Professional Documents
Culture Documents
Final Report Seminar 3
Final Report Seminar 3
Introduction
Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems.
MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes
are the systems or devices i.e. mobile phone, laptop, personal digital assistance, MP3 player
and personal computer that are participating in the network and are mobile. These nodes can
act as host/router or both at the same time. They can form arbitrary topologies depending on
their connectivity with each other in the network. These nodes have the ability to configure
themselves and because of their self configuration ability, they can be deployed urgently
without the need of any infrastructure. Internet Engineering Task Force (IETF) has MANET
working group (WG) that is devoted for developing IP routing protocols. Routing protocols is
one of the challenging and interesting research areas. Many routing protocols have been
developed for MANETS, i.e. AODV, OLSR, DSR etc.
Security in Mobile Ad-Hoc Network is the most important concern for the basic
functionality of network. The availability of network services, confidentiality and integrity of
the data can be achieved by assuring that security issues have been met. MANETs often
suffer from security attacks because of its features like open medium, changing its topology
dynamically, lack of central monitoring and management, cooperative algorithms and no
clear defense mechanism. These factors have changed the battle field situation for the
MANETs against the security threats.
The MANETs work without a centralized administration where the nodes
communicate with each other on the basis of mutual trust. This characteristic makes
MANETs more vulnerable to be exploited by an attacker inside the network. Wireless links
also makes the MANETs more susceptible to attacks, which make it easier for the attacker to
go inside the network and get access to the ongoing communication. Mobile nodes present
within the range of wireless link can overhear and even participate in the network.
MANETs must have a secure way for transmission and communication and this is a
quite challenging and vital issue as there is increasing threats of attack on the Mobile
Networks. Security is the cry of the day. In order to provide secure communication and
transmission, the engineers must understand different types of attacks and their effects on the
MANETs. Wormhole attack, Black hole attack, Sybil attack, flooding attack, routing table
overflow attack, Denial of Service (DoS), selfish node misbehaving, impersonation attack are
kind of attacks that a MANET can suffer from. A MANET is more open to these kinds of
attacks because communication is based on mutual trust between the nodes, there is no
central point for network management, no authorization facility, vigorously changing
topology and limited resources.
With the proliferation of cheaper, small, and more powerful mobile devices,
mobile ad hoc networks (MANETs) have become one of the fastest growing areas of
research. A “Mobile ad hoc network” is a system of wireless mobile nodes with routing
capabilities –the union of which form an arbitrary graph. Any group of them are capable
of forming an autonomous network that require no infrastructure and is capable of
organizing itself into arbitrary changeable topologies. Such a network may operate in a
stand-alone fashion, or may be connected to the larger Internet. The definition, which is
given by the Internet Engineering Task Force (IETF).Minimal configuration and quick
deployment make ad hoc networks suitable for emergency situations like natural or human-
induced disasters, military conflicts, emergency medical situations etc.
1
Fig.1 Infrastructure based Network
Advantages of MANETs:-
Characteristics:
Nodes can perform the roles of both hosts and routers.
No centralized controller and infrastructure.
Intrinsic mutual trust.
Dynamic network topology.
Frequent routing updates.
Request for Comments (RFC) 2501 document (IETF, 1999) which is published by MANET
working group within the IETF describes the main characteristics of MANET which differs
2
from the characteristics of traditional wireless local area networks such as WLANs due to the
dynamic and the infrastructure less natures of MANETs.
According to the IETF RFC 2501, MANET has characteristics can be divided into the
following:
A collection of autonomous terminals means that within a MANET, each mobile node
performs its tasks as a router and a host.
It contains a dynamic topology which means there are a group of nodes into it that are
moving and resulting to a random change rapidly at unpredictable times through the
network topology.
A distributed operation is contained into it which means that the network’s
management and control is spread (distributed) in the nodes because of the
infrastructure types’ absence of which the central control of the network operations is
supported. In a MANET, nodes must perform with each other. each node behaves as a
router and a host simultaneously in order to have the network functions efficiently
implemented, for example, routing and security.
