SlideShare une entreprise Scribd logo
1  sur  66
IT8602 Mobile Communication
Unit IV - Mobile Network Layer
Kaviya.P
Kamaraj College of Engineering & Technology
Unit IV – Mobile Network Layer
Mobile IP – DHCP – AdHoc– Proactive and Reactive
Routing Protocols – Multicast Routing- Vehicular Ad
Hoc networks ( VANET) –MANET Vs VANET –
Security
Mobile IP
Mobile IP - Definition
• Mobile Internet Protocol (Mobile IP) was proposed by the Internet Engineering
Task Force (IETF).
• The mobile IP allows mobile computers to stay connected to the Internet regardless
of their location and without changing their IP address.
• Every mobile user likes to have a continuous network connectivity irrespective of
its physical location.
Mobile IP
Mobile IP - Packet Delivery
Mobile IP
Mobile IP - Components
• A correspondent node (CN) is connected via a router to the Internet.
• The home network and the foreign network are also connected via a router, i.e.
the home agent (HA) and foreign agent (FA), respectively, to the Internet.
• Home agent (HA) is implemented on the router connecting the home network with
the Internet, a foreign agent (FA) is also implemented on the router connecting the
foreign network with the Internet.
• The tunnel for the packets towards mobile node starts at the home agent and ends
at the foreign agent.
• The foreign agent has the care-of-address (COA).
Mobile IP
Mobile IP - Terminologies
• Mobile Node (MN): Hand-held equipment with roaming capabilities. Eg: cell phone,
PDA, laptop, etc.
• Home Network: The network within which the device receives its identifying IP
address.
• Home Address: IP address assigned to the device within the home network.
Permanent address of the Mobile Node.
• Home Agent (HA): Node in the home network responsible for forwarding messages to
the Mobile node when it is outside the home network.
• Foreign Network (FN): The network in which a mobile node is operating when away
from its home network.
• Foreign Agent (FA): Point of attachment for a mobile node when it roams to the foreign
network, delivering packets from the Home Agent to the Mobile Node.
Mobile IP
Mobile IP - Terminologies
• Correspondent Node (CN): Any node that tries to send messages to mobile node
when it is outside its home network.
• Care-of-Address (COA): It is the address that is used to identify the present
location of a foreign agent.
– The packets sent to the MN are delivered to COA.
– The COA can be any of the following two types:
• Foreign agent COA: The COA is an IP address of foreign agent (FA).
• Co-located COA: When the mobile node (MN) acquires a temporary IP
address, that address acts as the COA. (acquired using services like DHCP)
Mobile IP
Mobile IP - Terminologies
• Tunnelling establishes a virtual pipe for the packets available between a tunnel
entry and an endpoint.
• Tunnelling is the process of sending a packet via a tunnel and it is achieved by a
mechanism called encapsulation.
• Encapsulation refers to arranging a packet header and data in the data part of
the new packet.
• On the other hand, disassembling the data part of an encapsulated packet is called
decapsulation.
Mobile IP
Mobile IP – Packet Delivery
Corresponding node (CN) wants to send an IP packet to a Mobile node (MN)
1. CN sends the packet to the IP address of the mobile node.
• The IP address of the MN is the destination address, whereas the address of CN is
the source address.
• The internet routes the packet to the router of the MN’s home network.
• The home agent (HA) examines the packet to determine whether the MN is
present in its current home network or not.
• In case that MN is not present, then the packet is encapsulated by a new header
that is placed in front of the existing IP header.
Mobile IP
Mobile IP – Packet Delivery
Corresponding node (CN) wants to send an IP packet to a Mobile node (MN)
2. The encapsulated packet is tunneled to the COA, which act as the new destination
address and the HA acts as the source address of the packet.
3. The encapsulated packet is routed to the foreign agent which performs decapsulation to
remove the additional header and forwards the decapsulated packets to the MN, which is
the actual destination, as specified by the source node (CN).
4. The MN after receiving the packet from CN, forwards a reply packet to the CN by
specifying its own IP address along with the address of the CN.
• The MN’s IP address acts as the source address and the CN’s IP address acts as the
destination address.
• The packet is routed to the FA. After receiving the packet, FA forwards the packet to
CN.
Mobile IP
Mobile IP - Desirable Features
• Transparency: The IP address is to be managed transparently and there should not
any effect of mobility on any on-going communication.
• Compatibility: Mobile IP should be compatible with the existing Internet
protocols.
• Security: Mobile IP should provide users with secure communications over the
Internet.
• Efficiency and Scalability: It should also be scalable to support billions of moving
hosts world wide.
Mobile IP
Key Mechanism in Mobile IP
Mobile IP is associated with the following three basic mechanisms:
• Discovering the care-of-address
• Registering the care-of-address
• Tunnelling to the care-of-address
The registration process works over UDP. The discovery protocol over ICMP.
Mobile IP
Key Mechanism in Mobile IP - Discovering the care-of-address
• Each mobile node uses a discovery protocol to identify the respective home and
foreign agents.
• The discovery of the care-of-address consists of the following important steps:
– Home agents and Home agents advertise their presence by periodically
broadcasting the agent advertisement messages.
– The mobile node receiving the agent advertisement message observes whether
the message is from its own home agent and determines whether it is on the
home network or on a foreign network.
– If a mobile node does not wish to wait for the periodic advertisement, it can send
out agent solicitation messages that will be responded to the mobility agent.
Mobile IP
Key Mechanism in Mobile IP - Registering the care-of-address
• The registration process consists of the following steps:
1. If the mobile node travels to a foreign network, it registers with the foreign agent by
sending a registration request message which includes the permanent IP address of
the mobile host and the IP address of its home agent.
2. The foreign agent in turn performs the registration process on behalf of the mobile
host by sending a Registration Request containing the permanent IP address of the
mobile node and the IP address of the foreign agent to the home agent.
3. When the home agent receives the Registration Request, it updates the mobility
binding by associating the care-of-address of the mobile node with its home address.
4. The home agent then sends an acknowledgement to the foreign agent.
5. The foreign agent in turn updates its visitors list by inserting the entry for the mobile
node and relays the reply to the mobile node.
Mobile IP
Key Mechanism in Mobile IP - Registering the care-of-address
Mobile IP
Key Mechanism in Mobile IP – Tunnelling to the care-of-address
• Tunnelling take place to forward an IP datagram from the home agent to a care-of-
address.
• This involves carrying out the following steps:
– When a home agent receives a packet addressed to a mobile host, it forwards the
packet to the care-of-address using IP-within-IP(encapsulation).
– Using IP-within-IP, the home agent inserts a new IP header in front of the IP header
of any datagram.
– Destination address is set to the care-of-address.
– Source address is set to the home agent’s address.
– After stripping out the first header, IP processes the packet again.
Mobile IP
Key Mechanism in Mobile IP – Tunnelling to the care-of-address
Mobile IP
Mobile IP – Route Optimization
• In the mobile IP protocol, all the data packets to the mobile node go through the
home agent.
• Because of this there will be heavy traffic between HA and CN in the network,
causing latency to increase.
• Therefore route optimization needs to be carried out to overcome this problem.
• The association of the home address with a care-of-address is called binding.
• Enable direct notification of the corresponding host.
• Direct tunneling from the corresponding host to the mobile host.
• Binding cache maintained at the corresponding host.
Mobile IP
Mobile IP – Route Optimization
Messages Transmitted in Optimized Mobile IP
Message Type Description
Binding request If a node wants to know the current location of a mobile
node (MN), it sends a request to the home agent (HA).
Binding acknowledgement On request, the node will return an acknowledgement
message after getting the binding update message.
Binding update This is a message sent by HA to CN mentioning the correct
location of MN. The message contains the fixed IP address
of the mobile node and the care-of-address. The binding
update can request for an acknowledgement.
Binding warning If a node decapsulates a paket for a mobile node (MN), but
it is not the current foreign agent (FA), then this node sends
a binding warning to the home agent (HA) of the mobile
node (MN).
DHCP – Dynamic Host Configuration Protocol
• DHCP was developed based on bootstrap protocol (BOOTP).
• DHCP provides several types of information to a user including its IP address.
• To manage dynamic configuration information and dynamic IP addresses, IETF
standardized an extension to BOOTP known as dynamic host configuration protocol
(DHCP).
• The DHCP client and server work together to handle the roaming status and to assign
IP address on a new network efficiently.
• The DHCP server allocates an IP address from a pool of IP addresses to a client.
DHCP – Dynamic Host Configuration Protocol
DHCP consists of two components
• A protocol for delivering host specific configuration parameters from a DHCP server to
a host
• A Mechanism for allocation of network addresses to hosts.
Application
• Simplification of installation and maintenance of networked computers.
• Supplies systems with all necessary information, such as IP address, DNS server
address, domain name, subnet mask, default router etc.
• Enables automatic integration of systems into an Intranet or the Internet, can be used to
acquire a COA for Mobile IP.
DHCP – Dynamic Host Configuration Protocol
Client/Server-Model
• The client sends via a MAC broadcast a request to the DHCP server (might be via a
DHCP relay).
• Server
– Several servers can be configured for DHCP, coordination not yet standardized (i.e.,
manual configuration).
• Renewal of configurations
– IP addresses have to be requested periodically, simplified protocol.
• Disadvantage
– No authentication of DHCP information specified.
DHCP – Dynamic Host Configuration Protocol
DHCP Protocol Mechanisms
DHCP – Dynamic Host Configuration Protocol
Significance of DHCP
• The importance of DHCP in a mobile computing environment is that it provides
temporary IP addresses whenever a host moves from one network to another
network.
• DHCP supports three important mechanisms for IP address allocation:
