Title: Mobile Ad hoc Network
1Mobile Ad hoc Network
- What is it ?
- Application of Mobile Ad hoc Network..
- Configuration Security challenges
- Presented By
- 1. Sanaul Haque Himel -- 012112032
- 2. Fizar Ahmed 012081006
- 3. Md. Osman Goni -- 012093006
2What is Mobile Ad hoc Network
- Networks deployed in random distribution
- Low power
- Delivering sensor data to a central site for some
purpose
3Definition of Mobile Ad hoc Network (MANET)
- Opposed to infrastructured wireless networks,
where each user directly communicates with an
access point or base station, a mobile Ad hoc
network, or MANET, does not rely on a fixed
infrastructure for its operation. - The network is an autonomous transitory
association of mobile nodes that communicate with
each other over wireless links. - Nodes that lie within each others send range can
communicate directly and are responsible for
dynamically discovering each other. - In order to enable communication between nodes
that are not directly within each others send
range, intermediate nodes act as routers
4Cellular Network versus Mobile AD Hoc Network
5Characteristics and Complexities of Mobile Ad hoc
Networks
- Autonomous and Infrastructureless
- Multi-hop routing
- Dynamic network topology
- Device heterogeneity
- Energy constrained operation
- Bandwidth constrained variable capacity links
- Limited physical security
- Network scalability
- Self-creation, self-organization and
self-administration
6Routing of MANET
- Proactive Routing Protocol To have an
up-to-date route to all other nodes at all times.
To this end, this protocol will exchange routing
control information periodically and on
topological changes. - Reactive Routing Protocol Only set up routes to
nodes they communicate with and these routes are
kept alive as long as they are needed. - Hybrid Routing Protocol Combinations of
proactive and reactive protocols, where nearby
routes (for example, maximum two hops) are kept
up-to-date proactively, while far-away routes are
set up reactively. - Location-Based Routing Protocol Where packet
forwarding is based on the location of a nodes
communication partner.
7Overview of Existing Routing Technique
8Mobile Ad Hoc Network Enabling Technologies
9Application of Mobile Ad hoc Network
- Tactical networks
- Military communication and operations
- Automated battlefields
- Emergency services
- Search and rescue operations
- Disaster recovery
- Replacement of fixed infrastructure in case of
environmental disasters. - Policing and fire fighting.
- Supporting doctors and nurses in hospitals.
- Commercial and civilian environments
- E-commerce electronic payments anytime and
anywhere - Business dynamic database access, mobile
offices - Vehicular services road or accident guidance,
transmission of road and weather conditions,
taxi cab network, inter-vehicle networks - Sports stadiums, trade fairs, shopping malls
- Networks of visitors at airports
10Application of Mobile Ad hoc Network
- Home and enterprise networking
- Home/office wireless networking
- Conferences, meeting rooms
- Personal area networks (PAN), Personal
networks (PN) - Networks at construction sites
-
- Education
- Universities and campus settings
- Virtual classrooms
- Ad hoc communications during meetings or
lectures -
- Entertainment
- Multi-user games
- Wireless P2P networking
- Outdoor Internet access
- Robotic pets
- Theme parks
11Application of Mobile Ad hoc Network
- Sensor networks
- Home applications smart sensors embedded in
consumer electronics - Body area networks (BAN)
- Data tracking of environmental conditions,
animal movements, chemical/biological detection -
- Context aware services
- Follow-on services call-forwarding, mobile
workspace - Information services location specific
services, time dependent services -
-
- Coverage extension
- Extending cellular network access
- Linking up with the Internet, intranets, etc.
12Mobile Ad-Hoc Networks using Car-to-Car
Communication
13Mobile Ad-Hoc Networks using Car-to-Car
Communication
14Mobile Ad-Hoc Networks using Healthcare System
15Mobile Ad-Hoc Networks using Healthcare System
16Example Scenario
A Scenario of Ad hoc Networks
Figure Mobile nodes in a City
17Ad Hoc Routing Protocols
There are several type of ad hoc routing
protocols exists. We have used Two sub categories
under two main categories in this discussion.
- 1. On Demand/Reactive Protocols
- - AODV (Ad hoc On Demand Distance Vector)
- Characteristics
- High latency in routing
- No overhead from periodic update
- Latency can be reduced by route caching
- Saves Bandwidth Energy during inactivity
18Ad Hoc Routing Protocols (Cont.)
- 2. Table Driven/Proactive Protocols
- - DSDV (Destination Sequenced Distance
Vector) - Characteristics
- Low latency, suitable for real time traffic
- High overhead (Periodic table updates)
- Bandwidth may wasted due to periodic updates
- Route repair depends upon update frequency
19(No Transcript)
20(No Transcript)
21(No Transcript)
22Experimental Setup (Contd.)
Simulation
Figure ns2 implementation
23Experimental Setup (Contd.)
Node movement
Figure Mobile nodes of ad hoc network
24Experimental Setup (Contd.)
