1 / 35

Mobile Ad hoc Network

Mobile Ad hoc Network. What is it ? Application of Mobile Ad hoc Network.. Configuration & Security challenges… Presented By 1. Sanaul Haque Himel -- 012112032 2. Fizar Ahmed – 012081006 3. Md. Osman Goni -- 012093006. Networks deployed in random distribution

kalb
Download Presentation

Mobile Ad hoc Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Ad hoc Network • What is it ? • Application of Mobile Ad hoc Network.. • Configuration & Security challenges… Presented By 1. Sanaul Haque Himel -- 012112032 2. Fizar Ahmed – 012081006 3. Md. Osman Goni -- 012093006

  2. Networks deployed in random distribution • Low power • Delivering sensor data to a central site for some purpose What is Mobile Ad hoc Network

  3. Definition of Mobile Ad hoc Network (MANET) • Opposed to infrastructured wireless networks, where each user directly communicates with an access point or base station, a mobile Ad hoc network, or MANET, does not rely on a fixed infrastructure for its operation. • The network is an autonomous transitory association of mobile nodes that communicate with each other over wireless links. • Nodes that lie within each other’s send range can communicate directly and are responsible for dynamically discovering each other. • In order to enable communication between nodes that are not directly within each other’s send range, intermediate nodes act as routers

  4. Cellular Network versus Mobile AD Hoc Network

  5. Characteristics and Complexities of Mobile Ad hoc Networks • Autonomous and Infrastructureless • Multi-hop routing • Dynamic network topology • Device heterogeneity • Energy constrained operation • Bandwidth constrained variable capacity links • Limited physical security • Network scalability • Self-creation, self-organization and self-administration

  6. Routing of MANET • Proactive Routing Protocol: To have an up-to-date route to all other nodes at all times. To this end, this protocol will exchange routing control information periodically and on topological changes. • Reactive Routing Protocol:Only set up routes to nodes they communicate with and these routes are kept alive as long as they are needed. • Hybrid Routing Protocol:Combinations of proactive and reactive protocols, where nearby routes (for example, maximum two hops) are kept up-to-date proactively, while far-away routes are set up reactively. • Location-Based Routing Protocol: Where packet forwarding is based on the location of a node’s communication partner.

  7. Overview of Existing Routing Technique

  8. Mobile Ad Hoc Network Enabling Technologies

  9. Tactical networks: • • Military communication and operations • • Automated battlefields • Emergency services: • • Search and rescue operations • • Disaster recovery • • Replacement of fixed infrastructure in case of environmental disasters. • • Policing and fire fighting. • • Supporting doctors and nurses in hospitals. • Commercial and civilian environments: • • E-commerce: electronic payments anytime and anywhere • • Business: dynamic database access, mobile offices • • Vehicular services: road or accident guidance, transmission of road and weather conditions, taxi cab network, inter-vehicle networks • • Sports stadiums, trade fairs, shopping malls • • Networks of visitors at airports Application of Mobile Ad hoc Network

  10. Application of Mobile Ad hoc Network • Home and enterprise networking: • Home/office wireless networking • Conferences, meeting rooms • Personal area networks (PAN), Personal networks (PN) • Networks at construction sites • Education : • Universities and campus settings • Virtual classrooms • Ad hoc communications during meetings or lectures • Entertainment: • Multi-user games • Wireless P2P networking • Outdoor Internet access • Robotic pets • Theme parks

  11. Application of Mobile Ad hoc Network • Sensor networks: • Home applications: smart sensors embedded in consumer electronics • Body area networks (BAN) • Data tracking of environmental conditions, animal movements, chemical/biological detection • Context aware services: • Follow-on services: call-forwarding, mobile workspace • Information services: location specific services, time dependent services • Coverage extension: • Extending cellular network access • Linking up with the Internet, intranets, etc.

  12. Mobile Ad-Hoc Networks using Car-to-Car Communication

  13. Mobile Ad-Hoc Networks using Car-to-Car Communication

  14. Mobile Ad-Hoc Networks using Healthcare System

  15. Mobile Ad-Hoc Networks using Healthcare System

  16. Example Scenario A Scenario of Ad hoc Networks Figure: Mobile nodes in a City

  17. Ad Hoc Routing Protocols There are several type of ad hoc routing protocols exists. We have used Two sub categories under two main categories in this discussion. • 1. On Demand/Reactive Protocols • -AODV(Ad hoc On Demand Distance Vector) • Characteristics: • High latency in routing • No overhead from periodic update • Latency can be reduced by route caching • Saves Bandwidth & Energy during inactivity

  18. Ad Hoc Routing Protocols (Cont.) • 2. Table Driven/Proactive Protocols • - DSDV(Destination Sequenced Distance Vector) • Characteristics: • Low latency, suitable for real time traffic • High overhead (Periodic table updates) • Bandwidth may wasted due to periodic updates • Route repair depends upon update frequency

