the secure zone routing protocol(szrp)1
DESCRIPTION
kkkTRANSCRIPT
![Page 1: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/1.jpg)
THE SECURE ZONE THE SECURE ZONE ROUTING ROUTING
PROTOCOL(SZRP)PROTOCOL(SZRP)
![Page 2: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/2.jpg)
IntroductionIntroduction
• Mobile Ad hoc NETworks
>self-organizing and infrastructure less
>dynamic network topology
>needed more active distributed algorithm
![Page 3: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/3.jpg)
Routing ProtocolsRouting Protocols
• Pro-active protocol> DSDV, OLSR, FSR.
• Re-active protocol >AODV, DSR.
• Hybrid protocol
>ZRP,ZHLS
![Page 4: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/4.jpg)
Security ProtocolsSecurity Protocols
Security goals
• Confidentiality• Integrity• Availability• Authenticity• Non-repudiation
![Page 5: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/5.jpg)
Protocols
• Authenticated Routing for Ad hoc Networks(ARAN)
• Security-Aware Ad hoc Routing(SAR)
• Secure Ad hoc )n-demand Vector Routing(SAODV)
• CONFIDANT protocol
• Watchdog and Path rater etc.,
![Page 6: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/6.jpg)
Zone Routing Protocol(ZRP)Zone Routing Protocol(ZRP)
• Hybrid routing protocol
• Uses proactive routing within a zone and reactive routing outside the zone
• Components: IARP, IERP, BRP
![Page 7: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/7.jpg)
Routing zone and Intra-zone Routing zone and Intra-zone RoutingRouting
2
35
6
10
1
7
9
13
15
14
11
12
8
4
![Page 8: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/8.jpg)
1
2
36
12
8
7
9
13
15
14
11
4
5
1016
Inter Zone Routing(IERP)Inter Zone Routing(IERP)
![Page 9: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/9.jpg)
Secure zone routing Secure zone routing protocol (SZRP)protocol (SZRP)
• Routing techniques are same as ZRP protocol with inclusion of security features
• Uses public key certificates for key distribution and management
![Page 10: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/10.jpg)
Security issuesSecurity issues
• End to End authentication
• Message/packet integrity
• Data confidentiality
![Page 11: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/11.jpg)
Certification ProcessCertification Process
![Page 12: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/12.jpg)
ArchitectureArchitecture
![Page 13: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/13.jpg)
Secure RoutingSecure Routing
EF
Y
A
B
C
DG
H
IJ
Zone of A
Zone of C
Zone of G
Other nodes
Source/ Destination
CAs
![Page 14: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/14.jpg)
Performance MetricsPerformance Metrics
• Average packet delivery fraction.• Average routing load in bytes.• Average routing load in terms of packets.• Average route acquisition latency.• Percentage of packets dropped that
passed through malicious nodes.
![Page 15: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/15.jpg)
Analysis of SZRPAnalysis of SZRP
• Prevention from information disclosure• Attacks involving impersonation• Routing message modification• Fabrication of messages• Replay attacks
![Page 16: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/16.jpg)
Network Simulator (ns-2)Network Simulator (ns-2)• Ns is a discrete event simulator targeted
at networking research. Ns provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks.
![Page 17: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/17.jpg)
Network Animator (nam)Network Animator (nam)• Nam is a Tcl/TK based animation tool for
viewing network simulation traces and real world packet traces. It is mainly intended as a companion animator to the ns simulator.
![Page 18: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/18.jpg)
ResultsResults
![Page 19: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/19.jpg)
Simple ExampleSimple Example
![Page 20: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/20.jpg)
Transmission between 10 nodes Transmission between 10 nodes
![Page 21: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/21.jpg)
Transmission between 20 nodesTransmission between 20 nodes
![Page 22: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/22.jpg)
Routing packets between zonesRouting packets between zones
![Page 23: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/23.jpg)
ConclusionConclusion
• Robust against multiple attacks.• Good solution towards achieving the
security goals.• The impact of time overhead is negligible
compared to the degree of security.
![Page 24: The Secure Zone Routing Protocol(Szrp)1](https://reader037.vdocuments.us/reader037/viewer/2022100304/552d3cfb55034614108b465c/html5/thumbnails/24.jpg)
THANK YOU