MANET Casestudy2

download MANET Casestudy2

of 17

Transcript of MANET Casestudy2

  • 7/29/2019 MANET Casestudy2

    1/17

  • 7/29/2019 MANET Casestudy2

    2/17

    SIES, Nerul

    Page | 2

    ABSTRACT:

    This case study presents a distributed sleep scheduling protocol and

    security problem in ad hoc network. Distributed sleep scheduling protocol that

    can be used for implementing synchronous interface sleep for energy

    conservation in wireless Ad Hoc (MANETs Mobile Ad Hoc Network) networks.Central idea of this protocol is to distribute a common sleep-awake cycle

    schedule among all nodes within a connected partition so that the nodes can turn

    their interface off during the sleep section of the agreed upon schedule, and they

    can communicate during the wake section of the schedule.

    The main assumption of the ad hoc routing protocols is that all

    anticipating nodes do so in good faith and without maliciously disrupting the

    operation of the protocol. But, the existence of malicious entities cannot be

    disregarded in any system, especially in open ones like ad hoc networks. In ad hoc

    network the routing function can be disrupted by internal or external attackers.

    INTRODUCTION:

    History:

    Ad hoc networks date back to the Seventies. They were developed by the

    Defence Forces, to comply with a military framework. The aim was to rapidlydeploy a robust, mobile and reactive network, under any circumstances. These

    networks then proved useful in commercial and industrial fields, first aid

    operations and exploration missions.

    WHAT IS AD HOC NETWORK?

    A wireless ad-hoc network is a decentralized type ofwireless network. The

    network is ad hoc because it does not rely on a pre-existing infrastructure, such

    as routers in wired networks or access points in managed (infrastructure)wireless networks. Instead, each node participates in routing by forwarding data

    for other nodes, and so the determination of which nodes forward data is made

    dynamically based on the network connectivity.

    An ad-hoc network is a self-configuring network of wireless links

    http://en.wikipedia.org/wiki/Wireless_networkhttp://en.wikipedia.org/wiki/Ad_hochttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Node_(computer_science)http://en.wikipedia.org/wiki/Node_(computer_science)http://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Ad_hochttp://en.wikipedia.org/wiki/Wireless_network
  • 7/29/2019 MANET Casestudy2

    3/17

    SIES, Nerul

    Page | 3

    connecting mobile nodes. These nodes may be routers and/or hosts. The mobile

    nodes communicate directly with each other and without the aid of access points,

    and therefore have no fixed infrastructure. They form an arbitrary topology,

    where the routers are free to move randomly and arrange themselves as required.

    (i.e. .) MANET is a self-configuringinfrastructure less networkof mobile devices connected bywireless. Each device

    in a MANET is free to move independently in any direction, and will therefore

    change its links to other devices frequently. Each must forward traffic unrelated

    to its own use, and therefore be a router.

    In simple terms - Mobile ad hoc networks (MANETs) can be defined as a

    collection of large number of mobile nodes that form temporary network without

    aid of any existing network infrastructure or central access point. Each node

    participating in the network acts both as host and a router and must therefore is

    willing to forward to packets for other nodes. The characteristics of MANETs such

    as: dynamic topology, node mobility, provides large number of degree of freedom

    and self-organizing capability of that make it completely different from other

    network. Due to the nature of MANETs, to design and development of secure

    routing is challenging task for researcher in an open and distributed

    communication environments.

    Ad hoc networking can be applied anywhere where there is little or no

    communication infrastructure or the existing infrastructure is expensive or

    inconvenient to use. Ad hoc networking allows the devices to maintain

    connections to the network as well as easily adding and removing devices to and

    from the network. The set of applications for MANETs is diverse, ranging from

    large-scale, mobile, highly dynamic networks, to small, static networks that are

    constrained by power sources.

    Routing protocols between any pair of nodes within an ad hoc network can

    be difficult because the nodes can move randomly and can also join or leave the

    http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Computer_network
  • 7/29/2019 MANET Casestudy2

    4/17

    SIES, Nerul

    Page | 4

    network. Most MANET routing protocols are vulnerable to attacks that can freeze

    the whole network. The main reasons for this difficulty are;

    "Shared broadcast radio channel, insecure operating environment, lack of

    central authority, lack of association among nodes, limited availability of

    resources, and physical vulnerability."

    The dynamic relationship between the nodes leaves very little opportunity

    for the nodes to form trust relationships with each other. In an ad-hoc network,

    nodes must act as both terminals and routers for other nodes. Because there are

    no dedicated nodes, a secure routing protocol is needed.

    Ad hoc networks, also called peer-to-peer networks, still have a long way to

    go in order to be fully functional and commercial, as it has its defects such as

    security and routing which we will discuss further.

