31-07-2013, 04:57 PM
SECURE AD HOC NETWORK ROUTING PROTOCOLS
SECURE AD HOC NETWORK.pptx (Size: 227.41 KB / Downloads: 23)
OBJECTIVE
To establish secure routing in mobile ad hoc networks.
Effectively Isolate The Malicious Nodes
FACES algorithm based on trust establishment of friends for secure routing in ad-hoc networks.
Friend rating scheme as a continuous process. Authentication of nodes by posing challenges.
Reduces The Overhead On Network
EXISITNG SYSTEM
This works by sending challenges and sharing friend Lists to provide a list of trusted nodes to the source node through which data transmission finally takes place.
Provides a Robust mechanism For Thwarting attacks by isolating malicious nodes in the network
DRAWBACKS
No proper security provided.
Cryptography is used for high security, the hackers can hack the data of single letter encryption.
Time Delay is high.
Does not detect malicious nodes
Occurs packet overhead
Energy usage is high
Data rating is low(0 to 10)
PROPOSED SYSTEM
The two contributions to the area of secure routing protocols for ad hoc networks:
Present a model for the types of attacks possible in such a system, and describes several new attacks on ad hoc network routing protocols.
Present the design and performance evaluation of a new on-demand secure ad hoc network routing protocol, called Ariadne, that withstands node compromise and relies only on highly efficient symmetric cryptography.
TRANSMIT PACKET
Packet Formed using the Triple Des Encryption for the data fragments.
These data fragments would be sent over multiple independent routes from source node to destination node.
DMR will select best four routes which is having a less route discovery time.
The TMR algorithm will choose a route which is having the maximum Trust from Source Node to Destination node in the network. The encrypted data fragments will be sent in the single best route.