mobile ad hoc network what is it ? application of mobile ad hoc network.. configuration &...

35
Mobile Ad hoc Network What is it ? Application of Mobile Ad hoc Network.. Configuration & Security challenges… Presented By 1. Sanaul Haque Himel -- 012112032 2. Fizar Ahmed – 012081006 3. Md. Osman Goni -- 012093006

Post on 18-Dec-2015

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Mobile Ad hoc Network

What is it ?Application of Mobile Ad hoc Network..Configuration & Security challenges…

Presented By 1. Sanaul Haque Himel -- 012112032 2. Fizar Ahmed – 012081006 3. Md. Osman Goni -- 012093006

Page 2: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

What is Mobile Ad hoc Network

•Networks deployed in random distribution

•Low power

•Delivering sensor data to a central site for some purpose

Page 3: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Definition of Mobile Ad hoc Network (MANET)

• Opposed to infrastructured wireless networks, where each user directly communicates with an access point or base station, a mobile Ad hoc network, or MANET, does not rely on a fixed infrastructure for its operation.

• The network is an autonomous transitory association of mobile nodes that communicate with each other over wireless links.

• Nodes that lie within each other’s send range can communicate directly and are responsible for dynamically discovering each other.

• In order to enable communication between nodes that are not directly within each other’s send range, intermediate nodes act as routers

Page 4: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Cellular Network versus Mobile AD Hoc Network

Page 5: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Characteristics and Complexities of Mobile Ad hoc Networks

• Autonomous and Infrastructureless• Multi-hop routing• Dynamic network topology• Device heterogeneity• Energy constrained operation• Bandwidth constrained variable capacity links• Limited physical security• Network scalability• Self-creation, self-organization and self-

administration

Page 6: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Routing of MANET• Proactive Routing Protocol: To have an up-to-date route to

all other nodes at all times. To this end, this protocol will exchange routing control information periodically and on topological changes.

• Reactive Routing Protocol: Only set up routes to nodes they communicate with and these routes are kept alive as long as they are needed.

• Hybrid Routing Protocol: Combinations of proactive and reactive protocols, where nearby routes (for example, maximum two hops) are kept up-to-date proactively, while far-away routes are set up reactively.

• Location-Based Routing Protocol: Where packet forwarding is based on the location of a node’s communication partner.

Page 7: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Overview of Existing Routing Technique

Page 8: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Mobile Ad Hoc Network Enabling Technologies

Page 9: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Application of Mobile Ad hoc Network

Tactical networks:• Military communication and operations• Automated battlefields

Emergency services:• Search and rescue operations• Disaster recovery• Replacement of fixed infrastructure in case of environmental disasters.• Policing and fire fighting.• Supporting doctors and nurses in hospitals.

Commercial and civilian environments:• E-commerce: electronic payments anytime and anywhere• Business: dynamic database access, mobile offices• Vehicular services: road or accident guidance, transmission of road and weather

conditions, taxi cab network, inter-vehicle networks• Sports stadiums, trade fairs, shopping malls• Networks of visitors at airports

Page 10: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Application of Mobile Ad hoc Network Home and enterprise networking:

• Home/office wireless networking• Conferences, meeting rooms• Personal area networks (PAN), Personal networks (PN)• Networks at construction sites

Education :

• Universities and campus settings• Virtual classrooms• Ad hoc communications during meetings or lectures

Entertainment:

• Multi-user games• Wireless P2P networking• Outdoor Internet access• Robotic pets• Theme parks

Page 11: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Application of Mobile Ad hoc Network Sensor networks:

• Home applications: smart sensors embedded in consumer electronics• Body area networks (BAN)• Data tracking of environmental conditions, animal movements, chemical/biological detection

  Context aware services:

• Follow-on services: call-forwarding, mobile workspace• Information services: location specific services, time dependent services

  Coverage extension:

• Extending cellular network access• Linking up with the Internet, intranets, etc.

