Mobile Ad hoc Network - PowerPoint PPT Presentation

1 / 35
About This Presentation
Title:

Mobile Ad hoc Network

Description:

Mobile Ad hoc Network What is it ? Application of Mobile Ad hoc Network.. Configuration & Security challenges Presented By 1. Sanaul Haque Himel -- 012112032 – PowerPoint PPT presentation

Number of Views:2271
Avg rating:3.0/5.0
Slides: 36
Provided by: fiz5
Category:

less

Transcript and Presenter's Notes

Title: Mobile Ad hoc Network


1
Mobile Ad hoc Network
  • What is it ?
  • Application of Mobile Ad hoc Network..
  • Configuration Security challenges
  • Presented By
  • 1. Sanaul Haque Himel -- 012112032
  • 2. Fizar Ahmed 012081006
  • 3. Md. Osman Goni -- 012093006

2
What is Mobile Ad hoc Network
  • Networks deployed in random distribution
  • Low power
  • Delivering sensor data to a central site for some
    purpose

3
Definition of Mobile Ad hoc Network (MANET)
  • Opposed to infrastructured wireless networks,
    where each user directly communicates with an
    access point or base station, a mobile Ad hoc
    network, or MANET, does not rely on a fixed
    infrastructure for its operation.
  • The network is an autonomous transitory
    association of mobile nodes that communicate with
    each other over wireless links.
  • Nodes that lie within each others send range can
    communicate directly and are responsible for
    dynamically discovering each other.
  • In order to enable communication between nodes
    that are not directly within each others send
    range, intermediate nodes act as routers

4
Cellular Network versus Mobile AD Hoc Network
5
Characteristics and Complexities of Mobile Ad hoc
Networks
  • Autonomous and Infrastructureless
  • Multi-hop routing
  • Dynamic network topology
  • Device heterogeneity
  • Energy constrained operation
  • Bandwidth constrained variable capacity links
  • Limited physical security
  • Network scalability
  • Self-creation, self-organization and
    self-administration

6
Routing of MANET
  • Proactive Routing Protocol To have an
    up-to-date route to all other nodes at all times.
    To this end, this protocol will exchange routing
    control information periodically and on
    topological changes.
  • Reactive Routing Protocol Only set up routes to
    nodes they communicate with and these routes are
    kept alive as long as they are needed.
  • Hybrid Routing Protocol Combinations of
    proactive and reactive protocols, where nearby
    routes (for example, maximum two hops) are kept
    up-to-date proactively, while far-away routes are
    set up reactively.
  • Location-Based Routing Protocol Where packet
    forwarding is based on the location of a nodes
    communication partner.

7
Overview of Existing Routing Technique
8
Mobile Ad Hoc Network Enabling Technologies
9
Application of Mobile Ad hoc Network
  • Tactical networks
  • Military communication and operations
  • Automated battlefields
  • Emergency services
  • Search and rescue operations
  • Disaster recovery
  • Replacement of fixed infrastructure in case of
    environmental disasters.
  • Policing and fire fighting.
  • Supporting doctors and nurses in hospitals.
  • Commercial and civilian environments
  • E-commerce electronic payments anytime and
    anywhere
  • Business dynamic database access, mobile
    offices
  • Vehicular services road or accident guidance,
    transmission of road and weather conditions,
    taxi cab network, inter-vehicle networks
  • Sports stadiums, trade fairs, shopping malls
  • Networks of visitors at airports

10
Application of Mobile Ad hoc Network
  • Home and enterprise networking
  • Home/office wireless networking
  • Conferences, meeting rooms
  • Personal area networks (PAN), Personal
    networks (PN)
  • Networks at construction sites
  •  
  • Education
  • Universities and campus settings
  • Virtual classrooms
  • Ad hoc communications during meetings or
    lectures
  •  
  • Entertainment
  • Multi-user games
  • Wireless P2P networking
  • Outdoor Internet access
  • Robotic pets
  • Theme parks

11
Application of Mobile Ad hoc Network
  • Sensor networks
  • Home applications smart sensors embedded in
    consumer electronics
  • Body area networks (BAN)
  • Data tracking of environmental conditions,
    animal movements, chemical/biological detection
  •  
  • Context aware services
  • Follow-on services call-forwarding, mobile
    workspace
  • Information services location specific
    services, time dependent services
  •  
  • Coverage extension
  • Extending cellular network access
  • Linking up with the Internet, intranets, etc.

