the secure zone routing protocol(szrp)1

24

Click here to load reader

Upload: kamalakar-reddy

Post on 14-Apr-2015

85 views

Category:

Documents


2 download

DESCRIPTION

kkk

TRANSCRIPT

Page 1: The Secure Zone Routing Protocol(Szrp)1

THE SECURE ZONE THE SECURE ZONE ROUTING ROUTING

PROTOCOL(SZRP)PROTOCOL(SZRP)

Page 2: The Secure Zone Routing Protocol(Szrp)1

IntroductionIntroduction

• Mobile Ad hoc NETworks

>self-organizing and infrastructure less

>dynamic network topology

>needed more active distributed algorithm

Page 3: The Secure Zone Routing Protocol(Szrp)1

Routing ProtocolsRouting Protocols

• Pro-active protocol> DSDV, OLSR, FSR.

• Re-active protocol >AODV, DSR.

• Hybrid protocol

>ZRP,ZHLS

Page 4: The Secure Zone Routing Protocol(Szrp)1

Security ProtocolsSecurity Protocols

Security goals

• Confidentiality• Integrity• Availability• Authenticity• Non-repudiation

Page 5: The Secure Zone Routing Protocol(Szrp)1

Protocols

• Authenticated Routing for Ad hoc Networks(ARAN)

• Security-Aware Ad hoc Routing(SAR)

• Secure Ad hoc )n-demand Vector Routing(SAODV)

• CONFIDANT protocol

• Watchdog and Path rater etc.,

Page 6: The Secure Zone Routing Protocol(Szrp)1

Zone Routing Protocol(ZRP)Zone Routing Protocol(ZRP)

• Hybrid routing protocol

• Uses proactive routing within a zone and reactive routing outside the zone

• Components: IARP, IERP, BRP

Page 7: The Secure Zone Routing Protocol(Szrp)1

Routing zone and Intra-zone Routing zone and Intra-zone RoutingRouting

2

35

6

10

1

7

9

13

15

14

11

12

8

4

Page 8: The Secure Zone Routing Protocol(Szrp)1

1

2

36

12

8

7

9

13

15

14

11

4

5

1016

Inter Zone Routing(IERP)Inter Zone Routing(IERP)

Page 9: The Secure Zone Routing Protocol(Szrp)1

Secure zone routing Secure zone routing protocol (SZRP)protocol (SZRP)

• Routing techniques are same as ZRP protocol with inclusion of security features

• Uses public key certificates for key distribution and management

Page 10: The Secure Zone Routing Protocol(Szrp)1

Security issuesSecurity issues

• End to End authentication

• Message/packet integrity

• Data confidentiality

Page 11: The Secure Zone Routing Protocol(Szrp)1

Certification ProcessCertification Process

Page 12: The Secure Zone Routing Protocol(Szrp)1

ArchitectureArchitecture

Page 13: The Secure Zone Routing Protocol(Szrp)1

Secure RoutingSecure Routing

EF

Y

A

B

C

DG

H

IJ

Zone of A

Zone of C

Zone of G

Other nodes

Source/ Destination

CAs

Page 14: The Secure Zone Routing Protocol(Szrp)1

Performance MetricsPerformance Metrics

• Average packet delivery fraction.• Average routing load in bytes.• Average routing load in terms of packets.• Average route acquisition latency.• Percentage of packets dropped that

passed through malicious nodes.

Page 15: The Secure Zone Routing Protocol(Szrp)1

Analysis of SZRPAnalysis of SZRP

• Prevention from information disclosure• Attacks involving impersonation• Routing message modification• Fabrication of messages• Replay attacks

Page 16: The Secure Zone Routing Protocol(Szrp)1

Network Simulator (ns-2)Network Simulator (ns-2)• Ns is a discrete event simulator targeted

at networking research. Ns provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks.

Page 17: The Secure Zone Routing Protocol(Szrp)1

Network Animator (nam)Network Animator (nam)• Nam is a Tcl/TK based animation tool for

viewing network simulation traces and real world packet traces. It is mainly intended as a companion animator to the ns simulator.

Page 18: The Secure Zone Routing Protocol(Szrp)1

ResultsResults

Page 19: The Secure Zone Routing Protocol(Szrp)1

Simple ExampleSimple Example

Page 20: The Secure Zone Routing Protocol(Szrp)1

Transmission between 10 nodes Transmission between 10 nodes

Page 21: The Secure Zone Routing Protocol(Szrp)1

Transmission between 20 nodesTransmission between 20 nodes

Page 22: The Secure Zone Routing Protocol(Szrp)1

Routing packets between zonesRouting packets between zones

Page 23: The Secure Zone Routing Protocol(Szrp)1

ConclusionConclusion

• Robust against multiple attacks.• Good solution towards achieving the

security goals.• The impact of time overhead is negligible

compared to the degree of security.

Page 24: The Secure Zone Routing Protocol(Szrp)1

THANK YOU