Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel.

Similar presentations


Presentation on theme: "Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel."— Presentation transcript:

1 Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel -- 012112032 2. Fizar Ahmed – 012081006 3. Md. Osman Goni -- 012093006

2 What is Mobile Ad hoc Network Networks deployed in random distribution Low power Delivering sensor data to a central site for some purpose

3 Definition of Mobile Ad hoc Network (MANET) Opposed to infrastructured wireless networks, where each user directly communicates with an access point or base station, a mobile Ad hoc network, or MANET, does not rely on a fixed infrastructure for its operation. The network is an autonomous transitory association of mobile nodes that communicate with each other over wireless links. Nodes that lie within each other’s send range can communicate directly and are responsible for dynamically discovering each other. In order to enable communication between nodes that are not directly within each other’s send range, intermediate nodes act as routers

4 Cellular Network versus Mobile AD Hoc Network

5 Characteristics and Complexities of Mobile Ad hoc Networks Autonomous and Infrastructureless Multi-hop routing Dynamic network topology Device heterogeneity Energy constrained operation Bandwidth constrained variable capacity links Limited physical security Network scalability Self-creation, self-organization and self- administration

6 Routing of MANET Proactive Routing Protocol: To have an up-to-date route to all other nodes at all times. To this end, this protocol will exchange routing control information periodically and on topological changes. Reactive Routing Protocol: Only set up routes to nodes they communicate with and these routes are kept alive as long as they are needed. Hybrid Routing Protocol: Combinations of proactive and reactive protocols, where nearby routes (for example, maximum two hops) are kept up-to-date proactively, while far-away routes are set up reactively. Location-Based Routing Protocol: Where packet forwarding is based on the location of a node’s communication partner.

7 Overview of Existing Routing Technique

8 Mobile Ad Hoc Network Enabling Technologies

9 Application of Mobile Ad hoc Network  Tactical networks: Military communication and operations Automated battlefields  Emergency services: Search and rescue operations Disaster recovery Replacement of fixed infrastructure in case of environmental disasters. Policing and fire fighting. Supporting doctors and nurses in hospitals.  Commercial and civilian environments: E-commerce: electronic payments anytime and anywhere Business: dynamic database access, mobile offices Vehicular services: road or accident guidance, transmission of road and weather conditions, taxi cab network, inter-vehicle networks Sports stadiums, trade fairs, shopping malls Networks of visitors at airports

10 Application of Mobile Ad hoc Network  Home and enterprise networking: Home/office wireless networking Conferences, meeting rooms Personal area networks (PAN), Personal networks (PN) Networks at construction sites  Education : Universities and campus settings Virtual classrooms Ad hoc communications during meetings or lectures  Entertainment: Multi-user games Wireless P2P networking Outdoor Internet access Robotic pets Theme parks

11 Application of Mobile Ad hoc Network  Sensor networks: Home applications: smart sensors embedded in consumer electronics Body area networks (BAN) Data tracking of environmental conditions, animal movements, chemical/biological detection  Context aware services: Follow-on services: call-forwarding, mobile workspace Information services: location specific services, time dependent services  Coverage extension: Extending cellular network access Linking up with the Internet, intranets, etc.

12 Mobile Ad-Hoc Networks using Car- to-Car Communication

13

14 Mobile Ad-Hoc Networks using Healthcare System

15

16 Example Scenario A Scenario of Ad hoc Networks Figure: Mobile nodes in a City

17 1. On Demand/Reactive Protocols - AODV (Ad hoc On Demand Distance Vector) Characteristics:  High latency in routing  No overhead from periodic update  Latency can be reduced by route caching  Saves Bandwidth & Energy during inactivity There are several type of ad hoc routing protocols exists. We have used Two sub categories under two main categories in this discussion. Ad Hoc Routing Protocols

18 Ad Hoc Routing Protocols (Cont.) 2. Table Driven/Proactive Protocols - DSDV (Destination Sequenced Distance Vector) Characteristics:  Low latency, suitable for real time traffic  High overhead (Periodic table updates)  Bandwidth may wasted due to periodic updates  Route repair depends upon update frequency

