secure routing in dsr
TRANSCRIPT
![Page 1: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/1.jpg)
Secure Routing in DSR
BY GROUP 4: Riya Chauhan(141060753016)
Birju Tank((141060753017)
Naman Vaishnav((141060753018)
Dhara Patel((141060753019)
Okasha Mahi((141060753020)
DATE:17/04/2015
GTU PG SCHOOL – IEEE PRESENTATION
![Page 2: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/2.jpg)
![Page 3: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/3.jpg)
![Page 4: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/4.jpg)
![Page 5: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/5.jpg)
![Page 6: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/6.jpg)
![Page 7: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/7.jpg)
![Page 8: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/8.jpg)
![Page 9: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/9.jpg)
![Page 10: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/10.jpg)
![Page 11: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/11.jpg)
![Page 12: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/12.jpg)
![Page 13: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/13.jpg)
![Page 14: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/14.jpg)
![Page 15: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/15.jpg)
![Page 16: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/16.jpg)
Attacks On DSR
• Warm-Hole Attacks
• Black-Hole Attack . .
![Page 17: Secure routing in DSR](https://reader034.vdocuments.mx/reader034/viewer/2022042607/55aa21861a28ab425b8b4662/html5/thumbnails/17.jpg)
References
• “An Efficient Secure Route Discovery Protocol for DSR”Kulasekaran A. Sivakumar and Mahalingam Ramkumar Department of Computer Science and Engineering Mississippi State University, MS., 2007 IEEE,
• “ASSOCIATION BETWEEN NODES TO COMBAT BLACKHOLE ATTACK IN DSR BASED MANET” N.Bhalaji, Dr.A.Shanmugam,Anna University Coimbatore,Tamilnadu, India