Presentation on theme: "Trust based Dynamic MANET On-demand Routing Protocol (TDRP) Under the guidance of Dr. P. Samundiswary Asst. Professor By J Naveen Reg. No. 13304033 M.Tech."— Presentation transcript:
Trust based Dynamic MANET On-demand Routing Protocol (TDRP) Under the guidance of Dr. P. Samundiswary Asst. Professor By J Naveen Reg. No. 13304033 M.Tech (Electronics) Department of Electronics Engineering Pondicherry University
Contents Objective Introduction Routing protocols Existing model Proposed model Work plan References
Objective To Study and analyze the performance of Zigbee based WSN using Trust based Dynamic MANET On-demand (DYMO) Routing Protocol (TDRP).
Introduction ZigBee is an IEEE 802.15.4 based wireless sensor network standard. ZigBee is a low-cost, low-power, and low memory wireless mesh network standard. It is having typical of 60 KB and 256 KB flash memory. Operates in the Industrial, Scientific and Medical (ISM) radio bands. i.e., 868 MHz in Europe, 915 MHz in the USA and Australia and 2.4 GHz in most jurisdictions worldwide. Data transmission rates: 20 kbps at 868 MHz frequency band and 250 kbps at 2.4 GHz frequency
Routing protocols A routing protocol specifies how routers should communicate with each other in network. Routing algorithm determines the efficient use of resources. Types of routing protocols Proactive (Table driven) Reactive (On demand) Hybrid protocols
Reactive protocols These protocols are based on source initiated on-demand reactive routing. This type of routing discovers routes only when a node requires a route to a destination. Eg: DSR, AODV, DYMO, LAR Adv : Saves energy & B.W during in activity period, good for low traffic. Disadv : High latency time in route finding, Excessive flooding can lead to network clogging.
DYMO…… DYMO is purely based on sequence numbers assigned to all packets. During route discovery, the source node initiates a Route Request (RREQ) throughout the network to find a route to the destination node. During this hop-by-hop dissemation process, each intermediate node records a route to the source node.
What is Trust… A Trust is the degree of belief’s about the behaviour of other ones. In order to ensure that the network provides its services without any problem, a trust based protocol helps to resolve this issue. Based on trust level each node communicates with its neighbours. A Trust which can also used to reduce the size of the data sent from node to node and thus decrease the needed power consumption. If the trust factor is high, low cryptography can take place and this leads to reduce the amount of bandwidth.
Existing model The trust concept applied to DSDV protocol helps to increase the security level of the network as it will avoid any misbehaving actions and denying malicious nodes. The trust factors including network-ack, data confidentiality, data integrity and drop ratio.
Calculation of Trust factor Trust factor 10 means that node 2 is completely trusted by node 1 and the value of data is low. if node 1 has a trust factor of 5 for node 2 and the value of data is medium, node 1 is going to use high encryption. HighMediumLow 9 & 10Medium Encryption No Encryption 6,7 & 8High EncryptionMedium Encryption No Encryption 2,3,4 & 5High Encryption No Encryption 0 & 1---
A scenario of trusted and untrusted nodes in the network.
Proposed model In proposed model, the Trust based model is applied to the existing DYMO based reactive protocol.
Work plan Time LineDescription Review 0 (14 th -15 th July) Problem definition and literature survey Review I (3 rd week of August) Performance analysis with the help of software on existing model and progress towards proposed model Review II (2 nd week of October) Power consumption of proposed model and power consumption comparison between existing and proposed models 14 th November, 2014Submission of Softcopy Phase I Report to Dept. Project Supervisor 25 th November, 2014Submission of hard copy of the report to Department 27 th November, 2014Viva-Voce Examination
References Marwah Almasri, Khaled Elleithy, Anas Bushang, and Remah Alshinina.,“A Trusted and Energy Efficient Routing Protocol for Wireless Sensor Networks,” IEEE International Symposium on Distributed Simulation.,207- 214, 2013. Zahariadis, T.; Trakadas, P.; Leligou, H.; Karkazis, P.; Voliotis, S.,"Implementing a Trust-Aware Routing Protocol in Wireless Sensor Nodes," Developments in E-systems Engineering (DESE), 2010pp.47,52, 6- 8 Sept. 2010. Pushpa, A.M., “Trust based secure routing in AODV routing protocol,” Internet Multimedia Services Architecture and Applications (IMSAA),2009 IEEE International Conference on, vol., no., pp.1,6, 9-11 Dec.2009. A rif, M. Z., & Shrivastava, G. (2012). Trusted Destination Sequenced Distance Vector Routing Protocol for Mobile Ad-hoc Network. International Journal of Computer Application, 15, 0975-887.
Your consent to our cookies if you continue to use this website.