  19. Experimental Setup (Contd.) Simulation Figure: ns2 implementation

  20. Experimental Setup (Contd.) Node movement Figure: Mobile nodes of ad hoc network

  21. Experimental Setup (Contd.) Data Transmission Figure: 100 mobile nodes starts data transmission

  22. Result analysis Trace file We have created an analyzer program in Perl script to analyze trace files. In the analyzer we have counted different traffic pattern. Here is a sample portion of a trace file. s 0.094186392 _7_ RTR --- 0 message 32 [0 0 0 0] ------- [7:255 -1:255 32 0] r 0.095487131 _3_ RTR --- 0 message 32 [0 ffffffff 7 800] ------- [7:255 -1:255 32 0] s 0.235686783 _9_ RTR --- 1 message 32 [0 0 0 0] ------- [9:255 -1:255 32 0] r 0.236727347 _2_ RTR --- 1 message 32 [0 ffffffff 9 800] ------- [9:255 -1:255 32 0] r 0.236727531 _3_ RTR --- 1 message 32 [0 ffffffff 9 800] ------- [9:255 -1:255 32 0] s 0.333477301 _6_ RTR --- 2 message 32 [0 0 0 0] ------- [6:255 -1:255 32 0] r 3.889605635 _2_ AGT --- 646 ack 60 [13a 2 4 800] ------- [4:0 2:2 32 2] [302 0] 1 0 s 3.895907809 _4_ AGT --- 660 ack 40 [0 0 0 0] ------- [4:0 2:2 32 0] [309 0] 0 0 r 3.895907809 _4_ RTR --- 660 ack 40 [0 0 0 0] ------- [4:0 2:2 32 0] [309 0] 0 0 s 3.895907809 _4_ RTR --- 660 ack 60 [0 0 0 0] ------- [4:0 2:2 32 2] [309 0] 0 0 r 98.118080147 _3_ RTR --- 18753 cbr 532 [13a 3 8 800] ------- [8:2 9:2 32 3] [303] 1 0 f 98.118080147 _3_ RTR --- 18753 cbr 532 [13a 3 8 800] ------- [8:2 9:2 31 9] [303] 1 0 D 149.987010754 _4_ RTR CBK 27141 cbr 532 [13a 5 4 800] ------- [4:2 5:1 32 5] [337] 0 0 D 150.000000000 _1_ IFQ END 28668 tcp 572 [0 2 1 800] ------- [1:0 2:0 32 2] [748 0] 0 0 D 150.000000000 _2_ IFQ END 28631 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [734 0] 0 0 D 150.000000000 _2_ IFQ END 28633 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [735 0] 0 0 D 150.000000000 _2_ IFQ END 28634 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [736 0] 0 0 D 150.000000000 _2_ IFQ END 28637 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [737 0] 0 0

  23. Result analysis DSDV Graph 10% 5 Unit Figure: Number of Nodes vs Throughput graph in DSDV

  24. Result analysis (Contd.) AODV Graph 13% 2 Unit Figure: Number of Nodes vs Throughput graph in AODV

  25. Result analysis (Contd.) DSDV vs. AODV Graph Figure: DSDV vs AODV performance comparison • Fluctuations • Many hosts with irregular updates • Broadcast with asynchronous events • Different propagation speed • Different transmission intervals AODV performs 2.9%~3% higher than DSDV

  26. Ad hoc Security

  27. The Nature of Ad hoc Networks poses a great challenge to System Security due to the following reason: firstly, the wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering. secondly, the lack of an online CA or Trusted Third Party adds the difficulty to deploy security mechanisms; thirdly, mobile devices tend to have limited power consumption and computation capabilities which makes it more vulnerable to Denial of Service attacks (Dos) and incapable to execute computation-heavy algorithms like public key algorithms; fourthly, in MANETs, there are more probabilities for trusted node being compromised and we need to consider both insider attacks and outsider attacks in mobile ad hoc networks, in which insider attacks are more difficult to deal with finally, node mobility enforces frequent networking reconfiguration which creates more chances for attacks, for example, it is difficult to distinguish between stale routing information and faked routing information.

  28. There are five main security services for MANETs: Authentication : means that correct identity is known to communicating partner Confidentiality : means certain message information is kept secure from unauthorized party. integrity : means message is unaltered during the communication. non-repudiation : means the origin of a message cannot deny having sent the message; availability : means the normal service provision in face of all kinds of attacks.

  29. Although some work has been done to increase the security ofMANETs, none of them considers designing security mechanisms from a system architectural view: Provide security mechanisms based on some routing protocols, like DSDV, DSR and AODV. PGP-like method to construct the trust infrastructure for MANETs. Distributed public-key management service for ad hoc networks like PK/SK

  30. The figure depicts a five-layer security architecture for MANETs, Security Architecture for MANETs

  31. SL1, Trust Infrastructure Layer: refers to the basic trust relationship between nodes, for example, like a well deployed PKI environment. • SL2, Communications Security Layer: refers to the security mechanisms applied in transmitting data frames in a node-to-node manner. Actually it works in Data link layer in OSI Model. • SL3, In fact, the routing security layer involves two aspects: secure • Routing and secure data forwarding. In secure routing aspect, nodes are required to cooperate to share correct routing information to keep the network connected efficiently; in secure data forwarding aspect, data packets on the fly should be protected from tampering, dropping, and altering by any unauthorized party. • SL4, Network Security Layer: refers to the security mechanisms • used by the network protocols. the security services like peer entity • authentication, confidentiality and integrity as the network layer • security protocol IPsec provides. • SL5, End-to-End Security Layer: refers to end system security, • such as SSL, SSH, https and any application-specific security • protocol.

  32. Thank You

More Related