SlideShare a Scribd company logo
1 of 21
Presented by
Rajat Soni
M.tech. WCT
Enrl.No.-140291
Secure Routing Protocol in Wireless Sensor
Networks
Supervisor
Prof. P.P. Bhattacharya
Co supervisor
Mr Deepak Sethi
Wireless Sensor Network
• WSNs consist of hundreds or thousands of low-power, low-cost nodes having a
computational unit, power source, radio and sensing elements.
• Power is the scarcest resource.
Features of WSN
 Self organizing
 Dynamic network topology
 Limited power
 Large scale deployment
Components Of Wireless Sensor Network
• Sensor Field
• Sensor Nodes
• Sink
• Base Station
Design Challenges
• Resource Constraints
• Ad-hoc Deployment
• Fault- Tolerance
• Scalability
• QoS
• Security
Application
of WSN
Military
Environme
ntal
Monitorin
g
Industrial
Manageme
nt
Health
Care
Disaster
Manageme
nt
Routing in Wireless Sensor
Network
• Many routing and data dissemination protocols have been specifically
designed for WSNs where energy awareness is an essential design
issue.
• Routing protocols might differ depending on the application and
network architecture
• The design of routing protocols is influenced by many challenging
factors caused by the nature of the WSNs.
some of these factors are
• Data delivery model
• Security
• Data aggregation
• Fault tolerance
Classification of Routing Protocols in
Wireless Sensor Networks
Security
Obstacles
 Limited resources
 Unreliable communication
 Unattended operation
Security Requirement
Primary goals
Data
Confidentiality
Data Integrity
Data Freshness
Authentication
Availability
Secondary goals
Self-Organization
Time
Synchronization
Secure Localization
Attacks in WSN
Attacks
By Spoofing, Altering, or Replaying routing information
Attacker can create loops, attract or repel network traffic, generate
false message, partition network, induce delay, etc.
 Selective forwarding
Malicious node forwards only some messages, drop others.
Attacker tries to be on the actual path of data flow
 Sinkhole Attacks 
• Main Reason : Specialized communication patterns supported by
WSN ; All packets have same destination i.e. base station
• Adversary tries to attract traffic from a particular area to pass
through a compromised node, thereby creating sinkhole with
adversary at the center
• A node may be made to look attractive to neighbors in some
routing algorithm
• Laptop class adversary provide a high quality route to base station
by transmitting at high power OR creating a wormhole
• Can enable other attacks e.g. selective forwarding
Sybil Attack
• Single node presents multiple identities to other nodes
• Significantly affect fault-tolerance schemes like distributed storage,
multi-path routing, topology maintenance
• Threat to geographical routing protocols
Wormholes
• tunnelling of messages over alternative low-latency links, e.g.
confuse the routing protocol, create sinkholes. etc.
• Exploit routing race condition
HELLO flood attack
• Some protocols require that nodes broadcast ‘hello’ packets to
advertise themselves
Acknowledgement spoofing
• Adversary can spoof ACKs for control packets and try to
convince the sender that a weak link is strong or a dead link is
alive; causing packet losses
Various Secure Routing Protocols
Distributed Security Framework (DSF)
Multipath Data Transfer protocol (MDTP)
Secure and Energy Efficient Disjoint Route (SEDR)
Data Centric Braided Multipath (DCBM)
Energy Efficient Secure Routing Protocol (EESRP)
Bio-inspired Self-Organized Secure Autonomous Routing
Protocol (BIOSARP)
Sink Toroidal Region Routing (STAR)
Distributed Security Framework
 Uses Hierarchical routing protocols
 Prevents network from Sybil, selective forwarding& worm hole
attacks
 Works for both mobile and static attackers
Limitations
 Consume high energy
 End to end delay is very high
Scope
 Improvement in success rate
 No defence mechanism for attack on gateway node
Energy Efficient Secure Routing
Protocol
 This protocol makes uses the sink-oriented grid structure for providing
better delivery ratio.
 It employs the farthest-highest energy dissemination node search to
find an efficient path from the source to the sink.
 use three different key for security.
 prevents from Sybil, black hole& worm hole attacks,
 Latency is high.
 Packet drop ratio is high.
Secure and Energy Efficient Disjoint Route
 In this protocol messages are
communicated by secret sharing,
by way of dividing them into
packets and by random
forwarding.
 Transmit packets to the sink node
by using least hop routing
 enhances the energy efficiency of
the network
 Prevents from black hole attack
Data Centric Braided Multipath
 Concentrate on the non-hierarchical approach
 Works on Reverse-path-based forwarding
 Normally using previous information, but detecting loops and
dismantling them soon after their formation
 Monitoring data delivery and limiting refreshes to the
neighbourhood of paths to sources with poor delivery quality
 Maintaining braided multiple paths from sources to the sink
 Highly energy efficient
Multipath Data Transfer Protocol
 Data route is decided by updated local table
 Provide data confidentiality
Scope
 Security mechanism for routing
 Improvements on end to end delay
Bio-inspired Self-Organized Secure
Autonomous Routing Protocol
 Based on ant colony optimization
 On demand routing protocol
 can be practically implemented for environmental monitoring or
battlefield surveillance.
 suitable for a large-scale self-organizing system
Scope
Can be designed by involving the mobility factor and
Autonomous security mechanism based on an artificial immune system
(AIS).
Sink Toroidal Region Routing
 Employs grid network structure and single path routing
 Addresses passive attacks like location privacy or eavesdropping
Limitation
 Works for passive attacks only
 Low delivery ratio
 End to end delay is high
Scope
 To remove collisions in the network
 Defense mechanism for active attacks
Conclusion and Future Scope
Routing is of pivotal importance in getting information from one node to
another. usually from the data collecting nodes or source to the base station
or sink is the primary objective. However, in military and medical
applications just getting the data across the network is not the only desired
focus. In these applications security is of utmost importance due to the
sensitive nature of the data that is transported. Hence, information security
measures must be placed in these types of WSNs.
In near future we are approaching to develop a new routing approach
based on multiple routes and provide security for possible threats using
MATLAB simulator which will have low energy consumption and high
delivery ratio with strong security mechanism.
REFRENCES
 Himali Saxena, Chunyu Ai, Marco Valero, Yingshu Li, and Raheem Beyah “DSF - A Distributed Security
Framework for Heterogeneous Wireless Sensor Networks” Military Communications Conference Cyber
Security and Network Management 2010.
 Shobha Poojary, Manohara “Multipath Data Transfer in Wireless Multimedia Sensor Network” Pai
Information and Communication Technology, Manipal Institute of Technology.2010.
 Anfeng Liu, Zhongming Zheng, Chao Zhang, Zhigang Chen, Member, IEEE, and Xuemin (Sherman)
Shen, “Secure and Energy-Efficient Disjoint Multipath Routing for WSNs”, IEEE ,2012.
 Alexander Aronsky and Adrian Segall “A Multipath Routing Algorithm for Mobile Wireless Sensor
Networks” Department of Electrical Engineering, Technion IIT, Haifa, Israel.
 Huei-Wen Ferng and Dian Rachmarini “A Secure Routing Protocol for Wireless Sensor Networks with
Consideration of Energy Efficiency” IEEE 2012.
 Kashif Saleem Norsheila Fisal, M. Ariff Baharudin “A Real-Time Empirical Study of BIOSARP based
Wireless Sensor Network Test bed” IEEE 2012.
 Leron Lightfoot, Yun Li, Jian Ren “Preserving Source-Location Privacy in Wireless Sensor Network using
STaR Routing” IEEE Globecom 2010.
Thank you

