Professional Documents
Culture Documents
Wireless environments
Different radio frequency (RF) spectrum ranges are used in wireless networks, 27.5-29.5 GHz for the Local Multipoint Distribution System (LMDS) 2.5-2.7 GHz for the Multipoint Multichannel Distribution System 5.15-5.35 GHz and 2.4-2.58 GHz for IEEE 802.11a and 802.11b Signal strength in a wireless medium decreases when the signal travels further.
Traditional vs mobile IP
in wired or wireless networks, hosts or a subnet as a whole may move from one location to another. Traditional networks require re-congurations of IP addresses used by these mobile hosts or subnets at the new locations. A network enabled with Mobile IP allows these mobile hosts or subnets to move around without any manual address reconguration. Moreover, those roaming nodes can remain connected with others while they are moving. Since Mobile IP also supports a certain mobility in the network, we can consider it as a potential technique to support routing in some types of MANETs.
WiFi / 802.11 Two modes: Centralized: wireless local area data network Peer-to-peer: MAC/PHY for ad hoc networks Ad hoc networks Multi-hop peer-to-peer networks Hybrid networks Unicast, multicast and broadcast networks Wireless sensor networks Different applications uses different n/w topologies Converge-cast, unicast, broadcast and multicast networks
10
11
12
A collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services Often ad-hoc network topology is dynamicnodes enter and leave the network continuously No centralized control or fixed infrastructure to support network configuration or reconfiguration Example scenarios for MANETs Meetings Emergency or disaster relief situations Military communications Wearable computers Sensor networks
13
Mobile nodes have limited communication range Reduces battery drain Enables spatial reuse of limited bandwidth --increased network capacity To connect all nodes in the network, each node is a Packet source, Packet sink, Router Nodes must route packets for other nodes to keep the network fully connected In MANETs, a big problem is how to determine where a destination node is located relative to a sending node
14
15
Network topologies
16
Centralized topology
17
Network topologies
18
19
20
21
22
Setting up of fixed access points and backbone infrast ructure is not always viable Infrastructure may not be present in a disaster area or war zone Infrastructure may not be practical for shortrange radios Bluetooth (range ~ 10m) Ad hoc networks: Do not need backbone infrastructure support Are easy to deploy (Useful when infrastructure is absent, destroyed or im practical )
23
Infrastructure Access
Access Points:
Provide
infrastructure access to mobile users Cover a fixed area Wired into LAN
24
25
Application new applications and adaptations Transport congestion and flow control Network addressing and routing Link media access and handoff Physical transmission errors and interference
26
Infrastructure Access
27
Problems
Access Point placement depends on wired network availability Obstructions make it difficult to provide total coverage of an area Site surveys are performed to determine coverage areas Security Concerns: rogue access points in companies etc.. Each Access Point has limited range
28
29
30
Problems
Communication is only possible between nodes which are directly in range of each other
31
If nodes move out of range of the access point (Infrastructure Mode) OR nodes are not in direct range of each other (Ad Hoc Mode) Then communication is not possible!!
32
33
34
Nodes might be out of range of the access point, But in range of other nodes. The nodes in range of the access point could relay packets to allow out of range nodes to communicate. NOT part of 802.11
35
If communication is required between two nodes which are out of range of each other, intermediary nodes can forward the packets. NOT part of 802.11
Source
Destination
36
Multihop operation requires a routing mechanism designed for mobile nodes. Internet access mechanisms. Self configuring networks requires an address allocation mechanism. Mechanism to detect and act on, merging of existing networks. Security mechanisms.
37
38
39
40
41
42
43
44
45
Ad Hoc Networks
46
Many Applications
Ad hoc networks:
Do not need backbone infrastructure support Are easy to deploy Useful when infrastructure is absent, destroyed or impractical Infrastructure may not be present in a disaster area or war zone
Applications:
Military environments Emergency operations Civilian environments
47
48
Sensor networks
Networks deployed in random distribution Low power Delivering sensor data to a central site for some purpose
49
Traffic networks
Smart cars and smart roads Onboard systems talk to the road:
Map obstacles and delays Obtain maps Inform the road of its actions
50
Military applications
Combat regiment in the field Perhaps 4000-8000 objects in constant unpredictable motion Intercommunication of forces Proximity, function, plan of battle Special issues Low probability of detection Random association and topology
51
Self-configuring network of mobile routers (and associated hosts) connected by wireless links This union forms a random topology Routers move randomly free Topology changes rapidly and unpredictably Standalone fashion or connected to the larger Internet Suitable for emergency situations like natural or human-induced disasters, military conflicts, emergency medical situations, etc.
52
53
of mobile applications Additional challenges Changes to the network topology Need of extreme network flexibility Answer = Mobile Ad-hoc Network
While MANETs are self contained, they can also be tied to an IP-based global or local network Hybrid MANETs
54
Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like natural disasters or military conflicts. The presence of a dynamic and adaptive routing protocol will enable ad hoc networks to be formed quickly. Wireless ad hoc networks can be further classified by their application: mobile ad hoc networks (MANETs) wireless mesh networks wireless sensor networks.
