Professional Documents
Culture Documents
ADHOC NETWORKS
By M.K.HAK
1
INTRODUCTION
Adhoc networks are formed by devices that are able to
communicate with each other using a wireless physical
medium without having to resort to pre-existing network
infrastructure.
These are also known as MANETS ie Mobile Adhoc
Networks.
Fundamental characteristics of ADHOC networks
They are able to configure themselves on the fly without the
intervention of a centralized administration.
They also act as intermediate system i.e. forwarding the packets from
the other nodes.
Basic principal
Applications
Accident warning
Floating car data
Multi-hop extensions of Info stations.
Application for wireless sensor networks
Temperature. Measurement details
Detect vibrations
Make photos.
Environmental monitoring
Intrusion detection , detection of bush fires , earth quake warning.
ADHOC NETWORKS
30/08/10
Medical sector : Monitoring of body functions and Implants.
13
30/08/10
Key advantages :-
No expensive infrastructure must be involved.
Making use of unlicensed frequency spectrum.
Quick distribution of information around sender.
14
30/08/10
KEY CHALLENGES
All network entities must be mobile requirement of very
dynamic technology.
Network functions must have high degree of adaptability
(mobility , outage).
No central entities
30/08/10
• Well known routings are:
– Link state routing
– Distance vector routing
• The Pro-active approach for routing
– Always maintain all routes
• Problems :
– Topologies changes → significant network traffic
– Even when the route is not used
16
UNICAST ROUTING PROTOCOLS :
30/08/10
Many protocols have been proposed some have been
invented specifically for MANETs other are adopted
from previously proposed protocols for wired networks.
No single protocol works well in all environments.
Some attempts made to develop adaptive protocols.
17
ROUTING PROTOCOLS :
30/08/10
Proactive Protocols :
Determines the route independent of traffic pattern
Traditionally link – state and distance vector routing
protocols are proactive
Reactive protocols :
Maintain routes only if needed
Hybrid protocols :
18
Combines Pro-active and re-active elements
Position based protocols Use the geographic
position of nodes for forwarding decisions
30/08/10
Latency of route discovery
Proactive protocols may have lower latency since the
routes are maintained at all times
Reactive protocols may have higher latency because a
route from X to Y will be found only when X attempts to
send Y
Overhead of route discovery /maintenance 19
30/08/10
Reactive protocols may have lower overhead since
routes are determined only if needed
Proactive protocols can (but not necessarily) result in
higher overhead due to continuous route updating
Which of the protocols achieve a better trade off depends
on the traffic and mobility patterns
20
FLOODING FOR DATA DELIVERY
30/08/10
Sender S broadcast data packet P to all neighbors
Each node receiving P forwards P to its neighbors
Sequence no's are used which avoid the possibility of
forwarding the same packet more than once
Packet P reaches the destination D provided that D is
reachable from sender S
21
S Node D does not forward a packet
E
B
30/08/10
F
H
J
A
G M
K L
I
30/08/10
Wireless links are prone to errors
Either because of interference
Or because of collisions
23
THE MECHANISM ARE NEEDED TO
INCREASE THE RELIABILITY :
30/08/10
Forward error correction (FEC) include the redundancy
in the packet
Automatic repeat request (ARQ) use acknowledgements
and re-transmission
ARQ for multi hop AD-HOC networks
Implicit assumptions :-
24
WHAT HAPPENS IF PACKET LOSS OCCURS
DUE TO A NODE LEAVING THE
TRANSMISSION RANGE
30/08/10
i. Multiple re-transmission before a sender gives up
Unlikely
No route discover strategies favor shortest (i.e.
minimal) path
Note:- Broadcast (used for rote discovery) are not
25
protected by ARQ
PROBLEM WITH RANGES FOR MULTI-
HOP ADHOC NETWORKS :
30/08/10
1. Large interference , dramatically reduces the capacity
30/08/10
Routes found via broadcast may not be usable for data traffic
It is called Grey zone
IEEE 802.11 is used and will be used for multi hop ADHOC
networks
Inter-vehicle communication
Also as access networks
It is certainly not optimal : focus is on single hop networks
There are many pit falls when blindly using existing MAC
mechanism
There is also the need & integrated routing /MAC approach
27
Building a new MAC is hard and expensive
SECURITY IN MOBILE ADHOC
NETWORKS
Security needs and threats
30/08/10
1.
30/08/10
End user perspective : wants secure end to end communication
Operator perspective : Has to provide secure n/w organization as
basis for offering a secure communication service
29
SECURITY GOALS WITH RESPECT TO
ADHOC ROUTING
30/08/10
Routing signaling cannot be spoofed
Fabricating routing messages can not be integrated in the
network
Routing messages cannot be altered in transit except
according to the normal functionality of the routing
protocol
Routing loops cannot be formed through malicious action
route cannot be re-directed from the shortest path by
malicious action
Managed open environment
Unauthorized nodes should be excluded from route 30
computation and discovery
• Managed hostile environment
30/08/10
• The network topology must be exposed neither to adversaries nor
to authorized nodes by the routing messages
• Cryptography
30/08/10
• Monitoring
30/08/10
Equipment/battery : no obvious line of defense ,Side
channel attacks
Radio jamming
DLC : attacks on MAC , MAC address
Routing : no infrastructure support , no clear line of
defense
Co-ordination : based on principal of mutual assistance ,
33
simple attacks and packet drops
Security procedures:
30/08/10
Route
Signed discovery packet (RDP) propagates to sought
destination
Destination sends back signed route reply (REP)
At each hop the following action is taken
Validation of original signature
30/08/10
check list :
• Unauthorized participation , managed by trusted
authority
• Spoofed route signaling everything is signed
• Fabricated routing messages
35
AD-HOC Routing Protocols
It is a convention or standard that controls how nodes decide which
way to route packets between computing devices in a mobile AD-
HOC networks
In AD-HOC networks nodes are not familiar with the topology but
instead they have to discover it
The new nodes can announce their presence & should keep on
listening to the announcements made by the neighbors
The node learns about neighbors which are nearer to them & how
to reach them & may announce how to reach them.
AD-HOC protocols can also be used Literally
Hierarchal Routing
Geographical Routing
Multicast Routing
External Links
1) SENCAST
2) Multi -rate AD-HOC on demand Distance Vector Routing
Protocol
Reliable Ad-Hoc on demand distance vector routing
protocol.
MEPA ( Minimum exposed path to the attacks in
mobile AD-HOC networks
Routing is initially established with some pro-actively
prospectively routes & then serves the demand for
some additionally activated nodes through reactive
flooding
The main disadvantages of such algorithms are