Application of Mobile Ad hoc Network

Download Report

Transcript Application of Mobile Ad hoc Network

Mobile Ad hoc Network
 What is it ?
Application of Mobile Ad hoc Network..
Configuration & Security challenges…
Presented By
1. Sanaul Haque Himel -- 012112032
2. Fizar Ahmed – 012081006
3. Md. Osman Goni -- 012093006
What is Mobile Ad hoc Network
•Networks deployed in
random distribution
•Low power
•Delivering sensor data to
a central site for some
purpose
Definition of Mobile Ad hoc Network
(MANET)
• Opposed to infrastructured wireless networks, where each
user directly communicates with an access point or base
station, a mobile Ad hoc network, or MANET, does not rely
on a fixed infrastructure for its operation.
• The network is an autonomous transitory association of
mobile nodes that communicate with each other over
wireless links.
• Nodes that lie within each other’s send range can
communicate directly and are responsible for dynamically
discovering each other.
• In order to enable communication between nodes that are
not directly within each other’s send range, intermediate
nodes act as routers
Cellular Network versus Mobile AD
Hoc Network
Characteristics and Complexities of
Mobile Ad hoc Networks
•
•
•
•
•
•
•
•
•
Autonomous and Infrastructureless
Multi-hop routing
Dynamic network topology
Device heterogeneity
Energy constrained operation
Bandwidth constrained variable capacity links
Limited physical security
Network scalability
Self-creation, self-organization and selfadministration
Routing of MANET
• Proactive Routing Protocol: To have an up-to-date route to
all other nodes at all times. To this end, this protocol will
exchange routing control information periodically and on
topological changes.
• Reactive Routing Protocol: Only set up routes to nodes they
communicate with and these routes are kept alive as long as
they are needed.
• Hybrid Routing Protocol: Combinations of proactive and
reactive protocols, where nearby routes (for example,
maximum two hops) are kept up-to-date proactively, while
far-away routes are set up reactively.
• Location-Based Routing Protocol: Where packet forwarding is
based on the location of a node’s communication partner.
Overview of Existing Routing
Technique
Mobile Ad Hoc Network Enabling
Technologies
Application of Mobile Ad hoc
Network
Tactical networks:
• Military communication and operations
• Automated battlefields
Emergency services:
• Search and rescue operations
• Disaster recovery
• Replacement of fixed infrastructure in case of environmental disasters.
• Policing and fire fighting.
• Supporting doctors and nurses in hospitals.
 Commercial and civilian environments:
• E-commerce: electronic payments anytime and anywhere
• Business: dynamic database access, mobile offices
• Vehicular services: road or accident guidance, transmission of road and weather
conditions, taxi cab network, inter-vehicle networks
• Sports stadiums, trade fairs, shopping malls
• Networks of visitors at airports
Application of Mobile Ad hoc Network

Home and enterprise networking:
• Home/office wireless networking
• Conferences, meeting rooms
• Personal area networks (PAN), Personal networks (PN)
• Networks at construction sites

Education :
• Universities and campus settings
• Virtual classrooms
• Ad hoc communications during meetings or lectures

