CSE 4215/5431: Mobile Communications Winter 2010

Slides:



Advertisements
Similar presentations
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Advertisements

MOBILE NETWORK LAYER Mobile IP.
Routing in Mobile Ad Hoc Networks Marc Heissenbüttel University of Berne Bern,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile IP.
Ad Hoc Wireless Routing COS 461: Computer Networks
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Routing in mobile ad-hoc networks (MANETs). 1. WHAT IS A MANET ? A MANET can be defined as a system of autonomous mobile nodes A MANET can be defined.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer
ROUTING ALGORITHMS IN AD HOC NETWORKS
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Mobile Communications: Network Protocols/Mobile IP Mobile Communications Chapter 9: Network Protocols/Mobile IP  Motivation  Data transfer  Encapsulation.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Mobile IP 순천향대학교 정보기술공학부 이 상 정 VoIP 특론 순천향대학교 정보기술공학부 이 상 정 2 References  Tutorial: Mobile IP
MOBILE IP Optimization of packet forwarding
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Lecture 6: Wireless Ad-Hoc Networks. Wireless Ad-hoc Networks Network without infrastructure – Use components of participants for networking Examples.
Mobile IP Definition: Mobile IP is a standard communication protocol, defined to allow mobile device users to move from one IP network to another while.
Fundamentals of Computer Networks ECE 478/578
Mobile Ad Hoc Network (MANET)
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Introduction to Mobile Ad hoc Networks (MANETs) Advanced Computer Networks.
ROUTING MOBILE IP  Motivation  Data transfer  Encapsulation.
MOBILE IP & IP MICRO-MOBILITY SUPPORT Presented by Maheshwarnath Behary Assisted by Vishwanee Raghoonundun Koti Choudary MSc Computer Networks Middlesex.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Wireless Sensor Networks 5. Routing
Routing Metrics for Wireless Mesh Networks
DMET 602: Networks and Media Lab
Introduction Wireless devices offering IP connectivity
Mobile Communications Chapter 8:
Mobile Ad Hoc Networks: Introduction
Mobile Networking (I) CS 395T - Mobile Computing and Wireless Networks
Mobile IP.
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Ad-hoc Networks.
Mobility Support in IPv6 (MIPv6)
Understand Networking Services
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
CSE 4340/5349 Mobile Systems Engineering
IS3120 Network Communications Infrastructure
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Net 431 D: ADVANCED COMPUTER NETWORKS
Mobile and Wireless Networking
by Saltanat Mashirova & Afshin Mahini
Network Virtualization
Mobile ad hoc networking: imperatives and challenges
Unit 3 Mobile IP Network Layer
DMET 602: Networks and Media Lab
CSE 4215/5431: Mobile Communications Winter 2010
Unit II MOBILE NETWORK LAYER. Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g ) determines physical subnet.
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
CSE 4215/5431: Mobile Communications Winter 2011
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
Other Routing Protocols
A Routing Protocol for WLAN Mesh
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Lecture 4a Mobile IP 1.
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

CSE 4215/5431: Mobile Communications Winter 2010 Suprakash Datta datta@cs.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cs.yorku.ca/course/4215 Some slides are adapted from the book website 11/17/2018 CSE 4215, Winter 2010

Security in Mobile IP Security requirements (Security Architecture for the Internet Protocol, RFC 4301, was: 1825, 2401) Integrity any changes to data between sender and receiver can be detected by the receiver Authentication sender address is really the address of the sender and all data received is really data sent by this sender Confidentiality only sender and receiver can read the data Non-Repudiation sender cannot deny sending of data Traffic Analysis creation of traffic and user profiles should not be possible Replay Protection receivers can detect replay of messages 11/17/2018 CSE 4215, Winter 2010

IP security architecture I Two or more partners have to negotiate security mechanisms to setup a security association typically, all partners choose the same parameters and mechanisms Two headers have been defined for securing IP packets: Authentication-Header guarantees integrity and authenticity of IP packets if asymmetric encryption schemes are used, non-repudiation can also be guaranteed Encapsulation Security Payload protects confidentiality between communication partners Authentification-Header IP-Header UDP/TCP-Paket authentication header IP header UDP/TCP data not encrypted encrypted IP header ESP header encrypted data 11/17/2018 CSE 4215, Winter 2010