19

20

21

22 Figure: ns2 implementation Simulation Experimental Setup (Contd.)

23 Figure: Mobile nodes of ad hoc network Node movement

24 Experimental Setup (Contd.) Figure: 100 mobile nodes starts data transmission Data Transmission

25 Result analysis s 0.094186392 _7_ RTR --- 0 message 32 [0 0 0 0] ------- [7:255 -1:255 32 0] r 0.095487131 _3_ RTR --- 0 message 32 [0 ffffffff 7 800] ------- [7:255 -1:255 32 0] s 0.235686783 _9_ RTR --- 1 message 32 [0 0 0 0] ------- [9:255 -1:255 32 0] r 0.236727347 _2_ RTR --- 1 message 32 [0 ffffffff 9 800] ------- [9:255 -1:255 32 0] r 0.236727531 _3_ RTR --- 1 message 32 [0 ffffffff 9 800] ------- [9:255 -1:255 32 0] s 0.333477301 _6_ RTR --- 2 message 32 [0 0 0 0] ------- [6:255 -1:255 32 0] r 3.889605635 _2_ AGT --- 646 ack 60 [13a 2 4 800] ------- [4:0 2:2 32 2] [302 0] 1 0 s 3.895907809 _4_ AGT --- 660 ack 40 [0 0 0 0] ------- [4:0 2:2 32 0] [309 0] 0 0 r 3.895907809 _4_ RTR --- 660 ack 40 [0 0 0 0] ------- [4:0 2:2 32 0] [309 0] 0 0 s 3.895907809 _4_ RTR --- 660 ack 60 [0 0 0 0] ------- [4:0 2:2 32 2] [309 0] 0 0 r 98.118080147 _3_ RTR --- 18753 cbr 532 [13a 3 8 800] ------- [8:2 9:2 32 3] [303] 1 0 f 98.118080147 _3_ RTR --- 18753 cbr 532 [13a 3 8 800] ------- [8:2 9:2 31 9] [303] 1 0 D 149.987010754 _4_ RTR CBK 27141 cbr 532 [13a 5 4 800] ------- [4:2 5:1 32 5] [337] 0 0 D 150.000000000 _1_ IFQ END 28668 tcp 572 [0 2 1 800] ------- [1:0 2:0 32 2] [748 0] 0 0 D 150.000000000 _2_ IFQ END 28631 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [734 0] 0 0 D 150.000000000 _2_ IFQ END 28633 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [735 0] 0 0 D 150.000000000 _2_ IFQ END 28634 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [736 0] 0 0 D 150.000000000 _2_ IFQ END 28637 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [737 0] 0 0 eventtimefrom node to node pkt type pkt size flagfidsrc addr dst addr seq num pkt id We have created an analyzer program in Perl script to analyze trace files. In the analyzer we have counted different traffic pattern. Here is a sample portion of a trace file. Trace file

26 Result analysis Figure: Number of Nodes vs Throughput graph in DSDV NodesThroughput 1016832564 2015515556 3015021056 4020899824 5017679552 6019893052 7019835588 8019794640 9019974384 10020769060 10% 5 Unit DSDV Graph

27 Result analysis (Contd.) Figure: Number of Nodes vs Throughput graph in AODV Nodes Throughput 1013337200 2013618280 3014539944 4017612960 5014284068 6017430596 7015325096 8015567132 9015748440 10015348624 13% 2 Unit AODV Graph

28 Result analysis (Contd.) Figure: DSDV vs AODV performance comparison Fluctuations Many hosts with irregular updates Broadcast with asynchronous events Different propagation speed Different transmission intervals Nodes DSDV AODV 1035%-20% 209%-10% 301%16% 40100%195% 5056%16% 6092%194% 70100%77% 80100%91% 90100%96% 100115%82% Average70.8%73.7% AODV performs 2.9%~3% higher than DSDV DSDV vs. AODV Graph

29 Ad hoc Security

30 The Nature of Ad hoc Networks poses a great challenge to System Security due to the following reason: firstly, the wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering. secondly, the lack of an online CA or Trusted Third Party adds the difficulty to deploy security mechanisms; thirdly, mobile devices tend to have limited power consumption and computation capabilities which makes it more vulnerable to Denial of Service attacks (Dos) and incapable to execute computation-heavy algorithms like public key algorithms; fourthly, in MANETs, there are more probabilities for trusted node being compromised and we need to consider both insider attacks and outsider attacks in mobile ad hoc networks, in which insider attacks are more difficult to deal with finally, node mobility enforces frequent networking reconfiguration which creates more chances for attacks, for example, it is difficult to distinguish between stale routing information and faked routing information.

31 There are five main security services for MANETs: Authentication : means that correct identity is known to communicating partner Confidentiality : means certain message information is kept secure from unauthorized party. integrity : means message is unaltered during the communication. non-repudiation : means the origin of a message cannot deny having sent the message; availability : means the normal service provision in face of all kinds of attacks.

32 Although some work has been done to increase the security of MANETs, none of them considers designing security mechanisms from a system architectural view: Provide security mechanisms based on some routing protocols, like DSDV, DSR and AODV. PGP-like method to construct the trust infrastructure for MANETs. Distributed public-key management service for ad hoc networks like PK/SK

33 The figure depicts a five-layer security architecture for MANETs, Security Architecture for MANETs SL5End-to-End Security SL4Network Security SL3Routing Security SL2Communication Security SL1Trust Infrastructure

34 SL1, Trust Infrastructure Layer: refers to the basic trust relationship between nodes, for example, like a well deployed PKI environment. SL2, Communications Security Layer: refers to the security mechanisms applied in transmitting data frames in a node-to-node manner. Actually it works in Data link layer in OSI Model. SL3, In fact, the routing security layer involves two aspects: secure Routing and secure data forwarding. In secure routing aspect, nodes are required to cooperate to share correct routing information to keep the network connected efficiently; in secure data forwarding aspect, data packets on the fly should be protected from tampering, dropping, and altering by any unauthorized party. SL4, Network Security Layer: refers to the security mechanisms used by the network protocols. the security services like peer entity authentication, confidentiality and integrity as the network layer security protocol IPsec provides. SL5, End-to-End Security Layer: refers to end system security, such as SSL, SSH, https and any application-specific security protocol.

35 Thank You


Download ppt "Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel."

Similar presentations


Ads by Google