Entertainment:
• Multi-user games
• Wireless P2P networking
• Outdoor Internet access
• Robotic pets
• Theme parks
Application of Mobile Ad hoc Network
 Sensor networks:
• Home applications: smart sensors embedded in consumer electronics
• Body area networks (BAN)
• Data tracking of environmental conditions, animal movements,
chemical/biological detection
 Context aware services:
• Follow-on services: call-forwarding, mobile workspace
• Information services: location specific services, time dependent services
 Coverage extension:
• Extending cellular network access
• Linking up with the Internet, intranets, etc.
Mobile Ad-Hoc Networks using Carto-Car Communication
Mobile Ad-Hoc Networks using
Car-to-Car Communication
Mobile Ad-Hoc Networks using
Healthcare System
Mobile Ad-Hoc Networks using
Healthcare System
Example Scenario
A Scenario of Ad hoc Networks
Figure: Mobile nodes in a City
Ad Hoc Routing Protocols
There are several type of ad hoc routing protocols exists. We have used
Two sub categories under two main categories in this discussion.
1. On Demand/Reactive Protocols
- AODV (Ad hoc On Demand Distance
Vector)
Characteristics:
 High latency in routing
 No overhead from periodic update
 Latency can be reduced by route caching
 Saves Bandwidth & Energy during
inactivity
Ad Hoc Routing Protocols (Cont.)
2. Table Driven/Proactive Protocols
- DSDV (Destination Sequenced
Distance Vector)
Characteristics:
 Low latency, suitable for real time
traffic
 High overhead (Periodic table updates)
 Bandwidth may wasted due to periodic
updates
 Route repair depends upon update
frequency
Experimental Setup (Contd.)
Simulation
Figure: ns2 implementation
Experimental Setup (Contd.)
Node movement
Figure: Mobile nodes of ad hoc network
Experimental Setup (Contd.)
Data Transmission
Figure: 100 mobile nodes starts data transmission
Result analysis
Trace file
We have created an analyzer program in Perl script to analyze trace files. In the analyzer
we have counted different traffic pattern. Here is a sample portion of a trace file.
event
time
from
node
to
node
pkt
type
pkt
size
flag
fid
src
addr
dst
addr
seq
num
pkt
id
s 0.094186392 _7_ RTR --- 0 message 32 [0 0 0 0] ------- [7:255 -1:255 32 0]
r 0.095487131 _3_ RTR --- 0 message 32 [0 ffffffff 7 800] ------- [7:255 -1:255 32 0]
s 0.235686783 _9_ RTR --- 1 message 32 [0 0 0 0] ------- [9:255 -1:255 32 0]
r 0.236727347 _2_ RTR --- 1 message 32 [0 ffffffff 9 800] ------- [9:255 -1:255 32 0]
r 0.236727531 _3_ RTR --- 1 message 32 [0 ffffffff 9 800] ------- [9:255 -1:255 32 0]
s 0.333477301 _6_ RTR --- 2 message 32 [0 0 0 0] ------- [6:255 -1:255 32 0]
r 3.889605635 _2_ AGT --- 646 ack 60 [13a 2 4 800] ------- [4:0 2:2 32 2] [302 0] 1 0
s 3.895907809 _4_ AGT --- 660 ack 40 [0 0 0 0] ------- [4:0 2:2 32 0] [309 0] 0 0
r 3.895907809 _4_ RTR --- 660 ack 40 [0 0 0 0] ------- [4:0 2:2 32 0] [309 0] 0 0
s 3.895907809 _4_ RTR --- 660 ack 60 [0 0 0 0] ------- [4:0 2:2 32 2] [309 0] 0 0
r 98.118080147 _3_ RTR --- 18753 cbr 532 [13a 3 8 800] ------- [8:2 9:2 32 3] [303] 1 0
f 98.118080147 _3_ RTR --- 18753 cbr 532 [13a 3 8 800] ------- [8:2 9:2 31 9] [303] 1 0
D 149.987010754 _4_ RTR CBK 27141 cbr 532 [13a 5 4 800] ------- [4:2 5:1 32 5] [337] 0 0
D 150.000000000 _1_ IFQ END 28668 tcp 572 [0 2 1 800] ------- [1:0 2:0 32 2] [748 0] 0 0
D 150.000000000 _2_ IFQ END 28631 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [734 0] 0 0
D 150.000000000 _2_ IFQ END 28633 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [735 0] 0 0
D 150.000000000 _2_ IFQ END 28634 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [736 0] 0 0
D 150.000000000 _2_ IFQ END 28637 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [737 0] 0 0
Result analysis
DSDV Graph
Throughput-DSDV
Throughput
Nodes
25000000
20000000
10%
5 Unit
15000000
Throughput
Linear (Throughput)
10000000
5000000
0
Throughput
10 16832564
20 15515556
30 15021056
40 20899824
50 17679552
60 19893052
70 19835588
80 19794640
90 19974384
100 20769060
Nodes
10
20
30
40
50
60
70
80
90
100
Figure: Number of Nodes vs Throughput graph in DSDV
Result analysis (Contd.)
AODV Graph
