Ad Hoc Network.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
A Survey of Secure Wireless Ad Hoc Routing
Introduction to Wireless Sensor Networks
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Mobile Routing protocols MANET Lecture: 4. DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Autonomous Mobile Mesh Networks and their Design Changes.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Arsitektur Jaringan Terkini
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Mobile Ad-hoc Networks (manets)
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Challenges of Routing in Ad-hoc Networks Chandra D Yarlagadda.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Secure Routing in Ad Hoc Wireless Networks
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Wireless Sensor Network Security Anuj Nagar CS 590.
August 6, Mobile Computing COE 446 Network Planning Tarek Sheltami KFUPM CCSE COE Principles of.
Ad Hoc Wireless Routing COS 461: Computer Networks
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Wireless Ad-Hoc Networks
Maulana Azad National Institute of Technology Bhopal (MP) AD-HOC NETWORKS Submitted By: Pradeep Ahirwar M Tech (CSE)
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
PERFORMANCE EVALUATION OF COMMON POWER ROUTING FOR AD-HOC NETWORK Zhan Liang Supervisor: Prof. Sven-Gustav Häggman Instructor: Researcher Boris Makarevitch.
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
UNIT-V Ad-hoc Networks
Mobile Ad Hoc Network (MANET)
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Overview of Wireless Networks:
Ad-hoc Networks.
Introduction to Wireless Sensor Networks
CHARACTERISTICS.
Wireless and Mobile Ad Hoc Networks
CSE 4340/5349 Mobile Systems Engineering
Wireless Ad Hoc Network
Mobile ad hoc networking: imperatives and challenges
INTRODUCTION TO AD HOC WIRELESS NETWORKS
Routing in Mobile Ad-hoc Networks
Other Routing Protocols
An Overview of Security Issues in Sensor Network
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

Ad Hoc Network

Outline Introduction Benefits Applications Security Issues Routing protocols in Ad-hoc network

Introduction Ad Hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration Machines may join and leave the network at any time Machines are mobile; movement is entirely unrestricted Each machine forwards data packets for other machines in the network

Introduction The transmission of a host is received by all hosts within its transmission range due to the broadcast nature of wireless communication and omni-directional antennae. If two wireless hosts are out of their transmission ranges in the ad hoc networks, other hosts located between them can forward their messages, which effectively builds connected networks among the mobile hosts in the deployed area.

Introduction C A B C is out of the wireless transmission range of A A Simple Ad Hoc Wireless Network C is out of the wireless transmission range of A A and C need the help of B to exchange packets

Introduction Ad Hoc Network Consists of mobile hosts (or nodes) which communicate with other nodes through wireless medium without any fixed infrastructure( like AP in 802.11)

Introduction Dynamic network topology The mobile nodes are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. move

Characteristics and tradeoffs Self-organized Self-deployed Decentralized Dynamic network topology Tradeoffs Limited Bandwidth Need Multi-hop router Energy consumption problem Security problem

Benefits Easy to deployment Fast deployment No dependence on infrastructure

Applications Personal area networking Emergency operations Cell phone, laptop, PDA , tablet pc Emergency operations Search and rescue Policing and fire fighting Civilian environments Taxi cab network Boats, aircrafts Military use On the battle field

Personal area networking Cell phone, laptop, PDA , tablet pc

Military use

Civilian Applications Disaster Recovery (flood, fire, earthquakes etc) Homeland defense Search and rescue in remote areas Environment monitoring (sensors) Space/planet exploration

An ad-hoc network as a graph

Critical issues in ad hoc networking Routing: Efficient: minimize control update O/H and redundant forwarding robust, QoS enabled routing route security, covert operations Security: Multicast: congestion controlled; reliable

Security Issues Security is an important issue for ad hoc networks, especially for those security-sensitive applications. we consider the following attributes: Availability Confidentiality Integrity Authentication Non-repudiation.

Availability Keep the network alive against denial of service attacks. A denial of service attack could be launched at any layer of an ad hoc network. physical and media access control layers Jamming the wireless channel network layer disrupt the routing protocol and disconnect the network. higher layers bring down high-level services. One such target is the key management service, an essential service for any security framework.

Confidentiality Some sensitive information requires confidentiality Ex. Strategic or tactical military information Leakage of such information could be dangerous , therefore we need to protect these information Routing information must also remain confidential in some cases, because the information might be used to track any node by an adversary.

Integrity Guarantees that a message being transferred is never corrupted. A message could be corrupted because of radio propagation impairment, or because of malicious attacks on the network.

Authentication Enables a node to ensure the identity of the peer node it is communicating with. Without authentication, an adversary could masquerade a node, thus gaining unauthorized access to resource and sensitive information and interfering with the operation of other nodes.

Non-repudiation Ensures that the origin of a message cannot deny having sent the message. Non-repudiation is useful for detection and isolation of compromised nodes. When a node A receives an erroneous message from a node B, non-repudiation allows A to accuse B using this message and to convince other nodes that B is compromised by an adversary.

Ad-hoc routing protocols

Source-Initiated On-Demand routing protocols AODV: Ad-hoc On-Demand Distance Vector Routing DSR: Dynamic Source Routing Generate routes when desired by the source node. Packet on source node must wait until a route is discovered. Periodic route updates are not required.

Table-Driven routing protocols DSDV: Destination-sequenced Distance-vector Routing Every node need to maintain a table to store routing information. Require mechanisms to update the routing table periodically Cause signaling traffic and power consumption problems Packets on source can be forwarded immediately since the routes are always available.