It can be deployed as fast as it could be.
Pre-existing infrastructure is independent from it.
Bandwidth-constrained, variable capacity links compared with the wired network
environment, the capacity of the wireless link itself is relatively small, but also
susceptible to external noise, interference, and signal attenuation effects.
Self-adapts to the propagation patterns and connectivity.
Adapts to mobility patterns and traffic.
A limited physical security is contained into it, for example, in the absence of any
centralized encryption or authentication. In order to reduce security threats, existing
techniques of link security are at most applied into the WLANs and the wired
networks.
It has an energy constrained operation a laptop or handheld computers are often used
batteries to provide power, how to save electricity in the context of depletion of
system design is also necessary to consider the point.
Disadvantages:
Some of the disadvantages of MANETs are:
Limited resources.
Limited physical security.
Intrinsic mutual trust vulnerable to attacks.
Lack of authorization facilities.
Volatile network topology makes it hard to detect malicious nodes.
Security protocols for wired networks cannot work for ad hoc networks.
3
2.1 Need of Wireless Networks
Wireless networks are gaining popularity to its peak today, as the user wants wireless
connectivity irrespective of their geographic position. Wireless Networks enable users to
communicate and transfer data with each other without any wired medium between them.
One of the reasons of the popularity of these networks is widely penetration of wireless
devices. Wireless applications and devices mainly emphasize on Wireless Local Area
Networks (WLANs). This has mainly two modes of operations, i.e. in the presence of Control
Module (CM) also known as Base Stations and Ad-Hoc connectivity where there is no
Control Module. Ad-Hoc networks do not depend on fixed infrastructure in order to carry out
their operations. The operation mode of such network is stand alone, or may be attached with
one or multiple points to provide internet and connectivity to cellular networks.
These networks exhibits the same conventional problems of wireless communications
i.e. bandwidth limitations, battery power, enhancement of transmission quality and coverage
problems.
A network in which, computer devices communicates with each other without any
wire. The communication medium between the computer devices is wireless. When a
computer device wants to communicate with another device, the destination device must lays
within the radio range of each other. Users in wireless networks transmit and receive data
using electromagnetic waves. Recently wireless networks are getting more and more popular
because of its mobility, simplicity and very affordable and cost saving installation.
4
a) Personal Area Network
Personal area network is used for communication between computer devices close to one
person. Some of the personal area networks are zigbee, Bluetooth, sensor networks.
Bluetooth is low cost wireless connection that can link up devices. These devices normally
work within 10 meters, with access speed up to 721 Kbps. This technology is widely used in
a range of devices like computer and their accessories i.e. mouse and keyboard, PDAs,
printers and mobile phones etc. It is important to understand that Bluetooth as Wireless
Personal Area Network (WPAN) is not 802.11 wireless as it do not perform the same job,
rather used as wireless replacement for cable in order to connect devices. Bluetooth works at
2.4 GHz band and this may cause interference with Wireless LAN equipments (802.11b,
802.11g).
A mobile ad-hoc network is a collection of mobile nodes forming an ad-hoc network without
the assistance of any centralized structures. These networks introduced a new art of network
establishment and can be well suited for an environment where either the infrastructure is lost
or where deploy an infrastructure is not very cost effective.
There are quite a number of uses for mobile ad-hoc networks. For example, the military can
track an enemy tank as it moves through the geographic area covered by the network. Your
local community can use an ad-hoc network to detect your car moving though an intersection,
checking the speed and direction of the car. In an environmental network, you can find out
the temperature, atmospheric pressure, amount of sunlight, and the relative humidity at a
number of locations.
The whole life-cycle of ad-hoc networks could be categorized into the first, second, and the
third generation ad-hoc networks systems. Present ad-hoc networks systems are considered
the third generation.
The first generation goes back to 1972. At the time, they were called PRNET (Packet Radio
Networks). In conjunction with ALOHA (Areal Locations of Hazardous Atmospheres) and
CSMA (Carrier Sense Medium Access), approaches for medium access control and a kind of
distance-vector routing PRNET were used on a trial basis to provide different networking
capabilities in a combat environment.