IP security architecture II Mobile Security Association for registrations parameters for the mobile host (MH), home agent (HA), and foreign agent (FA) Extensions of the IP security architecture extended authentication of registration prevention of replays of registrations time stamps: 32 bit time stamps + 32 bit random number nonces: 32 bit random number (MH) + 32 bit random number (HA) MH-FA authentication FA-HA authentication MH-HA authentication registration request MH FA registration request HA registration reply registration reply 11/17/2018 CSE 4215, Winter 2010

Key distribution Home agent distributes session keys foreign agent has a security association with the home agent mobile host registers a new binding at the home agent home agent answers with a new session key for foreign agent and mobile node FA MH response: EHA-FA {session key} EHA-MH {session key} HA 11/17/2018 CSE 4215, Winter 2010

IP Micro-mobility support Efficient local handover inside a foreign domain without involving a home agent Reduces control traffic on backbone Especially needed in case of route optimization Example approaches (research, not products): Cellular IP HAWAII Hierarchical Mobile IP (HMIP) Important criteria: Security Efficiency, Scalability, Transparency, Manageability 11/17/2018 CSE 4215, Winter 2010

Cellular IP Operation: CIP Gateway: Security provisions: “CIP Nodes” maintain routing entries (soft state) for MNs Multiple entries possible Routing entries updated based on packets sent by MN CIP Gateway: Mobile IP tunnel endpoint Initial registration processing Security provisions: all CIP Nodes share “network key” MN key: MD5(net key, IP addr) MN gets key upon registration CIP Gateway Internet BS MN1 data/control packets from MN 1 Mobile IP MN2 packets from MN2 to MN 1 11/17/2018 CSE 4215, Winter 2010

Cellular IP: Security Advantages: Potential problems: Initial registration involves authentication of MNs and is processed centrally by CIP Gateway All control messages by MN’s are authenticated Replay-protection (using timestamps) Potential problems: MN’s can directly influence routing entries Network key known to many entities (increases risk of compromise) No re-keying mechanisms for network key No choice of algorithm (always MD5, prefix+suffix mode) Proprietary mechanisms (not, e.g., IPSec AH) 11/17/2018 CSE 4215, Winter 2010

Cellular IP: Other issues Advantages: Simple and elegant architecture Mostly self-configuring (little management needed) Integration with firewalls / private address support possible Potential problems: Not transparent to MN’s (additional control messages) Public-key encryption of MN keys may be a problem for resource-constrained MN’s Multiple-path forwarding may cause inefficient use of available bandwidth 11/17/2018 CSE 4215, Winter 2010

DHCP: Dynamic Host Configuration Protocol Application simplification of installation and maintenance of networked computers supplies systems with all necessary information, such as IP address, DNS server address, domain name, subnet mask, default router etc. enables automatic integration of systems into an Intranet or the Internet, can be used to acquire a COA for Mobile IP Client/Server-Model the client sends via a MAC broadcast a request to the DHCP server (might be via a DHCP relay) DHCPDISCOVER DHCPDISCOVER server client client relay 11/17/2018 CSE 4215, Winter 2010

DHCP - protocol mechanisms client server (not selected) server (selected) initialization DHCPDISCOVER DHCPDISCOVER determine the configuration determine the configuration DHCPOFFER DHCPOFFER collection of replies selection of configuration time DHCPREQUEST (reject) DHCPREQUEST (options) confirmation of configuration DHCPACK initialization completed release DHCPRELEASE delete context 11/17/2018 CSE 4215, Winter 2010

DHCP characteristics Server Renewal of configurations Options several servers can be configured for DHCP, coordination not yet standardized (i.e., manual configuration) Renewal of configurations IP addresses have to be requested periodically, simplified protocol Options available for routers, subnet mask, NTP (network time protocol) timeserver, SLP (service location protocol) directory, DNS (domain name system) 11/17/2018 CSE 4215, Winter 2010