Data Transmission
Figure 100 mobile nodes starts data transmission
25Result analysis
Trace file
We have created an analyzer program in Perl
script to analyze trace files. In the analyzer we
have counted different traffic pattern. Here is a
sample portion of a trace file.
event time from node to node pkt type pkt size flag fid src addr dst addr seq num pkt id
s 0.094186392 _7_ RTR --- 0 message 32 0 0 0 0
------- 7255 -1255 32 0 r 0.095487131 _3_
RTR --- 0 message 32 0 ffffffff 7 800 -------
7255 -1255 32 0 s 0.235686783 _9_ RTR --- 1
message 32 0 0 0 0 ------- 9255 -1255 32 0
r 0.236727347 _2_ RTR --- 1 message 32 0
ffffffff 9 800 ------- 9255 -1255 32 0 r
0.236727531 _3_ RTR --- 1 message 32 0 ffffffff
9 800 ------- 9255 -1255 32 0 s 0.333477301
_6_ RTR --- 2 message 32 0 0 0 0 -------
6255 -1255 32 0 r 3.889605635 _2_ AGT ---
646 ack 60 13a 2 4 800 ------- 40 22 32 2
302 0 1 0 s 3.895907809 _4_ AGT --- 660 ack 40
0 0 0 0 ------- 40 22 32 0 309 0 0 0 r
3.895907809 _4_ RTR --- 660 ack 40 0 0 0 0
------- 40 22 32 0 309 0 0 0 s 3.895907809
_4_ RTR --- 660 ack 60 0 0 0 0 ------- 40
22 32 2 309 0 0 0 r 98.118080147 _3_ RTR ---
18753 cbr 532 13a 3 8 800 ------- 82 92 32
3 303 1 0 f 98.118080147 _3_ RTR --- 18753
cbr 532 13a 3 8 800 ------- 82 92 31 9
303 1 0 D 149.987010754 _4_ RTR CBK 27141 cbr
532 13a 5 4 800 ------- 42 51 32 5 337 0
0 D 150.000000000 _1_ IFQ END 28668 tcp 572 0 2
1 800 ------- 10 20 32 2 748 0 0 0 D
150.000000000 _2_ IFQ END 28631 ack 60 0 1 2
800 ------- 20 10 32 1 734 0 0 0 D
150.000000000 _2_ IFQ END 28633 ack 60 0 1 2
800 ------- 20 10 32 1 735 0 0 0 D
150.000000000 _2_ IFQ END 28634 ack 60 0 1 2
800 ------- 20 10 32 1 736 0 0 0 D
150.000000000 _2_ IFQ END 28637 ack 60 0 1 2
800 ------- 20 10 32 1 737 0 0 0
26Result analysis
DSDV Graph
Nodes Throughput
10 16832564
20 15515556
30 15021056
40 20899824
50 17679552
60 19893052
70 19835588
80 19794640
90 19974384
100 20769060
10
5 Unit
Figure Number of Nodes vs Throughput graph in
DSDV
27Result analysis (Contd.)
AODV Graph
Nodes Throughput
10 13337200
20 13618280
30 14539944
40 17612960
50 14284068
60 17430596
70 15325096
80 15567132
90 15748440
100 15348624
13
2 Unit
Figure Number of Nodes vs Throughput graph in
AODV
28Result analysis (Contd.)
DSDV vs. AODV Graph
Nodes DSDV AODV
10 35 -20
20 9 -10
30 1 16
40 100 195
50 56 16
60 92 194
70 100 77
80 100 91
90 100 96
100 115 82
Average 70.8 73.7
Figure DSDV vs AODV performance comparison
- Fluctuations
- Many hosts with irregular updates
- Broadcast with asynchronous events
- Different propagation speed
- Different transmission intervals
AODV performs 2.93 higher than DSDV
29Ad hoc Security
30The Nature of Ad hoc Networks poses a great
challenge to System Security due to the following
reason
- firstly, the wireless network is more
susceptible to attacks ranging from
passive eavesdropping to active interfering. - secondly, the lack of an online CA or Trusted
Third Party adds the difficulty to deploy
security mechanisms - thirdly, mobile devices tend to have limited
power consumption and computation capabilities
which makes it more vulnerable to Denial of
Service attacks (Dos) and incapable to execute
computation-heavy algorithms like public key
algorithms - fourthly, in MANETs, there are more
probabilities for trusted node being compromised
and we need to consider both insider attacks and
outsider attacks in mobile ad hoc networks, in
which insider attacks are more difficult to deal
with - finally, node mobility enforces frequent
networking reconfiguration which creates more
chances for attacks, for example, it is difficult
to distinguish between stale routing information
and faked routing information.
31There are five main security services for MANETs
- Authentication means that correct identity is
known to communicating partner - Confidentiality means certain message
information is kept secure from unauthorized - party.
- integrity means message is unaltered during
the communication. - non-repudiation means the origin of a
message cannot deny having sent the message - availability means the normal service
provision in face of all kinds of attacks.
32Although some work has been done to increase the
security ofMANETs, none of them considers
designing security mechanisms from a system
architectural view
- Provide security mechanisms based on some
routing protocols, like DSDV, DSR and AODV. - PGP-like method to construct the trust
infrastructure for MANETs. - Distributed public-key management service for ad
hoc networks like PK/SK
33The figure depicts a five-layer security
architecture for MANETs,
- Security Architecture for MANETs
SL5 End-to-End Security
SL4 Network Security
SL3 Routing Security
SL2 Communication Security
SL1 Trust Infrastructure
34- SL1, Trust Infrastructure Layer refers to the
basic trust relationship between nodes, for
example, like a well deployed PKI environment. - SL2, Communications Security Layer refers to
the security mechanisms applied in transmitting
data frames in a node-to-node manner. Actually it
works in Data link layer in OSI Model. - SL3, In fact, the routing security layer
involves two aspects secure - Routing and secure data forwarding. In secure
routing aspect, nodes are required to cooperate
to share correct routing information to keep the
network connected efficiently in secure data
forwarding aspect, data packets on the fly should
be protected from tampering, dropping, and
altering by any unauthorized party. - SL4, Network Security Layer refers to the
security mechanisms - used by the network protocols. the security
services like peer entity - authentication, confidentiality and integrity as
the network layer - security protocol IPsec provides.
- SL5, End-to-End Security Layer refers to end
system security, - such as SSL, SSH, https and any
application-specific security - protocol.
35Thank You