540 likes | 836 Views
Mobile Ad hoc Network. What is it ? Application of Mobile Ad hoc Network.. Configuration & Security challenges… Presented By 1. Sanaul Haque Himel -- 012112032 2. Fizar Ahmed – 012081006 3. Md. Osman Goni -- 012093006. Networks deployed in random distribution
E N D
Mobile Ad hoc Network • What is it ? • Application of Mobile Ad hoc Network.. • Configuration & Security challenges… Presented By 1. Sanaul Haque Himel -- 012112032 2. Fizar Ahmed – 012081006 3. Md. Osman Goni -- 012093006
Networks deployed in random distribution • Low power • Delivering sensor data to a central site for some purpose What is Mobile Ad hoc Network
Definition of Mobile Ad hoc Network (MANET) • Opposed to infrastructured wireless networks, where each user directly communicates with an access point or base station, a mobile Ad hoc network, or MANET, does not rely on a fixed infrastructure for its operation. • The network is an autonomous transitory association of mobile nodes that communicate with each other over wireless links. • Nodes that lie within each other’s send range can communicate directly and are responsible for dynamically discovering each other. • In order to enable communication between nodes that are not directly within each other’s send range, intermediate nodes act as routers
Characteristics and Complexities of Mobile Ad hoc Networks • Autonomous and Infrastructureless • Multi-hop routing • Dynamic network topology • Device heterogeneity • Energy constrained operation • Bandwidth constrained variable capacity links • Limited physical security • Network scalability • Self-creation, self-organization and self-administration
Routing of MANET • Proactive Routing Protocol: To have an up-to-date route to all other nodes at all times. To this end, this protocol will exchange routing control information periodically and on topological changes. • Reactive Routing Protocol:Only set up routes to nodes they communicate with and these routes are kept alive as long as they are needed. • Hybrid Routing Protocol:Combinations of proactive and reactive protocols, where nearby routes (for example, maximum two hops) are kept up-to-date proactively, while far-away routes are set up reactively. • Location-Based Routing Protocol: Where packet forwarding is based on the location of a node’s communication partner.
Tactical networks: • • Military communication and operations • • Automated battlefields • Emergency services: • • Search and rescue operations • • Disaster recovery • • Replacement of fixed infrastructure in case of environmental disasters. • • Policing and fire fighting. • • Supporting doctors and nurses in hospitals. • Commercial and civilian environments: • • E-commerce: electronic payments anytime and anywhere • • Business: dynamic database access, mobile offices • • Vehicular services: road or accident guidance, transmission of road and weather conditions, taxi cab network, inter-vehicle networks • • Sports stadiums, trade fairs, shopping malls • • Networks of visitors at airports Application of Mobile Ad hoc Network
Application of Mobile Ad hoc Network • Home and enterprise networking: • Home/office wireless networking • Conferences, meeting rooms • Personal area networks (PAN), Personal networks (PN) • Networks at construction sites • Education : • Universities and campus settings • Virtual classrooms • Ad hoc communications during meetings or lectures • Entertainment: • Multi-user games • Wireless P2P networking • Outdoor Internet access • Robotic pets • Theme parks
Application of Mobile Ad hoc Network • Sensor networks: • Home applications: smart sensors embedded in consumer electronics • Body area networks (BAN) • Data tracking of environmental conditions, animal movements, chemical/biological detection • Context aware services: • Follow-on services: call-forwarding, mobile workspace • Information services: location specific services, time dependent services • Coverage extension: • Extending cellular network access • Linking up with the Internet, intranets, etc.
