Vous êtes sur la page 1sur 25

ENHANCED FRIEND BASED

ALGORITHM FOR IMPROVED


PRIVACY AND QOS IN MANETs
GUIDED BY
PRESENTED BY

D.Dennis Ebenezer, Mr. S.Anuvelavan,


01110901013 AP / Dept. of CSE
ME(CSE)-MBCBS,
VI-Module, University Departments of Anna
University Departments of University of Technology,
Anna University of Tiruchirrappalli.
Technology, Tiruchirrappalli.
OBJECTIVE

• The objective of the project is to enhance the


available FACES algorithm by preventing
hidden channel attack during the route
discovery process
ABSTRACT

• A solution for attacks against routing in


mobile ad hoc networks using secure route
discovery protocol, to prevent hidden channel
attacks by isolating the malicious nodes
EXISTING SYSTEM
• Normal FACES algorithm is used
• No consideration for wormhole attacks are
done
• Delay in finding the friend node
PROPOSED SYSTEM
• Combines the power of FACES with MTMR
• Delay in finding the route is reduced
• Wormhole attack is managed to locate the
proper friend
SYSTEM REQUIREMENTS
Hardware Requirements
PROCESSOR : PENTIUM III 866 MHz
RAM : 128 MD SD RAM
MONITOR : 15” COLOR
HARD DISK : 20 GB
FLOPPY DRIVE : 1.44 MB
CD DRIVE : LG 52X
KEYBOARD : STANDARD 102 KEYS
MOUSE : 3 BUTTONS
Software Requirements

Operating system : Windows XP Professional


Environment : Visual Studio .NET
2008/2005
.Net framework : Version 3.5
Language : C#.NET
Backend : SQL SERVER 2005
WORKING MODEL DIAGRAM
MODULES

• Web service
• Route Discovery Time
• Transmit packet
• Generator function
• Packet Loss
WEB SERVICE
• Find out the all the nodes that are
available within its limit
• Monitors for a steady flow of actions
performed in a specific node
• Helps to communicate from the
transporting system to the transmitting
system
ROUTE DISCOVERY TIME
• Find the time taken to transmit the
packet through each system
• Data acquired in this will be
helpful in filling the status table
SAMPLE N/W
STATUS TABLE
TRANSMIT PACKET
• Average time that is calculated and
recorded in the status table
• Transporting system starts sending
packets to the destination system through
the friend system
GENERATOR FUNCTION
• Used for packet transmission
• GF function is incremented by 1 for
successful transmission
• GF function is decremented by 1 for
failure of transmission
• Packet is transmitted through the system
which is having maximum GF value
PACKET LOSS
• Takes care of the security issue of the
packets that are being transmitted
• MTMR is best in terms of number of
malicious nodes detected, number of
hops, route discovery time and packet
loss
• This is done by maintaining the trust level
IMPLEMENTATION
MONITORING
PINGING
SELECTING A NODE
SELECTING NODES FOR
TRANSMITTING
CONCLUSION
• A secure route discovery protocol is
proposed to prevent hidden channel and
worm hole attacks
• Trace- ability concept, uses promiscuous
mode to detect and analyse routing
misbehaviour and isolate adversarial nodes
• Prevents hidden channel attacks and also
finds a plausible route between source and
target
REFERENCE
[1] Sanjay K. Dhurandher, Mohammad S.
Obaidat, Karan Verma, Pushkar Gupta, and
Pravina Dhurandher “FACES: Friend-Based
Ad Hoc Routing Using Challenges to
Establish Security in MANETs Systems” IEEE
SYSTEMS JOURNAL, VOL. 5, NO. 2, JUNE
2011
[2]Kavitha Ammayappan, Vinjamuri Narsimha
Sastry and Atul Negi “A New Secure Route
Discovery Protocol for MANETs to Prevent
Hidden Channel Attacks” International Journal
REFERENCE cont…
[3] Yih-Chun Hu, Adrian Perrig, and David B.
Johnson “Wormhole Attacks in Wireless
Networks”
[4] Mohana, N.K.Srinath andAmit L.K “Trust
Based Routing Algorithms for Mobile Ad-hoc
Network” International Journal of Emerging
Technology and Advanced Engineering
CONFERENCE AND
PUBLICATION
• First International Conference on
Communication, Computation and Control
ICCCC ’13 11th - 13th ,April-2013 Organized
by the Circuit Branches Christian College of
Engineering and Technology, Oddanchatram,
Dindigul Dt
• International Journal on Information and
Communication Technologies, Vol-6, July-
Dec 2013
THANK YOU

Vous aimerez peut-être aussi