Adhoc Networks 2
-
Upload
eva-sharma -
Category
Documents
-
view
221 -
download
0
Transcript of Adhoc Networks 2
-
8/3/2019 Adhoc Networks 2
1/41
ADHOC NETWORKS
1/28/2012
1
-
8/3/2019 Adhoc Networks 2
2/41
INTRODUCTION
Adhoc networks are formed by devices that are able to
communicate with each other using a wireless physical
medium without having to resort to pre-existing network
infrastructure. These are also known as MANETS ie Mobile Adhoc
Networks.
-
8/3/2019 Adhoc Networks 2
3/41
Fundamental characteristics of ADHOC
networks
They are able to configure themselves on the fly withoutthe intervention of a centralized administration.
The terminals in ADHOC networks can function not onlyas end systems (executing applications, sending
information) as source nodes and receiving the data asdestination nodes.
They also act as intermediate system i.e. forwarding thepackets from the other nodes.
Adhoc networks are also called multihop wireless
networks.
-
8/3/2019 Adhoc Networks 2
4/41
Adhoc networks
Compared to cellular networks adhoc networks are moreadaptive to changing demands and physical conditions.
Attenuation characteristics of wireless networks are nonlinear.
Energy efficiency will be potentially superior and theincreased spatial reuse will yield superior capacity withincreased spectral efficiency.
These characteristics make adhoc networks attractive andis tightly linked to heterogeneous network and 4G
architecture.
-
8/3/2019 Adhoc Networks 2
5/41
Challenges in adhoc networks
The need for self configurability and flexibility at
various levels i.e. (Dynamic Routing or distributed MAC
arrangements).
Gross layer optimization can significantly improve thesystem performance.
-
8/3/2019 Adhoc Networks 2
6/41
Classification of adhoc networks
ADHOC networks are classified as follows
Body area network (BAN)
It is the set of variable devices that have a
communication range of 2 meters.
Personal area network (PAN)
It refers to the communication between different BANs ,
between a BAN and its intermediate surroundings.
Range of communication is approx 10 meters .
-
8/3/2019 Adhoc Networks 2
7/41
Wireless local area network (WLAN)
WLAN has the range of 100s of meters.
ForWLAN the main option is the family of standards i.e.
IEEE 802.11
The main existing technology for implementing BANs
and PANs is Bluetooth.
-
8/3/2019 Adhoc Networks 2
8/41
Routing is the most active research field in the adhoc
networks as it is related with different communication
layers .
Minimizing the hops is no longer the objective of therouting algorithm but optimization of multiple
parameters such as packets error rate over the route,
energy consumption, network survivability, routing
overheads, possibility of establishing a parallel route.
-
8/3/2019 Adhoc Networks 2
9/41
Use of TCP over wireless links poses many problems .it
results in additional problems for wireless links.
Communication over wireless Route failures lead to
unnecessary congestion control. MAC congestion reduces throughput on longer routes.
-
8/3/2019 Adhoc Networks 2
10/41
Power awareness
: since most of the w/l terminals can be expected to havelimited energy storage, power awareness is veryimportant.
This subject spans over several communication layers soattention is given to different power saving approaches.
The objectives are not only the reduction of transmissionpower but also the management of sleep states or
extention of network survivability through the routingwhich isenergy aware ..
-
8/3/2019 Adhoc Networks 2
11/41
1
However if the medium remains idle for this period the
station will go to the back off state.
When entering the back off state MS selects aback off
interval (BI) between zero and the contention windowperiod (CW).
CW is the integer no of basic tine slots, if the medium
remains idle for the duration of BI time (i.e the value of
chosen BI minus the elapsed time since entering the back
off state).
-
8/3/2019 Adhoc Networks 2
12/41
CSMA CD
Carrier sensed multiple access
technique/collision detection.
When the mobile gets a frame to transmit, it first senses
the channel to determine whether another MS istransmitting.
If MS senses the channel to be idle for a period which is
equal to the inter space frame, then it starts transmitting
the frame.
-
8/3/2019 Adhoc Networks 2
13/41
When it senses the channel to be busy it will differ the
transmission and the station will keep on sensing the
channel.
At the point of time when the media becomes idle thestation will continue sensing and will wait for the period
which is equal to inter frame space to elapse again. If the
medium becomes busy during this period, the station will
go to the deffering state again.
-
8/3/2019 Adhoc Networks 2
14/41
Collision will occur if two or more MSs select the same
BI provided the condition stated above , that the frame
coexist spatially at one or more of the receiving stations.
When the collision occurs the station that have causedthe collision senses the medium again for the inter frame
space and go again to back off state. Selecting a new BI.