– Automatic allocation: In automatic allocation, DHCP assigns a permanent IP
address to a particular client.
– Dynamic allocation: In dynamic allocation, DHCP assigns IP address to a client for
a specific period of time.
– Manual allocation: In manual allocation, a client’s IP address is assigned by the
network administrator, where the DHCP is used to inform the address assigned to
clients.
AdHoc Networks
• Temporary or ad-hoc networks that are established and maintained on the fly
and work without the support of any form of fixed infrastructure such as
base station, are known as Mobile Ad-Hoc Networks (MANETs).
• Self-configuring networks setup among the hand-held devices of mobile users.
How is an AdHoc Network Setup without the
Infrastructure Support?
• Mobile device can communicate with each other in absence of any form of fixed
networking infrastructure such as hubs, routers, base station etc.
• A network can be established through cooperation among the devices themselves.
• A mobile device wanting to communicate can forward its packet to its neighbors
and the neighbors nodes in turn can forward those to their neighbors and so on
until the destination is reached.
A schematic model of a Mobile Ad-Hoc Network
Why is Routing in a MANET a complex Task?
• In a MANET, routing is a complex task. Because,
– Frequent topology changes
– Node failure
– Link breakages
– Depletion of battery energy
Characteristics of Mobile Ad-Hoc Networks
• Lack of fixed infrastructure: In the absence of fixed infrastructure, a pair of nodes can either
communicate directly when they are in transmission range of each other or they can communicate
using a multi-hop communication.
• Dynamic topologies: The devices in the MANET are allowed to move arbitrarily, the network
topology can change unpredictably.
• Bandwidth constrained, variable capacity links: Wireless links have lower capacity. Factors
such as fading, noise, and interference can change the available bandwidth of wireless link.
• Energy constrained operation: The nodes in a MANET rely on battery power. Batteries are
small and can store very limited amounts of energy. Transmissions and processing required
during routing involve expenditure of substantial amount of energy causing the batteries to get
rapidly drained out, unless the routing protocol is carefully designed.
• Increased vulnerability: MANETs are prone to many new types of security threats. There are
increased possibilities of eavesdropping, spoofing, denial-of-service attacks. It is very difficult to
identify the attacker since the devices keep moving and do not have a global identifier.
Applications of Mobile Ad-Hoc Networks
• MANETs can be setup quickly since no fixed infrastructures need to be deployed.
• Fixed infrastructure becomes difficult to be set up because of security, cost,
inaccessibility of the terrain, or safety-related reasons, ad-hoc networks become the
preferred choice.
• Applications
– Communication among portable computers
– Environmental Monitoring
– Military
– Emergency Applications
MANET Design Issues
• Network Size and Node density: Network and node density need to be considered
while designing an appropriate routing protocol for a network. Network size refers
to the geographical coverage area of the network. Network density refers to the
number of nodes present per unit geographical area.
• Connectivity: The term connectivity of a node usually refers to neighbors it has.
In a MANET , both the number of neighboring nodes and the capacities of the links
to different neighbors may vary significantly.
• Network topology: Mobility of the nodes affects the network topology. Due to
node mobility, new links can form and some links may get dissolved. Other than
mobility , nodes can become inoperative due to discharged batteries or hardware
failure and thereby causing changes to the topology.
MANET Design Issues
• User Traffic: A network protocol should leverage the characteristics of specific
traffic types that are expected to improve the performance. The common traffic
types are the following: Bursty traffic, Large packet sent periodically, and
Combination of the above two types of traffic.
• Operational environment: The operational environment of a mobile network is
usually either urban, rural and maritime. These operational environment
supports the line of sight(LOS) communication. It requires different design of
mobile network suit an operational environment.
• Energy constraint: No fixed infrastructure exists in MANET. The mobile node
themselves store and forward packets. The energy spent can be substantially
reduced by allowing the nodes to go into a sleep mode whenever possible.
MANET Routing
• Packet routing is usually a much more complex task in an ad hoc network
compared to that in an infrastructure based network.
• Main complications arise on account of continual topology changes and
limited battery power of the nodes.
• The purpose of routing is to find the best path between the source and the
destination for forwarding packets in any store and forward network.
• In a MANET, the nodes Making up a route may themselves move or
shutdown down to low battery energy, in the process making the knowledge
about routes at various nodes to quickly become obsolete.
• It is therefore necessary to find a new route each time a node needs to transmit a
message, making routing an expensive and difficult task.
MANET Routing
Based on the above discussions,
• Traditional routing protocols would not be suitable in an ad hoc network.
• Each node in an ad hoc network needs to have routing capability and also
needs to participate in routing to keep the network operational.
Whenever there is an incoming packet in a MANET:
(a) Forward the packet to the next node(hop).
(b) While forwarding the packet, the sender needs to ensure that:
(i) The packet move towards its destination.
(ii) The number of hops/path length is minimized.
(iii) Delay is minimized.
(iv) The packet loss is minimized.
(v) The packet does not move around the network endlessly.
Ad-Hoc Routing Protocols
The node initiate the following types of communication.
• Unicast: The message is sent to a single destination node.
• Multicast: The message is sent to a selected subset of the network nodes.
• Broadcast: The message is sent to all node in the network. Since unrestrained
broadcast can choke a MANET, applications usually do not use broad cast.
AdHoc Networks - Classification of Unicast
Routing Protocols
AdHoc Networks - Classification of Unicast
Routing Protocols
Proactive protocols
• Traditional distributed shortest-path
protocols
• Maintain routes between every host pair at all
times
• Based on periodic updates; High routing
overhead
• Little or no delay for route determination
• Consume bandwidth to keep routes up-to-
date
• Maintain routes which may never be used
• Example: DSDV (Destination Sequenced
Distance Vector)
Reactive protocols
• Determine route if and when needed
• Source initiates route discovery
• Lower overhead since routes are
determined on demand
• Significant delay in route determination
• Employ flooding (global search)
• Control traffic may be bursty
• Example: DSR (Dynamic Source Routing)
AdHoc Networks - Classification of Unicast
Routing Protocols
• Hybrid protocols
– Adaptive; Combination of proactive and reactive
– Combine the good features of both the protocols
– To achieve increased scalability by allowing nodes with close proximity to
work together to form some sort of backbone to reduce the route discovery
overheads. – Proactive Routing
– Route discovery strategy - Determining routes to far away nodes
– Example : ZRP (Zone Routing Protocol)
Destination Sequence Distance Vector
Routing Protocol (DSDV)
• DSDV is based on the table driven (Proactive) approach to packet routing, it
extends the distance vector protocol of wired networks (Bellman-Foard routing
algorithm).
• Improvement made is the avoidance of routing loops through the use of
sequence number scheme.
• Each node maintains information regarding routes to all the known destinations.
The routing information updated periodically.
– Full Update or full dump: Send all routing information from own table.
– Incremental Update: Send only entries that has changed. (Make it fit into
one single packet)
• This can be considered shortcoming – traffic overhead and maintain routes
which they may not use.
Destination Sequence Distance Vector
Routing Protocol (DSDV)
• Steps in DSDV
– Each router (node) in network collects route information from all its
neighbors .
– The node finds shortest path to destination based on gathered information .
– A new routing table is generated based on gathered information .
– Router broadcasts this table to neighbors for updating .
– This process continues till routing information is stable.
Destination Sequence Distance Vector
Routing Protocol (DSDV)
Destination Next Hop Metric Sequence No Install
N1 N1 1 321 001
N2 N2 1 218 001
N3 N2 2 043 002
N5 N5 1 163 002
• Source Node: N4
• Sequence number: Originated from destination. Ensures loop freeness.
• Install Time: When entry was made (used to delete stale entries from table)
Destination Sequence Distance Vector
Routing Protocol (DSDV)
• Advantages
– Route setup process is very fast.
– Make the existing wired network protocol apply to adhoc network with fewer
modifications.
• Disadvantages
– Excessive control overhead during high mobility.
– Node must wait for a table update message initiated by the destination node.
• Cause stale routing information at nodes.
Dynamic Source Routing (DSR)
• DSR is a source initiated on-demand (or reactive) routing protocol for ad hoc
networks.
• It uses source routing technique in which sender of a packet determines the complete
sequence of nodes through which a packet has to travel.
• The sender of the packet then explicitly records this list of all nodes in the packet’s
header.
• Not exchange the routing table information periodically.
• Each mobile node in the protocol maintains a routing cache – which contains the list
of all routes that the node has learnt and maintains a sequence counter called request id
to uniquely identify the last request it had generated.
• DSR works in two phases:
I. Route discovery II. Route maintenance
Dynamic Source Routing (DSR)
• Route discovery
– First checks its own routing cache. If there is a valid route, sends the packet.
– Otherwise, it initiate the route discovery by route request
– The route request packet initiates a route reply by the destination node or by an
intermediate node that knows a route to the destination.
• Route maintenance
– Route maintenance is the process of monitoring the correct operation of a route in use
and taking the corrective action when needed.
– As soon as the source receives the RouteError message, it deletes the broken-link-
route from its cache.
– If it had another route to the destination, it starts to retransmits the packets using
alternative route otherwise it intimates the route discovery process again.
Dynamic Source Routing (DSR)
• Advantages