12
Mobile Ad-Hoc Networks using Car-to-Car
Communication
13
Mobile Ad-Hoc Networks using Car-to-Car
Communication
14
Mobile Ad-Hoc Networks using Healthcare System
15
Mobile Ad-Hoc Networks using Healthcare System
16
Example Scenario
A Scenario of Ad hoc Networks
Figure Mobile nodes in a City
17
Ad Hoc Routing Protocols
There are several type of ad hoc routing
protocols exists. We have used Two sub categories
under two main categories in this discussion.
  • 1. On Demand/Reactive Protocols
  • - AODV (Ad hoc On Demand Distance Vector)
  • Characteristics
  • High latency in routing
  • No overhead from periodic update
  • Latency can be reduced by route caching
  • Saves Bandwidth Energy during inactivity

18
Ad Hoc Routing Protocols (Cont.)
  • 2. Table Driven/Proactive Protocols
  • - DSDV (Destination Sequenced Distance
    Vector)
  • Characteristics
  • Low latency, suitable for real time traffic
  • High overhead (Periodic table updates)
  • Bandwidth may wasted due to periodic updates
  • Route repair depends upon update frequency

19
(No Transcript)
20
(No Transcript)
21
(No Transcript)
22
Experimental Setup (Contd.)
Simulation
Figure ns2 implementation
23
Experimental Setup (Contd.)
Node movement
Figure Mobile nodes of ad hoc network
24
Experimental Setup (Contd.)
Data Transmission
Figure 100 mobile nodes starts data transmission
25
Result analysis
Trace file
We have created an analyzer program in Perl
script to analyze trace files. In the analyzer we
have counted different traffic pattern. Here is a
sample portion of a trace file.
event time from node to node pkt type pkt size flag fid src addr dst addr seq num pkt id
s 0.094186392 _7_ RTR --- 0 message 32 0 0 0 0
------- 7255 -1255 32 0 r 0.095487131 _3_
RTR --- 0 message 32 0 ffffffff 7 800 -------
7255 -1255 32 0 s 0.235686783 _9_ RTR --- 1
message 32 0 0 0 0 ------- 9255 -1255 32 0
r 0.236727347 _2_ RTR --- 1 message 32 0
ffffffff 9 800 ------- 9255 -1255 32 0 r
0.236727531 _3_ RTR --- 1 message 32 0 ffffffff
9 800 ------- 9255 -1255 32 0 s 0.333477301
_6_ RTR --- 2 message 32 0 0 0 0 -------
6255 -1255 32 0 r 3.889605635 _2_ AGT ---
646 ack 60 13a 2 4 800 ------- 40 22 32 2
302 0 1 0 s 3.895907809 _4_ AGT --- 660 ack 40
0 0 0 0 ------- 40 22 32 0 309 0 0 0 r
3.895907809 _4_ RTR --- 660 ack 40 0 0 0 0
------- 40 22 32 0 309 0 0 0 s 3.895907809
_4_ RTR --- 660 ack 60 0 0 0 0 ------- 40
22 32 2 309 0 0 0 r 98.118080147 _3_ RTR ---
18753 cbr 532 13a 3 8 800 ------- 82 92 32
3 303 1 0 f 98.118080147 _3_ RTR --- 18753
cbr 532 13a 3 8 800 ------- 82 92 31 9
303 1 0 D 149.987010754 _4_ RTR CBK 27141 cbr
532 13a 5 4 800 ------- 42 51 32 5 337 0
0 D 150.000000000 _1_ IFQ END 28668 tcp 572 0 2
1 800 ------- 10 20 32 2 748 0 0 0 D
150.000000000 _2_ IFQ END 28631 ack 60 0 1 2
800 ------- 20 10 32 1 734 0 0 0 D
150.000000000 _2_ IFQ END 28633 ack 60 0 1 2
800 ------- 20 10 32 1 735 0 0 0 D
150.000000000 _2_ IFQ END 28634 ack 60 0 1 2
800 ------- 20 10 32 1 736 0 0 0 D
150.000000000 _2_ IFQ END 28637 ack 60 0 1 2
800 ------- 20 10 32 1 737 0 0 0
26
Result analysis
DSDV Graph
Nodes Throughput
10 16832564
20 15515556
30 15021056
40 20899824
50 17679552
60 19893052
70 19835588
80 19794640
90 19974384
100 20769060
10
5 Unit
Figure Number of Nodes vs Throughput graph in
DSDV
27
Result analysis (Contd.)
AODV Graph
Nodes Throughput
10 13337200
20 13618280
30 14539944
40 17612960
50 14284068
60 17430596
70 15325096
80 15567132
90 15748440
100 15348624
13
2 Unit
Figure Number of Nodes vs Throughput graph in
AODV
28
Result analysis (Contd.)
DSDV vs. AODV Graph
Nodes DSDV AODV
10 35 -20
20 9 -10
30 1 16
40 100 195
50 56 16
60 92 194
70 100 77
80 100 91
90 100 96
100 115 82
Average 70.8 73.7
Figure DSDV vs AODV performance comparison
  • Fluctuations
  • Many hosts with irregular updates
  • Broadcast with asynchronous events
  • Different propagation speed
  • Different transmission intervals