    Existing ad-hoc network routing protocols fall into:

    Ad-hoc Mobile Routing Protocols

    , also known as Proactive Protocols, work out

    routes in the background independent of traffic demands. Each node uses routing

  • 7/29/2019 MANET Casestudy2

    5/17

    SIES, Nerul

    Page | 5

    information to store the location information of other nodes in the network and

    this information is then used to move data among different nodes in the network.

    This type of protocol is slow to converge and may be prone to routing loops.

    These protocols keep a constant overview of the network and this can be a

    disadvantage as they may react to change in the network topology even if notraffic is affected by the topology modification which could create unnecessary

    overhead.

    Even in a network with little data traffic, Table Driven Protocols will use

    limited resources such as power and link bandwidth therefore they might not be

    considered an effective routing solution for Ad-hoc Networks. Fisheye State

    Routing is an example of a Table Driven Protocol.

    , also known as Reactive Protocols, establish

    routes between nodes only when they are required to route data packets. There is

    no updating of every possible route in the network instead it focuses on routes

    that are being used or being set up. When a route is required by a source node to

    a destination for which it does not have route information, it starts a route

    discovery process which goes from one node to the other until it arrives at the

    destination or a node in-between has a route to the destination. On Demand

    protocols are generally considered efficient when the route discovery is less

    frequent than the data transfer because the network traffic caused by the route

    discovery step is low compared to the total communication bandwidth. This

    makes On Demand Protocols more suited to large networks with light traffic and

    low mobility. An example of an On Demand Protocol is Dynamic Source Routing.

    combine Table Based Routing Protocols with On

    Demand Routing Protocols. They use distance-vectors for more precise metrics to

    establish the best paths to destination networks, and report routing information

    only when there is a change in the topology of the network.

    Each node in the network has its own routing zone, the size of which is defined

    by a zone radius, which is defined by a metric such as the number of hops. Each

  • 7/29/2019 MANET Casestudy2

    6/17

    SIES, Nerul

    Page | 6

    node keeps a record of routing information for its own zone. Zone Routing

    Protocol (ZRP) is an example of a Hybrid routing protocol.

    For energy conservation we come across Distributed Sleep-synchronization

    Protocol. The aim of this protocol is to reduce energy consumption due to idle

    listening.

    A (MANET) is a group of mobile wireless nodes

    which, upon deployment, cooperatively form an infrastructure-less network

    without any centralized control and service infrastructure. Since MANET nodes

    typically run from limited energy portable batteries, a critical design issue for

    future wireless Ad-Hoc networks is the development of suitable communication

    architectures, protocols and services that reduce power consumption, therebyincreasing the operational lifespan of network enabled wireless devices. Energy

    conservation in a MANET node not only maximizes its own operational lifespan

    but it can also help maximize the network lifespan and defer network

    partitioning.

    In addition to essential energy consumption due to transmissions and

    receptions, there are three main sources of non-essential energy consumption.

    The first source is overhearing where a node receives traffic not destined to it.The second source is collision. Collisions result in retransmissions and hence an

    increase in energy expenditure. The third source, which we highlighted here, is

    idle listening, which corresponds to energy consumption when a wireless

    interface is in an idle state that is neither transmitting nor receiving.

    Even in idle state an interface must be up and ready to receive possible

    traffic. Interface hardwares, the power consumption during idle listening is quite

    significant and is often comparable to the consumption rate during reception.

    Protocol that reduces energy consumption due to idle listening by using a

    distributed sleep-synchronization algorithm for maintaining a common

    network-wide sleep schedule. Once synchronized, nodes can turn their interface

    off during the sleep section of the synchronized schedule, and they can

  • 7/29/2019 MANET Casestudy2

    7/17

    SIES, Nerul

    Page | 7

    communicate during the wake section of the schedule. By turning the interface

    off, the nodes can avoid energy consumption due to idle listening.

    o Weaker in Securityo Device size limitationo Battery lifeo Dynamic topologyo Bandwidth and slower data transfer rate

    Authentication

    Integrity Confidentiality Non-Repudiation

    Distributed Sleep-synchronization Protocol:

    The aim of this protocol is to reduce energy consumption due to idle

    listening. This is achieved by making use of a concept of periodic sleep and wake

  • 7/29/2019 MANET Casestudy2

    8/17

    SIES, Nerul

    Page | 8

    cycles that are synchronized across each neighbor pairs in the network. To

    explain it further, any pair of neighbor nodes will maintain asynchronies sleep-

    wake schedule so that their interfaces can sleep during the sleep period and they

    can execute protocol for data transaction during the wake period. With this

    mechanism, it is expected that during low loading situations the idle listeningconsumption will be significantly slashed by putting interfaces to sleep states that

    typically has much lower power ratings.

