13
Presented By S.AAKASHAM 722012405001 II M. E. ,CSE SVS College of Engineering. A Secure QOS Oriented Routing for Hybrid Wireless Networks Guided By Mr. S. R. MUGUNTHAN, M. E., Assistant Professor & HOD, Dept of Computer Science and Engg., SVS College of Engineering.

A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

Embed Size (px)

Citation preview

Page 1: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

Presented By

S.AAKASHAM

722012405001

II M. E. ,CSE

SVS College of Engineering.

A Secure QOS Oriented Routing for Hybrid Wireless Networks

Guided ByMr. S. R. MUGUNTHAN, M. E.,Assistant Professor & HOD,Dept of Computer Science and Engg., SVS College of Engineering.

Page 2: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

Abstract A wireless hybrid network is integrates a mobile wireless

ad-hoc network and a wireless infrastructureIt proven the better alternative for next generation Wireless

network It popular among critical mission applications like military

use or emergency recoveryHowever, the open medium and wide distribution of nodes

make HWN vulnerable to malicious attackers In this case, it is crucial to develop efficient intrusion-

detection mechanisms to protect HWN from attacks

Page 3: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

Existing systemTo support QOS routing in hybrid wireless network

Introduce QOS Oriented Distributed Routing Protocol to

enhance the QOS support capability of hybrid networks.

It incorporates the five algorithm

1. Neighbor Selection Algorithm: To meet the

transmission delay requirement

2. Distributed Packet Scheduling Algorithm: Reduce

the transmission delay

Page 4: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

Existing system contd..3. Mobility based Segment Resizing Algorithm:

Adjusts segment size according to node mobility in order

to reduce the transmission time

4. Traffic Redundant elimination Algorithm: To

increase the transmission throughput

5. Data redundancy elimination based transmission

Algorithm: To Eliminate the redundant data to improve

the transmission QOS

Page 5: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

Advantage

It can provide the high QOS performance such as

overhead, transmission delay, mobility-resilience and

scalability

Disadvantage

In this method, there is a chance for attackers

Page 6: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

Proposed systemIn this project proposed a new intrusion-detection

system named Enhanced Adaptive ACKnowledgment(EAACK) specially designed for HWNsUsing the SQOD scheme, the attacker has been

detected efficientlyIn this scheme, SQOD is splitted into 3 categories.

1. ACKnowledgment (ACK)2.Secure-ACKnowledgement (S-ACK) 3.Misbehavior Report Authentication (MRA)

Page 7: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

Advantage

Reduced receiver collisions and false misbehavior

report

Increase the limited transmission power

Page 8: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

Modules

ACK Mode

SACK Mode

MRA Mode

Page 9: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

ACK ModeACK is basically an end-to-end acknowledgment

schemeIt acts as a part of the hybrid scheme in SQOD, aiming

to reduce network overhead when no network misbehavior is detected

Page 10: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

S-ACK ModeEvery three consecutive nodes work in a group to

detect misbehaving nodes For every three consecutive nodes in the route, the

third node is required to send an S-ACK acknowledgment packet to the first node

source node immediately trusts the misbehavior report, EQOD requires the source node to switch to MRA mode and confirm this misbehavior report

Page 11: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

S-ACK Schema

Page 12: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

MRA ModeThe MRA scheme is designed to resolve the weakness

of Watchdog The false misbehavior report can be generated by

malicious attackers to falsely report innocent nodes as malicious

This attack can be lethal to the entire network when the attackers break down sufficient nodes and thus cause a network division

The core of MRA scheme is to authenticate whether the destination node has received the reported missing packet through a different route

Page 13: A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS

Next ModuleAbove the three module implement to QOD Routing

ProtocolIt can provide Secure QOS routing in Hybrid Wireless

Networks