Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Routing in mobile ad hoc networks Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Mobile Routing protocols MANET Lecture: 4. DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
Centre for Wireless Communications University of Oulu, Finland
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
August 6, Mobile Computing COE 446 Network Planning Tarek Sheltami KFUPM CCSE COE Principles of.
Ad Hoc Wireless Routing COS 461: Computer Networks
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
Cryptography and Network Security
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Seminar Algorithms for ad hoc networking: Patrik Floréen Seminar Introduction.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
ROUTING ALGORITHMS IN AD HOC NETWORKS
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
MANET: Introduction Reference: “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”; S. Corson and J.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Ad Hoc Network.
Designing Reliable Delivery for Mobile Ad-hoc Networks in Robots BJ Tiemessen Advisor: Dr. Dan Massey Department of Computer Science Colorado State University.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
UNIT-V Ad-hoc Networks
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Mobile Ad Hoc Networks Part 1: Overview
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Mobile Ad Hoc Network (MANET)
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Overview of Wireless Networks:
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Ad-hoc Networks.
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
CHARACTERISTICS.
Wireless and Mobile Ad Hoc Networks
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
CSE 4340/5349 Mobile Systems Engineering
by Saltanat Mashirova & Afshin Mahini
Mobile ad hoc networking: imperatives and challenges
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Routing in Mobile Ad-hoc Networks
Presentation transcript:

Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel Fizar Ahmed – Md. Osman Goni

What is Mobile Ad hoc Network Networks deployed in random distribution Low power Delivering sensor data to a central site for some purpose

Definition of Mobile Ad hoc Network (MANET) Opposed to infrastructured wireless networks, where each user directly communicates with an access point or base station, a mobile Ad hoc network, or MANET, does not rely on a fixed infrastructure for its operation. The network is an autonomous transitory association of mobile nodes that communicate with each other over wireless links. Nodes that lie within each other’s send range can communicate directly and are responsible for dynamically discovering each other. In order to enable communication between nodes that are not directly within each other’s send range, intermediate nodes act as routers

Cellular Network versus Mobile AD Hoc Network

Characteristics and Complexities of Mobile Ad hoc Networks Autonomous and Infrastructureless Multi-hop routing Dynamic network topology Device heterogeneity Energy constrained operation Bandwidth constrained variable capacity links Limited physical security Network scalability Self-creation, self-organization and self- administration

Routing of MANET Proactive Routing Protocol: To have an up-to-date route to all other nodes at all times. To this end, this protocol will exchange routing control information periodically and on topological changes. Reactive Routing Protocol: Only set up routes to nodes they communicate with and these routes are kept alive as long as they are needed. Hybrid Routing Protocol: Combinations of proactive and reactive protocols, where nearby routes (for example, maximum two hops) are kept up-to-date proactively, while far-away routes are set up reactively. Location-Based Routing Protocol: Where packet forwarding is based on the location of a node’s communication partner.

Overview of Existing Routing Technique

Mobile Ad Hoc Network Enabling Technologies

Application of Mobile Ad hoc Network  Tactical networks: Military communication and operations Automated battlefields  Emergency services: Search and rescue operations Disaster recovery Replacement of fixed infrastructure in case of environmental disasters. Policing and fire fighting. Supporting doctors and nurses in hospitals.  Commercial and civilian environments: E-commerce: electronic payments anytime and anywhere Business: dynamic database access, mobile offices Vehicular services: road or accident guidance, transmission of road and weather conditions, taxi cab network, inter-vehicle networks Sports stadiums, trade fairs, shopping malls Networks of visitors at airports

Application of Mobile Ad hoc Network  Home and enterprise networking: Home/office wireless networking Conferences, meeting rooms Personal area networks (PAN), Personal networks (PN) Networks at construction sites  Education : Universities and campus settings Virtual classrooms Ad hoc communications during meetings or lectures  Entertainment: Multi-user games Wireless P2P networking Outdoor Internet access Robotic pets Theme parks

Application of Mobile Ad hoc Network  Sensor networks: Home applications: smart sensors embedded in consumer electronics Body area networks (BAN) Data tracking of environmental conditions, animal movements, chemical/biological detection  Context aware services: Follow-on services: call-forwarding, mobile workspace Information services: location specific services, time dependent services  Coverage extension: Extending cellular network access Linking up with the Internet, intranets, etc.

Mobile Ad-Hoc Networks using Car- to-Car Communication

Mobile Ad-Hoc Networks using Healthcare System

Example Scenario A Scenario of Ad hoc Networks Figure: Mobile nodes in a City

1. On Demand/Reactive Protocols - AODV (Ad hoc On Demand Distance Vector) Characteristics:  High latency in routing  No overhead from periodic update  Latency can be reduced by route caching  Saves Bandwidth & Energy during inactivity There are several type of ad hoc routing protocols exists. We have used Two sub categories under two main categories in this discussion. Ad Hoc Routing Protocols

Ad Hoc Routing Protocols (Cont.) 2. Table Driven/Proactive Protocols - DSDV (Destination Sequenced Distance Vector) Characteristics:  Low latency, suitable for real time traffic  High overhead (Periodic table updates)  Bandwidth may wasted due to periodic updates  Route repair depends upon update frequency

Figure: ns2 implementation Simulation Experimental Setup (Contd.)

