modeling and conceptualize a secure ad hoc routing protocol in wireless networks using dna...

20
Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki Reddy Bali Reddy College of Engineering, Mylavaram Dr. G. Ram Murthy Mentor Dr.C.Nagaraju Professor &Head Mentee

Upload: pierce-melton

Post on 13-Jan-2016

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks

Using DNA Cryptography

E.SURESH BABU M.TECH(Phd)

Dept of ITMentee

Laki Reddy Bali Reddy College of Engineering,

Mylavaram

Dr. G. Ram Murthy Mentor

Dr.C.Nagaraju Professor &Head

Mentee

Page 2: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

2

Introduction

Recent Advances in Mobile Technology and

Mobile Devices

Mobile Computing has become an important

part of our life.

People are using wireless networks for their

day-to-day work

The desire to be connected anytime,

anywhere, anyhow has led to the

development of wireless networks

Page 3: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

Statement of the Problem

In this Proposed work,

Focus has been put on the strategy to

address the security issue

A lot of emphasis has been given on the

routing mechanism and

Security Area has not been addressed

adequately in Existing Research

3

Page 4: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

Statement of the Problem

The Main Objective of the Proposed Work can

be stated as – “Modeling and Conceptualize a

secure routing protocol for MANETs”.

In order to handle the above problem, the

following outline is proposed

Evaluation and Analysis of existing ad hoc routing

protocols

Design and development of the proposed routing

protocol

4

Page 5: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

Statement of the Problem

The New Protocol will be proposed after

proper verification and validation through

simulations

5

Page 6: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

Protocol Classes

6

Ready to go

Whole topology

Updates changes

Reactive

On-demand

Little maintenance

Cell operations

Proactive

Overhead Costs

Bandwidth

Battery power

Inflexible

Page 7: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

Proposed Work

In our study the On-demand (Reactive)

Protocols have a lower communication

overhead because

the roots are built only when required and

there are no periodic updates required.

We consider a Routing Protocol, namely, Ad hoc

On-Demand Distance Vector (AODV).

The AODV is an on-demand routing protocol

based on the concept of reactive routing

7

Page 8: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

AODV

Improving the Ad-hoc On-demand Distance

Vector

Charles E. Perkins, 1999

Reactive protocol

Fast discovery

Loop free

On-demand

8

Page 9: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

Security Mechanisms

9

Page 10: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

Security Mechanisms A pseudo DNA (Deoxyribo Nucleic Acid)

based cryptographic algorithm is used in

order to secure the MANETs.

The pseudo DNA cryptography is a concept

inspired from the field of life science and has

been extended to the field of MANETs to

secure them.

10

Page 11: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

IntroductionEncoding data “as in nature

11

Recombinationalgorithm

Input Output

Molecular AI: DNA Computing

Page 12: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

DNA ComputingDNA Computing

12

011001101010001 ATGCTCGAAGCT

Page 13: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

DNA ComputingDNA Computing

13

DNADNA (Deoxyribonucleic acid)

GeneticGenetic information “memory”

NucleotidesNucleotides strung into polymer chainspolymer chains (DNA Strands)

Four classes of nucleotides: Adenine, Guanine, Cytosine, ThymineAdenine, Guanine, Cytosine, Thymine (A,C,G,T)

DNA

Page 14: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

DNA Computing DNA Computing The Structure of DNA

14

The double helix structure discovered by Watson and Crick

Page 15: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

1515

HPP

...

...... ...

ATGATG

ACGACG

TGCTGC

CGACGATAATAAGCAGCA

CGTCGT

......

...

...

......

......

10

3

2 5

6

4

Solution

PCR(Polymerase

Chain Reaction)

ATGTGCTAACGAACG

ACGCGAGCATAAATGTGCCGTACGCGAGCATAAATGTGCCGT

TAAACG

CGACGT

TAAACGGCAACG

...

...

...

...

CGACGTAGCCGT

...

...

...

ACGCGAGCATAAATGTGCCGTACGCGAGCATAAATGTGCCGT

ACGCGTAGCCGT

ACGCGT...

...

...

...

...

ACGGCATAAATGTGCACGCGT

ACGCGAGCATAAATGCGATGCCGT

ACGCGAGCATAAATGTGCCGTACGCGAGCATAAATGTGCCGT

......

.........

ACGCGAGCATAAATGTGCCGTACGCGAGCATAAATGTGCCGT

...

......

...

...

Decoding

LigationEncoding

Gel Electrophoresis

Affinity Column

ACGCGAGCATAAATGTGCACGCGT

ACGCGAGCATAAATGCGATGCACGCGT

ACGCGAGCATAAATGTGCACGCGT

ACGCGAGCATAAATGCGATGCACGCGT

2

01

3 4

5

6

Page 16: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

The Central Dogma of molecular biology

16

Page 17: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

Pseudo DNA cryptography

17

Page 18: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

Security Mechanisms

In proposed work, one potential key

application will be used known as DNA-

based molecular cryptography

systems.

it provides a much more compact storage

medium, and

An extremely small amount of DNA

suffices even for huge one-time pads.

18

Page 19: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

Conclusion

Finally,the New Routing Protocol will be

validated through various simulation

scenarios,

19

Page 20: Modeling and Conceptualize A Secure Ad hoc Routing Protocol in Wireless Networks Using DNA Cryptography E.SURESH BABU M.TECH(Phd) Dept of IT Mentee Laki

Thank U

20