Professional Documents
Culture Documents
MANETPPT1
MANETPPT1
Dr. Pradip M Jawandhiya Professor & Head, Computer Engineering Department, Jagadambha College of Engg. & Tech., Yavatmal. pmjawandhiya@rediffmail.com (9763717428) & Mangesh M Ghonge Faculty, Department of Computer Science & Engineering, Jawaharlal Darda Institute of Engineering & Technology, Yavatmal (Maharashtra)- 445001, India. mmghonge@gmail.com (8275737556)
1
Outline
Introduction Infrastructured Networks Infrastructure less (Ad hoc) Networks Motivation Mobile Ad hoc Networks (MANETs) Comparision MANETs vs. Wired networks MANETs vs. Managed wireless networks MANET: Characteristics MANET: Advantages MANET: Disadvantages MANET: Applications MANET: Challenges MANET: Routing protocols Security attributes(goals) Security threats for routing Types of security mechanisms
2
Introduction: Wireless Networking is an emerging technology that allows users to access information and services electronically, regardless of their geographic position. Wireless networks can be classified in two types: Infrastructured Networks: It consists of a network with fixed and wired gateways. A mobile host communicates with a bridge in the network(called base station) within its communication radius. The mobile unit can move geographically while it is communicating. When it goes out of range of one base station, it connects with new base station and starts communicating through it . This called hand off. In this base stations are fixed. Infrastructure less (Ad hoc )Networks: Ad hoc -- a Latin phrase which means "for this [purpose]". In ad hoc networks all nodes are mobile and can be connected dynamically in an arbitrary manner. All nodes of these networks behave as routers and take part in route discovery and maintenance of routes to other nodes in the network.
3
Motivation
Battlefield survivability
Must support mobility Avoid single point of failure typical of centralized systems Often unable to rely on existing communications infrastructure Desire for a rapidly deployable, selforganizing network Multi-hop packet routing used to exchange messages between users who are not within LOS of each other
4
A
E
Comparison
MANETs vs. Wired networks
In MANETs, each node also works as router for forwarding packets In wired networks, routers perform routing task
MANET: Characteristics
No fixed infrastructure Dynamic changing topology Mobile devices join/leave the network unexpectedly; they can also move freely Energy-constrained Bandwidth-constrained Each node also serves as router Help to relay packets received from neighbors Interoperation with the Internet
MANET: Advantages
Wireless Communication Mobility Do not need infrastructure but can use it, if available Small, Light equipment Ease of deployment Fast to deploy
10
MANET: Disadvantages
Wireless Communication reliability, bandwidth Mobility partitioning Can not count on infrastructure Small, Light equipment Limited resources(memory, battery power)
11
MANET: Applications
Military Rapidly deployable battle-site networks Sensor fields Unmanned aerial vehicles Disaster management Disaster relief teams that cannot rely on existing infrastructure Neighborhood area networks (NANs) Shareable Internet access in high density urban settings Communications among groups of people Meetings/conferences Wearable computing Automobile communications
12
MANET: Challenges
1. Channel vulnerability: broadcast wireless channels allow message eavesdropping and injection easily. 2. Node vulnerability: nodes do not reside in physically protected places, thus easily fall under attack. 3. Absence of infrastructure: certification/authentication authorities are absent. 4. Dynamically changing network topology: puts security of routing protocols under threat. 5. Power and computational limitations: prevent the use of complex encryption algorithms. 13
A
Source Destination Neighbors
14
15
Number of Nodes
16
Mobility
17
19
Comparison
Table driven routing(Proactive routing)
Classic routing strategies: link state, distance vector Keep track of routes to all possible destinations Changes in link connection updated periodically Minimal delay but substantial fraction of control information E.g. DSDV, WRP, CGSR, OLSR, etc.
20
Comparison
On demand routing(Reactive routing)
Only discover routes to destinations ondemand Consume much less bandwidth but experience substantial delay E.g. DSR, ADOV, TORA, etc.
21
Internal attacks
Already authenticated(trusted), but compromised nodes Both on the network and data Exclusion mechanism needed
Passive attacks
Malicious node either ignores operations supposed to be accomplished by it or listens to the channel, attempting to retrieve valuable information.(e.g. eavesdropping)
Active attacks
Information is inserted to the network and thus network operation or some nodes may be harmed. (impersonation/spoofing, modification, fabrication, and disclosure attack) 24
Thank You
26