The Secure Zone Routing Protocol(Szrp)1

Post on 14-Apr-2015

83 views 2 download

description

kkk

Transcript of The Secure Zone Routing Protocol(Szrp)1

THE SECURE ZONE THE SECURE ZONE ROUTING ROUTING

PROTOCOL(SZRP)PROTOCOL(SZRP)

IntroductionIntroduction

• Mobile Ad hoc NETworks

>self-organizing and infrastructure less

>dynamic network topology

>needed more active distributed algorithm

Routing ProtocolsRouting Protocols

• Pro-active protocol> DSDV, OLSR, FSR.

• Re-active protocol >AODV, DSR.

• Hybrid protocol

>ZRP,ZHLS

Security ProtocolsSecurity Protocols

Security goals

• Confidentiality• Integrity• Availability• Authenticity• Non-repudiation

Protocols

• Authenticated Routing for Ad hoc Networks(ARAN)

• Security-Aware Ad hoc Routing(SAR)

• Secure Ad hoc )n-demand Vector Routing(SAODV)

• CONFIDANT protocol

• Watchdog and Path rater etc.,

Zone Routing Protocol(ZRP)Zone Routing Protocol(ZRP)

• Hybrid routing protocol

• Uses proactive routing within a zone and reactive routing outside the zone

• Components: IARP, IERP, BRP

Routing zone and Intra-zone Routing zone and Intra-zone RoutingRouting

2

35

6

10

1

7

9

13

15

14

11

12

8

4

1

2

36

12

8

7

9

13

15

14

11

4

5

1016

Inter Zone Routing(IERP)Inter Zone Routing(IERP)

Secure zone routing Secure zone routing protocol (SZRP)protocol (SZRP)

• Routing techniques are same as ZRP protocol with inclusion of security features

• Uses public key certificates for key distribution and management

Security issuesSecurity issues

• End to End authentication

• Message/packet integrity

• Data confidentiality

Certification ProcessCertification Process

ArchitectureArchitecture

Secure RoutingSecure Routing

EF

Y

A

B

C

DG

H

IJ

Zone of A

Zone of C

Zone of G

Other nodes

Source/ Destination

CAs

Performance MetricsPerformance Metrics

• Average packet delivery fraction.• Average routing load in bytes.• Average routing load in terms of packets.• Average route acquisition latency.• Percentage of packets dropped that

passed through malicious nodes.

Analysis of SZRPAnalysis of SZRP

• Prevention from information disclosure• Attacks involving impersonation• Routing message modification• Fabrication of messages• Replay attacks

Network Simulator (ns-2)Network Simulator (ns-2)• Ns is a discrete event simulator targeted

at networking research. Ns provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks.

Network Animator (nam)Network Animator (nam)• Nam is a Tcl/TK based animation tool for

viewing network simulation traces and real world packet traces. It is mainly intended as a companion animator to the ns simulator.

ResultsResults

Simple ExampleSimple Example

Transmission between 10 nodes Transmission between 10 nodes

Transmission between 20 nodesTransmission between 20 nodes

Routing packets between zonesRouting packets between zones

ConclusionConclusion

• Robust against multiple attacks.• Good solution towards achieving the

security goals.• The impact of time overhead is negligible

compared to the degree of security.

THANK YOU