks
• Trace- ability concept, uses promiscuous
mode to detect and analyse routing
misbehaviour and isolate adversarial nodes
• Prevents hidden channel attacks and also
finds a plausible route between source and
target
REFERENCE
[1] Sanjay K. Dhurandher, Mohammad S.
Obaidat, Karan Verma, Pushkar Gupta, and
Pravina Dhurandher “FACES: Friend-Based
Ad Hoc Routing Using Challenges to
Establish Security in MANETs Systems” IEEE
SYSTEMS JOURNAL, VOL. 5, NO. 2, JUNE
2011
[2]Kavitha Ammayappan, Vinjamuri Narsimha
Sastry and Atul Negi “A New Secure Route
Discovery Protocol for MANETs to Prevent
Hidden Channel Attacks” International Journal
REFERENCE cont…
[3] Yih-Chun Hu, Adrian Perrig, and David B.
Johnson “Wormhole Attacks in Wireless
Networks”
[4] Mohana, N.K.Srinath andAmit L.K “Trust
Based Routing Algorithms for Mobile Ad-hoc
Network” International Journal of Emerging
Technology and Advanced Engineering
CONFERENCE AND
PUBLICATION
• First International Conference on
Communication, Computation and Control
ICCCC ’13 11th - 13th ,April-2013 Organized
by the Circuit Branches Christian College of
Engineering and Technology, Oddanchatram,
Dindigul Dt
• International Journal on Information and
Communication Technologies, Vol-6, July-
Dec 2013
THANK YOU