– No need to updating the routing tables.
– Intermediate nodes are able to utilize the Route Cache information efficiently to
reduce the control overhead.
– There are no “hello” messages needed. (beacon-less).
• Disadvantages
– The route maintenance protocol does not locally repair a broken link.
– There is always a small time delay at the begin of a new connection.
AdHoc On-Demand Distance Vector
Routing Protocol (AODV)
• Every node has a routing table. When a node knows a route to the destination, it
sends a route reply to the source node.
• The major difference between DSR and AODV
– DSR uses source routing in which a data packet carries the complete path to
traversed.
– AODV stores the next-hop information corresponding to each flow for data
packet transmission.
• Message Types
– Route Requests (RREQs)
– Route Replies (RREPs)
– Route Errors (RERRs)
AdHoc On-Demand Distance Vector
Routing Protocol (AODV)
• RouteRequest packet carries:
– SreID, DestID, DestSeqNum, BcastID and TTL.
– DestSeqNum indicates the freshness of the route is accepted.
– An internediate node receives a RouteRequest packet. It either forwards it or
prepares RouteReply if it has valid route to the destination.
• RouteReply packet:
– A node receives RouteReply packet will record the information as the next hop
towards the destination.
• AODV does not repair a broken path locally.
51
AdHoc On-Demand Distance Vector
Routing Protocol (AODV)
• Advantages
– Establish on demand.
– Destination sequences are used to find the latest path to destination.
– The connection setup delay is less.
• Disadvantages
– Intermediate node can lead to inconsistent route.
– Beacon-base.
– Heavy control overhead.
Multicast Routing Protocols for MANET
• Multicast is the delivery of a message to a group of destination nodes in a single
transmission as shown in figure.
• Providing Efficient bandwidth, Reducing communication cost, Efficient delivery of
data, Supporting dynamic topology Multiple unicast.
• Minimizing network load, Providing basic support for reliable transmission, Designing
optimal routes, Providing robustness, efficiency, and adaptability.
• There are two main categories of multicast routing protocols: Tree-based protocols,
and Mesh-based protocols.
Multicast Routing Protocols for MANET
• Tree-based protocols: Establish a single path between any two nodes in the
multicast group. Minimum number of copies per packet to be sent in the tree.
Bandwidth efficient .
• Example: Multicast Ad hoc On-Demand Distance Vector (MAODV) routing
protocol
• Mesh-based protocols: Establish a mesh of paths that connect the sources
and destinations. They are more resilient to link failures as well as to mobility.
• Drawback – Multiple copies of the same packet are disseminated through the
mesh., resulting in reduced packet delivery and increased overhead under highly
mobilized conditions.
• Example: On-Demand Multicast Routing Protocol (ODMRP)
Vehicular Ad Hoc networks(VANET)
• VANET is a special type of MANET in which moving automobiles from the nodes of
the network
• Vehicle can communicate with other vehicle that are within a range of about 100 to 300
meters – Multi- hop communication.
• Any vehicle that goes out of the signal range in the network excluded from the network.
• A vehicle come in the range of a vehicles of a VANET can come in the range can join
the network.
• A VANET can offer a significant utility value to a motorist.
• It can help drivers to get information and warnings from a nearby environment via
message exchange.
• It can help disseminate geographical information to drivers as he continues to drive.
Vehicular Ad Hoc networks(VANET)
• The driver can get road condition ahead or a warning about the application of
emergency electronic brake by a vehicle ahead in the lane.
• Drivers may have the opportunity to engage in other leisurely tasks, VoIP with
family, watch news and participate in an office video conference etc.
• Two vehicles are involved in a collision. The trailing vehicle get advance notification
of the collision ahead on the road. The scenario shown in figure.
Vehicular Ad Hoc networks(VANET)
MANET Vs VANET
Criteria
VANET
(Vehicular Adhoc Network)
MANET
(Mobile Adhoc Network)
Basic Idea
It is a collection of nodes (vehicles)
that communicate with each other over
bandwidth constrained wireless links
with certain road side infrastructure or
base station
It is a collection nodes that
communicate with each other over
bandwidth constrained wireless links
without any infrastructure support
Production Cost Costly Inexpensive
Network Topology
Change
Frequent and very fast Sluggish / Slow
Mobility High Low
Density in Node Frequent variable and dense Sparse
Bandwidth 1000kbps 100kbps
Range Up to 600 m Up to 100 m
Node Lifetime
It is depend on vehicle life
time
It is depend on power source
Reliability High Medium
Nodes moving
pattern
Regular Random
Security issues in MANETs
MANETs are much more vulnerable to attack than wired network. This is because of the
following reasons :
• Open Medium: Eavesdropping is more easier than in wired network.
• Dynamically Changing Network Topology: Mobile Nodes comes and goes from the
network, thereby allowing any malicious node to join the network without being
detected.
• Cooperative Algorithms: The routing algorithm of MANETs requires mutual trust
between nodes which violates the principles of Network Security.
• Lack of Centralized Monitoring: Absence of any centralized infrastructure prohibits
any monitoring agent in the system.
The important characteristics of ad hoc networks that can be exploited to cause security
vulnerabilities
• Lack of physical boundary: Difficult to deploy firewalls or monitor the incoming
traffic.
• Low power RF transmission: Signal jamming lead to denial of service(DoS) attack
• Limited computational capabilities: Inability to encrypt messages – spoofing and
routing attacks.
• Limited power supply: Attacker attempt exhaust batteries.
Characteristics of secure ad hoc networks
A secure ad hoc network should have the following characteristics:
• Availability - Able to survive denial of service(DOS).
• Confidentiality - Prevent unauthorized users to access confidential information.
• Integrity - No tampering of transmitted messages.
• Authentication - Guarantee about the true identity of peer node.
• Non-repudiation - Should ensure that a node have sent a message cannot deny it.
Attacks on Ad Hoc Networks
• MANET attacks are classified into passive and active attacks.
• Passive attacks:
• Target to monitor and steal the data exchanged in the network without
disrupting the network operations.
• Very difficult to identify since these do not have any perceivable symptoms.
• Can be reduced by using suitable encryption techniques.
• Active attacks:
• Destructive and disturbs the normal functionality of the network.
Passive attacks Active
attacks
Snooping
Eavesdropping,
traffic analysis,
monitoring
Wormhole,
black hole,
grey hole,
resource
consumption
, routing
attacks
Layer Attacks
Application
Layer
Malicious code, repudiation, data corruption
Transport Layer Session hijacking, SYN flooding
Network Layer Wormhole, black hole, fabrication attack, grey
hole
Data link layer Resource consumption
Physical layer Traffic analysis, monitoring, disruption, jamming,
interceptions, eavesdropping
Multilayer Denial-of-Service (DoS), impersonation, replay
Attacks on Ad Hoc Networks
• Routing loop
• By sending tampered routing packets, an attacker can create a routing loop.
• Data packets being sent endlessly, consuming bandwidth and causing dissipation
of power for a number of nodes.
• As a result, the packets are prevented from reaching their intended recipients.
• Type of Denial-of-service (DoS) attack.
• Malicious code attack
• A malicious code can be a virus, worm, spyware, or a Trojan.
• An attacker can propagate malicious code and can slow down the nodes,
overload the network, or even crash the nodes.
• Repudiation attack
• Refers to the denial of participation in a communication.
• A malicious user can deny a credit card or bank transaction.
Attacks on Ad Hoc Networks
• SYN flooding attack
• An attacker creates a large number of half-opened TCP connections with the victim
nodes by sending a large number of SYN packets to them.
• This causes the victim nodes to overflow.
• Session hijacking
• The attacker can spoof the IP address of a node that has just started a session and
hijack the session from the victim and perform a DoS attack.
• Fabrication attack
• A malicious node sends a false route error message to the packet to the sender, even
when the next hop link is not broken.
• Black hole
• A node can set up a route to some destination via itself, and when the actual data
packets are received from other nodes are simply dropped.
• This node forms a black hole, to which data packets enter but never leave.
Attacks on Ad Hoc Networks
• Grey hole
– Special case of black hole attack.
– The attackers selectively drops some kinds of packets that pass through it.
– More difficult to detect this attack.
• Partitioning
– The attacker partitions a network by causing some nodes to spilt up from the
other nodes.
– One set of nodes is not able to communicate with other set of nodes.
– By analyzing the network topology the attacker can choose to make the
partitioning between the set of nodes that causes the most harm to the system.
• Blacklist
– This attack tries to exploit a loophole in security mechanisms.
– Keeping a list of perceived malicious node to tackle this problem.
– Each node has a blacklist of bad nodes and thereby avoids using them when
setting up routing paths.
– An attacker might try to get a good node blacklisted, causing the other good
nodes to add this node to their respective blacklists and so avoid it.
Attacks on Ad Hoc Networks
• Wormhole
• A direct link (tunnel) between the two nodes is established. – wormhole link
• Through the wormhole link, one node eavesdrops messages at one end, and
tunnels them through the wormhole link to the other node which then replays them.
• The tunnel essentially emulates a shorter route through the network and so
naive nodes prefer to use it rather than the alternative longer routes.
• Once a wormhole is established, a malicious node can use it for traffic analysis or
make a denial-of-service attack by dropping certain data or control packets.
• Dropping routing traffic
• In an Ad-Hoc network, all nodes participate in the routing process.
• A node may act selfishly and process only the routing information that is
related to itself either maliciously or to conserve energy.
• This attack can create network instability or can even segment the network.
Security Attack Countermeasures
Layer Attacks
Data link layer Use of spread spectrum transmission and directional
antennae.
Network Layer Use of authentication measures and keeping track of
the trust nodes.
Transport Layer Securing and authenticating end-to-end
communications through data encryption techniques.
Application Layer Detection and prevention of virus, worms, malicious
code through code analysis.