Page 12: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Mobile Ad-Hoc Networks using Car-to-Car Communication

Page 13: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Mobile Ad-Hoc Networks using Car-to-Car Communication

Page 14: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Mobile Ad-Hoc Networks using Healthcare System

Page 15: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Mobile Ad-Hoc Networks using Healthcare System

Page 16: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Example Scenario A Scenario of Ad hoc Networks

Figure: Mobile nodes in a City

Page 17: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

1. On Demand/Reactive Protocols - AODV (Ad hoc On Demand Distance Vector)

Characteristics: High latency in routing No overhead from periodic update Latency can be reduced by route caching Saves Bandwidth & Energy during inactivity

There are several type of ad hoc routing protocols exists. We have used Two sub categories under two main categories in this discussion.

Ad Hoc Routing Protocols

Page 18: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Ad Hoc Routing Protocols (Cont.)

2. Table Driven/Proactive Protocols - DSDV (Destination Sequenced Distance Vector)

Characteristics: Low latency, suitable for real time traffic High overhead (Periodic table updates) Bandwidth may wasted due to periodic updates Route repair depends upon update frequency

Page 19: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel
Page 20: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel
Page 21: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel
Page 22: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Figure: ns2 implementation

SimulationExperimental Setup (Contd.)

Page 23: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Experimental Setup (Contd.)

Figure: Mobile nodes of ad hoc network

Node movement

Page 24: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Experimental Setup (Contd.)

Figure: 100 mobile nodes starts data transmission

Data Transmission

Page 25: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Result analysis

s 0.094186392 _7_ RTR --- 0 message 32 [0 0 0 0] ------- [7:255 -1:255 32 0] r 0.095487131 _3_ RTR --- 0 message 32 [0 ffffffff 7 800] ------- [7:255 -1:255 32 0] s 0.235686783 _9_ RTR --- 1 message 32 [0 0 0 0] ------- [9:255 -1:255 32 0] r 0.236727347 _2_ RTR --- 1 message 32 [0 ffffffff 9 800] ------- [9:255 -1:255 32 0] r 0.236727531 _3_ RTR --- 1 message 32 [0 ffffffff 9 800] ------- [9:255 -1:255 32 0] s 0.333477301 _6_ RTR --- 2 message 32 [0 0 0 0] ------- [6:255 -1:255 32 0] r 3.889605635 _2_ AGT --- 646 ack 60 [13a 2 4 800] ------- [4:0 2:2 32 2] [302 0] 1 0s 3.895907809 _4_ AGT --- 660 ack 40 [0 0 0 0] ------- [4:0 2:2 32 0] [309 0] 0 0r 3.895907809 _4_ RTR --- 660 ack 40 [0 0 0 0] ------- [4:0 2:2 32 0] [309 0] 0 0s 3.895907809 _4_ RTR --- 660 ack 60 [0 0 0 0] ------- [4:0 2:2 32 2] [309 0] 0 0r 98.118080147 _3_ RTR --- 18753 cbr 532 [13a 3 8 800] ------- [8:2 9:2 32 3] [303] 1 0f 98.118080147 _3_ RTR --- 18753 cbr 532 [13a 3 8 800] ------- [8:2 9:2 31 9] [303] 1 0D 149.987010754 _4_ RTR CBK 27141 cbr 532 [13a 5 4 800] ------- [4:2 5:1 32 5] [337] 0 0D 150.000000000 _1_ IFQ END 28668 tcp 572 [0 2 1 800] ------- [1:0 2:0 32 2] [748 0] 0 0D 150.000000000 _2_ IFQ END 28631 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [734 0] 0 0D 150.000000000 _2_ IFQ END 28633 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [735 0] 0 0D 150.000000000 _2_ IFQ END 28634 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [736 0] 0 0D 150.000000000 _2_ IFQ END 28637 ack 60 [0 1 2 800] ------- [2:0 1:0 32 1] [737 0] 0 0

event time from node

to node

pkt type

pkt size

flag fid src addr

dst addr

seq num

pkt id

We have created an analyzer program in Perl script to analyze trace files. In the analyzer we have counted different traffic pattern. Here is a sample portion of a trace file.