Mobile ad hoc networks Standard Mobile IP needs an infrastructure Home Agent/Foreign Agent in the fixed network DNS, routing etc. are not designed for mobility Sometimes there is no infrastructure! remote areas, ad-hoc meetings, disaster areas cost can also be an argument against an infrastructure! Main topic: routing no default router available every node should be able to forward A B C 11/17/2018 CSE 4215, Winter 2010

Solution: Wireless ad-hoc networks Network without infrastructure Use components of participants for networking Examples Single-hop: All partners max. one hop apart Bluetooth piconet, PDAs in a room, gaming devices… Multi-hop: Cover larger distances, circumvent obstacles Bluetooth scatternet, TETRA police network, car-to-car networks… Internet: MANET (Mobile Ad-hoc Networking) group 11/17/2018 CSE 4215, Winter 2010

Manet: Mobile Ad-hoc Networking Fixed Network Mobile Devices Router Manet Mobile IP, DHCP End system 11/17/2018 CSE 4215, Winter 2010

Problem No. 1: Routing Highly dynamic network topology Device mobility plus varying channel quality Separation and merging of networks possible Asymmetric connections possible N7 N6 N6 N7 N1 N1 N2 N3 N2 N3 N4 N4 N5 N5 time = t1 time = t2 good link weak link 11/17/2018 CSE 4215, Winter 2010

Traditional routing algorithms Distance Vector periodic exchange of messages with all physical neighbors that contain information about who can be reached at what distance selection of the shortest path if several paths available Link State periodic notification of all routers about the current state of all physical links router get a complete picture of the network Example ARPA packet radio network (1973), DV-Routing every 7.5s exchange of routing tables including link quality updating of tables also by reception of packets routing problems solved with limited flooding 11/17/2018 CSE 4215, Winter 2010

Routing in ad-hoc networks THE big topic in many research projects Far more than 50 different proposals exist The most simplest one: Flooding! Reasons Classical approaches from fixed networks fail Very slow convergence, large overhead High dynamicity, low bandwidth, low computing power Metrics for routing Minimal Number of nodes, loss rate, delay, congestion, interference … Maximal Stability of the logical network, battery run-time, time of connectivity … 11/17/2018 CSE 4215, Winter 2010

Problems of traditional routing algorithms Dynamic nature of the topology frequent changes of connections, connection quality, participants Limited performance of mobile systems periodic updates of routing tables need energy without contributing to the transmission of user data, sleep modes difficult to realize limited bandwidth of the system is reduced even more due to the exchange of routing information links can be asymmetric, i.e., they can have a direction dependent transmission quality 11/17/2018 CSE 4215, Winter 2010

DSDV (Destination Sequenced Distance Vector, historical) Early work on demand version: AODV Expansion of distance vector routing Sequence numbers for all routing updates assures in-order execution of all updates avoids loops and inconsistencies Decrease of update frequency store time between first and best announcement of a path inhibit update if it seems to be unstable (based on the stored time values) 11/17/2018 CSE 4215, Winter 2010

Dynamic source routing I Split routing into discovering a path and maintaining a path Discover a path only if a path for sending packets to a certain destination is needed and no path is currently available Maintaining a path only while the path is in use one has to make sure that it can be used continuously No periodic updates needed! 11/17/2018 CSE 4215, Winter 2010

Dynamic source routing II Path discovery broadcast a packet with destination address and unique ID if a station receives a broadcast packet if the station is the receiver (i.e., has the correct destination address) then return the packet to the sender (path was collected in the packet) if the packet has already been received earlier (identified via ID) then discard the packet otherwise, append own address and broadcast packet sender receives packet with the current path (address list) Optimizations limit broadcasting if maximum diameter of the network is known caching of address lists (i.e. paths) with help of passing packets stations can use the cached information for path discovery (own paths or paths for other hosts) 11/17/2018 CSE 4215, Winter 2010

DSR: Route Discovery Sending from C to O P R C G Q B I E M O K A H L D J 11/17/2018 CSE 4215, Winter 2010

DSR: Route Discovery Broadcast P R [O,C,4711] C G Q [O,C,4711] B I E M K A H L D N F J 11/17/2018 CSE 4215, Winter 2010