Contenu connexe

Tendances (20)

Mobile Data Networks
Mobile Data NetworksMobile Data Networks
Mobile Data Networks
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
GSM
GSMGSM
GSM
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Gsm call routing
Gsm call routingGsm call routing
Gsm call routing
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
It6601 mobile computing unit 3
It6601 mobile computing unit 3It6601 mobile computing unit 3
It6601 mobile computing unit 3
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
IEEE 802.16 Standard
IEEE 802.16 StandardIEEE 802.16 Standard
IEEE 802.16 Standard
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?
 
wireless application protocol
wireless application protocol wireless application protocol
wireless application protocol
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Hidden & exposed terminal problem
Hidden & exposed terminal problemHidden & exposed terminal problem
Hidden & exposed terminal problem
 
Wired and wireless technologies
Wired and  wireless  technologiesWired and  wireless  technologies
Wired and wireless technologies
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Cs8601 3
Cs8601 3Cs8601 3
Cs8601 3
 

Similaire à IT8602 - Mobile Communication Unit IV (20)

IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit II
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
Mobile computing Unit III MANET Notes
Mobile computing Unit III MANET NotesMobile computing Unit III MANET Notes
Mobile computing Unit III MANET Notes
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobileip 161105154557
Mobileip 161105154557Mobileip 161105154557
Mobileip 161105154557
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAMMobile computing - SARASWATHI RAMALINGAM
Mobile computing - SARASWATHI RAMALINGAM
 
ipgoals,assumption requirements
ipgoals,assumption requirementsipgoals,assumption requirements
ipgoals,assumption requirements
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
 
