90 likes | 269 Views
An Assessment of Mobile Ad-Hoc Network (MANET) Issues. Jerry Usery CS 526 May 12 th , 2008. MANET Issues - Overview. History Uses Technical Concerns DSR and AODV Routing Security. MANET Issues - History. Three generations of ad-hoc network systems 1 – 1972, PRNET ALOHA, CSMA
E N D
An Assessment of MobileAd-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12th, 2008
MANET Issues - Overview • History • Uses • Technical Concerns • DSR and AODV Routing • Security
MANET Issues - History • Three generations of ad-hoc network systems • 1 – 1972, PRNET • ALOHA, CSMA • 2 – 1980s, SURAN • Packet-switched network • No infrastructure • Increased radio performance • 3 – Current generation
MANET Issues - Uses • Growing need • Emergency and rescue operations • Disaster relief efforts • Military networks • Flexibility and speed of set-up is key
MANET Issues – Technical Concerns • Routing has been problematic • Existing Internet protocols intended for fixed infrastructure • Limited success with conventional protocols at each router • Bandwidth, power constraints, topology changes and SECURITY concerns • Link state protocols (bandwidth, reliability issues) • On-demand protocols (frequent topology changes)
MANET Issues – DSR and AODV Routing • DSR • Simple, specifically designed for MANETs • Implemented on several testbeds • Connected to Internet • Route discovery & maintenance • Scales automatically • Allows multiple routes to any node • Designed for approximately 200 nodes, unicast IPv4 packets
MANET Issues – DSR and AODV Routing (Cont) • AODV • Experimental protocol • Rapid adaptation to dynamic link changes • Low use of the network • Low memory overhead and processing • Finds unicast routes within the network • Uses destination sequence numbers (no loops) • Nodes notified when link is broken • IPv6 packets
MANET Issues – Security • Major Issue with as needed connections • Client-server structure does not apply • Availability, confidentiality, integrity, authentication, non-repudiation all face challenges • Dynamic security solution required • External attacks • Active - Erroneous routes, replaying old information, false route queries, distortion of route information • Passive - Eavesdropping data, analyzing traffic • Internal attacks • Compromised nodes can use standard security to protect their attacks • Valid signatures must be validated
MANET Issues • Questions?