DSR: Route Discovery P R [O,C/G,4711] C G Q [O,C/G,4711] [O,C/B,4711] M O K A H [O,C/E,4711] L D N F J 11/17/2018 CSE 4215, Winter 2010

DSR: Route Discovery P R C G Q B I E M O K A H L D N F J [O,C/G/I,4711] B I E M O K A H [O,C/E/H,4711] L D [O,C/B/A,4711] N F J [O,C/B/D,4711] (alternatively: [O,C/E/D,4711]) 11/17/2018 CSE 4215, Winter 2010

DSR: Route Discovery P R C G Q B I E M O K A H L D N F J [O,C/G/I/K,4711] E M O K A H L D N F J [O,C/E/H/J,4711] [O,C/B/D/F,4711] 11/17/2018 CSE 4215, Winter 2010

DSR: Route Discovery P R C G Q B I E M O K A H L D N F J [O,C/G/I/K/M,4711] E M O K A H L D N F J [N,C/E/H/J/L,4711] (alternatively: [N,C/G/I/K/L,4711]) 11/17/2018 CSE 4215, Winter 2010

DSR: Route Discovery P R C G Q B I E M O K A H L D N F J [N,C/E/H/J/L/N,4711] 11/17/2018 CSE 4215, Winter 2010

DSR: Route Discovery P R C G Q B I E M O K A H L D N F J Path: M, K, I, G B I E M O K A H L D N F J 11/17/2018 CSE 4215, Winter 2010

Dynamic Source Routing III Maintaining paths after sending a packet wait for a layer 2 acknowledgement (if applicable) listen into the medium to detect if other stations forward the packet (if possible) request an explicit acknowledgement if a station encounters problems it can inform the sender of a packet or look-up a new path locally 11/17/2018 CSE 4215, Winter 2010

Interference-based routing Routing based on assumptions about interference between signals N1 N2 R1 S1 N3 N4 N5 N6 R2 S2 N9 N8 N7 neighbors (i.e. within radio range) 11/17/2018 CSE 4215, Winter 2010

Examples for interference based routing Least Interference Routing (LIR) calculate the cost of a path based on the number of stations that can receive a transmission Max-Min Residual Capacity Routing (MMRCR) calculate the cost of a path based on a probability function of successful transmissions and interference Least Resistance Routing (LRR) calculate the cost of a path based on interference, jamming and other transmissions LIR is very simple to implement, only information from direct neighbors is necessary 11/17/2018 CSE 4215, Winter 2010

Other ad hoc routing protocols Flat proactive FSLS – Fuzzy Sighted Link State FSR – Fisheye State Routing OLSR – Optimized Link State Routing Protocol (RFC 3626) TBRPF – Topology Broadcast Based on Reverse Path Forwarding reactive AODV – Ad hoc On demand Distance Vector (RFC 3561) DSR – Dynamic Source Routing (RFC 4728) DYMO – Dynamic MANET On-demand Hierarchical CGSR – Clusterhead-Gateway Switch Routing HSR – Hierarchical State Routing LANMAR – Landmark Ad Hoc Routing ZRP – Zone Routing Protocol Geographic position assisted DREAM – Distance Routing Effect Algorithm for Mobility GeoCast – Geographic Addressing and Routing GPSR – Greedy Perimeter Stateless Routing LAR – Location-Aided Routing Two promising candidates: OLSRv2 and DYMO 11/17/2018 CSE 4215, Winter 2010

Problems, research areas Auto-Configuration Assignment of addresses, function, profile, program, … Service discovery Discovery of services and service providers Multicast Transmission to a selected group of receivers Quality-of-Service Maintenance of a certain transmission quality Power control Minimizing interference, energy conservation mechanisms Security Data integrity, protection from attacks (e.g. Denial of Service) Scalability 10 nodes? 100 nodes? 1000 nodes? 10000 nodes? Integration with fixed networks 11/17/2018 CSE 4215, Winter 2010

Clustering of ad-hoc networks Internet Cluster head Base station Cluster Super cluster 11/17/2018 CSE 4215, Winter 2010

More on routing Clustering and routing Geographic routing Routing via embedding (e.g. with beacons) 11/17/2018 CSE 4215, Winter 2010