Mobile computing Mobile Transport Layer
Mobile computing Mobile Transport LayerMobile computing Mobile Transport Layer
Mobile computing Mobile Transport Layer
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
 
Unit 3
Unit 3Unit 3
Unit 3
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentation
 
Report
ReportReport
Report
 

Plus de pkaviya

IT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database ConnectivityIT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database Connectivitypkaviya
 
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdfIT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdfpkaviya
 
IT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and ScriptingIT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and Scriptingpkaviya
 
IT2255 Web Essentials - Unit II Web Designing
IT2255 Web Essentials - Unit II  Web DesigningIT2255 Web Essentials - Unit II  Web Designing
IT2255 Web Essentials - Unit II Web Designingpkaviya
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basicspkaviya
 
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfBT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfpkaviya
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Materialpkaviya
 
OIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question BankOIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question Bankpkaviya
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bankpkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V pkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV pkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III pkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IICS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IIpkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT ICS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT Ipkaviya
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT Vpkaviya
 
CS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVCS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVpkaviya
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIIpkaviya
 
CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II pkaviya
 
CS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit ICS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit Ipkaviya
 
IT8602 Mobile Communication Question Bank
IT8602 Mobile Communication Question BankIT8602 Mobile Communication Question Bank
IT8602 Mobile Communication Question Bankpkaviya
 

Plus de pkaviya (20)

IT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database ConnectivityIT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database Connectivity
 
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdfIT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
 
IT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and ScriptingIT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and Scripting
 
IT2255 Web Essentials - Unit II Web Designing
IT2255 Web Essentials - Unit II  Web DesigningIT2255 Web Essentials - Unit II  Web Designing
IT2255 Web Essentials - Unit II Web Designing
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfBT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Material
 
OIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question BankOIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question Bank
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V
 
CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV
 
CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III
 
CS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IICS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT II
 
CS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT ICS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT I
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT V
 
CS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVCS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IV
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit III
 
CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II
 
CS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit ICS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit I
 
IT8602 Mobile Communication Question Bank
IT8602 Mobile Communication Question BankIT8602 Mobile Communication Question Bank
IT8602 Mobile Communication Question Bank
 

Dernier

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 

Dernier (20)

Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 

IT8602 - Mobile Communication Unit IV

  • 1. IT8602 Mobile Communication Unit IV - Mobile Network Layer Kaviya.P Kamaraj College of Engineering & Technology
  • 2. Unit IV – Mobile Network Layer Mobile IP – DHCP – AdHoc– Proactive and Reactive Routing Protocols – Multicast Routing- Vehicular Ad Hoc networks ( VANET) –MANET Vs VANET – Security
  • 3. Mobile IP Mobile IP - Definition • Mobile Internet Protocol (Mobile IP) was proposed by the Internet Engineering Task Force (IETF). • The mobile IP allows mobile computers to stay connected to the Internet regardless of their location and without changing their IP address. • Every mobile user likes to have a continuous network connectivity irrespective of its physical location.
  • 4. Mobile IP Mobile IP - Packet Delivery
  • 5. Mobile IP Mobile IP - Components • A correspondent node (CN) is connected via a router to the Internet. • The home network and the foreign network are also connected via a router, i.e. the home agent (HA) and foreign agent (FA), respectively, to the Internet. • Home agent (HA) is implemented on the router connecting the home network with the Internet, a foreign agent (FA) is also implemented on the router connecting the foreign network with the Internet. • The tunnel for the packets towards mobile node starts at the home agent and ends at the foreign agent. • The foreign agent has the care-of-address (COA).
  • 6. Mobile IP Mobile IP - Terminologies • Mobile Node (MN): Hand-held equipment with roaming capabilities. Eg: cell phone, PDA, laptop, etc. • Home Network: The network within which the device receives its identifying IP address. • Home Address: IP address assigned to the device within the home network. Permanent address of the Mobile Node. • Home Agent (HA): Node in the home network responsible for forwarding messages to the Mobile node when it is outside the home network. • Foreign Network (FN): The network in which a mobile node is operating when away from its home network. • Foreign Agent (FA): Point of attachment for a mobile node when it roams to the foreign network, delivering packets from the Home Agent to the Mobile Node.
  • 7. Mobile IP Mobile IP - Terminologies • Correspondent Node (CN): Any node that tries to send messages to mobile node when it is outside its home network. • Care-of-Address (COA): It is the address that is used to identify the present location of a foreign agent. – The packets sent to the MN are delivered to COA. – The COA can be any of the following two types: • Foreign agent COA: The COA is an IP address of foreign agent (FA). • Co-located COA: When the mobile node (MN) acquires a temporary IP address, that address acts as the COA. (acquired using services like DHCP)
  • 8. Mobile IP Mobile IP - Terminologies • Tunnelling establishes a virtual pipe for the packets available between a tunnel entry and an endpoint. • Tunnelling is the process of sending a packet via a tunnel and it is achieved by a mechanism called encapsulation. • Encapsulation refers to arranging a packet header and data in the data part of the new packet. • On the other hand, disassembling the data part of an encapsulated packet is called decapsulation.
  • 9. Mobile IP Mobile IP – Packet Delivery Corresponding node (CN) wants to send an IP packet to a Mobile node (MN) 1. CN sends the packet to the IP address of the mobile node. • The IP address of the MN is the destination address, whereas the address of CN is the source address. • The internet routes the packet to the router of the MN’s home network. • The home agent (HA) examines the packet to determine whether the MN is present in its current home network or not. • In case that MN is not present, then the packet is encapsulated by a new header that is placed in front of the existing IP header.
  • 10. Mobile IP Mobile IP – Packet Delivery Corresponding node (CN) wants to send an IP packet to a Mobile node (MN) 2. The encapsulated packet is tunneled to the COA, which act as the new destination address and the HA acts as the source address of the packet. 3. The encapsulated packet is routed to the foreign agent which performs decapsulation to remove the additional header and forwards the decapsulated packets to the MN, which is the actual destination, as specified by the source node (CN). 4. The MN after receiving the packet from CN, forwards a reply packet to the CN by specifying its own IP address along with the address of the CN. • The MN’s IP address acts as the source address and the CN’s IP address acts as the destination address. • The packet is routed to the FA. After receiving the packet, FA forwards the packet to CN.
  • 11. Mobile IP Mobile IP - Desirable Features • Transparency: The IP address is to be managed transparently and there should not any effect of mobility on any on-going communication. • Compatibility: Mobile IP should be compatible with the existing Internet protocols. • Security: Mobile IP should provide users with secure communications over the Internet. • Efficiency and Scalability: It should also be scalable to support billions of moving hosts world wide.
  • 12. Mobile IP Key Mechanism in Mobile IP Mobile IP is associated with the following three basic mechanisms: • Discovering the care-of-address • Registering the care-of-address • Tunnelling to the care-of-address The registration process works over UDP. The discovery protocol over ICMP.
  • 13. Mobile IP Key Mechanism in Mobile IP - Discovering the care-of-address • Each mobile node uses a discovery protocol to identify the respective home and foreign agents. • The discovery of the care-of-address consists of the following important steps: – Home agents and Home agents advertise their presence by periodically broadcasting the agent advertisement messages. – The mobile node receiving the agent advertisement message observes whether the message is from its own home agent and determines whether it is on the home network or on a foreign network. – If a mobile node does not wish to wait for the periodic advertisement, it can send out agent solicitation messages that will be responded to the mobility agent.
  • 14. Mobile IP Key Mechanism in Mobile IP - Registering the care-of-address • The registration process consists of the following steps: 1. If the mobile node travels to a foreign network, it registers with the foreign agent by sending a registration request message which includes the permanent IP address of the mobile host and the IP address of its home agent. 2. The foreign agent in turn performs the registration process on behalf of the mobile host by sending a Registration Request containing the permanent IP address of the mobile node and the IP address of the foreign agent to the home agent. 3. When the home agent receives the Registration Request, it updates the mobility binding by associating the care-of-address of the mobile node with its home address. 4. The home agent then sends an acknowledgement to the foreign agent. 5. The foreign agent in turn updates its visitors list by inserting the entry for the mobile node and relays the reply to the mobile node.
  • 15. Mobile IP Key Mechanism in Mobile IP - Registering the care-of-address
  • 16. Mobile IP Key Mechanism in Mobile IP – Tunnelling to the care-of-address • Tunnelling take place to forward an IP datagram from the home agent to a care-of- address. • This involves carrying out the following steps: – When a home agent receives a packet addressed to a mobile host, it forwards the packet to the care-of-address using IP-within-IP(encapsulation). – Using IP-within-IP, the home agent inserts a new IP header in front of the IP header of any datagram. – Destination address is set to the care-of-address. – Source address is set to the home agent’s address. – After stripping out the first header, IP processes the packet again.
  • 17. Mobile IP Key Mechanism in Mobile IP – Tunnelling to the care-of-address
  • 18. Mobile IP Mobile IP – Route Optimization • In the mobile IP protocol, all the data packets to the mobile node go through the home agent. • Because of this there will be heavy traffic between HA and CN in the network, causing latency to increase. • Therefore route optimization needs to be carried out to overcome this problem. • The association of the home address with a care-of-address is called binding. • Enable direct notification of the corresponding host. • Direct tunneling from the corresponding host to the mobile host. • Binding cache maintained at the corresponding host.
  • 19. Mobile IP Mobile IP – Route Optimization Messages Transmitted in Optimized Mobile IP Message Type Description Binding request If a node wants to know the current location of a mobile node (MN), it sends a request to the home agent (HA). Binding acknowledgement On request, the node will return an acknowledgement message after getting the binding update message. Binding update This is a message sent by HA to CN mentioning the correct location of MN. The message contains the fixed IP address of the mobile node and the care-of-address. The binding update can request for an acknowledgement. Binding warning If a node decapsulates a paket for a mobile node (MN), but it is not the current foreign agent (FA), then this node sends a binding warning to the home agent (HA) of the mobile node (MN).
  • 20. DHCP – Dynamic Host Configuration Protocol • DHCP was developed based on bootstrap protocol (BOOTP). • DHCP provides several types of information to a user including its IP address. • To manage dynamic configuration information and dynamic IP addresses, IETF standardized an extension to BOOTP known as dynamic host configuration protocol (DHCP). • The DHCP client and server work together to handle the roaming status and to assign IP address on a new network efficiently. • The DHCP server allocates an IP address from a pool of IP addresses to a client.
  • 21. DHCP – Dynamic Host Configuration Protocol DHCP consists of two components • A protocol for delivering host specific configuration parameters from a DHCP server to a host • A Mechanism for allocation of network addresses to hosts. Application • Simplification of installation and maintenance of networked computers. • Supplies systems with all necessary information, such as IP address, DNS server address, domain name, subnet mask, default router etc. • Enables automatic integration of systems into an Intranet or the Internet, can be used to acquire a COA for Mobile IP.
  • 22. DHCP – Dynamic Host Configuration Protocol Client/Server-Model • The client sends via a MAC broadcast a request to the DHCP server (might be via a DHCP relay). • Server – Several servers can be configured for DHCP, coordination not yet standardized (i.e., manual configuration). • Renewal of configurations – IP addresses have to be requested periodically, simplified protocol. • Disadvantage – No authentication of DHCP information specified.
  • 23. DHCP – Dynamic Host Configuration Protocol DHCP Protocol Mechanisms