The second generation of ad-hoc networks emerged in 1980s, when the ad-hoc network
systems were further enhanced and implemented as a part of the SURAN (Survivable
Adaptive Radio Networks) program. This provided a packet-switched network to the mobile
battlefield in an environment without infrastructure. This program proved to be beneficial in
improving the radios' performance by making them smaller, cheaper, and resilient to
electronic attacks.
In the 1990s, the concept of commercial ad-hoc networks arrived with notebook computers
and other viable communications equipment. At the same time, the idea of a collection of
mobile nodes was proposed at several research conferences.
The IEEE 802.11 subcommittee had adopted the term "ad-hoc networks" and the research
community had started to look into the possibility of deploying ad-hoc networks in other
areas of application.
Meanwhile, work was going on to advance the previously built ad-hoc networks. GloMo
(Global Mobile Information Systems) and the NTDR (Near-term Digital Radio) are some of
the results of these efforts. GloMo was designed to provide an office environment with
Ethernet-type multimedia connectivity anywhere and anytime in handheld devices.
4 Applications of MANET
8
4.1 Military
Ad hoc networking would allow the military to take advantage of commonplace network
technology to maintain an information network between the soldiers, vehicles, and military
information head quarters.
Consider a scenario as shown in fig, is deployed over a battlefield. The ad hoc network
formed by the air vehicle in the sky can provide a backbone for land based platforms to
communicate when they are out of direct range, or when obstacles prevent direct
communication. The ad hoc network therefore extends down to the land based forces and
allows communication across the battlefield. Voice and video, as well as sensing and data
applications can be supported.
Disaster Relief
9
Fig: 6 Disaster Reliefs
Home Networking
Home networking is the collection of electronic products and systems, enabling remote
access and control of those products and systems, and any available contents such as music,
video or data. In home networks, a user wants to accomplish data communication in ways
that are affordable, reliable, easy to learn, and easy to use.
10
Fig: 8 VANET
In addition, the major application view of VANETs includes real-time and safety
applications. Non-safety applications include real-time traffic congestion and routing
information, high-speed tolling, mobile infotainment, traffic condition monitoring, and many
others. Vehicular safety applications include emergency, collision, car accident, and other
safety warnings.
Sensor network
Sensor networks are composed of a large number of small nodes with sensing, computation,
and wireless communication capabilities. In sensor networks, sensor nodes are usually
scattered and the position of sensor nodes needs not be predetermined. It means that sensor
network protocols and algorithms must provide self-organizing capabilities. Another feature
of sensor networks is the coordination of sensor nodes to produce high-quality information
about the sensing environment. The features of sensor networks provide a wide range of
applications such as health, military, and home. The realization of these and other sensor
network applications require wireless ad hoc networking techniques.
11
Network Gaming
Ad hoc wireless also use for network gaming. Two different LANs can be connected with
each other for gaming whenever required. It’s a temporary connection.
Conferencing
Ad hoc network is widely used to create a network in place like Conferences, where for a
short time of period the network is formed. One main pc is wired to which the internet facility
is given and the rest of the computers or laptops are connectionless. One main computer
forms the Ad hoc network and tries to connect with all the rest of the computer to make
communication and data transfer is possible.
Campus use
Ad hoc Network is also used for Campus use. It’s a small area in which network is created or
formed whenever it is required. Professor from one building can communicate with the
professor of the other building. No need to set up any wired connection. Etc.
12
5 Challenges in MANET:-
MANETs are much more vulnerable to attack than wired network. This is because of
following reasons:
Mobile wireless networks are generally more prone to physical security threats than a
fixed- cable nets. The increased possibility of eavesdropping, spoofing, and denial-of-
service attacks should be carefully considered. Existing link security techniques are
often applied within wireless networks to reduce security threat.
Due to mobility of nodes in the ad hoc network, nodes will rely on battery as their power
supply method; the problem that may be caused by restricted power supply is denial-of-
service attacks and selfish manner.