Example Scenario A Scenario of Ad hoc Networks Figure: Mobile nodes in a City
Ad Hoc Routing Protocols There are several type of ad hoc routing protocols exists. We have used Two sub categories under two main categories in this discussion. • 1. On Demand/Reactive Protocols • -AODV(Ad hoc On Demand Distance Vector) • Characteristics: • High latency in routing • No overhead from periodic update • Latency can be reduced by route caching • Saves Bandwidth & Energy during inactivity
Ad Hoc Routing Protocols (Cont.) • 2. Table Driven/Proactive Protocols • - DSDV(Destination Sequenced Distance Vector) • Characteristics: • Low latency, suitable for real time traffic • High overhead (Periodic table updates) • Bandwidth may wasted due to periodic updates • Route repair depends upon update frequency
Experimental Setup (Contd.) Simulation Figure: ns2 implementation
Experimental Setup (Contd.) Node movement Figure: Mobile nodes of ad hoc network
Experimental Setup (Contd.) Data Transmission Figure: 100 mobile nodes starts data transmission
Result analysis Trace file We have created an analyzer program in Perl script to analyze trace files. In the analyzer we have counted different traffic pattern. Here is a sample portion of a trace file. s 0.094186392 _7_ RTR --- 0 message 32 [0 0 0 0] ------- [7:255 -1:255 32 0] r 0.095487131 _3_ RTR --- 0 message 32 [0 ffffffff 7 800] ------- [7:255 -1:255 32 0] s 0.235686783 _9_ RTR --- 1 message 32 [0 0 0 0] ------- [9:255 -1:255 32 0] r 0.236727347 _2_ RTR --- 1 message 32 [0 ffffffff 9 800] ------- [9:255 -1:255 32 0] r 0.236727531 _3_ RTR --- 1 message 32 [0 ffffffff 9 800] ------- [9:255 -1:255 32 0] s 0.333477301 _6_ RTR --- 2 message 32 [0 0 0 0] ------- [6:255 -1:255 32 0] r 3.889605635 _2_ AGT --- 646 ack 60 [13a 2 4 800] ------- [4:0 2:2 32 2] [302 0] 1 0 s 3.895907809 _4_ AGT --- 660 ack 40 [0 0 0 0] ------- [4:0 2:2 32 0] [309 0] 0 0 r 3.895907809 _4_ RTR --- 660 ack 40 [0 0 0 0] ------- [4:0 2:2 32 0] [309 0] 0 0 s 3.895907809 _4_ RTR --- 660 ack 60 [0 0 0 0] ------- [4:0 2:2 32 2] [309 0] 0 0 r 98.118080147 _3_ RTR --- 18753 cbr 532 [13a 3 8 800] ------- [8:2 9:2 32 3] [303] 1 0 f 98.118080147 _3_ RTR --- 18753 cbr 532 [13a 3 8 800] ------- [8:2 9:2 31 9] [303] 1 0 D 149.987010754 _4_ RTR CBK 27141 cbr 532 [13a 5 4 800] ------- [4:2 5:1 32 5] [337] 0 0 D 150.000000000 _1_ IFQ END 28668 tcp 572 [0 2 1 800] ------- [1:0 2:0 32 2] [748 0] 0 0 D 150.000000000 _2_ IFQ END 28631 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [734 0] 0 0 D 150.000000000 _2_ IFQ END 28633 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [735 0] 0 0 D 150.000000000 _2_ IFQ END 28634 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [736 0] 0 0 D 150.000000000 _2_ IFQ END 28637 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [737 0] 0 0
Result analysis DSDV Graph 10% 5 Unit Figure: Number of Nodes vs Throughput graph in DSDV
Result analysis (Contd.) AODV Graph 13% 2 Unit Figure: Number of Nodes vs Throughput graph in AODV
Result analysis (Contd.) DSDV vs. AODV Graph Figure: DSDV vs AODV performance comparison • Fluctuations • Many hosts with irregular updates • Broadcast with asynchronous events • Different propagation speed • Different transmission intervals AODV performs 2.9%~3% higher than DSDV
The Nature of Ad hoc Networks poses a great challenge to System Security due to the following reason: firstly, the wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering. secondly, the lack of an online CA or Trusted Third Party adds the difficulty to deploy security mechanisms; thirdly, mobile devices tend to have limited power consumption and computation capabilities which makes it more vulnerable to Denial of Service attacks (Dos) and incapable to execute computation-heavy algorithms like public key algorithms; fourthly, in MANETs, there are more probabilities for trusted node being compromised and we need to consider both insider attacks and outsider attacks in mobile ad hoc networks, in which insider attacks are more difficult to deal with finally, node mobility enforces frequent networking reconfiguration which creates more chances for attacks, for example, it is difficult to distinguish between stale routing information and faked routing information.
There are five main security services for MANETs: Authentication : means that correct identity is known to communicating partner Confidentiality : means certain message information is kept secure from unauthorized party. integrity : means message is unaltered during the communication. non-repudiation : means the origin of a message cannot deny having sent the message; availability : means the normal service provision in face of all kinds of attacks.
Although some work has been done to increase the security ofMANETs, none of them considers designing security mechanisms from a system architectural view: Provide security mechanisms based on some routing protocols, like DSDV, DSR and AODV. PGP-like method to construct the trust infrastructure for MANETs. Distributed public-key management service for ad hoc networks like PK/SK
The figure depicts a five-layer security architecture for MANETs, Security Architecture for MANETs
SL1, Trust Infrastructure Layer: refers to the basic trust relationship between nodes, for example, like a well deployed PKI environment. • SL2, Communications Security Layer: refers to the security mechanisms applied in transmitting data frames in a node-to-node manner. Actually it works in Data link layer in OSI Model. • SL3, In fact, the routing security layer involves two aspects: secure • Routing and secure data forwarding. In secure routing aspect, nodes are required to cooperate to share correct routing information to keep the network connected efficiently; in secure data forwarding aspect, data packets on the fly should be protected from tampering, dropping, and altering by any unauthorized party. • SL4, Network Security Layer: refers to the security mechanisms • used by the network protocols. the security services like peer entity • authentication, confidentiality and integrity as the network layer • security protocol IPsec provides. • SL5, End-to-End Security Layer: refers to end system security, • such as SSL, SSH, https and any application-specific security • protocol.