Figure: Mobile nodes of ad hoc network Node movement

Experimental Setup (Contd.) Figure: 100 mobile nodes starts data transmission Data Transmission

Result analysis s _7_ RTR message 32 [ ] [7:255 -1: ] r _3_ RTR message 32 [0 ffffffff 7 800] [7:255 -1: ] s _9_ RTR message 32 [ ] [9:255 -1: ] r _2_ RTR message 32 [0 ffffffff 9 800] [9:255 -1: ] r _3_ RTR message 32 [0 ffffffff 9 800] [9:255 -1: ] s _6_ RTR message 32 [ ] [6:255 -1: ] r _2_ AGT ack 60 [13a ] [4:0 2:2 32 2] [302 0] 1 0 s _4_ AGT ack 40 [ ] [4:0 2:2 32 0] [309 0] 0 0 r _4_ RTR ack 40 [ ] [4:0 2:2 32 0] [309 0] 0 0 s _4_ RTR ack 60 [ ] [4:0 2:2 32 2] [309 0] 0 0 r _3_ RTR cbr 532 [13a ] [8:2 9:2 32 3] [303] 1 0 f _3_ RTR cbr 532 [13a ] [8:2 9:2 31 9] [303] 1 0 D _4_ RTR CBK cbr 532 [13a ] [4:2 5:1 32 5] [337] 0 0 D _1_ IFQ END tcp 572 [ ] [1:0 2:0 32 2] [748 0] 0 0 D _2_ IFQ END ack 60 [ ] [2:0 1:0 32 1] [734 0] 0 0 D _2_ IFQ END ack 60 [ ] [2:0 1:0 32 1] [735 0] 0 0 D _2_ IFQ END ack 60 [ ] [2:0 1:0 32 1] [736 0] 0 0 D _2_ IFQ END ack 60 [ ] [2:0 1:0 32 1] [737 0] 0 0 eventtimefrom node to node pkt type pkt size flagfidsrc addr dst addr seq num pkt id We have created an analyzer program in Perl script to analyze trace files. In the analyzer we have counted different traffic pattern. Here is a sample portion of a trace file. Trace file

Result analysis Figure: Number of Nodes vs Throughput graph in DSDV NodesThroughput % 5 Unit DSDV Graph

Result analysis (Contd.) Figure: Number of Nodes vs Throughput graph in AODV Nodes Throughput % 2 Unit AODV Graph

Result analysis (Contd.) Figure: DSDV vs AODV performance comparison Fluctuations Many hosts with irregular updates Broadcast with asynchronous events Different propagation speed Different transmission intervals Nodes DSDV AODV 1035%-20% 209%-10% 301%16% 40100%195% 5056%16% 6092%194% 70100%77% 80100%91% 90100%96% %82% Average70.8%73.7% AODV performs 2.9%~3% higher than DSDV DSDV vs. AODV Graph

Ad hoc Security

The Nature of Ad hoc Networks poses a great challenge to System Security due to the following reason: firstly, the wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering. secondly, the lack of an online CA or Trusted Third Party adds the difficulty to deploy security mechanisms; thirdly, mobile devices tend to have limited power consumption and computation capabilities which makes it more vulnerable to Denial of Service attacks (Dos) and incapable to execute computation-heavy algorithms like public key algorithms; fourthly, in MANETs, there are more probabilities for trusted node being compromised and we need to consider both insider attacks and outsider attacks in mobile ad hoc networks, in which insider attacks are more difficult to deal with finally, node mobility enforces frequent networking reconfiguration which creates more chances for attacks, for example, it is difficult to distinguish between stale routing information and faked routing information.

There are five main security services for MANETs: Authentication : means that correct identity is known to communicating partner Confidentiality : means certain message information is kept secure from unauthorized party. integrity : means message is unaltered during the communication. non-repudiation : means the origin of a message cannot deny having sent the message; availability : means the normal service provision in face of all kinds of attacks.

Although some work has been done to increase the security of MANETs, none of them considers designing security mechanisms from a system architectural view: Provide security mechanisms based on some routing protocols, like DSDV, DSR and AODV. PGP-like method to construct the trust infrastructure for MANETs. Distributed public-key management service for ad hoc networks like PK/SK

The figure depicts a five-layer security architecture for MANETs, Security Architecture for MANETs SL5End-to-End Security SL4Network Security SL3Routing Security SL2Communication Security SL1Trust Infrastructure

SL1, Trust Infrastructure Layer: refers to the basic trust relationship between nodes, for example, like a well deployed PKI environment. SL2, Communications Security Layer: refers to the security mechanisms applied in transmitting data frames in a node-to-node manner. Actually it works in Data link layer in OSI Model. SL3, In fact, the routing security layer involves two aspects: secure Routing and secure data forwarding. In secure routing aspect, nodes are required to cooperate to share correct routing information to keep the network connected efficiently; in secure data forwarding aspect, data packets on the fly should be protected from tampering, dropping, and altering by any unauthorized party. SL4, Network Security Layer: refers to the security mechanisms used by the network protocols. the security services like peer entity authentication, confidentiality and integrity as the network layer security protocol IPsec provides. SL5, End-to-End Security Layer: refers to end system security, such as SSL, SSH, https and any application-specific security protocol.

Thank You