Sie sind auf Seite 1von 16

Data communication

Presented by:
Talha Riaz ECI-IT-14-099
Umar Hassan ECI-IT-05-089
Muhammad Mumtaz ECI-IT-14-052

Presented To:
Engr. Uzma Majeed
Introduction
 Mobile Ad hoc Networks (MANET) is a
technology where multiple nodes are
connected with wireless connection and
independent to form network topology.
 MANET is a mobile network in which
each node communicate each other
without using any predefine
infrastructure or central administration.
Introduction (count….)
 These networks are mainly uses in
temporary networks or to form a small
networking topology
 By new emerging technologies like Wi-Fi
(wireless lane), Bluetooth make mobile
ad-hoc networking more realistic
Routing Protocols
Stands For
 DSDV Destination-Sequenced Distance-Vector Routing

 AODV Ad-hoc on demand vector routing

 DSR Dynamic source routing

 TORA Temporally ordered routing algorithm

 ZRP Zone routing protocol


Attacks on manet
 Location disclosure
Location disclosure is a type of attack that directly
attacks the privacy terms of an ad-hoc network
 Black hole
A black hole problem means that one malicious
node utilizes the routing protocol to claim itself of
being the shortest path to the destination node
 Replay
This attack can degrade the performance of the
manet
Attack on manet (cont….)
 Wormhole
Wormhole node fake a route that is shorter
then the original one with in the network this
can confuse routing mechanism.

 Denial service attack


This attack can completely disturbs the
routing function which effects the whole ad-
hoc network. A denial service attack is an
attempt to make a network resource
unavailable to its intended users
Attack on manet (cont….)
 Routing
This attack can maintain the routing table that
contains the information about the route of the
network
 Breaking the neighbor relationship
An intelligent filter is placed in between two ISS
(information system) that could change
information in the routing update.
Applications
 Military Tactical Operations: For fast
and possibly short term establishment of
military communications.

 Search and Rescue Operations: For


communication in areas with little or no
wireless infrastructure support.
Applications (count..)
 Disaster Relief Operations: For
communication in environments where the
existing infrastructure is destroyed or left
inoperable.
 Law Enforcement: For secure and fast
communication during law enforcement
operations.
 Commercial Use: For enabling
communications in exhibitions, conferences
and large gatherings.
Proposed Methodology
 Implementation in
Smart houses
 Implementation in site
areas
 useful for projects in
remote areas
 By using Mobile
phone
 With wi-fi and
Bluetooth
Proposed Methodology (count…)

 Two step Routing Protocol


 We use two different protocols
 To avoid attacks
 Not easy to hack by someone
 By this technique our
communication is more
secure
Conclusion

 Before apply any routing protocol check


the drawback.
 Our technique not clear the attacks
 Our technique not clarify the
Implementation

Das könnte Ihnen auch gefallen