Randomly with the value of contention window period
doubled
-
8/3/2019 Adhoc Networks 2
15/41
The other station which stored their remaining BI times
also waits for inter frame space and then go to the back
off state.
-
8/3/2019 Adhoc Networks 2
16/41
Basic principal
Mobile devices communicate in Peer to Peer fashion.
Self organizing network without the need to fixed
network infrastructure.
Multihop communication. Decentralized mobility-adaptive operation. This is the art
of networking without a network .
-
8/3/2019 Adhoc Networks 2
17/41
Applications
Accident warning
Floating car data
Multihop extensions of Info stations.
Application for wireless sensor networks
Temperature. Measurement details
Detect vibrations
Make photos.
Environmental monitoring
Intrusion detection , detection of bush fires , earth quakewarning.
-
8/3/2019 Adhoc Networks 2
18/41
ADHOC NETWORKS
Medical sector : Monitoring of body functions andImplants.
Biological sector : Animal tracking , underseaexploration
Industrial sector : Remote sensing in power plants
Home automation: Remote monitoring of resourcessuch as Electricity ,Water and Gas
Aerospace sector : Sensor equipped Robots on a plant
1/28/2012
18
-
8/3/2019 Adhoc Networks 2
19/41
Key advantages :-
y No expensive infrastructure must be involved.
y Making use of unlicensed frequency spectrum.
y Quick distribution of information around sender.
1/28/2012
19
-
8/3/2019 Adhoc Networks 2
20/41
KEY CHALLENGES
y All network entities must be mobile requirement of
very dynamic technology.
y Network functions must have high degree of
adaptability (mobility , outage).
y No central entities
operation in completely distributed manner.
1/28/2012
20
-
8/3/2019 Adhoc Networks 2
21/41
ROUTING FORADHOC MOBILENETWORKS :
Well known routings are:
Link state routing
Distance vector routing The Pro-active approach for routing
Always maintain all routes
Problems :
Topologies changes significant network traffic
Even when the route is not used
1/28/2012
21
-
8/3/2019 Adhoc Networks 2
22/41
UNICAST ROUTING PROTOCOLS :
Many protocols have been proposed some have been
invented specifically forMANETs other are adopted
from previously proposed protocols for wired networks.
No single protocol works well in all environments.
Some attempts made to develop adaptive protocols.
1/28/2012
22
-
8/3/2019 Adhoc Networks 2
23/41
ROUTING PROTOCOLS :
Proactive Protocols :
y Determines the route independent of traffic pattern
y Traditionally link state and distance vector routingprotocols are proactive
Reactive protocols :
y
Maintain routes only if needed
Hybrid protocols :
y Combines Pro-active and re-active elements
1/28/2012
23
-
8/3/2019 Adhoc Networks 2
24/41
1/28/2012
24
Position based protocols
Use the geographic position of nodes for
forwarding decisions
-
8/3/2019 Adhoc Networks 2
25/41
TRADE OFF
Latency of route discovery
Proactive protocols may have lower latency since the
routes are maintained at all times
Reactive protocols may have higher latency because a
route from X to Y will be found only when X attempts to
send Y
Overhead of route discovery /maintenance
1/28/2012
25
-
8/3/2019 Adhoc Networks 2
26/41
Reactive protocols may have lower overhead since routes
are determined only if needed
Proactive protocols can (but not necessarily) result in
higher overhead due to continuous route updating
Which of the protocols achieve a better trade off depends
on the traffic and mobility patterns
1/28/2012
26
-
8/3/2019 Adhoc Networks 2
27/41
FLOODING FOR DATA DELIVERY
SenderSbroadcast data packet P to all neighbours
Each node receiving P forwards P to its neighbours
Sequence no's are used which avoid the possibility of
forwarding the same packet more than once
Packet Preaches the destination D provided that D is
reachable from senderS
1/28/2012
27
-
8/3/2019 Adhoc Networks 2
28/41
B
S
A
C
H
E
I
G
F
K
J
D
M
N
L
i.e. S represent a node that has
received packet P
represents that connected nodes are
within each other transmission range
1/28/2012
28
Node D does not forward a packet
-
8/3/2019 Adhoc Networks 2
29/41
RELIABILITY OF ADHOC NETWORKS
Wireless links are prone to errors
y Either because of interference
y Or because of collisions
(collision detection does not work for half duplex
networks)
High packet loss rate detrimental to transport layer
performance
1/28/2012
29
-
8/3/2019 Adhoc Networks 2
30/41
THE MECHANISM ARE NEEDED TO
INCREASE THE RELIABILITY :
Forward error correction (FEC) include the redundancy
in the packet
Automatic repeat request (ARQ) use acknowledgementsand re-transmission
y ARQ for multi hop AD-HOC networks
Implicit assumptions :-
y
Packet loss is caused by interference or collisionsy Retransmission seems to be appropriate
1/28/2012
30
-
8/3/2019 Adhoc Networks 2
31/41
WHAT HAPPENS IF PACKET LOSS OCCURS DUE TO
A NODE LEAVING THE TRANSMISSION RANGE
i. Multiple re-transmission before a sender gives up
ii. Massive increase in network congestion
Unlikely
y No route discover strategies favour shortest (i.e.