Nodes are free to move arbitrarily. The network topology may change randomly and have
no restriction on their distance from other nodes.
Absence of any centralized monitoring makes the detection of attacks a very difficult
problem because it is not easy to monitor the traffic in a highly and large
scale ad hoc network. It is rather common in the ad hoc network that benign failures such as
transmission impairments and packet dropping.
13
5.6 Scalability
In some applications, a MANET can grow to thousands of nodes, such as, battlefield
deployments, urban vehicle grids and large environmental sensor fabrics. It is extremely hard
to have the scalability handled in a MANET due to the random and unlimited mobility.
5.7 Mobility
It is at most the first designer’s enemy of MANET.
5.9 Design/Implementation
Manageable, secure, reliable and survivable implementation and design must act for MANET
since a bandwidth-constrained operation and a limited physical security are contained in
MANETs.
5.11 Operational/Business-related
How to have the network managed and how to bill for services.
14
5.2 Protocol Stack used in Mobile Ad hoc network
In this section the protocol stack for mobile ad hoc networks is described. This gives a
comprehensive picture of, and helps to better understand, mobile ad hoc networks. Figure
shows the protocol stack which consists of five layers: physical layer, data link layer, network
layer, transport layer and application layer.
Fig: 11 The OSI model, TCP/IP suite and MANET protocol stack
It has similarities to the TCP/IP protocol suite. As it can be seen the OSI layers for session,
presentation and application are merged into one section, the application layer. On the left of
Fig, the OSI model is shown. It is a layered framework for the design of network systems that
allows for communication across all types of computer systems. In the middle of the figure,
the TCP/IP suite is illustrated. Because it was designed before the OSI model, the layers in
the TCP/IP suite do not correspond exactly to the OSI layers. The lower four layers are the
same but the fifth layer in the TCP/IP suite (the application layer) is equivalent to the
combined session, presentation and application layers of the OSI model.
On the right, the MANET protocol stack - which is similar to the TCP/IP suite – is
shown. The main difference between these two protocols stacks lies in the network layer.
Mobile nodes (which are both hosts and routers) use an ad hoc routing protocol to route
packets. In the physical and data link layer, mobile nodes run protocols that have been
designed for wireless channels. In the simulation tool used in this project, the standard IEEE
802.11 is used in these layers. The network layer is divided into two parts: Network and Ad
hoc Routing. In the transport layer, the User Datagram Protocol (UDP) is used in the study.
15
6 Routing Protocols:
Routing protocols in MANETs are classified into three different categories according to their
functionality:
1. Reactive (On-Demand) protocols
2. Proactive (table Driven) protocols
3. Hybrid protocols (both)
16
6.1.1 Ad-Hoc on Demand Distance Vector Protocol (AODV):
AODV is described in RFC 3561. It’s reactive protocol, when a node wishes to start
transmission with another node in the network to which it has no route; AODV will provide
topology information for the node. AODV use control messages to find a route to the
destination node in the network. There are three types of control messages in AODV which
are discussed bellow.
Route Request Message (RREQ):
Source node that needs to communicate with another node in the network transmits RREQ
message. AODV floods RREQ message, using expanding ring technique. There is a time to
live (TTL) value in every RREQ message, the value of TTL states the number of hops the
RREQ should be transmitted.
Route Reply Message (RREP):
A node having a requested identity or any intermediate node that has a route to the requested
node generates a route reply RREP message back to the originator node.
Route Error Message (RERR):
Every node in the network keeps monitoring the link status to its neighbor’s nodes during
active routes. When the node detects a link crack in an active route, (RERR) message is
generated by the node in order to notify other nodes that the link is down.
Route Discovery Mechanism in AODV:-
When a node “A” wants to initiate transmission with another node “G” as shown in the Fig. ,
it will generate a route request message (RREQ). This message is propagated through a
limited flooding to other nodes. This control message is forwarded to the neighbors, and
those node forward the control message to their neighbors’ nodes. This process of finding
destination node goes on until it finds a node that has fresh enough routes to the destination
or destination node is located itself. Once the destination node is located or an intermediate
node with enough fresh routes is located, they generate control message route reply message
(RREP) to the source node. When RREP reaches the source node, a route is established
between the source node “A” and destination node “G”. Once the route is established
between “A” and “G”, node “A” and “G” can communicate with each other. Fig. depicts the
exchange of control messages between source node and destination node.
