Professional Documents
Culture Documents
Seminar Presentation By
TARUN VARSHNEY
Department of Information Technology ABES Engineering College
Wireless Networks
Gateways
IP backbone
Server
Router
Infrastructure-based networks
Less expensive to setup
Disadvantages
Disaster areas
no infrastructure
Large construction sites
Too expensive
Inconvenient
Military operations
Solution???
Mobile ad hoc network Mobile ad hoc network (MANET), or simply ad hoc network, comprises nodes that freely and dynamically self-organize into arbitrary and temporary network topology without any infrastructure support.
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communication and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure
MANETs: Operation
Internet
C
B A D E E
Gateway
F Stand-alone MANET
After one of the nodes is configured as a gateway, the entire network is connected to an external network like Internet
MANET: Formation
B
MANET: Architecture
A wishes to communicate with B. However A cannot detect communication from C but can detect communication from B.
C also wishes to communicate with B. Again C cannot detect communication from A but can detect Communication from B.
C is hidden from A and A is hidden from C. Both A and C transmit and their signals collide leading to loss of both packets.
Nodes A, B, and C can all detect communications from one another. However, Only C can detect communication from D.
Node B wishes to send to Node A and Node C wishes to send to Node D. So Node B begins transmitting to Node A and Node C recognizes this. The medium is in use so Node C can not transmit to Node D. Even though both transmission requests could be made going in opposite directions, the transmission does not happen. This is because Node C is exposed to Nodes A and B while D is not.
Routing Protocols are the set of rules and regulation that are must followed during the communication over the network.
Reactive Routing Protocol: Establish the route to a destination only when there is a demand for it. Also called as Demand Protocol. Hybrid Routing Protocol: Combination of proactive and reactive protocol The route is established with the proactive routes and uses reactive flooding for new mobile nodes.
Packet send from source to destination, floods the network with the RREQ packets. All mobile node receive RREQ from neighbor or update message then checks routing table to find out that if it is the destination node or if it has fresh route to the destination then unicast RREP which is routed back on a temporary reverse route generated by RREQ from source node or else it re-broadcast RREQ.
Qualitative Metrics
Quantitative Metrics
Qualitative Metrics
Qualitative metrics include the : Loop Freedom On-Demand Routing Behavior Proactive Behavior Security Unidirectional Link Support Sleep Mode
Quantitative Metrics
Quantitative metrics broadly includes the: End-to-end data throughput and delay Route Acquisition Time Out-of-Order Delivery Efficiency
- Confidentiality
- Integrity
- Authentication
Nodes that perform active attacks with the aim of damaging other nodes by causing network outage are considered to be malicious.
Nodes that perform passive attacks with the aim of saving battery life for their own communications are considered to be selfish Selfish nodes can severely degrade network performances and eventually partition the network
MANET Applications
Tactical Networks
Sensor Networks
Home applications: allow users to manage home device locally and remotely
Conclusion
MANETs is challenging and promising system concepts
Quality of service
Low power consumption
Conclusion
Security of ad hoc networks has recently gained momentum in the research community
Due to the open nature of ad hoc networks and their inherent lack of infrastructure, security exposures can be an impediment to basic network operation Security solutions for MANET have to cope with a challenging environment including scarce energy and computational resources and lack of persistent structure
Conclusion
The solutions presented in this presentation only cover a subset of all threats and are far from providing a comprehensive answer to the security problem in ad hoc networks They often address isolated issues away from a global approach to security
As the technology for ad hoc wireless networks gains maturity, comprehensive security solutions based on realistic trust models and addressing all prevalent issues like routing, key management and cooperation enforcement are expected to appear
Any