SlideShare uma empresa Scribd logo
1 de 15
CONTENT
 INTRODUCTION
 OVER VIEW
 PROTOCOLS AND ATTACKS
 STATEFUL PROTOCOLS AND THEIR ATTACKS
 STATELESS PROTOCOLS AND THEIR ATTACKS
 CLEAN STATE SECURE ROUTING PROTOCOL (PLGP)
 MODULES
 CONCLUSION
INTRODUCTION
• Fundamental Issue
• Proposed Method Discusses Resource Depletion Attacks
• Minimal Exposure Paths
• An Algorithm Is Used
• Wireless Medium Allows An Attacker
OVER VIEW
• Communication In Terms Of Power
– The Carousel Attack (Allowing Single Packet)
– The Stretch Attack (Artificially Long Route)
Fig. 1 Fig. 2
PROTOCOLS AND ATTACKS
• Sleep Deprivation Torture
• Denial-of-sleep
• SYN Flood Attack
Conti..
Carousel Attack Stretch attack
Stateful Protocols and their
Attacks
• It Requires The Server
• Two Important Classes
– Olsr
– Dsdv
• Two Types Of Attacks
– Directional Antenna Attack
– Malicious Discovery Attack.
Stateless Protocols and their
Attacks
• It doesn’t requires the server
• Communication protocol
• Two types of attacks
– Carousel Attack
– Stretch attack
Clean State Secure Routing
Protocol (PLGP)
• Provable Security Against Vampire Attacks
– Definition 1
No- backtracking is satisfied
– Definition 2
The hop count of packet p received
Modules
A. Topology Discovery and Cluster Head Selection
Conti...
B.Tree Formation and Route Discovery
Conti…
C. Forwarding the Packets
CONCLUSION
helping the disabled in every manner in the field of transportation.

Mais conteúdo relacionado

Destaque

Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
sai krishna
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
asharanick
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
jaisica
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
Niki Upadhyay
 

Destaque (16)

Quantum dots ppt
Quantum dots ppt Quantum dots ppt
Quantum dots ppt
 
Cloud Computing and your Data Warehouse
Cloud Computing and your Data WarehouseCloud Computing and your Data Warehouse
Cloud Computing and your Data Warehouse
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde
 
Technology in ECE
Technology in ECETechnology in ECE
Technology in ECE
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
 
Easy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry pptEasy to swallow wireless telemetry ppt
Easy to swallow wireless telemetry ppt
 
Ece ppt[1]
Ece ppt[1]Ece ppt[1]
Ece ppt[1]
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
 
Nfc technology ppt
Nfc technology pptNfc technology ppt
Nfc technology ppt
 
Technology trends for 2016
Technology trends for 2016 Technology trends for 2016
Technology trends for 2016
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communication
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Semelhante a CONFERENCE

Vasserman-TMC13-slide
Vasserman-TMC13-slideVasserman-TMC13-slide
Vasserman-TMC13-slide
manoj kumar s
 

Semelhante a CONFERENCE (8)

Hardware Trojans
Hardware TrojansHardware Trojans
Hardware Trojans
 
Vasserman-TMC13-slide
Vasserman-TMC13-slideVasserman-TMC13-slide
Vasserman-TMC13-slide
 
Analysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queriesAnalysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queries
 
Presentation on Long Reach Passive Optical Network (LR-PON)
Presentation on Long Reach Passive Optical Network (LR-PON) Presentation on Long Reach Passive Optical Network (LR-PON)
Presentation on Long Reach Passive Optical Network (LR-PON)
 
SPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptxSPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptx
 
Introduction to Attacks on Bitcoin and Cryptos
Introduction  to Attacks on  Bitcoin and CryptosIntroduction  to Attacks on  Bitcoin and Cryptos
Introduction to Attacks on Bitcoin and Cryptos
 
Pilot protection
Pilot protectionPilot protection
Pilot protection
 
On Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio NetworksOn Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio Networks
 

CONFERENCE