17
“E” and “G”, so a route error RERR message is generated at node “E” and transmitted to the
source node informing the source node a route error, where “A” is source node and “G” is the
destination node. The scheme is shown in the Fig. below.
18
6.2 Proactive Protocols (Table driven)
Proactive routing protocols work as the other way around as compared to reactive routing
protocols. These protocols constantly maintain the updated topology of the network. Every
node in the network knows about the other node in advance, in other words the whole
network is known to all the nodes making that network. All the routing information is usually
kept in tables. Whenever there is a change in the network topology, these tables are updated
according to the change. The nodes exchange topology information with each other; they can
have route information any time when they needed.
6.2.1 Optimized Link State Routing Protocol (OLSR):
The Optimized Link State Routing (OLSR) protocol is described in RFC3626. OLSR is
proactive routing protocol that is also known as table driven protocol by the fact that it
updates its routing tables. OLSR has also three types of control messages which are describe
bellow.
Hello
This control message is transmitted for sensing the neighbor and for Multi Point Distribution
Relays (MPR) calculation.
Topology Control (TC)
These are link state signaling that is performed by OLSR. MPRs are used to optimize theses
messaging.
Multiple Interface Declaration (MID)
MID messages contains the list of all IP addresses used by any node in the network. All the
nodes running OLSR transmit these messages on more than one interface.
OLSR Working:
Multi Point Relaying (MPR):
OLSR diffuses the network topology information by flooding the packets throughout the
network. The flooding is done in such way that each node that received the packets
retransmits the received packets. These packets contain a sequence number so as to avoid
loops. The receiver nodes register this sequence number making sure that the packet is
retransmitted once. The basic concept of MPR is to reduce the duplication or loops of
retransmissions of the packets.
Only MPR nodes broadcast route packets. The nodes within the network keep a list of MPR
nodes. MPR nodes are selected with in the vicinity of the source node. The selection of MPR
is based on HELLO message sent between the neighbor nodes. The selection of MPR is such
that, a path exist to each of its 2 hop neighbors through MPR node. Routes are established,
once it is done the source node that wants to initiate transmission can start sending data.
19
Fig: 16 Flooding Packets using MPR
Hybrid protocols exploit the strengths of both reactive and proactive protocols, and combine
them together to get better results. The network is divided into zones, and use different
protocols in two different zones i.e. one protocol is used within zone, and the other protocol
is used between them. Zone Routing Protocol (ZRP) is the example of Hybrid Routing
Protocol. ZRP uses proactive mechanism for route establishment within the nodes
neighborhood, and for communication amongst the neighborhood it takes the advantage of
reactive protocols. These local neighborhoods are known as zones, and the protocol is named
for the same reason as zone routing protocol. Each zone can have different size and each
node may be within multiple overlapping zones. The size of zone is given by radius of length
P, where P is number of hops to the perimeter of the zone.
20
7. SECURITY CONCERNS IN MANETs
Security in Mobile Ad-Hoc Network (MANET) is the most important concern for the basic
functionality of network. Availability of network services, confidentiality and integrity of the
data can be achieved by assuring that security issues have been met. MANET often suffer
from security attacks because of its features like open medium, changing its topology
dynamically, lack of central monitoring and management, cooperative algorithms and no
clear defense mechanism. These factors have changed the battle field situation for the
MANET against the security threats.
In the last few years, security of computer networks has been of serious concern which has
widely been discussed and formulized. Most of the discussions involved only static and
networking based on wired systems. However, mobile Ad-Hoc networking is still in need of
further discussions and development in terms of security. With the emergence of ongoing and
new approaches for networking, new problems and issues arises for the basics of routing.
