You are on page 1of 12

FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems

TEAM MEMBERS
MaduraDevi.V Sharmila.R Vaishnavi.R

Shanthoshini.R
Guide :Ms VanathiPriyadharshini AP

Network Router Protocol

Adhoc

Secure

routing in ad hoc mobile Networks Effectively Isolate The Malicious Nodes Reduces The Overhead On Network

Design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne. Ariadne prevents attackers or compromised nodes from tampering with uncompromised nodes Prevents from Denial-of-Service attacks.

This works by sending challenges and sharing friend Lists to provide a list of trusted nodes to the source node through which data transmission finally takes place. Provides a Robust mechanism For Thwarting attacks by isolating malicious nodes in the network

The nodes in the friend list are rated on the basis of the amount of data transmission they accomplish and their friendship with other nodes in the network. The result of this scheme of operation, the network is able to effectively isolate the malicious nodes which are left with no role to play in the ad hoc network. No proper security provided. cryptography is used for high security, the hackers can hack the data of single letter encryption. Time Delay is high.

Secure

routing protocols for ad hoc networks. Describe several new attacks on ad hoc network routing protocols Describe Ariadne- withstands node compromise and relies only on highly efficient symmetric cryptography.

Ariadne is more secure, more efficient, or more general

Our goal is to design simple and efficient mechanisms achieving high attack robustness High security is maintained due to the encryption in every word using this Ariadne Protocol method with eavesdropping.

Software Requirements

Operating system : Windows XP Professional Environment : Visual Studio .NET 2008/2005 .NET framework : Version 3.5 Language : C#.NET Backend : SQL SERVER 2005

Thank you

You might also like