Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 25

Mobile Ad Hoc Networks

Dr. Pradip M Jawandhiya Professor & Head, Computer Engineering Department, Jagadambha College of Engg. & Tech., Yavatmal. pmjawandhiya@rediffmail.com (9763717428) & Mangesh M Ghonge Faculty, Department of Computer Science & Engineering, Jawaharlal Darda Institute of Engineering & Technology, Yavatmal (Maharashtra)- 445001, India. mmghonge@gmail.com (8275737556)
1

Outline

Introduction Infrastructured Networks Infrastructure less (Ad hoc) Networks Motivation Mobile Ad hoc Networks (MANETs) Comparision MANETs vs. Wired networks MANETs vs. Managed wireless networks MANET: Characteristics MANET: Advantages MANET: Disadvantages MANET: Applications MANET: Challenges MANET: Routing protocols Security attributes(goals) Security threats for routing Types of security mechanisms
2

Introduction: Wireless Networking is an emerging technology that allows users to access information and services electronically, regardless of their geographic position. Wireless networks can be classified in two types: Infrastructured Networks: It consists of a network with fixed and wired gateways. A mobile host communicates with a bridge in the network(called base station) within its communication radius. The mobile unit can move geographically while it is communicating. When it goes out of range of one base station, it connects with new base station and starts communicating through it . This called hand off. In this base stations are fixed. Infrastructure less (Ad hoc )Networks: Ad hoc -- a Latin phrase which means "for this [purpose]". In ad hoc networks all nodes are mobile and can be connected dynamically in an arbitrary manner. All nodes of these networks behave as routers and take part in route discovery and maintenance of routes to other nodes in the network.
3

Motivation
Battlefield survivability
Must support mobility Avoid single point of failure typical of centralized systems Often unable to rely on existing communications infrastructure Desire for a rapidly deployable, selforganizing network Multi-hop packet routing used to exchange messages between users who are not within LOS of each other
4

What are MANETs?

Mobile Ad hoc NETwork


5

Mobile Ad Hoc Networks (MANETs)


MANETs are collections of mobile nodes, dynamically forming a temporary network without preexisting network infrastructure or centralized administration. Mobile nodes can be arbitrarily located and are free to move randomly at any given time. Node mobility can vary from almost nodes to constantly moving nodes -> Network topology and interconnections between nodes can change rapidly and unpredictably. No dedicated routers-> each node in a MANET networks acts as router and is responsible for discovering and maintaining routes to other nodes. MANETs are autonomous networks-> suitable routing protocol(s) is/are required to automatically adjust to, possibly very frequent, environment changes. The primary goal of the MANET routing protocol is correct and efficient route establishment to facilitate communication within the network between arbitrary nodes.
6

Example of Mobile Ad hoc networks

A
E

Comparison
MANETs vs. Wired networks
In MANETs, each node also works as router for forwarding packets In wired networks, routers perform routing task

MANETs vs. Managed wireless networks


No infrastructure in MANETs Special node known as access point (AP) in managed wireless networks

MANET: Characteristics
No fixed infrastructure Dynamic changing topology Mobile devices join/leave the network unexpectedly; they can also move freely Energy-constrained Bandwidth-constrained Each node also serves as router Help to relay packets received from neighbors Interoperation with the Internet

MANET: Advantages
Wireless Communication Mobility Do not need infrastructure but can use it, if available Small, Light equipment Ease of deployment Fast to deploy

10

MANET: Disadvantages
Wireless Communication reliability, bandwidth Mobility partitioning Can not count on infrastructure Small, Light equipment Limited resources(memory, battery power)

11

MANET: Applications
Military Rapidly deployable battle-site networks Sensor fields Unmanned aerial vehicles Disaster management Disaster relief teams that cannot rely on existing infrastructure Neighborhood area networks (NANs) Shareable Internet access in high density urban settings Communications among groups of people Meetings/conferences Wearable computing Automobile communications
12

MANET: Challenges
1. Channel vulnerability: broadcast wireless channels allow message eavesdropping and injection easily. 2. Node vulnerability: nodes do not reside in physically protected places, thus easily fall under attack. 3. Absence of infrastructure: certification/authentication authorities are absent. 4. Dynamically changing network topology: puts security of routing protocols under threat. 5. Power and computational limitations: prevent the use of complex encryption algorithms. 13

MANET: Routing Protocol


B

A
Source Destination Neighbors

14

Factors Affecting MANET Routing


Number of nodes Mobility
Other factors: e.g. traffic, quality of wireless channel.

15

Number of Nodes

Source Destination Neighbors

16

Mobility

Source Destination Neighbors

17

Ad hoc routing protocols


Table driven routing(Proactive routing): Nodes continually exchange routing information so that it is readily available when a node would like to send packets to another node. DSDV (destination sequenced distance vector) CGSR (Cluster head Gateway Switch Routing) WRP (Wireless Routing Protocol) On demand routing(Reactive routing): A mobile node initiates route discovery only when it needs to deliver a packet to a destination. DSR (dynamic source routing) AODV (ad-hoc on-demand distance vector) TORA (Temporally Ordered Routing Algorithm) Hybrid routing:
18

Ad Hoc Routing Protocols

19

Comparison
Table driven routing(Proactive routing)
Classic routing strategies: link state, distance vector Keep track of routes to all possible destinations Changes in link connection updated periodically Minimal delay but substantial fraction of control information E.g. DSDV, WRP, CGSR, OLSR, etc.

20

Comparison
On demand routing(Reactive routing)
Only discover routes to destinations ondemand Consume much less bandwidth but experience substantial delay E.g. DSR, ADOV, TORA, etc.

21

Security attributes (goals)


Availability: Ensures the survivability of network services despite denial of service attacks. Authentication: Enables a node to ensure the identity of the peer it is communicating with. Non-repudiation: Ensures that the origin of a message can not deny having sent the message. Confidentiality: Ensures that secret information or data is never disclosed to unauthorized devices. Integrity: Ensures that a message received is not corrupted.
23

Security threats for routing(Attacks)


External attacks
Nodes from outside of the network Network congestion(Denial-of-Service attacks)

Internal attacks
Already authenticated(trusted), but compromised nodes Both on the network and data Exclusion mechanism needed

Passive attacks
Malicious node either ignores operations supposed to be accomplished by it or listens to the channel, attempting to retrieve valuable information.(e.g. eavesdropping)

Active attacks
Information is inserted to the network and thus network operation or some nodes may be harmed. (impersonation/spoofing, modification, fabrication, and disclosure attack) 24

Types of Security Mechanisms


Preventive: Since no central authority, no centralized trusted third party, and no central server are available in ad hoc network, key management has to be distributed over the nodes. By using key-based cryptography, key distribution is at the center of preventive mechanism. Detective: On the other hand, the intrusion detection system (IDS) in detective mechanisms has to monitor and rely on the audit trace that is limited to communication activities taking place within the radio range.
25

Thank You

26

You might also like