Trace file

Page 26: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Result analysis

Figure: Number of Nodes vs Throughput graph in DSDV

Nodes Throughput10 1683256420 1551555630 1502105640 2089982450 1767955260 1989305270 1983558880 1979464090 19974384

100 20769060

10%

5 Unit

DSDV Graph

Page 27: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Result analysis (Contd.)

Figure: Number of Nodes vs Throughput graph in AODV

Nodes Throughput10 1333720020 1361828030 1453994440 1761296050 1428406860 1743059670 1532509680 1556713290 15748440

100 15348624

13%

2 Unit

AODV Graph

Page 28: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Result analysis (Contd.)

Figure: DSDV vs AODV performance comparison

Fluctuations Many hosts with irregular updates Broadcast with asynchronous events Different propagation speed Different transmission intervals

Nodes DSDV AODV

10 35% -20%20 9% -10%30 1% 16%40 100% 195%50 56% 16%60 92% 194%70 100% 77%80 100% 91%90 100% 96%

100 115% 82%Average 70.8% 73.7%

AODV performs 2.9%~3% higher than DSDV

DSDV vs. AODV Graph

Page 29: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Ad hoc Security

Page 30: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

The Nature of Ad hoc Networks poses a great challenge to System Security due to the following reason:

firstly, the wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering. secondly, the lack of an online CA or Trusted Third Party adds the difficulty to deploy security mechanisms; thirdly, mobile devices tend to have limited power consumption and computation capabilities which makes it more vulnerable to Denial of Service attacks (Dos) and incapable to execute computation-heavy algorithms like public key algorithms; fourthly, in MANETs, there are more probabilities for trusted node being compromised and we need to consider both insider attacks and outsider attacks in mobile ad hoc networks, in which insider attacks are more difficult to deal with finally, node mobility enforces frequent networking reconfiguration which creates more chances for attacks, for example, it is difficult to distinguish between stale routing information and faked routing information.

Page 31: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

There are five main security services for MANETs:

Authentication : means that correct identity is known to communicating partner Confidentiality : means certain message information is kept secure from unauthorized

party. integrity : means message is unaltered during the communication. non-repudiation : means the origin of a message cannot deny having sent the message; availability : means the normal service provision in face of all kinds of attacks.

Page 32: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Although some work has been done to increase the security ofMANETs, none of them considers designing security mechanisms from a system architectural view:

Provide security mechanisms based on some routing protocols, like DSDV, DSR and AODV. PGP-like method to construct the trust infrastructure for MANETs. Distributed public-key management service for ad hoc networks like PK/SK

Page 33: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

The figure depicts a five-layer security architecture for MANETs,

Security Architecture for MANETs

SL5 End-to-End Security

SL4 Network Security

SL3 Routing Security

SL2 Communication Security

SL1 Trust Infrastructure

Page 34: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

SL1, Trust Infrastructure Layer: refers to the basic trust relationship between nodes, for example, like a well deployed PKI environment.

SL2, Communications Security Layer: refers to the security mechanisms applied in transmitting data frames in a node-to-node manner. Actually it works in Data link layer in OSI Model.SL3, In fact, the routing security layer involves two aspects: secureRouting and secure data forwarding. In secure routing aspect, nodes are required to cooperate to share correct routing information to keep the network connected efficiently; in secure data forwarding aspect, data packets on the fly should be protected from tampering, dropping, and altering by any unauthorized party. SL4, Network Security Layer: refers to the security mechanisms used by the network protocols. the security services like peer entityauthentication, confidentiality and integrity as the network layersecurity protocol IPsec provides. SL5, End-to-End Security Layer: refers to end system security,such as SSL, SSH, https and any application-specific securityprotocol.

Page 35: Mobile Ad hoc Network  What is it ?  Application of Mobile Ad hoc Network..  Configuration & Security challenges… Presented By 1. Sanaul Haque Himel

Thank You