0% found this document useful (0 votes)
73 views25 pages

Enhanced Friend Based Algorithm For Improved Privacy and Qos

1) The document proposes an enhanced FACES algorithm to improve privacy and quality of service in mobile ad hoc networks (MANETs) by preventing hidden channel attacks during route discovery. 2) It aims to combine the power of the FACES algorithm with multi-topology multi-path routing (MTMR) to reduce route discovery delays and manage wormhole attacks to locate proper routes. 3) The key modules described are the web service for finding available nodes, calculating route discovery times, transmitting packets using a generator function, and handling packet loss using MTMR to maintain trust levels and isolate malicious nodes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views25 pages

Enhanced Friend Based Algorithm For Improved Privacy and Qos

1) The document proposes an enhanced FACES algorithm to improve privacy and quality of service in mobile ad hoc networks (MANETs) by preventing hidden channel attacks during route discovery. 2) It aims to combine the power of the FACES algorithm with multi-topology multi-path routing (MTMR) to reduce route discovery delays and manage wormhole attacks to locate proper routes. 3) The key modules described are the web service for finding available nodes, calculating route discovery times, transmitting packets using a generator function, and handling packet loss using MTMR to maintain trust levels and isolate malicious nodes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 25

ENHANCED FRIEND BASED

ALGORITHM FOR IMPROVED


PRIVACY AND QOS IN MANETs
GUIDED BY
PRESENTED BY

D.Dennis Ebenezer, Mr. S.Anuvelavan,


01110901013 AP / Dept. of CSE
ME(CSE)-MBCBS,
VI-Module, University Departments of Anna
University Departments of University of Technology,
Anna University of Tiruchirrappalli.
Technology, Tiruchirrappalli.
OBJECTIVE

• The objective of the project is to enhance the


available FACES algorithm by preventing
hidden channel attack during the route
discovery process
ABSTRACT

• A solution for attacks against routing in


mobile ad hoc networks using secure route
discovery protocol, to prevent hidden channel
attacks by isolating the malicious nodes
EXISTING SYSTEM
• Normal FACES algorithm is used
• No consideration for wormhole attacks are
done
• Delay in finding the friend node
PROPOSED SYSTEM
• Combines the power of FACES with MTMR
• Delay in finding the route is reduced
• Wormhole attack is managed to locate the
proper friend
SYSTEM REQUIREMENTS
Hardware Requirements
PROCESSOR : PENTIUM III 866 MHz
RAM : 128 MD SD RAM
MONITOR : 15” COLOR
HARD DISK : 20 GB
FLOPPY DRIVE : 1.44 MB
CD DRIVE : LG 52X
KEYBOARD : STANDARD 102 KEYS
MOUSE : 3 BUTTONS
Software Requirements

Operating system : Windows XP Professional


Environment : Visual Studio .NET
2008/2005
.Net framework : Version 3.5
Language : C#.NET
Backend : SQL SERVER 2005
WORKING MODEL DIAGRAM
MODULES

• Web service
• Route Discovery Time
• Transmit packet
• Generator function
• Packet Loss
WEB SERVICE
• Find out the all the nodes that are
available within its limit
• Monitors for a steady flow of actions
performed in a specific node
• Helps to communicate from the
transporting system to the transmitting
system
ROUTE DISCOVERY TIME
• Find the time taken to transmit the
packet through each system
• Data acquired in this will be
helpful in filling the status table
SAMPLE N/W
STATUS TABLE
TRANSMIT PACKET
• Average time that is calculated and
recorded in the status table
• Transporting system starts sending
packets to the destination system through
the friend system
GENERATOR FUNCTION
• Used for packet transmission
• GF function is incremented by 1 for
successful transmission
• GF function is decremented by 1 for
failure of transmission
• Packet is transmitted through the system
which is having maximum GF value
PACKET LOSS
• Takes care of the security issue of the
packets that are being transmitted
• MTMR is best in terms of number of
malicious nodes detected, number of
hops, route discovery time and packet
loss
• This is done by maintaining the trust level
IMPLEMENTATION
MONITORING
PINGING
SELECTING A NODE
SELECTING NODES FOR
TRANSMITTING
CONCLUSION
• A secure route discovery protocol is
proposed to prevent hidden channel and
worm hole attacks
• Trace- ability concept, uses promiscuous
mode to detect and analyse routing
misbehaviour and isolate adversarial nodes
• Prevents hidden channel attacks and also
finds a plausible route between source and
target
REFERENCE
[1] Sanjay K. Dhurandher, Mohammad S.
Obaidat, Karan Verma, Pushkar Gupta, and
Pravina Dhurandher “FACES: Friend-Based
Ad Hoc Routing Using Challenges to
Establish Security in MANETs Systems” IEEE
SYSTEMS JOURNAL, VOL. 5, NO. 2, JUNE
2011
[2]Kavitha Ammayappan, Vinjamuri Narsimha
Sastry and Atul Negi “A New Secure Route
Discovery Protocol for MANETs to Prevent
Hidden Channel Attacks” International Journal
REFERENCE cont…
[3] Yih-Chun Hu, Adrian Perrig, and David B.
Johnson “Wormhole Attacks in Wireless
Networks”
[4] Mohana, N.K.Srinath andAmit L.K “Trust
Based Routing Algorithms for Mobile Ad-hoc
Network” International Journal of Emerging
Technology and Advanced Engineering
CONFERENCE AND
PUBLICATION
• First International Conference on
Communication, Computation and Control
ICCCC ’13 11th - 13th ,April-2013 Organized
by the Circuit Branches Christian College of
Engineering and Technology, Oddanchatram,
Dindigul Dt
• International Journal on Information and
Communication Technologies, Vol-6, July-
Dec 2013
THANK YOU

You might also like