    The energy savings of this protocol depends on the wake-sleep duty cycle,

    which can be defined as the wake duration normalized by the total cycle

    duration. The wake-sleep duty cycle will also determine the sustainable loading

    range, and it should be appropriately dimensioned based on the applications and

    their loading requirements. Higher duty cycles can handle higher loads at thecost of lower idle energy savings.

    The proposed distributed algorithm is implemented within a Sync Agent. A

    Sync Agent runs in each node and it handles all sleep-synchronization related

    functions including distributed schedule maintenance and instructing the

    wireless interface hardware to sleep and wake up according to the converged

    schedule.

    An implicit assumption of our protocol is that all nodes within a networkare required to use the same wake-sleep cycle duration and duty cycle. The duty

    cycle should be chosen depending on the network loading conditions and the

    cycle duration should be dictated by the sleep-to-wakeup latency overhead of the

    wireless interface card. We assume that the cycle duration and duty cycle

    parameters are either manually configured or dynamically determined across the

    network using an offline mechanism.

  • 7/29/2019 MANET Casestudy2

    9/17

    SIES, Nerul

    Page | 9

    The main assumption of the previously presented ad hoc routing protocols

    is that all anticipating nodes do so in good faith and without maliciously

    disrupting the operation of the protocol [19]. However, the existence of malicious

    entities cannot be disregarded in any system, especially in open ones like ad hoc

    networks. In ad hoc network the routing function can be disrupted by internal or

    external attackers. An internal attacker can be any legitimate participant of the

    routing protocol. An external attacker is defined as any other entity.

    Cryptographic solutions can be employed to prevent the impact of external

    attackers by mutual authentication of the participating nodes through digital

    signature schemes. However, the underlying protocols should also be consideredsince an attacker could manipulate a lower level protocol to interrupt a security

    mechanism in a higher level. Internal attackers having capability to complete

    access the communication link they are able to advertise false routing

    information at will and force arbitrary routing decisions on their peers.

  • 7/29/2019 MANET Casestudy2

    10/17

    SIES, Nerul

    Page | 10

    Security:

    Authentication Confidentially Low power consumption Integrity Availability Non-repudiation

    Generally, when considering the security of a network, we examine it

    under the headings; availability, confidentiality, authentication, integrity and

    non-repudiation. Availability refers to the fact that the network must remain

    operational at all times despite denial of service attacks.

    Confidentiality ensures that certain information is never disclosed to

    certain users. Authentication is the ability of a node to identify the node

    with which it is communicating. Integrity guarantees that a message is never

    corrupted when transferred. Non-repudiation states that the sender of the

    message cannot deny having sent it. An ad-hoc network has extra security

    requirements caused by its lack of proper infrastructure and the dynamicrelationship between the nodes in the network.

    Because of the lack of infrastructure, accountability is very difficult to

    determine as there is - no central authority which can be referenced when it

    comes to making trust decisions on other parties in the network."

    Denial of Service Attacks

  • 7/29/2019 MANET Casestudy2

    11/17

    SIES, Nerul

    Page | 11

    Vulnerability:

    The meaning of this vulnerability is self-evident: there is not such a clear

    secure boundary in the mobile ad hoc network, which can be compared with the

    clear line of defence in the traditional wired network.

    This vulnerability originates from the nature of the mobile ad hoc network:

    freedom to join, leave and move inside the network. Lack of secure boundaries

    makes the mobile ad hoc network susceptible to the attacks. Due to this mobile ad

    hoc network suffers from all-weather attacks, which can come from any node

    that is in the radio range of any node in the network, at any time, and target to

    any other node(s) in the network. To make matters worse, there are various link

    attacks that can jeopardize the mobile ad hoc network, which make it even

    harder for the nodes in the network to resist the attacks.

    Current routing protocols are exposed to two types of attacks:

  • 7/29/2019 MANET Casestudy2

    12/17

    SIES, Nerul

    Page | 12

    Active attacks are the attacks that are performed by the malicious nodes

    that bear some energy cost in order to perform the attacks. Active attacks involve

    some modification of data stream or creation of false stream. E.g.: Spoofing,Fabrication, Wormhole Attack, Modification, Denial of Service, Sinkholes etc.

    : Spoofing occurs when a malicious node misrepresents its identity in

    order to alter the vision of the network topology that a benign node can gather.

    : The notation fabrication is used when referring to attacks

    performed by generating false routing messages. Such kind of attacks can be

    difficult to identify as they come as valid routing constructs, especially in the case

    of fabricated routing error messages, which claim that a neighbor can no longer

    be contacted.

    :An attacker records packets at one location in the network and

    tunnels them to another location. Routing can be disrupted when routing controlmessages are tunneled. This tunnel between two colluding attackers is referred as

    a wormhole. Wormhole attacks are severe threats to MANET routing protocols.

