wireless mesh network
TRANSCRIPT
![Page 1: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/1.jpg)
Wireless Mesh Network
1
Presented by PRIYAN T
KOSHY BMCE,SASTHAMCOTA
![Page 2: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/2.jpg)
OBJECTIVES
INTRODUCTIONMESH TOPOLOGYCLASSIFICATION OF NETWORKWIRELESS MESH NETWORKBATMAN PROTOCOLBATMAN FLLODING MECHANISMROUTINGROUTING MANIPULATION ATTACKDETECTION OF ATTACKFUTURE SCOPECONCLUSION
2
![Page 3: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/3.jpg)
INTRODUCTION
WHAT IS A NETWORK? *Set of devices connected by
communication links
NETWORK CRITERIA*performance*security
3
![Page 4: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/4.jpg)
Contd…
TWO TYPES OF CONNECTION
*Point to point connection*Multi point connection
NETWORK TOPOLOGY* way in which a network is setup.
TYPES OF TOPOLOGY* Mesh,star,bus,ring
4
![Page 5: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/5.jpg)
MESH TOPOLOGY
EVERY DEVICE HAS A DEDICATED POINT TO POINT LINK.
ADVANTAGE*Eliminating traffic problems*Strong*Privacy or Security
5
![Page 6: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/6.jpg)
Contd…
DISADVANTAGE* Space loss.*Installation and Reconnection are
difficult.*Hardware is expensive.
6
![Page 7: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/7.jpg)
CLASSIFICATION OF NETWORK
BASED ON*medium
*scale*topology*organizational scope
BASED ON MEDIUM *Wired *Wireless
7
![Page 8: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/8.jpg)
Wireless Mesh NetworkCommunication network made up of radio
nodes.
Class of ad-hoc network.
Two types of mesh node *Mesh Router *Mesh Client 8
![Page 9: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/9.jpg)
CHARACTERISTICS
Dynamic self organization
Self-configuration
Self-healing
9
![Page 10: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/10.jpg)
10
Contd.WMN
![Page 11: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/11.jpg)
11
ADVANTAGE*Stable topology*Reliable*Offers redundancy
DISADVANTAGE*Vulnerable to attacks
![Page 12: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/12.jpg)
APPLICATIONS
U.S military forces
Electric meter
66-satellite Iridium constellation
12
![Page 13: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/13.jpg)
BATMAN PROTOCOLBorn out of a response to the
shortcomings of OLSR.Optimized Link State Routing Protocol
Routing protocol Design
Maximize traffic throughput minimize packet delay
Implement FLOODING MECHANISM. 13
![Page 14: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/14.jpg)
BATMAN FLOODING MECHANISMEach node broadcast hello messages
Hello messages are also referred as OGMs.
An OGM has *originator address *sending node address *time to live *sending node address
Bad route causes packet loss, delay .14
![Page 15: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/15.jpg)
15
(a) mesh networkContd…
![Page 16: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/16.jpg)
16
(b)OGMs broadcasted by node O1
c)Routing table of On
contd
![Page 17: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/17.jpg)
ROUTINGProcess of selecting paths.
Performed in many kinds of network.*Telephone Network*Electronic data Network*Transportation Network
Routing table construction17
![Page 18: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/18.jpg)
ROUTING MANIPULATION ATTACK
Malicious node disrupts the network routes.
Two attacking methods *attacking method 1 *attacking method 2
18
![Page 19: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/19.jpg)
19
ROUTING MANIPULATION ATTACK
A1-ATTACKERT1,T2,T3,T4-TARGET NODE
![Page 20: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/20.jpg)
DETECTION OF ATTACK
BATMAN ADVANCED CONTROL AND MANAGEMENT TOOL (batcl).
Analyze bat-adv debugging output.
Batcl create*data base*tree structure
20
![Page 21: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/21.jpg)
CONCLUSIONDIFFERENT ATTACKING METHODS ARE
ANALYSED.
ROUTING OPERATIONS ARE SERIOUSLY AFFECTED BY FLOODING FORGED OGM
BATMAN PROTOCOL HAS PROVED TO BE VULNERABLE TO ROUTE MANIPULATION ATTACK.
21
![Page 22: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/22.jpg)
FUTURE SCOPE
IT OFFER INTERNET ACCESS IN AN INEXPENSIVE,CONVENIENT AND QUICK WAY.
22
![Page 23: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/23.jpg)
REFERENCE[1] Anderson Morais,Ana Cavalli,”Detection of
attacks in wireless mesh network” from IEEE 2009-2010
[2] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Computer Networks, vol. 47, pp. 445-487, Jan. 2005.
[3] W. Zhang, Z. Wang, S. K. Das, and M. Hassan,
“Security issues in wireless mesh networks”, In Book
Wireless Mesh Networks: Architectures and protocols. New York: Springer, 2008.
23
![Page 24: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/24.jpg)
contd…
[4] D. Johnson, N. Ntlatlapa, and C. Aichele, “A simple Pragmatic approach to mesh routing using BATMAN”, In IFIP International Symposium on Wireless Communications and Information Technology in Developing Countries .
[5] A. Neumann, C. Aichele, M. Lindner, and S.Wunderlich, “Better approach to mobile ad-hoc networking (B.A.T.M.A.N.)”, April 2008, IETF Internet-Draft (expired October 2008)
[6 ] http://www.open-mesh.net.
24
![Page 25: wireless mesh network](https://reader035.vdocuments.site/reader035/viewer/2022070518/58eb54121a28ab395a8b4769/html5/thumbnails/25.jpg)
THANK YOU
25