More Related Content

What's hot

Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless networkTeced Ce
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manetMeena S Pandi
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technologyKapil Dev
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkMuhammad Kaife Uddin
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor NetworkAarthi Raghavendra
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey915086731
 

What's hot (20)

Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
Chapter
ChapterChapter
Chapter
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 

Viewers also liked

wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocolssourabhshivtiwari
 
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...ketaki19deshmukh
 
Những động từ mà động từ theo sau nó phải là to infinitive
Những động từ mà động từ theo sau nó phải là to infinitiveNhững động từ mà động từ theo sau nó phải là to infinitive
Những động từ mà động từ theo sau nó phải là to infinitiveconvitden_67
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...divya_prabha
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasuresMuqeed Abdul
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShareSlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShareSlideShare
 

Viewers also liked (20)

wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Routing
RoutingRouting
Routing
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
 
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
 
Những động từ mà động từ theo sau nó phải là to infinitive
Những động từ mà động từ theo sau nó phải là to infinitiveNhững động từ mà động từ theo sau nó phải là to infinitive
Những động từ mà động từ theo sau nó phải là to infinitive
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
Sinkholes in karst environments
Sinkholes in karst environmentsSinkholes in karst environments
Sinkholes in karst environments
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 

Similar to Presentation1

firewall simenar ppt.pptx
firewall simenar ppt.pptxfirewall simenar ppt.pptx
firewall simenar ppt.pptxmayurbankar2
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsnGOWTHAMMS6
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...DMV SAI
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless networkElanthendral Mariappan
 
Design and development of anonymous location based routing for mobile ad-hoc...
Design and development of anonymous location based routing  for mobile ad-hoc...Design and development of anonymous location based routing  for mobile ad-hoc...
Design and development of anonymous location based routing for mobile ad-hoc...IJECEIAES
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Umang Singh
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxRamprakashSingaravel1
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 

