SlideShare a Scribd company logo
Secure Routing in DSR
BY GROUP 4: Riya Chauhan(141060753016)
Birju Tank((141060753017)
Naman Vaishnav((141060753018)
Dhara Patel((141060753019)
Okasha Mahi((141060753020)
DATE:17/04/2015
GTU PG SCHOOL – IEEE PRESENTATION
Secure routing in DSR
Secure routing in DSR
Secure routing in DSR
Secure routing in DSR
Secure routing in DSR
Secure routing in DSR
Secure routing in DSR
Secure routing in DSR
Secure routing in DSR
Secure routing in DSR
Secure routing in DSR
Secure routing in DSR
Secure routing in DSR
Secure routing in DSR
Attacks On DSR
• Warm-Hole Attacks
• Black-Hole Attack . .
References
• “An Efficient Secure Route Discovery Protocol for DSR”Kulasekaran A.
Sivakumar and Mahalingam Ramkumar Department of Computer
Science and Engineering Mississippi State University, MS., 2007 IEEE,
• “ASSOCIATION BETWEEN NODES TO COMBAT BLACKHOLE ATTACK IN
DSR BASED MANET” N.Bhalaji, Dr.A.Shanmugam,Anna University
Coimbatore,Tamilnadu, India

More Related Content

PPTX
"Underrepresented" is not just a buzzword: A closer look at the lack of ethni...
PPTX
Improved dsr algo routing in manet
PPTX
DSR Protocol
PPTX
DYNAMIC SOURCE ROUTING (DSR)
PPTX
Dynamic source routing
PPTX
Database security
PPTX
Vulnerabilities in Android
PPTX
Blackhole Attck detection in AODV Protocol
"Underrepresented" is not just a buzzword: A closer look at the lack of ethni...
Improved dsr algo routing in manet
DSR Protocol
DYNAMIC SOURCE ROUTING (DSR)
Dynamic source routing
Database security
Vulnerabilities in Android
Blackhole Attck detection in AODV Protocol

More from Birju Tank (11)

PPTX
5 g technology
DOCX
Literature review report
PPTX
J2ME Mobile app
PPTX
Android vs iOS encryption systems
PPTX
Software prototyping
PPTX
Secure lab setup for cyber security
PPTX
Data mining
PPTX
Android operating system
PPT
Virtualization
PPTX
Mobile Broadband Wireless Access
PPTX
Process management
5 g technology
Literature review report
J2ME Mobile app
Android vs iOS encryption systems
Software prototyping
Secure lab setup for cyber security
Data mining
Android operating system
Virtualization
Mobile Broadband Wireless Access
Process management
Ad

Recently uploaded (20)

PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
composite construction of structures.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Digital Logic Computer Design lecture notes
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Geodesy 1.pptx...............................................
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
PPT on Performance Review to get promotions
PPTX
Lecture Notes Electrical Wiring System Components
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
composite construction of structures.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Operating System & Kernel Study Guide-1 - converted.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
R24 SURVEYING LAB MANUAL for civil enggi
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Mechanical Engineering MATERIALS Selection
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Digital Logic Computer Design lecture notes
Embodied AI: Ushering in the Next Era of Intelligent Systems
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Geodesy 1.pptx...............................................
Foundation to blockchain - A guide to Blockchain Tech
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPT on Performance Review to get promotions
Lecture Notes Electrical Wiring System Components
Ad

Secure routing in DSR

  • 1. Secure Routing in DSR BY GROUP 4: Riya Chauhan(141060753016) Birju Tank((141060753017) Naman Vaishnav((141060753018) Dhara Patel((141060753019) Okasha Mahi((141060753020) DATE:17/04/2015 GTU PG SCHOOL – IEEE PRESENTATION
  • 16. Attacks On DSR • Warm-Hole Attacks • Black-Hole Attack . .
  • 17. References • “An Efficient Secure Route Discovery Protocol for DSR”Kulasekaran A. Sivakumar and Mahalingam Ramkumar Department of Computer Science and Engineering Mississippi State University, MS., 2007 IEEE, • “ASSOCIATION BETWEEN NODES TO COMBAT BLACKHOLE ATTACK IN DSR BASED MANET” N.Bhalaji, Dr.A.Shanmugam,Anna University Coimbatore,Tamilnadu, India