  • 24. DHCP – Dynamic Host Configuration Protocol Significance of DHCP • The importance of DHCP in a mobile computing environment is that it provides temporary IP addresses whenever a host moves from one network to another network. • DHCP supports three important mechanisms for IP address allocation: – Automatic allocation: In automatic allocation, DHCP assigns a permanent IP address to a particular client. – Dynamic allocation: In dynamic allocation, DHCP assigns IP address to a client for a specific period of time. – Manual allocation: In manual allocation, a client’s IP address is assigned by the network administrator, where the DHCP is used to inform the address assigned to clients.
  • 25. AdHoc Networks • Temporary or ad-hoc networks that are established and maintained on the fly and work without the support of any form of fixed infrastructure such as base station, are known as Mobile Ad-Hoc Networks (MANETs). • Self-configuring networks setup among the hand-held devices of mobile users.
  • 26. How is an AdHoc Network Setup without the Infrastructure Support? • Mobile device can communicate with each other in absence of any form of fixed networking infrastructure such as hubs, routers, base station etc. • A network can be established through cooperation among the devices themselves. • A mobile device wanting to communicate can forward its packet to its neighbors and the neighbors nodes in turn can forward those to their neighbors and so on until the destination is reached.
  • 27. A schematic model of a Mobile Ad-Hoc Network
  • 28. Why is Routing in a MANET a complex Task? • In a MANET, routing is a complex task. Because, – Frequent topology changes – Node failure – Link breakages – Depletion of battery energy
  • 29. Characteristics of Mobile Ad-Hoc Networks • Lack of fixed infrastructure: In the absence of fixed infrastructure, a pair of nodes can either communicate directly when they are in transmission range of each other or they can communicate using a multi-hop communication. • Dynamic topologies: The devices in the MANET are allowed to move arbitrarily, the network topology can change unpredictably. • Bandwidth constrained, variable capacity links: Wireless links have lower capacity. Factors such as fading, noise, and interference can change the available bandwidth of wireless link. • Energy constrained operation: The nodes in a MANET rely on battery power. Batteries are small and can store very limited amounts of energy. Transmissions and processing required during routing involve expenditure of substantial amount of energy causing the batteries to get rapidly drained out, unless the routing protocol is carefully designed. • Increased vulnerability: MANETs are prone to many new types of security threats. There are increased possibilities of eavesdropping, spoofing, denial-of-service attacks. It is very difficult to identify the attacker since the devices keep moving and do not have a global identifier.
  • 30. Applications of Mobile Ad-Hoc Networks • MANETs can be setup quickly since no fixed infrastructures need to be deployed. • Fixed infrastructure becomes difficult to be set up because of security, cost, inaccessibility of the terrain, or safety-related reasons, ad-hoc networks become the preferred choice. • Applications – Communication among portable computers – Environmental Monitoring – Military – Emergency Applications
  • 31. MANET Design Issues • Network Size and Node density: Network and node density need to be considered while designing an appropriate routing protocol for a network. Network size refers to the geographical coverage area of the network. Network density refers to the number of nodes present per unit geographical area. • Connectivity: The term connectivity of a node usually refers to neighbors it has. In a MANET , both the number of neighboring nodes and the capacities of the links to different neighbors may vary significantly. • Network topology: Mobility of the nodes affects the network topology. Due to node mobility, new links can form and some links may get dissolved. Other than mobility , nodes can become inoperative due to discharged batteries or hardware failure and thereby causing changes to the topology.
  • 32. MANET Design Issues • User Traffic: A network protocol should leverage the characteristics of specific traffic types that are expected to improve the performance. The common traffic types are the following: Bursty traffic, Large packet sent periodically, and Combination of the above two types of traffic. • Operational environment: The operational environment of a mobile network is usually either urban, rural and maritime. These operational environment supports the line of sight(LOS) communication. It requires different design of mobile network suit an operational environment. • Energy constraint: No fixed infrastructure exists in MANET. The mobile node themselves store and forward packets. The energy spent can be substantially reduced by allowing the nodes to go into a sleep mode whenever possible.
  • 33. MANET Routing • Packet routing is usually a much more complex task in an ad hoc network compared to that in an infrastructure based network. • Main complications arise on account of continual topology changes and limited battery power of the nodes. • The purpose of routing is to find the best path between the source and the destination for forwarding packets in any store and forward network. • In a MANET, the nodes Making up a route may themselves move or shutdown down to low battery energy, in the process making the knowledge about routes at various nodes to quickly become obsolete. • It is therefore necessary to find a new route each time a node needs to transmit a message, making routing an expensive and difficult task.
  • 34. MANET Routing Based on the above discussions, • Traditional routing protocols would not be suitable in an ad hoc network. • Each node in an ad hoc network needs to have routing capability and also needs to participate in routing to keep the network operational. Whenever there is an incoming packet in a MANET: (a) Forward the packet to the next node(hop). (b) While forwarding the packet, the sender needs to ensure that: (i) The packet move towards its destination. (ii) The number of hops/path length is minimized. (iii) Delay is minimized. (iv) The packet loss is minimized. (v) The packet does not move around the network endlessly.
  • 35. Ad-Hoc Routing Protocols The node initiate the following types of communication. • Unicast: The message is sent to a single destination node. • Multicast: The message is sent to a selected subset of the network nodes. • Broadcast: The message is sent to all node in the network. Since unrestrained broadcast can choke a MANET, applications usually do not use broad cast.
  • 36. AdHoc Networks - Classification of Unicast Routing Protocols
  • 37. AdHoc Networks - Classification of Unicast Routing Protocols Proactive protocols • Traditional distributed shortest-path protocols • Maintain routes between every host pair at all times • Based on periodic updates; High routing overhead • Little or no delay for route determination • Consume bandwidth to keep routes up-to- date • Maintain routes which may never be used • Example: DSDV (Destination Sequenced Distance Vector) Reactive protocols • Determine route if and when needed • Source initiates route discovery • Lower overhead since routes are determined on demand • Significant delay in route determination • Employ flooding (global search) • Control traffic may be bursty • Example: DSR (Dynamic Source Routing)
  • 38. AdHoc Networks - Classification of Unicast Routing Protocols • Hybrid protocols – Adaptive; Combination of proactive and reactive – Combine the good features of both the protocols – To achieve increased scalability by allowing nodes with close proximity to work together to form some sort of backbone to reduce the route discovery overheads. – Proactive Routing – Route discovery strategy - Determining routes to far away nodes – Example : ZRP (Zone Routing Protocol)
  • 39. Destination Sequence Distance Vector Routing Protocol (DSDV) • DSDV is based on the table driven (Proactive) approach to packet routing, it extends the distance vector protocol of wired networks (Bellman-Foard routing algorithm). • Improvement made is the avoidance of routing loops through the use of sequence number scheme. • Each node maintains information regarding routes to all the known destinations. The routing information updated periodically. – Full Update or full dump: Send all routing information from own table. – Incremental Update: Send only entries that has changed. (Make it fit into one single packet) • This can be considered shortcoming – traffic overhead and maintain routes which they may not use.
  • 40. Destination Sequence Distance Vector Routing Protocol (DSDV) • Steps in DSDV – Each router (node) in network collects route information from all its neighbors . – The node finds shortest path to destination based on gathered information . – A new routing table is generated based on gathered information . – Router broadcasts this table to neighbors for updating . – This process continues till routing information is stable.
  • 41. Destination Sequence Distance Vector Routing Protocol (DSDV) Destination Next Hop Metric Sequence No Install N1 N1 1 321 001 N2 N2 1 218 001 N3 N2 2 043 002 N5 N5 1 163 002 • Source Node: N4 • Sequence number: Originated from destination. Ensures loop freeness. • Install Time: When entry was made (used to delete stale entries from table)
  • 42. Destination Sequence Distance Vector Routing Protocol (DSDV) • Advantages – Route setup process is very fast. – Make the existing wired network protocol apply to adhoc network with fewer modifications. • Disadvantages – Excessive control overhead during high mobility. – Node must wait for a table update message initiated by the destination node. • Cause stale routing information at nodes.
  • 43. Dynamic Source Routing (DSR) • DSR is a source initiated on-demand (or reactive) routing protocol for ad hoc networks. • It uses source routing technique in which sender of a packet determines the complete sequence of nodes through which a packet has to travel. • The sender of the packet then explicitly records this list of all nodes in the packet’s header. • Not exchange the routing table information periodically. • Each mobile node in the protocol maintains a routing cache – which contains the list of all routes that the node has learnt and maintains a sequence counter called request id to uniquely identify the last request it had generated. • DSR works in two phases: I. Route discovery II. Route maintenance
  • 44. Dynamic Source Routing (DSR) • Route discovery – First checks its own routing cache. If there is a valid route, sends the packet. – Otherwise, it initiate the route discovery by route request – The route request packet initiates a route reply by the destination node or by an intermediate node that knows a route to the destination. • Route maintenance – Route maintenance is the process of monitoring the correct operation of a route in use and taking the corrective action when needed. – As soon as the source receives the RouteError message, it deletes the broken-link- route from its cache. – If it had another route to the destination, it starts to retransmits the packets using alternative route otherwise it intimates the route discovery process again.
  • 45.
  • 46.
