modeling and conceptualize a secure ad hoc routing protocol in wireless networks using dna...
TRANSCRIPT
Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks
Using DNA Cryptography
E.SURESH BABU M.TECH(Phd)
Dept of ITMentee
Laki Reddy Bali Reddy College of Engineering,
Mylavaram
Dr. G. Ram Murthy Mentor
Dr.C.Nagaraju Professor &Head
Mentee
2
Introduction
Recent Advances in Mobile Technology and
Mobile Devices
Mobile Computing has become an important
part of our life.
People are using wireless networks for their
day-to-day work
The desire to be connected anytime,
anywhere, anyhow has led to the
development of wireless networks
Statement of the Problem
In this Proposed work,
Focus has been put on the strategy to
address the security issue
A lot of emphasis has been given on the
routing mechanism and
Security Area has not been addressed
adequately in Existing Research
3
Statement of the Problem
The Main Objective of the Proposed Work can
be stated as – “Modeling and Conceptualize a
secure routing protocol for MANETs”.
In order to handle the above problem, the
following outline is proposed
Evaluation and Analysis of existing ad hoc routing
protocols
Design and development of the proposed routing
protocol
4
Statement of the Problem
The New Protocol will be proposed after
proper verification and validation through
simulations
5
Protocol Classes
6
Ready to go
Whole topology
Updates changes
Reactive
On-demand
Little maintenance
Cell operations
Proactive
Overhead Costs
Bandwidth
Battery power
Inflexible
Proposed Work
In our study the On-demand (Reactive)
Protocols have a lower communication
overhead because
the roots are built only when required and
there are no periodic updates required.
We consider a Routing Protocol, namely, Ad hoc
On-Demand Distance Vector (AODV).
The AODV is an on-demand routing protocol
based on the concept of reactive routing
7
AODV
Improving the Ad-hoc On-demand Distance
Vector
Charles E. Perkins, 1999
Reactive protocol
Fast discovery
Loop free
On-demand
8
Security Mechanisms
9
Security Mechanisms A pseudo DNA (Deoxyribo Nucleic Acid)
based cryptographic algorithm is used in
order to secure the MANETs.
The pseudo DNA cryptography is a concept
inspired from the field of life science and has
been extended to the field of MANETs to
secure them.
10
IntroductionEncoding data “as in nature
11
Recombinationalgorithm
Input Output
Molecular AI: DNA Computing
DNA ComputingDNA Computing
12
011001101010001 ATGCTCGAAGCT
DNA ComputingDNA Computing
13
DNADNA (Deoxyribonucleic acid)
GeneticGenetic information “memory”
NucleotidesNucleotides strung into polymer chainspolymer chains (DNA Strands)
Four classes of nucleotides: Adenine, Guanine, Cytosine, ThymineAdenine, Guanine, Cytosine, Thymine (A,C,G,T)
DNA
DNA Computing DNA Computing The Structure of DNA
14
•
The double helix structure discovered by Watson and Crick
1515
HPP
...
...... ...
ATGATG
ACGACG
TGCTGC
CGACGATAATAAGCAGCA
CGTCGT
......
...
...
......
......
10
3
2 5
6
4
Solution
PCR(Polymerase
Chain Reaction)
ATGTGCTAACGAACG
ACGCGAGCATAAATGTGCCGTACGCGAGCATAAATGTGCCGT
TAAACG
CGACGT
TAAACGGCAACG
...
...
...
...
CGACGTAGCCGT
...
...
...
ACGCGAGCATAAATGTGCCGTACGCGAGCATAAATGTGCCGT
ACGCGTAGCCGT
ACGCGT...
...
...
...
...
ACGGCATAAATGTGCACGCGT
ACGCGAGCATAAATGCGATGCCGT
ACGCGAGCATAAATGTGCCGTACGCGAGCATAAATGTGCCGT
......
.........
ACGCGAGCATAAATGTGCCGTACGCGAGCATAAATGTGCCGT
...
......
...
...
Decoding
LigationEncoding
Gel Electrophoresis
Affinity Column
ACGCGAGCATAAATGTGCACGCGT
ACGCGAGCATAAATGCGATGCACGCGT
ACGCGAGCATAAATGTGCACGCGT
ACGCGAGCATAAATGCGATGCACGCGT
2
01
3 4
5
6
The Central Dogma of molecular biology
16
Pseudo DNA cryptography
17
Security Mechanisms
In proposed work, one potential key
application will be used known as DNA-
based molecular cryptography
systems.
it provides a much more compact storage
medium, and
An extremely small amount of DNA
suffices even for huge one-time pads.
18
Conclusion
Finally,the New Routing Protocol will be
validated through various simulation
scenarios,
19
Thank U
20