Similar to Presentation1 (20)

firewall simenar ppt.pptx
firewall simenar ppt.pptxfirewall simenar ppt.pptx
firewall simenar ppt.pptx
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsn
 
Manet
ManetManet
Manet
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
Design and development of anonymous location based routing for mobile ad-hoc...
Design and development of anonymous location based routing  for mobile ad-hoc...Design and development of anonymous location based routing  for mobile ad-hoc...
Design and development of anonymous location based routing for mobile ad-hoc...
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
 
G0933443
G0933443G0933443
G0933443
 
Ns2422412247
Ns2422412247Ns2422412247
Ns2422412247
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 

More from Rajat Soni

Generation of mobile
Generation of mobileGeneration of mobile
Generation of mobileRajat Soni
 
Generation of mobile networks
Generation of mobile networksGeneration of mobile networks
Generation of mobile networksRajat Soni
 
matlab coding for All propagation model using rayleigh
matlab coding for All propagation model using rayleighmatlab coding for All propagation model using rayleigh
matlab coding for All propagation model using rayleighRajat Soni
 
Presentation on emc testing and measurement
Presentation on emc testing and measurementPresentation on emc testing and measurement
Presentation on emc testing and measurementRajat Soni
 
Presentation on health hazards by em waves
Presentation on health hazards by em  wavesPresentation on health hazards by em  waves
Presentation on health hazards by em wavesRajat Soni
 

More from Rajat Soni (6)

Generation of mobile
Generation of mobileGeneration of mobile
Generation of mobile
 
Generation of mobile networks
Generation of mobile networksGeneration of mobile networks
Generation of mobile networks
 
Shree cement
Shree cementShree cement
Shree cement
 
matlab coding for All propagation model using rayleigh
matlab coding for All propagation model using rayleighmatlab coding for All propagation model using rayleigh
matlab coding for All propagation model using rayleigh
 
Presentation on emc testing and measurement
Presentation on emc testing and measurementPresentation on emc testing and measurement
Presentation on emc testing and measurement
 
Presentation on health hazards by em waves
Presentation on health hazards by em  wavesPresentation on health hazards by em  waves
Presentation on health hazards by em waves
 