55
possibly highly mobile nodes power constrained relatively immobile severely power constrained nodes large scale rapidly deployable wireless infrastructure largely immobile nodes
Common attributes:
Ad hoc deployment, no infrastructure Routes between Source-Destination nodes may contain multiple hops
56
57
History of MANETs
Earliest MANETs were called packet radio networks, sponsored by DARPA (1970) These packet radio systems predated the Internet and were part of motivation of the original IP suite Later DARPA experiments included the Survivable Radio Network (SURAN) project (1980s) 1990s the advent of inexpensive 802.11 radio cards for personal computer Current MANETs are designed primary for military utility; examples include JTRS (Joint Tactical Radio System) and NTDR (Near-Term Digital Radio).
58
major switches and routers serving the region often damaged cellular cell towers may survive, but suffer from traffic overload and dependence on (damaged) wired infrastructure for backhaul
In addition, existing networks even if they survive may not be optimized for services needed at site
significant increase in mobile phone traffic needs to be served first responders need access to data services (email, www,...) new requirements for peer-to-peer communication, sensor net or robotic control at the site
Motivates need for rapidly deployable networks that meet both the above needs -> recent advances in wireless technology can be
harnessed to provide significant new capabilities
59
A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self-configuring network of mobile devices connected by wireless links Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic
60
61
Dynamic topologies Bandwidth-constrained Asymmetric links with variable capacity Energy constrained Multiple technologies can be used simultaneously
62
No cellular infrastructure. Multi-hop wireless links. Data must be routed via intermediate nodes.
63
Mobile
Random
Ad-hoc
Not
engineered
Networks
Elastic
64
Without (necessarily) using a pre-existing infrastructure Routes between nodes may potentially contain multiple hops
65
66
67
Ease of deployment
Speed of deployment
Decreased dependence on infrastructure
68
Challenges
Limited wireless transmission range Broadcast nature of the wireless medium Packet losses due to transmission errors Mobility-induced route changes Mobility-induced packet losses Battery constraints Potentially frequent network partitions Ease of snooping on wireless transmissions (security hazard)
69
70
71
Vulnerabilities in Mobile Ad Hoc Networks Threats from Compromised nodes Inside the Network attacks that aim to gain the control over the nodes themselves by some unrighteous means and then use the compromised nodes to execute further malicious actions. This vulnerability can be viewed as the threats that come from the compromised nodes inside the network. because of the mobility of the ad hoc network, a compromised node can frequently change its attack target and perform malicious behavior to different node in the network, thus it is very difficult to track the malicious behavior performed by a compromised node especially in a large scale ad hoc network.
72
Vulnerabilities in Mobile Ad Hoc Networks Restricted Power Supply due to the mobility of nodes in the ad hoc network, the nodes in the ad hoc network will reply on battery as their power supply method. (nodes in the wired network need not consider the power supply problem because they can get electric power supply) The problem caused by the restricted power supply is denial-of-service attacks. Adversary nodes knows that the target node is battery-restricted, either it can continuously send additional packets to the target and ask it routing those additional packets, or it can induce the target to be trapped in some kind of timeconsuming computations. Thus the target node will be out of service to all the n service requests since it runs out of power.
73
Vulnerabilities in Mobile Ad Hoc Networks Scalability the traditional wired network scaling is generally predefined when it is designed and will not change much during the use scale of ad hoc network keeps changing all the time: because of the mobility of the nodes in the mobile ad hoc network, (hardly predict how many nodes there will be in the network in the future). As a result, the protocols and services that are applied to the ad hoc network such as routing protocol and key management service should be compatible to the continuously changing scale of the ad hoc network. scale
74
Vulnerabilities in Mobile Ad Hoc Networks Threats from Compromised nodes Inside the Network
Therefore, threats from compromised nodes inside the network are far more dangerous than the attacks from outside the network, and these attacks are much harder to detect because they come from the compromised nodes, which behave well before they are compromised. An example of this threats Byzantine failures encountered in the routing protocol for the mobile ad hoc network
75
Vulnerabilities in Mobile Ad Hoc Networks Lack of Centralized Management Facility the absence of centralized management machinery makes the detection of attacks a very difficult problem because it is not easy to monitor the traffic in a highly dynamic and large scale ad hoc network . It is rather common in the ad hoc network that benign failures, such as path breakages, transmission impairments and packet dropping, happen frequently. Therefore, malicious failures will be more difficult to detect, especially when adversaries change their attack pattern and their attack target in different periods of time.
76
Vulnerabilities in Mobile Ad Hoc Networks Lack of Centralized Management Facility lack of centralized management machinery will impede the trust management for the nodes in the ad hoc network . In mobile ad hoc network, all the nodes are required to cooperate in the network operation, while no security association (SA2) can be assumed for all the network nodes. Some algorithms in the mobile ad hoc network rely on the cooperative participation of all nodes and the infrastructure. Because there is no centralized uthority, and decision- making in mobile ad hoc network is sometimes decentralized, the adversary can make use of this vulnerability and perform some attacks that can break the cooperative algorithm
77
Multihop Routing
Traverse multiple links to reach a destination
78
MANET
79
MANET
No fixed infrastructure
Fixed/static infrastructure
80
Variations
Fully symmetric vs. asymmetries in
Transmission
ranges
Battery
life Processing capability Speed, patterns, and predictability of movement Ability to act as multihop relay Ability to act as leaders of a cluster of nodes