With the comparison of wired network Mobile Ad-Hoc network is different. The routing
protocols designed majorly for internet is different from the mobile Ad-Hoc networks
(MANET). Traditional routing table was basically made for the hosts which are connected
wired to a non dynamic backbone. Due to which it is not possible to support Ad-Hoc
networks mainly due to the movement and dynamic topology of networks.
Due to various factors including lack of infrastructure, absence of already established trust
relationship in between the different nodes and dynamic topology, the routing protocols are
vulnerable to various attacks.
Major vulnerabilities which have been so far researched are mostly these types which include
selfishness, dynamic nature, and severe resource restriction and also open network medium.
Despite of the above said protocols in MANET, there are attacks which can be categorized in
Passive, Active, Internal, External and network-layer attacks, Routing attacks and Packet
forwarding attacks.
MANET work without a centralized administration where node communicates with each
other on the base of mutual trust. This characteristic makes MANET more vulnerable to be
exploited by an attacker from inside the network. Wireless links also makes the MANET
more susceptible to attacks which make it easier for the attacker to go inside the network and
get access to the ongoing communication. Mobile nodes present within the range of wireless
link can overhear and even participate in the network.
21
Fig: 17 Types of Security Goals
7.1.1 Confidentiality
Confidentiality ensures that computer-related assets are accessed only by authorized parties.
That is, only those who should have access to something will actually get that access. To
maintain confidentiality of some confidential information, it is needed to keep them secret
from all entities that do not have privilege to access them. Confidentiality is sometimes called
secrecy or privacy.
7.1.2 Integrity
Integrity means that assets can be modified only by authorized parties or only in authorized
way. Modification includes writing, changing status, deleting and creating. Integrity assures
that a message being transferred is never corrupted. The integrity of a network depends on all
nodes in the network following correct routing procedures so that every node has correct
routing information. Therefore threats to integrity are those which either introduce incorrect
routing information or alter existing information.
7.1.3 Availability
Availability means the assets are accessible to authorized parties at appropriate times.
Availability applies both to data and to services. It ensures the survivability of network
service despite denial of service attack.
22
7.1.4 Authentication
Authentication enables a node to ensure the identity of peer node it is communicating with.
Authentication is essentially assurance that participants in communication are authenticated
and not impersonators. Authenticity is ensured because only the legitimate sender can
produce a message that will decrypt properly with the shared key.
7.1.6 Authorization
This property assigns different access rights to different types of users. For example a
network management can be performed by network administrator only.
7.2.2 Dynamic Topology: MANET nodes can leave and join the network, and move
independently. As a result the network topology can change frequently. It is hard to
differentiate normal behavior of the network from anomaly/malicious behavior in this
dynamic environment. For example, a node sending disruptive routing information can be a
malicious node, or else simply be using outdated information in good faith. Moreover
mobility of nodes means that we cannot assume nodes, especially critical ones (servers, etc.),
are secured in locked cabinets as in wired networks. Nodes with inadequate physical
protection may often be at risk of being captured and compromised.
Cooperativeness: Routing algorithms for MANETs usually assume that nodes are cooperative
and no malicious.
As a result, a malicious attacker can easily become an important routing agent and disrupt
network operations by disobeying the protocol specifications.
For example, a node can pose as a neighbor to other nodes and participate in collective
decision-making mechanisms, possibly affecting networking significantly.
7.2.3 Lack of a Clear Line of Defense: MANETs do not have a clear line of defense; attacks
can come from all directions. The boundary that separates the inside network from the
outside world is not very clear on MANETs. For example, there is no well defined place
where we can deploy our traffic monitoring, and access control mechanisms. Whereas all
traffic goes through switches, routers, or gateways in wired networks, network information in
MANETs is distributed across nodes that can only see the packets sent and received in their
transmission range.
7.2.4 Limited Resources: Resource constraints are a further vulnerability. There can be a
variety of devices on MANETs, ranging from laptops to handheld devices such as PDAs and
23
mobile phones. These will generally have different computing and storage capacities that can
be the focus of new attacks.
