the secure zone routing protocol(szrp)1
DESCRIPTION
kkkTRANSCRIPT
THE SECURE ZONE THE SECURE ZONE ROUTING ROUTING
PROTOCOL(SZRP)PROTOCOL(SZRP)
IntroductionIntroduction
• Mobile Ad hoc NETworks
>self-organizing and infrastructure less
>dynamic network topology
>needed more active distributed algorithm
Routing ProtocolsRouting Protocols
• Pro-active protocol> DSDV, OLSR, FSR.
• Re-active protocol >AODV, DSR.
• Hybrid protocol
>ZRP,ZHLS
Security ProtocolsSecurity Protocols
Security goals
• Confidentiality• Integrity• Availability• Authenticity• Non-repudiation
Protocols
• Authenticated Routing for Ad hoc Networks(ARAN)
• Security-Aware Ad hoc Routing(SAR)
• Secure Ad hoc )n-demand Vector Routing(SAODV)
• CONFIDANT protocol
• Watchdog and Path rater etc.,
Zone Routing Protocol(ZRP)Zone Routing Protocol(ZRP)
• Hybrid routing protocol
• Uses proactive routing within a zone and reactive routing outside the zone
• Components: IARP, IERP, BRP
Routing zone and Intra-zone Routing zone and Intra-zone RoutingRouting
2
35
6
10
1
7
9
13
15
14
11
12
8
4
1
2
36
12
8
7
9
13
15
14
11
4
5
1016
Inter Zone Routing(IERP)Inter Zone Routing(IERP)
Secure zone routing Secure zone routing protocol (SZRP)protocol (SZRP)
• Routing techniques are same as ZRP protocol with inclusion of security features
• Uses public key certificates for key distribution and management
Security issuesSecurity issues
• End to End authentication
• Message/packet integrity
• Data confidentiality
Certification ProcessCertification Process
ArchitectureArchitecture
Secure RoutingSecure Routing
EF
Y
A
B
C
DG
H
IJ
Zone of A
Zone of C
Zone of G
Other nodes
Source/ Destination
CAs
Performance MetricsPerformance Metrics
• Average packet delivery fraction.• Average routing load in bytes.• Average routing load in terms of packets.• Average route acquisition latency.• Percentage of packets dropped that
passed through malicious nodes.
Analysis of SZRPAnalysis of SZRP
• Prevention from information disclosure• Attacks involving impersonation• Routing message modification• Fabrication of messages• Replay attacks
Network Simulator (ns-2)Network Simulator (ns-2)• Ns is a discrete event simulator targeted
at networking research. Ns provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks.
Network Animator (nam)Network Animator (nam)• Nam is a Tcl/TK based animation tool for
viewing network simulation traces and real world packet traces. It is mainly intended as a companion animator to the ns simulator.
ResultsResults
Simple ExampleSimple Example
Transmission between 10 nodes Transmission between 10 nodes
Transmission between 20 nodesTransmission between 20 nodes
Routing packets between zonesRouting packets between zones
ConclusionConclusion
• Robust against multiple attacks.• Good solution towards achieving the
security goals.• The impact of time overhead is negligible
compared to the degree of security.
THANK YOU