minimal) path
Note:- Broadcast (used for rote discovery) are not
protected by ARQ
1/28/2012
31
-
8/3/2019 Adhoc Networks 2
32/41
PROBLEM WITH RANGES FOR MULTI-HOP
ADHOCNETWORKS :
1. Large interference , dramatically reduces the capacity
2. Ranges depend on the transmission rate
Low rate less vulnerable to interference
3. Broadcast use a lower rate than Uni casts in IEEE
802.11
( to make the transmission more reliable)
4. Broadcasts are used for route discovery
5. Uni casts used for data delivery
1/28/2012
32
-
8/3/2019 Adhoc Networks 2
33/41
CONSEQUENCES :-
Routes found via broadcast may not be usable for data traffic
y It is called Grey zone
IEEE 802.11 is used and will be used for multi hop ADHOCnetworks
Inter-vehicle communication
Also as access networks
It is certainly not optimal : focus is on single hop networks
There are many pit falls when blindly using existing MAC
mechanism
There is also the need & integrated routing /MAC approach
Building a new MAC is hard and expensive
1/28/2012
33
-
8/3/2019 Adhoc Networks 2
34/41
SECURITY IN MOBILE ADHOCNETWORKS
1. Security needs and threats1/28/2012
34
Security
features and need
Privacy
/Anonymity
features and
need
Dependability
features and need
Subject /object
authentication
Confidentiality sort off Availability
Data integrity No unauthorizeddissemation of personal
data
Availability
Accountability Location , Address
,service privacy
-
8/3/2019 Adhoc Networks 2
35/41
NETWORK SECURITY SEEN AS CUSTOMER-
PROVIDER RELATIONSHIP
End user perspective : wants secure end to end
communication
Operator perspective : Has to provide secure n/w organization
as basis for offering a secure communication service
Attack types and building blocks of counter measures
y
Passive attack -F
abricating or stealing of packetsy Get content - modification of packets
y Profiling -Active attacks
y Other types of attacks
1/28/2012
35
-
8/3/2019 Adhoc Networks 2
36/41
SECURITY GOALS WITH RESPECT TO
ADHOC ROUTING
Routing signaling cannot be spoofed
Fabricating routing messages can not be integrated in the
network
Routing messages cannot be altered in transit exceptaccording to the normal functionality of the routing
protocol
Routing loops cannot be formed through malicious
action route cannot be re-directed from the shortest path
by malicious action
Managed open environment
Unauthorized nodes should be excluded from route
computation and discovery
1/28/2012
36
-
8/3/2019 Adhoc Networks 2
37/41
Managed hostile environment
The network topology must be exposed neither to adversaries nor
to authorized nodes by the routing messages
The solutions for secure routing
ARAN : Authenticated routing for Adhoc networks
Assumptions : MOE (Managed Open Environment )
Trusted certificate server to its public key is known to all nodes
Each nodes has non certificate signed by T
1/28/2012
37
-
8/3/2019 Adhoc Networks 2
38/41
Counter measures used are :
Cryptography
Monitoring
Difference in service classes and ADHOC network
1)Key managed infrastructure2)Intrusion detection
3)Single administration domain
4)Transiently unavailable
Only local monitoring
Multiple domains , no clear line of defense
1/28/2012
38
-
8/3/2019 Adhoc Networks 2
39/41
ADHOC SPECIFIC ATTACK TYPES ARE AS
FOLLOWS :
Equipment/battery : no obvious line of defense ,Side
channel attacks
Radio jamming
DLC : attacks on MAC , MAC address
Routing : no infrastructure support , no clear line of
defense
Co-ordination : based on principal of mutual assistance ,
simple attacks and packet drops
1/28/2012
39
-
8/3/2019 Adhoc Networks 2
40/41
Security procedures:
Route
y Signed discovery packet (RDP) propagates to sought
destination
y
Destination sends back signed route reply (REP)y At each hop the following action is taken
Validation of original signature
Validation of last hop signature
When last hop is neither source nor destination
replace the last hop signature by your own signature
1/28/2012
40
-
8/3/2019 Adhoc Networks 2
41/41
ARAN (authentication routing for ADHOC
networks )
check list :
Unauthorized participation , managed by trusted
authority
Spoofed route signaling everything is signed
Fabricated routing messages
1/28/2012
41