For example, mobile nodes generally run on battery power. This has led to emergence of
innovative attacks targeting this aspect, e.g. “Sleep Deprivation Torture”. Furthermore, the
introduction of more security features into the network increases the computation,
communication and management load. This is a challenge for networks that are already
resource-constrained.
24
7.3.4 Problem of Scalability:
In traditional networks, where the network is built and each machine is connected to the other
machine with help of wire. The network topology and the scale of the network, while
designing it is defined and it do not change much during its life. In other words we can say
that the scalability of the network is defined in the beginning phase of the designing of the
network. The case is quite opposite in MANETs because the nodes are mobile and due to
their mobility in MANETs, the scale of the MANETs is changing. It is too hard to know and
predict the numbers of nodes in the MANETs in the future. The nodes are free to move in and
out of the Ad-Hoc network which makes the Ad-Hoc network very much scalable and
shrinkable. Keeping this property of the MANET, the protocols and all the services that a
MANET provides must be adaptable to such changes.
The attacks can be categorized on the basis of the source of the attacks i.e. Internal or
External, and on the behavior of the attack i.e. Passive or Active attack. This classification is
important because the attacker can exploit the network either as internal, external or/ as well
as active or passive attack against the network.
25
Fig: 19 Classifications of Security Attacks in MANET
26
7.4.2 External and Internal Attack
External attackers are mainly outside the networks who want to get access to the network and
once they get access to the network they start sending bogus packets, denial of service in
order to disrupt the performance of the whole network. This attack is same, like the attacks
that are made against wired network. These attacks can be prevented by implementing
security measures such as firewall, where the access of unauthorized person to the network
can be mitigated. While in internal attack the attacker wants to have normal access to the
network as well as participate in the normal activities of the network. The attacker gain
access in the network as new node either by compromising a current node in the network or
by malicious impersonation and start its malicious behavior. Internal attack is more severe
attacks then external attacks.
7.4.3 Eavesdropping
This is a passive attack. The node simply observes the confidential information. This
information can be later used by the malicious node. The secret information like location,
public key, private key, password etc. can be fetched by eavesdropper.
7.4.4 Impersonation
If the authentication mechanism is not properly implemented a malicious node can act as a
genuine node and monitor the network traffic. It can also send fake routing packets, and gain
access to some confidential information.
27
7.4.6 Jamming
In jamming, attacker initially keep monitoring wireless medium in order to determine
frequency at which destination node is receiving signal from sender. It then transmit signal on
that frequency so that error free receptor is hindered.
In black hole attack, a malicious node uses its routing protocol in order to advertise itself for
having the shortest path to the destination node or to the packet it wants to intercept.
This hostile node advertises its availability of fresh routes irrespective of checking its routing
table. In this way attacker node will always have the availability in replying to the route
request and thus intercept the data packet and retain it. In protocol based on flooding, the
malicious node reply will be received by the requesting node before the reception of reply
from actual node; hence a malicious and forged route is created. When this route is establish,
now it’s up to the node whether to drop all the packets or forward it to the unknown address.
The method how malicious node fits in the data routes varies. Fig. shows how black hole
problem arises, here node “A” want to send data packets to node “D” and initiate the route
discovery process. So if node “C” is a malicious node then it will claim that it has active
route to the specified destination as soon as it receives RREQ packets. It will then send the
response to node “A” before any other node. In this way node “A” will think that this is the
active route and thus active route discovery is complete. Node “A” will ignore all other
replies and will start seeding data packets to node “C”. In this way all the data packet will be
lost consumed or lost.
28
Fig: 22 Black Hole Problems
The malicious node will drop now all the data to which it belong in the route.
In AODV black hole attack the malicious node “A” first detect the active route in between
the sender “E” and destination node “D”. The malicious node “A” then send the RREP which
contains the spoofed destination address including small hop count and large sequence
number than normal to node “C”. This node “C” forwards this RREP to the sender node “E”.
Now this route is used by the sender to send the data and in this way data will arrive at the
malicious node. These data will then be dropped. In this way sender and destination node will
be in no position any more to communicate in state of black hole attack.