  • 47. Dynamic Source Routing (DSR) • Advantages – No need to updating the routing tables. – Intermediate nodes are able to utilize the Route Cache information efficiently to reduce the control overhead. – There are no “hello” messages needed. (beacon-less). • Disadvantages – The route maintenance protocol does not locally repair a broken link. – There is always a small time delay at the begin of a new connection.
  • 48. AdHoc On-Demand Distance Vector Routing Protocol (AODV) • Every node has a routing table. When a node knows a route to the destination, it sends a route reply to the source node. • The major difference between DSR and AODV – DSR uses source routing in which a data packet carries the complete path to traversed. – AODV stores the next-hop information corresponding to each flow for data packet transmission. • Message Types – Route Requests (RREQs) – Route Replies (RREPs) – Route Errors (RERRs)
  • 49. AdHoc On-Demand Distance Vector Routing Protocol (AODV) • RouteRequest packet carries: – SreID, DestID, DestSeqNum, BcastID and TTL. – DestSeqNum indicates the freshness of the route is accepted. – An internediate node receives a RouteRequest packet. It either forwards it or prepares RouteReply if it has valid route to the destination. • RouteReply packet: – A node receives RouteReply packet will record the information as the next hop towards the destination. • AODV does not repair a broken path locally.
  • 50.
  • 51. 51
  • 52. AdHoc On-Demand Distance Vector Routing Protocol (AODV) • Advantages – Establish on demand. – Destination sequences are used to find the latest path to destination. – The connection setup delay is less. • Disadvantages – Intermediate node can lead to inconsistent route. – Beacon-base. – Heavy control overhead.
  • 53. Multicast Routing Protocols for MANET • Multicast is the delivery of a message to a group of destination nodes in a single transmission as shown in figure. • Providing Efficient bandwidth, Reducing communication cost, Efficient delivery of data, Supporting dynamic topology Multiple unicast. • Minimizing network load, Providing basic support for reliable transmission, Designing optimal routes, Providing robustness, efficiency, and adaptability. • There are two main categories of multicast routing protocols: Tree-based protocols, and Mesh-based protocols.
  • 54. Multicast Routing Protocols for MANET • Tree-based protocols: Establish a single path between any two nodes in the multicast group. Minimum number of copies per packet to be sent in the tree. Bandwidth efficient . • Example: Multicast Ad hoc On-Demand Distance Vector (MAODV) routing protocol • Mesh-based protocols: Establish a mesh of paths that connect the sources and destinations. They are more resilient to link failures as well as to mobility. • Drawback – Multiple copies of the same packet are disseminated through the mesh., resulting in reduced packet delivery and increased overhead under highly mobilized conditions. • Example: On-Demand Multicast Routing Protocol (ODMRP)
  • 55. Vehicular Ad Hoc networks(VANET) • VANET is a special type of MANET in which moving automobiles from the nodes of the network • Vehicle can communicate with other vehicle that are within a range of about 100 to 300 meters – Multi- hop communication. • Any vehicle that goes out of the signal range in the network excluded from the network. • A vehicle come in the range of a vehicles of a VANET can come in the range can join the network. • A VANET can offer a significant utility value to a motorist. • It can help drivers to get information and warnings from a nearby environment via message exchange. • It can help disseminate geographical information to drivers as he continues to drive.
  • 56. Vehicular Ad Hoc networks(VANET) • The driver can get road condition ahead or a warning about the application of emergency electronic brake by a vehicle ahead in the lane. • Drivers may have the opportunity to engage in other leisurely tasks, VoIP with family, watch news and participate in an office video conference etc. • Two vehicles are involved in a collision. The trailing vehicle get advance notification of the collision ahead on the road. The scenario shown in figure.
  • 57. Vehicular Ad Hoc networks(VANET)
  • 58. MANET Vs VANET Criteria VANET (Vehicular Adhoc Network) MANET (Mobile Adhoc Network) Basic Idea It is a collection of nodes (vehicles) that communicate with each other over bandwidth constrained wireless links with certain road side infrastructure or base station It is a collection nodes that communicate with each other over bandwidth constrained wireless links without any infrastructure support Production Cost Costly Inexpensive Network Topology Change Frequent and very fast Sluggish / Slow Mobility High Low Density in Node Frequent variable and dense Sparse Bandwidth 1000kbps 100kbps Range Up to 600 m Up to 100 m Node Lifetime It is depend on vehicle life time It is depend on power source Reliability High Medium Nodes moving pattern Regular Random
  • 59. Security issues in MANETs MANETs are much more vulnerable to attack than wired network. This is because of the following reasons : • Open Medium: Eavesdropping is more easier than in wired network. • Dynamically Changing Network Topology: Mobile Nodes comes and goes from the network, thereby allowing any malicious node to join the network without being detected. • Cooperative Algorithms: The routing algorithm of MANETs requires mutual trust between nodes which violates the principles of Network Security. • Lack of Centralized Monitoring: Absence of any centralized infrastructure prohibits any monitoring agent in the system. The important characteristics of ad hoc networks that can be exploited to cause security vulnerabilities • Lack of physical boundary: Difficult to deploy firewalls or monitor the incoming traffic. • Low power RF transmission: Signal jamming lead to denial of service(DoS) attack • Limited computational capabilities: Inability to encrypt messages – spoofing and routing attacks. • Limited power supply: Attacker attempt exhaust batteries.
  • 60. Characteristics of secure ad hoc networks A secure ad hoc network should have the following characteristics: • Availability - Able to survive denial of service(DOS). • Confidentiality - Prevent unauthorized users to access confidential information. • Integrity - No tampering of transmitted messages. • Authentication - Guarantee about the true identity of peer node. • Non-repudiation - Should ensure that a node have sent a message cannot deny it.
  • 61. Attacks on Ad Hoc Networks • MANET attacks are classified into passive and active attacks. • Passive attacks: • Target to monitor and steal the data exchanged in the network without disrupting the network operations. • Very difficult to identify since these do not have any perceivable symptoms. • Can be reduced by using suitable encryption techniques. • Active attacks: • Destructive and disturbs the normal functionality of the network. Passive attacks Active attacks Snooping Eavesdropping, traffic analysis, monitoring Wormhole, black hole, grey hole, resource consumption , routing attacks Layer Attacks Application Layer Malicious code, repudiation, data corruption Transport Layer Session hijacking, SYN flooding Network Layer Wormhole, black hole, fabrication attack, grey hole Data link layer Resource consumption Physical layer Traffic analysis, monitoring, disruption, jamming, interceptions, eavesdropping Multilayer Denial-of-Service (DoS), impersonation, replay
  • 62. Attacks on Ad Hoc Networks • Routing loop • By sending tampered routing packets, an attacker can create a routing loop. • Data packets being sent endlessly, consuming bandwidth and causing dissipation of power for a number of nodes. • As a result, the packets are prevented from reaching their intended recipients. • Type of Denial-of-service (DoS) attack. • Malicious code attack • A malicious code can be a virus, worm, spyware, or a Trojan. • An attacker can propagate malicious code and can slow down the nodes, overload the network, or even crash the nodes. • Repudiation attack • Refers to the denial of participation in a communication. • A malicious user can deny a credit card or bank transaction.
  • 63. Attacks on Ad Hoc Networks • SYN flooding attack • An attacker creates a large number of half-opened TCP connections with the victim nodes by sending a large number of SYN packets to them. • This causes the victim nodes to overflow. • Session hijacking • The attacker can spoof the IP address of a node that has just started a session and hijack the session from the victim and perform a DoS attack. • Fabrication attack • A malicious node sends a false route error message to the packet to the sender, even when the next hop link is not broken. • Black hole • A node can set up a route to some destination via itself, and when the actual data packets are received from other nodes are simply dropped. • This node forms a black hole, to which data packets enter but never leave.
  • 64. Attacks on Ad Hoc Networks • Grey hole – Special case of black hole attack. – The attackers selectively drops some kinds of packets that pass through it. – More difficult to detect this attack. • Partitioning – The attacker partitions a network by causing some nodes to spilt up from the other nodes. – One set of nodes is not able to communicate with other set of nodes. – By analyzing the network topology the attacker can choose to make the partitioning between the set of nodes that causes the most harm to the system. • Blacklist – This attack tries to exploit a loophole in security mechanisms. – Keeping a list of perceived malicious node to tackle this problem. – Each node has a blacklist of bad nodes and thereby avoids using them when setting up routing paths. – An attacker might try to get a good node blacklisted, causing the other good nodes to add this node to their respective blacklists and so avoid it.
  • 65. Attacks on Ad Hoc Networks • Wormhole • A direct link (tunnel) between the two nodes is established. – wormhole link • Through the wormhole link, one node eavesdrops messages at one end, and tunnels them through the wormhole link to the other node which then replays them. • The tunnel essentially emulates a shorter route through the network and so naive nodes prefer to use it rather than the alternative longer routes. • Once a wormhole is established, a malicious node can use it for traffic analysis or make a denial-of-service attack by dropping certain data or control packets. • Dropping routing traffic • In an Ad-Hoc network, all nodes participate in the routing process. • A node may act selfishly and process only the routing information that is related to itself either maliciously or to conserve energy. • This attack can create network instability or can even segment the network.
  • 66. Security Attack Countermeasures Layer Attacks Data link layer Use of spread spectrum transmission and directional antennae. Network Layer Use of authentication measures and keeping track of the trust nodes. Transport Layer Securing and authenticating end-to-end communications through data encryption techniques. Application Layer Detection and prevention of virus, worms, malicious code through code analysis.