    A B

    Attacker

    Assumed Route

    Actual Route

  • 7/29/2019 MANET Casestudy2

    13/17

    SIES, Nerul

    Page | 13

    : The attacker performs such attacks is targeted to integrity of data,

    by altering packet or modifying packets.

    :In a sinkhole attack, a compromised node tries to attract the data to it

    from all neighboring nodes. So, practically, the node eavesdrops on all the datathat is being communicated between its neighboring nodes.

    In passive attacks the attacker does not perturb the routing protocol,

    instead try to extract the valuable information like node hierarchy and network

    topology from it. Passive attack is in nature of monitoring transmission. The goal

    of opponent is to obtained information that is being transmitted. Passive attacksare very difficult to detect because they do not involve any alteration of data.

    E.g.: Eavesdropping, traffic analysis, monitoring etc.

    SECURE AD HOC ROUTING:

    There exist several proposals that attempt to architect a secure routing

    protocol for mobile ad hoc network, in order to offer protection against the

    attacks. There are several solutions proposed by researcher they are either

    completely new stand-alone protocol or in some cases incorporation of security

    mechanism into existing one like DSDV and AODV. Cryptography is one of the

    solutions for analysis of problem and protection of confidentiality of messages i.e.

    Solution based on Symmetric cryptography, solution based on Asymmetric

    cryptography and Hybrid solution.

  • 7/29/2019 MANET Casestudy2

    14/17

    SIES, Nerul

    Page | 14

    The future of ad hoc networks

    Mobile ad hoc networks are the future of wireless networks. Why? Because

    they're practical, versatile, simple, easy to use and inexpensive! We will be living

    in a world where our network instantly updates and reconfigures itself to keep usconnected anywhere we go.

    These networks provide a new approach for wireless communication and

    by operating in a license free frequency band prove to be relatively inexpensive.

    With the current trend of society's demand for information at our

    fingertips, we will see our future living environments requiring communication

    networks between the many devices we use in day to day living, allowing them to

    talk to each other.For example devices like personal digital assistants and mobile phones

    being able to receive instant messages from a home device. Such as a refrigerator

    sending a message to a PDA to update its shopping list; notifying that it's run out

    of milk. Or washing machines and ovens sending a report to say the clothes are

    finished or the chickens cooked.

    Likewise, in education ad hoc networks may be deployed for student

    laptops interacting with the lecturer during classes. Also wireless public access

    for dense urban areas (Nokia RoofTopT): A wireless broadband solution for

    residential markets, based on a multi-hop Ad-Hoc (mesh) networking. [5] See

    diagram below

    http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group11/index.html#5http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group11/index.html#5
  • 7/29/2019 MANET Casestudy2

    15/17

    SIES, Nerul

    Page | 15

    Nokia Roof Top Wireless Routing

    WAND (Wireless Ad hoc Network for Dublin)

    Closer to home, in Trinity College Dublin itself, the WAND venture,

    Wireless Ad hoc Network for Dublin, is underway. WAND is a project that is

    currently in progress to aid research in the area of ad-hoc networks. The project

    is run by the Distributed Systems Group of Trinity College, in collaboration with

    Media Lab Europe.

    WAND is arranged as a large scale test bed for ad-hoc networks protocols

    and applications, covering a 2km route from Trinity to Media Lab Europe. Seediagram below.

    This route will be routed with custom-built wireless-enabled embedded

    PCs. Along this stretch, the embedded PCs will be placed in apartments, shops, on

    traffic lights and in phone booths providing a minimum level of connectivity.

    The PCs form a sparse population of wireless network nodes. This sparse coverage

    is constantly available and the embedded PCs can be configured to create a

    variety of network models.Other devices with wireless connectivity may also connect to the network

    via the implementation of mobile nodes.

  • 7/29/2019 MANET Casestudy2

    16/17

    SIES, Nerul

    Page | 16

    2km route from Trinity to MLE

    Many factors lead us to believe that ad-hoc is the wireless network of the

    future. Due to the network not requiring any base station makes them

    indispensable in disaster relief situations or military war zones. Also energy issues

    have moved us from using a single long wireless link (as in cellular) to a mesh of

    short links (as in ad hoc networks). To sum up, ad-hoc networks will be the

    future of our wireless networks.

  • 7/29/2019 MANET Casestudy2

    17/17

    SIES, Nerul

    Page | 17

    Conclusion:

    After researching Ad-hoc networks in depth, we believe that they will be

    the future of wireless networking. It is true that performance suffers as thenumber of devices grows and large ad-hoc networks become difficult to route

    and manage. However, much time is being devoted to achieving routing stability,

    and a few technical issues need to be solved before they become common place.

    The area of ad hoc networks is a very fast growing area, and due to the vast

    research in them, we are seeing these problems disappear and they are coming

    into a world of their own.