29
7.4.10 Wormhole Attack
Wormhole attack is a severe attack in which two attackers placed themselves strategically in
the network. The attackers then keep on hearing the network, record the wireless data. The
fig. bellow shows the two attackers placed themselves in a strong strategic location in the
network.
7.4.11 Snooping
Snooping is unauthorized access to another person's data. It is similar to eavesdropping but is
not necessarily limited to gaining access to data during its transmission. Snooping can include
casual observance of an e-mail that appears on another's computer screen or watching what
someone else is typing. More sophisticated snooping uses software programs to remotely
monitor activity on a computer or network device.
Malicious hackers (crackers) frequently use snooping techniques to monitor key strokes,
capture passwords and login information and to intercept e-mail and other private
communications and data transmissions. Corporations sometimes snoop on employees
legitimately to monitor their use of business computers and track Internet usage.
Governments may snoop on individuals to collect information and prevent crime and
terrorism.
Although snooping has a negative aspect in general but in computer technology snooping can
refer to any program or utility that performs a monitoring function. For example, a snoop
30
server is used to capture network traffic for analysis, and the snooping protocol monitors
information on a computer bus to ensure efficient processing.
codes and
application abuses
by use of Firewalls,
IDS.
etc.
31
Physical Eavesdropping, Jamming, Preventing signal jamming
Layer denial-of-service attacks by
Interceptions. using Spread
Spectrum Mechanism.
32
8. Mobility in MANET
Mobility: the fact that nodes move is probably the most important attribute of MANETs.
Mobility differentiates MANETs from their close cousins, the sensor networks. Mobility
dictates network and application level protocols.
Temporal dependency
Spatial dependency
Geographic restrictions
33
8.1.3 Random Direction Mobility Model
To reduce density waves in the average number of neighbors by the Random Waypoint
Model the Random Direction Mobility Model was created. Density waves are the clustering
of nodes in one part of the simulation area. For the Random Waypoint Mobility Model the
probability of choosing a location near the center or a waypoint which requires traveling
through the center of the area is high. The Random Direction Mobility Model was invented to
prevent this behavior and to promote a semi-constant number of neighbors. The mobile node
selects a direction and travels to the border of the simulation area. If the boundary is reached,
the node pauses for a specific time and then chooses a new direction and the process goes on.
34
9 CONCLUSIONS
We can conclude that the importance of MANET can’t be denied as the world of computing
is getting portable and compact. Mobile ad hoc network have the ability to setup networks on
the fly in a harsh environment where it may not possible to deploy a traditional network
infrastructure.
MANET is the future networks because they are practically versatile, easy to use, and
inexpensive and can instantly updates and reconfigures itself.
When routing protocols AODV and DSR are considered, it is obvious that AODV Performs
better in cases of heavily loaded networks. This is mainly due to the route table entry
mechanism employed.
35
10 REFERENCES
(1) E. Ayanoglu, C.-L. I, R. D. Gitlin, and J. E. Mazo. Diversity coding for transparent self-
healing and fault-tolerant communication networks. IEEE Transactions on Communications,
41(11):1677–1686,
November 1993.
(4) C.E. Perkins, Mobile IP: Design Principles and Practices, Addison-Wesley, 1997
(5) E. Royer and C-K. Toh, “A Review of Current Routing Protocols for Ad Hoc Mobile
Wireless Networks,” IEEE Personal Communications, vol. 6, no. 2, 1999, pp. 46-55.
(6)http://www.researchandmarkets.com/reports/1207264/manets_in_military_communicatios
_strategic
(7)http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4014472&url=http%3A%2F%2Fie
eexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4014472
(8)http://vusolutions.com/wp-content/uploads/2012/01/manet-4G-vegas2-White-Paper-
vusolutions
(11) David B. Johnson Yih-Chun Hu, Adrian Perrig. Ariadne: A secure on-demand routing
protocol for
ad hoc networks. Proceedings of the 8th annual international conference on Mobile
computing and networking, 2002 Sep.
36