Recently uploaded

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 

Recently uploaded (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 

Presentation1

  • 1. Presented by Rajat Soni M.tech. WCT Enrl.No.-140291 Secure Routing Protocol in Wireless Sensor Networks Supervisor Prof. P.P. Bhattacharya Co supervisor Mr Deepak Sethi
  • 2. Wireless Sensor Network • WSNs consist of hundreds or thousands of low-power, low-cost nodes having a computational unit, power source, radio and sensing elements. • Power is the scarcest resource. Features of WSN  Self organizing  Dynamic network topology  Limited power  Large scale deployment
  • 3. Components Of Wireless Sensor Network • Sensor Field • Sensor Nodes • Sink • Base Station Design Challenges • Resource Constraints • Ad-hoc Deployment • Fault- Tolerance • Scalability • QoS • Security
  • 5. Routing in Wireless Sensor Network • Many routing and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. • Routing protocols might differ depending on the application and network architecture • The design of routing protocols is influenced by many challenging factors caused by the nature of the WSNs. some of these factors are • Data delivery model • Security • Data aggregation • Fault tolerance
  • 6. Classification of Routing Protocols in Wireless Sensor Networks
  • 7. Security Obstacles  Limited resources  Unreliable communication  Unattended operation Security Requirement Primary goals Data Confidentiality Data Integrity Data Freshness Authentication Availability Secondary goals Self-Organization Time Synchronization Secure Localization
  • 9. Attacks By Spoofing, Altering, or Replaying routing information Attacker can create loops, attract or repel network traffic, generate false message, partition network, induce delay, etc.  Selective forwarding Malicious node forwards only some messages, drop others. Attacker tries to be on the actual path of data flow  Sinkhole Attacks  • Main Reason : Specialized communication patterns supported by WSN ; All packets have same destination i.e. base station • Adversary tries to attract traffic from a particular area to pass through a compromised node, thereby creating sinkhole with adversary at the center • A node may be made to look attractive to neighbors in some routing algorithm • Laptop class adversary provide a high quality route to base station by transmitting at high power OR creating a wormhole • Can enable other attacks e.g. selective forwarding
  • 10. Sybil Attack • Single node presents multiple identities to other nodes • Significantly affect fault-tolerance schemes like distributed storage, multi-path routing, topology maintenance • Threat to geographical routing protocols Wormholes • tunnelling of messages over alternative low-latency links, e.g. confuse the routing protocol, create sinkholes. etc. • Exploit routing race condition HELLO flood attack • Some protocols require that nodes broadcast ‘hello’ packets to advertise themselves Acknowledgement spoofing • Adversary can spoof ACKs for control packets and try to convince the sender that a weak link is strong or a dead link is alive; causing packet losses
  • 11. Various Secure Routing Protocols Distributed Security Framework (DSF) Multipath Data Transfer protocol (MDTP) Secure and Energy Efficient Disjoint Route (SEDR) Data Centric Braided Multipath (DCBM) Energy Efficient Secure Routing Protocol (EESRP) Bio-inspired Self-Organized Secure Autonomous Routing Protocol (BIOSARP) Sink Toroidal Region Routing (STAR)
  • 12. Distributed Security Framework  Uses Hierarchical routing protocols  Prevents network from Sybil, selective forwarding& worm hole attacks  Works for both mobile and static attackers Limitations  Consume high energy  End to end delay is very high Scope  Improvement in success rate  No defence mechanism for attack on gateway node
  • 13. Energy Efficient Secure Routing Protocol  This protocol makes uses the sink-oriented grid structure for providing better delivery ratio.  It employs the farthest-highest energy dissemination node search to find an efficient path from the source to the sink.  use three different key for security.  prevents from Sybil, black hole& worm hole attacks,  Latency is high.  Packet drop ratio is high.
  • 14. Secure and Energy Efficient Disjoint Route  In this protocol messages are communicated by secret sharing, by way of dividing them into packets and by random forwarding.  Transmit packets to the sink node by using least hop routing  enhances the energy efficiency of the network  Prevents from black hole attack
  • 15. Data Centric Braided Multipath  Concentrate on the non-hierarchical approach  Works on Reverse-path-based forwarding  Normally using previous information, but detecting loops and dismantling them soon after their formation  Monitoring data delivery and limiting refreshes to the neighbourhood of paths to sources with poor delivery quality  Maintaining braided multiple paths from sources to the sink  Highly energy efficient
  • 16. Multipath Data Transfer Protocol  Data route is decided by updated local table  Provide data confidentiality Scope  Security mechanism for routing  Improvements on end to end delay
  • 17. Bio-inspired Self-Organized Secure Autonomous Routing Protocol  Based on ant colony optimization  On demand routing protocol  can be practically implemented for environmental monitoring or battlefield surveillance.  suitable for a large-scale self-organizing system Scope Can be designed by involving the mobility factor and Autonomous security mechanism based on an artificial immune system (AIS).
  • 18. Sink Toroidal Region Routing  Employs grid network structure and single path routing  Addresses passive attacks like location privacy or eavesdropping Limitation  Works for passive attacks only  Low delivery ratio  End to end delay is high Scope  To remove collisions in the network  Defense mechanism for active attacks
  • 19. Conclusion and Future Scope Routing is of pivotal importance in getting information from one node to another. usually from the data collecting nodes or source to the base station or sink is the primary objective. However, in military and medical applications just getting the data across the network is not the only desired focus. In these applications security is of utmost importance due to the sensitive nature of the data that is transported. Hence, information security measures must be placed in these types of WSNs. In near future we are approaching to develop a new routing approach based on multiple routes and provide security for possible threats using MATLAB simulator which will have low energy consumption and high delivery ratio with strong security mechanism.
  • 20. REFRENCES  Himali Saxena, Chunyu Ai, Marco Valero, Yingshu Li, and Raheem Beyah “DSF - A Distributed Security Framework for Heterogeneous Wireless Sensor Networks” Military Communications Conference Cyber Security and Network Management 2010.  Shobha Poojary, Manohara “Multipath Data Transfer in Wireless Multimedia Sensor Network” Pai Information and Communication Technology, Manipal Institute of Technology.2010.  Anfeng Liu, Zhongming Zheng, Chao Zhang, Zhigang Chen, Member, IEEE, and Xuemin (Sherman) Shen, “Secure and Energy-Efficient Disjoint Multipath Routing for WSNs”, IEEE ,2012.  Alexander Aronsky and Adrian Segall “A Multipath Routing Algorithm for Mobile Wireless Sensor Networks” Department of Electrical Engineering, Technion IIT, Haifa, Israel.  Huei-Wen Ferng and Dian Rachmarini “A Secure Routing Protocol for Wireless Sensor Networks with Consideration of Energy Efficiency” IEEE 2012.  Kashif Saleem Norsheila Fisal, M. Ariff Baharudin “A Real-Time Empirical Study of BIOSARP based Wireless Sensor Network Test bed” IEEE 2012.  Leron Lightfoot, Yun Li, Jian Ren “Preserving Source-Location Privacy in Wireless Sensor Network using STaR Routing” IEEE Globecom 2010.