An Assessment of Mobile Ad-Hoc Network (MANET) Issues: Jerry Usery CS 526 May 12, 2008

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 9

An Assessment of Mobile Ad-Hoc Network (MANET) Issues

Jerry Usery CS 526 May 12th, 2008

MANET Issues - Overview

History Uses Technical Concerns DSR and AODV Routing Security

MANET Issues - History

Three generations of ad-hoc network systems

1 1972, PRNET

ALOHA, CSMA Packet-switched network No infrastructure Increased radio performance

2 1980s, SURAN

3 Current generation

MANET Issues - Uses

Growing need

Emergency and rescue operations Disaster relief efforts Military networks

Flexibility and speed of set-up is key

MANET Issues Technical Concerns

Routing has been problematic

Existing Internet protocols intended for fixed infrastructure Limited success with conventional protocols at each router

Bandwidth, power constraints, topology changes and SECURITY concerns

Link state protocols (bandwidth, reliability issues) On-demand protocols (frequent topology changes)

MANET Issues DSR and AODV Routing

DSR

Simple, specifically designed for MANETs Implemented on several testbeds Connected to Internet Route discovery & maintenance Scales automatically Allows multiple routes to any node Designed for approximately 200 nodes, unicast IPv4 packets

MANET Issues DSR and AODV Routing (Cont)

AODV

Experimental protocol Rapid adaptation to dynamic link changes Low use of the network Low memory overhead and processing Finds unicast routes within the network Uses destination sequence numbers (no loops) Nodes notified when link is broken IPv6 packets

MANET Issues Security


Major Issue with as needed connections Client-server structure does not apply Availability, confidentiality, integrity, authentication, nonrepudiation all face challenges Dynamic security solution required External attacks Active - Erroneous routes, replaying old information, false route queries, distortion of route information Passive - Eavesdropping data, analyzing traffic Internal attacks Compromised nodes can use standard security to protect their attacks Valid signatures must be validated

MANET Issues

Questions?

You might also like