PPT

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

Abstract

In a mobile ad hoc network (MANET), nodes cooperate


to dynamically establish the network configuration and
find and maintain routes for message exchange. A similar
strategy is used in wireless sensor networks (WSNs)
which are considered a derivative of MANETs with some
differences. In both networks, nodes are responsible for
forwarding packets for each other to facilitate multi-hop
communication between other nodes that are not in direct
transmission range. However the lack of a fixed topology
in these networks leads to significant challenges to the
routing process. Particularly, when the issue of trust
among the nodes is in question. Routing protocols
designed for ad hoc networks such as the Dynamic Source
Routing protocol (DSR), and the Ad hoc On-Demand
Distance Vector (AODV) protocol are generally effective
and efficient. However, different nodes exhibit different
measures of trust and reliability to effectively and
correctly participate in the routing and data transmission
process.

Introduction
Network
A network is defined as a group of two or
more computer systems linked together.
• Wired and Wireless network
A wired network connects devices to the Internet
or other network using cables. The most
common wired networks use cables connected to
Ethernet ports on the network router on one end and to
a computer or other device on the cable's opposite end
Wireless networks are computer networks that are
not connected by cables of any kind.

Infrastructre-less network
A wireless ad hoc network is an autonomous
system consisting of nodes, which may or may not be
mobile, connected with wireless links and without using
pre-existing communication infrastructure or central
control

MANET
A mobile ad hoc network (MANET) is
generally defined as a network that has many free or
autonomous nodes, often composed of mobile devices or
other mobile pieces, that can arrange themselves in
various ways and operate without strict top-down network
administration.
Problem statement
Security. Wi-Fi devices in ad hoc mode offer minimal
security against unwanted incoming connections. For
example, ad hoc devices cannot disable SSID broadcast
like infrastructure mode devices can. Attackers generally
will have little difficulty connecting to your ad hoc device
if they get within signal range.
Literature Survey
Deepika Kukreja, Umang Singh, and B. V. R. Reddy
proposed Index term CONFIDANT (Cooperation of
Nodes, Fairness In Dynamic Ad hoc NeTworks)
Limitations : The protocols fail to work when malicious
nodes collude

Mrs. S. Geetha Dr. G. Geetha Ramani proposed


Trusted Destination Sequenced Distance Vector
(TDSDV) Routing Protocol
Existing system
1. A trusted AODV (TAODV) routing protocol was
proposed. Trust is represented by an opinion as used
in subjective logic
 The nodes authenticate each other by verifying the
certificate, which is an added overhead. The
protocol is unable to detect an internal attack
2 .A trusted routing protocol, called dynamic mutual trust
based routing (DMTR), based on the dynamic source
routing (DSR) protocol, was proposed
 Exchanges of trust tables between nodes requires
lots of bandwidth, and increases the overhead
3 . Protocol called CORE (Collaborative REputation) was
proposed that has a monitoring mechanism complemented
by a reputation functionality
 A unique characteristic of this mechanism is that it
exchanges only positive reputation information
 this may limit its reliance on positive reports
without the facility to submit negative feedback
4 . A reputation-based trust management scheme using an
incentive mechanism was introduced (secure and
objective reputation-based incentive; SORI).
As these enhancements address the trust problem, they all
have some type of shortcomings that either affect overall
performance or significantly increase overhead
Proposed system
 Our approach provides a routing protocol based on
trust, which is established and maintained by the
nodes in the network.
 In each node, the trust factor is updated based on the
successful participation of the other nodes in previous
data transmissions. Our protocol is based on the DSR
routing protocol, and is on-demand. In addition, it is
a distributed protocol.
 Unlike other protocols, such as the link-state-based
ones, each node only has to maintain topology and
trust information about its immediate neighbors and
not the entire network.
 These characteristics enhance the scalability and
performance of our proposed algorithm. Also as an
ad hoc networks usually include nodes of varying
trust levels, it becomes necessary to distinguish these
nodes using the accumulated trust levels for each
node.
 As a result, TRAS becomes more effective and more
capable of selecting paths with higher trust levels.
Architecture
Software requirements and specifications

System Requirements

IDE : Visual Studio .Net (Framework 4.0 or later)

Programming Language : C#

Technology : Windows Form .Net

Hardware Requirements

Minimum 4 to 5 Physical Machines/Virtual Machines


in Network
References

[1] Q. He, D. Wu and P. Khosla, "SORI: A Secure and


Objective Reputation-based Incentive Scheme for Ad-hoc
Networks," in Wireless Communications and Networking
Conference, 2004
[2] Abusalah, A. Khokhar and M. Guizani, "TARP:
Trust Aware Routing Protocol," 2006.
[3] M. A. Ayachi, C. Bidan, T. Abbes and A. Bouhoula,
"Misbehavior Detection using Implicit Trust Relations in
the AODV Routing Protocol," in International Conference
on Computaional Science and Engineering, 2009

You might also like