Throughput
Nodes
10
20
30
15348624
40
50
60
Throughput
70
Linear (Throughput)
80
90
100
20000000
18000000
16000000
13%
14000000
2 Unit
12000000
10000000
8000000
6000000
4000000
2000000
0
10
20
30
40
50
60
70
80
90
100
Figure: Number of Nodes vs Throughput graph in AODV
Throughput
13337200
13618280
14539944
17612960
14284068
17430596
15325096
15567132
15748440
15348624
Result analysis (Contd.)
DSDV vs. AODV Graph
DSDV vs AODV
25000000
20000000
3%
15000000
Throughput-DSDV
10000000
Throughput-AODV
5000000
0
10
20
30
40
50
60
70
80
90
Figure: DSDV vs AODV performance comparison
Fluctuations
 Many hosts with irregular updates
 Broadcast with asynchronous events
 Different propagation speed
 Different transmission intervals
100
Nodes
DSDV
AODV
10
20
30
40
50
60
70
80
90
100
35%
9%
1%
100%
56%
92%
100%
100%
100%
115%
-20%
-10%
16%
195%
16%
194%
77%
91%
96%
82%
70.8%
73.7%
Average
AODV performs 2.9%~3% higher than DSDV
Ad hoc Security
The Nature of Ad hoc Networks poses a great challenge to System
Security due to the following reason:
 firstly, the wireless network is more susceptible to attacks ranging from
passive eavesdropping to active interfering.
 secondly, the lack of an online CA or Trusted Third Party adds the
difficulty to deploy security mechanisms;
 thirdly, mobile devices tend to have limited power consumption and
computation capabilities which makes it more vulnerable to Denial of Service
attacks (Dos) and incapable to execute computation-heavy algorithms like
public key algorithms;
 fourthly, in MANETs, there are more probabilities for trusted node being
compromised and we need to consider both insider attacks and outsider
attacks in mobile ad hoc networks, in which insider attacks are more difficult
to deal with
 finally, node mobility enforces frequent networking reconfiguration which
creates more chances for attacks, for example, it is difficult to distinguish
between stale routing information and faked routing information.
There are five main security services for MANETs:
 Authentication : means that correct identity is known to communicating partner
 Confidentiality : means certain message information is kept secure from unauthorized
party.
 integrity : means message is unaltered during the communication.
 non-repudiation : means the origin of a message cannot deny having sent the
message;
 availability : means the normal service provision in face of all kinds of attacks.
Although some work has been done to increase the security of
MANETs, none of them considers designing security mechanisms from a
system architectural view:
 Provide security mechanisms based on some routing protocols, like DSDV,
DSR and AODV.
 PGP-like method to construct the trust infrastructure for MANETs.
 Distributed public-key management service for ad hoc networks like PK/SK
The figure depicts a five-layer security architecture for
MANETs,
Security Architecture for MANETs
SL5
End-to-End Security
SL4
Network Security
SL3
Routing Security
SL2
Communication Security
SL1
Trust Infrastructure
 SL1, Trust Infrastructure Layer: refers to the basic trust relationship
between nodes, for example, like a well deployed PKI environment.
 SL2, Communications Security Layer: refers to the security
mechanisms applied in transmitting data frames in a node-to-node manner.
Actually it works in Data link layer in OSI Model.
SL3, In fact, the routing security layer involves two aspects: secure
Routing and secure data forwarding. In secure routing aspect, nodes are
required to cooperate to share correct routing information to keep the
network connected efficiently; in secure data forwarding aspect, data
packets on the fly should be protected from tampering, dropping, and
altering by any unauthorized party.
 SL4, Network Security Layer: refers to the security mechanisms
used by the network protocols. the security services like peer entity
authentication, confidentiality and integrity as the network layer
security protocol IPsec provides.
 SL5, End-to-End Security Layer: refers to end system security,
such as SSL, SSH, https and any application-specific security
protocol.
Thank You