0% found this document useful (0 votes)
241 views24 pages

The Secure Zone Routing Protocol (SZRP) 1

The Secure Zone Routing Protocol (SZRP) is a hybrid routing protocol that incorporates security features from the Zone Routing Protocol (ZRP). SZRP uses proactive routing within zones and reactive routing between zones. It provides end-to-end authentication, message integrity, data confidentiality, and prevents various attacks like impersonation, message modification, fabrication, and replay attacks. Performance is evaluated using the ns-2 network simulator and results show SZRP is robust against multiple attacks while having a negligible time overhead compared to its security benefits.

Uploaded by

Kamalakar Reddy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
241 views24 pages

The Secure Zone Routing Protocol (SZRP) 1

The Secure Zone Routing Protocol (SZRP) is a hybrid routing protocol that incorporates security features from the Zone Routing Protocol (ZRP). SZRP uses proactive routing within zones and reactive routing between zones. It provides end-to-end authentication, message integrity, data confidentiality, and prevents various attacks like impersonation, message modification, fabrication, and replay attacks. Performance is evaluated using the ns-2 network simulator and results show SZRP is robust against multiple attacks while having a negligible time overhead compared to its security benefits.

Uploaded by

Kamalakar Reddy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 24

THE SECURE ZONE ROUTING PROTOCOL(SZRP)

Introduction
Mobile Ad hoc NETworks
>self-organizing and infrastructure less

>dynamic network topology

>needed more active distributed algorithm

Routing Protocols
Pro-active protocol > DSDV, OLSR, FSR. Re-active protocol >AODV, DSR.

Hybrid protocol
>ZRP,ZHLS

Security Protocols
Security goals
Confidentiality Integrity Availability Authenticity Non-repudiation

Protocols
Authenticated Routing for Ad hoc Networks(ARAN) Security-Aware Ad hoc Routing(SAR) Secure Ad hoc )n-demand Vector Routing(SAODV)

CONFIDANT protocol
Watchdog and Path rater etc.,

Zone Routing Protocol(ZRP)


Hybrid routing protocol Uses proactive routing within a zone and reactive routing outside the zone

Components: IARP, IERP, BRP

Routing zone and Intra-zone Routing


15

14
1 11 10 4 5 6 3 8

13

2
12

Inter Zone Routing(IERP)


15
14 12 8 10 16 5 6 2 1 4 3 7 13

11

Secure zone routing protocol (SZRP)


Routing techniques are same as ZRP protocol with inclusion of security features Uses public key certificates for key distribution and management

Security issues
End to End authentication Message/packet integrity Data confidentiality

Certification Process

Architecture

Secure Routing
I J Zone of G

H
G D Zone of C

C
Zone of A A B Source/ Destination CAs F E Y Other nodes

Performance Metrics
Average packet delivery fraction. Average routing load in bytes. Average routing load in terms of packets. Average route acquisition latency. Percentage of packets dropped that passed through malicious nodes.

Analysis of SZRP
Prevention from information disclosure Attacks involving impersonation Routing message modification Fabrication of messages Replay attacks

Network Simulator (ns-2)


Ns is a discrete event simulator targeted at networking research. Ns provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks.

Network Animator (nam)


Nam is a Tcl/TK based animation tool for viewing network simulation traces and real world packet traces. It is mainly intended as a companion animator to the ns simulator.

Results

Simple Example

Transmission between 10 nodes

Transmission between 20 nodes

Routing packets between zones

Conclusion
Robust against multiple attacks. Good solution towards achieving the security goals. The impact of time overhead is negligible compared to the degree of security.

THANK YOU

You might also like