Mobile ad hoc networking: imperatives and challenges

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Chris Karlof and David Wagner
Security in Mobile Ad Hoc Networks
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Routing Security in Ad Hoc Networks
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
August 6, Mobile Computing COE 446 Network Planning Tarek Sheltami KFUPM CCSE COE Principles of.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
1 Mobile ad hoc networking: imperatives and challenges Imrich Chlamtac, Marco Conti, Jennifer J.N. Liu MMLAB, Seongil Han
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Lecture 24 Wireless Network Security
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
UNIT-V Ad-hoc Networks
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Introduction to Mobile Ad hoc Networks (MANETs) Advanced Computer Networks.
Presented by Edith Ngai MPhil Term 3 Presentation
Mobile IP for Mobile Ad hoc Networks
IMPROVING OF WIRELESS MESH NETWORKS.
Outline What is Wireless LAN Wireless Transmission Types
Introduction Wireless devices offering IP connectivity
IMPROVEMENT OF NETWORK LIFETIME BY IMPROVING ROUTE DISCOVERY PHASE IN MULTI-PATH DSR USING HYBRID ANT COLONY OPTIMIZATION.
Overview of Wireless Networks:
The University of Adelaide, School of Computer Science
Ad-hoc Networks.
MOBILE AD-HOC NETWORKS
Chapter 6 Wireless and Mobile Networks
Classification of various Attacks.
CHARACTERISTICS.
Wireless and Mobile Ad Hoc Networks
CSE 4340/5349 Mobile Systems Engineering
Environment-Aware Reputation Management for Ad Hoc Networks
CS 457 – Lecture 7 Wireless Networks
Wireless ATM PRESENTED BY : NIPURBA KONAR.
Ad Hoc and Sensor Networks
Wireless Ad-Hoc Networking
Adhoc and Wireless Sensor Networks
An Introduction to Computer Networking
Issues in Ad Hoc Wireless Networks
Practical Considerations for Securely Deploying Mobility
Study of performance of regular TCP in MANETs (using simulator).
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Protocols.
An Overview of Security Issues in Sensor Network
Global One Communications
Security in Wide Area Networks
Protocols.
Presentation transcript:

Mobile ad hoc networking: imperatives and challenges

Agendas Wireless networks Ad hoc networks Mobile ad hoc networks (MANET) MANET applications Enabling technologies Security issues Conclusions Questions

Wireless networks Computer network that is wireless IP backbone Server Router Gateways Computer network that is wireless Infrastructure-based networks Less expensive to setup

Disadvantages Disaster areas Large construction sites no infrastructure Large construction sites Too expensive Inconvenient Military operations Less time to setup

Solution??? Mobile ad hoc network Mobile ad hoc network (MANET), or simply ad hoc network, comprises nodes that freely and dynamically self-organize into arbitrary and temporary network topology without any infrastructure support. (Chlamtac, Conti, and Liu, 2003)

MANET Formed by wireless hosts Without using pre-installed infrastructure Routes between hops may contain multiple hops Does not use centralized administration MANETs are often referred to as multihop wireless and hoc networks

Key Elements of MANETs Formed dynamically through independent nodes Nodes do not have any pre-specified nodes Make decision based on the current network situation Nodes are expected to behave as routers As routers, nodes must assist in discovery and maintenance of network routes

MANET applications Tactical Networks Sensor Networks Military communication, operation Automated Battlefields Sensor Networks Home applications: allow users to manage home device locally and remotely Environment applications: tracking the movements of animals

MANET applications (continued) Emergency Services Replacement of a fixed infrastructure in case of earthquake, hurricanes Home and Enterprise Networking Shared whiteboard applications Use PDA to print anywhere Entertainment Multi-user games Robotic pets

Mobility Space divided into cells A base station is responsible to communicate with hosts in its cell Mobile hosts can change cells while communicating Hand-off occurs when a mobile host starts communicating via a new base station

MANET Architecture

MANET Research activities Based on its architecture, research activities are grouped into three main areas Enabling technologies Networking Middleware and application

Enabling Technologies Classification depends on networks coverage area Body (BAN) Personal (PAN) Local (LAN) Metropolitan (MAN) Wide (WAN)

Collision – Hidden-Station Problem A wishes to communicate with B. However A cannot detect communication from C but can detect communication from B. C also wishes to communicate with B. Again C cannot detect communication from A but can detect Communication from B. C is hidden from A and A is hidden from C. Both A and C transmit and their signals collide leading to loss of both packets.

Collision – Exposed-station Problem Nodes A, B, and C can all detect communications from one another. However, Only C can detect communication from D. Node B wishes to send to Node A and Node C wishes to send to Node D. So Node B begins transmitting to Node A and Node C recognizes this. The medium is in use so Node C can not transmit to Node D. Even though both transmission requests could be made going in opposite directions, the transmission does not happen. This is because Node C is exposed to Nodes A and B while D is not.

Research issues Energy conservation Network security and cooperation Simulation and performance evaluation Quality of service

Energy conservation Energy conservation Solution Battery power is finite Limits services and applications that the network can support Solution Topology management – goal is to reduce overall network power consumption Routing protocols – minimize routing paths

Energy conservation (Continued)

Network Security - MANET Physically insecure network Network security requirements Confidentiality Authentication Integrity Non-repudiation Availability

Eavesdropping Who has a radio receiver B C Who has a radio receiver Same frequency used by the ad hoc network Man-in-the-middle attack

Impersonation - Security Attacks Nodes join to the network undetectably Black hole attack Malicious node uses the same routing protocol Advertise itself as having the shortest path Worm hole attack Create a tunnel(wormhole link) between two malicious nodes Captures wireless transmission from one end Sends them to the other end through that tunnel

Denial of Service - Security Attacks Attempts to create routes to non-existent node The attacker attempts to consume batteries of other nodes by requesting routes Forwards unnecessary packets Causes a system to be unavailability A violation of security policy

Disclosure Attack - Security Attacks Reveal the physical location of nodes Reveal the structure of the network Two security mechanisms are applied Preventive Detective Mechanisms are based on key-based cryptography Secret keys are distributed through a secure channel Public keys are distributed through certificates

Quality of Service - MANET Capability of network to provide better service Controls jitter and latency Manages and minimizes network congestion Sharps network traffic Sets network traffic priorities

Conclusion MANETs is challenging and promising system concepts Requires new type of architectures and protocols Popular research topic Open areas Secure routing protocol Quality of service Low power consumption

Questions

References www.ietf.org/html.charters/manet-charter.html I Chlamtac, M Conti, JJN Liu, "Mobile ad hoc networking: imperatives and challenges." Ad Hoc Networks, 1(1), pp. 13-64, 2003. http://cs.utsa.edu/faculty/boppana/6393/ www.ietf.org/html.charters/manet-charter.html http://www.antd.nist.gov/wahn_mahn.shtml