THE SECURE ZONE ROUTING PROTOCOL(SZRP

)

Introduction
• Mobile Ad hoc NETworks
>self-organizing and infrastructure less

>dynamic network topology

>needed more active distributed algorithm

Routing Protocols
• Pro-active protocol > DSDV, OLSR, FSR. • Re-active protocol >AODV, DSR.

• Hybrid protocol
>ZRP,ZHLS

Security Protocols
 Security goals
• • • • • Confidentiality Integrity Availability Authenticity Non-repudiation

Protocols
• Authenticated Routing for Ad hoc Networks(ARAN) • Security-Aware Ad hoc Routing(SAR) • Secure Ad hoc )n-demand Vector Routing(SAODV)

• CONFIDANT protocol
• Watchdog and Path rater etc.,

Zone Routing Protocol(ZRP)
• Hybrid routing protocol • Uses proactive routing within a zone and reactive routing outside the zone

• Components: IARP, IERP, BRP

Routing zone and Intra-zone Routing
15

14
1 11 10 4 5 6 3 8

13

9

7

2
12

Inter Zone Routing(IERP)
15
14 12 8 10 16 5 6 2 1 4 3 7 13

11

9

Secure zone routing protocol (SZRP)
• Routing techniques are same as ZRP protocol with inclusion of security features • Uses public key certificates for key distribution and management

Security issues
• End to End authentication • Message/packet integrity • Data confidentiality

Certification Process

Architecture

Secure Routing
I J Zone of G

H
G D Zone of C

C
Zone of A A B Source/ Destination CAs F E Y Other nodes

Performance Metrics
• • • • • Average packet delivery fraction. Average routing load in bytes. Average routing load in terms of packets. Average route acquisition latency. Percentage of packets dropped that passed through malicious nodes.

Analysis of SZRP
• • • • • Prevention from information disclosure Attacks involving impersonation Routing message modification Fabrication of messages Replay attacks

Network Simulator (ns-2)
• Ns is a discrete event simulator targeted at networking research. Ns provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks.

Network Animator (nam)
• Nam is a Tcl/TK based animation tool for viewing network simulation traces and real world packet traces. It is mainly intended as a companion animator to the ns simulator.

Results

Simple Example

Transmission between 10 nodes

Transmission between 20 nodes

Routing packets between zones

Conclusion
• Robust against multiple attacks. • Good solution towards achieving the security goals. • The impact of time overhead is negligible compared to the degree of security.

THANK YOU

Sign up to vote on this title
UsefulNot useful