AODV performs 2.93 higher than DSDV
29
Ad hoc Security
30
The Nature of Ad hoc Networks poses a great
challenge to System Security due to the following
reason
  • firstly, the wireless network is more
    susceptible to attacks ranging from
    passive eavesdropping to active interfering.
  • secondly, the lack of an online CA or Trusted
    Third Party adds the difficulty to deploy
    security mechanisms
  • thirdly, mobile devices tend to have limited
    power consumption and computation capabilities
    which makes it more vulnerable to Denial of
    Service attacks (Dos) and incapable to execute
    computation-heavy algorithms like public key
    algorithms
  • fourthly, in MANETs, there are more
    probabilities for trusted node being compromised
    and we need to consider both insider attacks and
    outsider attacks in mobile ad hoc networks, in
    which insider attacks are more difficult to deal
    with
  • finally, node mobility enforces frequent
    networking reconfiguration which creates more
    chances for attacks, for example, it is difficult
    to distinguish between stale routing information
    and faked routing information.

31
There are five main security services for MANETs
  • Authentication means that correct identity is
    known to communicating partner
  • Confidentiality means certain message
    information is kept secure from unauthorized
  • party.
  • integrity means message is unaltered during
    the communication.
  • non-repudiation means the origin of a
    message cannot deny having sent the message
  • availability means the normal service
    provision in face of all kinds of attacks.

32
Although some work has been done to increase the
security ofMANETs, none of them considers
designing security mechanisms from a system
architectural view
  • Provide security mechanisms based on some
    routing protocols, like DSDV, DSR and AODV.
  • PGP-like method to construct the trust
    infrastructure for MANETs.
  • Distributed public-key management service for ad
    hoc networks like PK/SK

33
The figure depicts a five-layer security
architecture for MANETs,
  • Security Architecture for MANETs

SL5 End-to-End Security
SL4 Network Security
SL3 Routing Security
SL2 Communication Security
SL1 Trust Infrastructure
34
  • SL1, Trust Infrastructure Layer refers to the
    basic trust relationship between nodes, for
    example, like a well deployed PKI environment.
  • SL2, Communications Security Layer refers to
    the security mechanisms applied in transmitting
    data frames in a node-to-node manner. Actually it
    works in Data link layer in OSI Model.
  • SL3, In fact, the routing security layer
    involves two aspects secure
  • Routing and secure data forwarding. In secure
    routing aspect, nodes are required to cooperate
    to share correct routing information to keep the
    network connected efficiently in secure data
    forwarding aspect, data packets on the fly should
    be protected from tampering, dropping, and
    altering by any unauthorized party.
  • SL4, Network Security Layer refers to the
    security mechanisms
  • used by the network protocols. the security
    services like peer entity
  • authentication, confidentiality and integrity as
    the network layer
  • security protocol IPsec provides.
  • SL5, End-to-End Security Layer refers to end
    system security,
  • such as SSL, SSH, https and any
    application-specific security
  • protocol.

35
Thank You
Write a Comment
User Comments (0)
About PowerShow.com