Mobile Ad Hoc Networks - Stevens Institute Of Technology

Transcription

Mobile Ad Hoc NetworksOverviewnnIntroductionA brief look at the following (w.r.t MANETs)nnMedium Access ControlRouting (unicast)nnnnnReactive ProtocolsProactive ProtocolsHybrid ProtocolsTransport and Security IssuesConclusion21

Mobile Ad hoc NetworksI. IntroductionWireless NetworksnnNeed: Access computing and communication services, on themoveInfrastructure-based NetworksnnWireless LANsnnnntraditional cellular systems (base station infrastructure)typically radio links (802.11, etc), can be Infraredvery flexible within the reception area; ad-hoc networks possiblelower bandwidth than wired networks (1-54 Mbit/s)Ad hoc Networksnnnuseful when infrastructure not available, impractical, or expensiveoriginally military applications, rescue, home networkinginteresting potential for Metro-area networking42

Cellular WirelessnSingle hop wireless connectivity to the wired worldnnnnSpace divided into cellsA base station is responsible to communicate with hosts in itscellMobile hosts can change cells while communicatingHand-off occurs when a mobile host starts communicatingvia a new base station5Mobile Ad Hoc Networks (MANETs)nFormed by wireless hosts which may be mobilenWithout (necessarily) using a pre-existing infrastructurenRoutes between nodes may potentially contain multiplehops63

Mobile Ad Hoc Networks (MANETs)nMay need to traverse multiple links to reach destination7Mobile Ad Hoc Networks (MANETs)nMobility causes route changes84

Why Ad Hoc Networks ?nSetting up of fixed access points and backbone infrastructure isnot always viablennnInfrastructure may not be present in a disaster area or war zoneInfrastructure may not be practical for short-range radios; Bluetooth(range 10m)Ad hoc networks:nnnnDo not need backbone infrastructure supportAre easy to deploySelf-configureUseful when infrastructure is absent, destroyed or impractical9Many ApplicationsnPersonal area networkingnnMilitary environmentsnnsoldiers, tanks, planesCivilian environmentsnnnnncell phone, laptop, ear phone, wrist watchtaxi cab networkmeeting roomssports stadiumsboats, small aircraftEmergency operationsnnsearch-and-rescuepolicing and fire fighting105

Many VariationsnFully Symmetric EnvironmentnnAsymmetric Capabilitiesnnnnnall nodes have identical capabilities and responsibilitiestransmission ranges and radios may differbattery life of different nodes may differprocessing capacity may be different at different nodesspeed of movementAsymmetric Responsibilitiesnnonly some nodes may route packetssome nodes may act as leaders of nearby nodes (e.g., cluster head)11Many VariationsnTraffic characteristics may differ in different ad hoc networksnnnnnnbit ratetimeliness constraintsreliability requirementsunicast / multicast / geocasthost-based addressing / content-based addressing / capability-basedaddressingMay co-exist (and co-operate) with an infrastructure-basednetwork126

Many VariationsnMobility patterns may be differentnnnnnnpeople sitting at an airport loungeNew York taxi cabskids playingmilitary movementspersonal area networkMobility characteristicsnnnspeedpredictabilityn direction of movementn pattern of movementuniformity (or lack thereof) of mobility characteristics amongdifferent nodes13Challenges in Design & Operation ofMANETsnnLack of a centralized entityALL communications is carried over the wireless mediumnnnnnnnLimited wireless transmission rangeBroadcast nature of the wireless mediumn Hidden terminal problem (see next slide)n Exposed terminal problemn Ease of snooping on wireless transmissions (security hazard)Packet losses due to transmission errorsMobility-induced route changesMobility-induced packet lossesBattery constraintsPotentially frequent network partitions147

Hidden Terminal ProblemABCNodes A and C cannot hear each otherTransmissions by nodes A and C can collide at node BNodes A and C are hidden from each other15Challenges in Design & Operation ofMANETsnGiven all these challenges, the design of ad-hoc shouldallow for a high degree ility of the network168

Mobile Ad hoc NetworksII. Medium Access ControlProtocolsMotivationnnCan we apply media access methods from fixednetworks?Example CSMA/CDnnnCarrier Sense Multiple Access with Collision DetectionSend as soon as the medium is free, listen into the medium ifa collision occurs (original method in IEEE 802.3)Medium access problems in wireless networksnnnnSignal strength decreases proportional to the square of thedistanceSender would apply CS and CD, but the collisions happen atthe receiverSender may not “hear” the collision, i.e., CD does not workCS might not work, e.g. if a terminal is “hidden”189

Multiple Access with CollisionAvoidance (MACA) [Kar90]nMACA uses signaling packets for collision avoidancennnSignaling packets containnnnnRTS (request to send)n sender request the right to send from a receiver with a short RTSpacket before it sends a data packetCTS (clear to send)n receiver grants the right to send as soon as it is ready to receivesender addressreceiver addresspacket sizeVariants of this method are used in IEEE 802.1119Multiple Access with CollisionAvoidance (MACA) [Kar90]nMACA avoids the problem of hidden terminalsnnnnA and C want to send to BA sends RTS firstC waits after receiving CTS from BMACA avoids the problem of exposed terminalsnnB wants to send to A, C to another terminalnow C does not have to wait, as it cannot receive CTS fromA2010

MACAW Scheme [Bha94]nSuggested use of RTS-CTS-DS-DATA- ACK message exchangefor a data packet transmissionnnA new back-off algorithm, the Multiple Increase and LinearDecrease (MILD) algorithm, was also proposednnTwo new control packets were added to the packet train: DS and ACKpacketsAddress the unfairness problem in accessing the shared channelThe drawback of the MACAW scheme is inherited from theMACA scheme: the RTS/CTS packet collisions in a network withhidden terminals degrade its performance21Floor Acquisition Multiple Access(FAMA) Scheme [Ful94]nnnnnEach ready node has to acquire the channel (the “floor'') before itcan transmit its data packetsUses both CS and RTS/CTS dialogue to ensure the acquisition ofthe "floor'' and the successful transmission of the data packetsWas extended to FAMA-NPS (FAMA Non- persistent PacketSensing) and FAMA-NCS (FAMA Non-persistent CarrierSensing) [Ful97]FAMA-NCS uses carrier sensing to keep neighbor nodes fromtransmitting while the channel is being used for data packettransmissionFAMA-NCS out-performs non-persistent CSMA and previousFAMA schemes in multi-hop networks2211

Dual Busy Tone Multiple Access(DBTMA) Scheme [Haa02]nIn addition to the use of an RTS packet, two out-of-band busytones are usednnnTransmit Busy Tone RTS packetReceive Busy ToneDBTMA scheme completely solves the hidden terminal and theexposed terminal problems.nnnforbids the hidden terminals to send any packet on the channelwhile the receiver is receiving the data packetallows the exposed terminals to initiate transmission by sendingout the RTS packetsallows the hidden terminals to reply RTS packets by setting up theReceive Busy Tone and initiate data packet reception23Mobile Ad hoc NetworksIII. Routing Protocols12

Unicast Routing ProtocolsnnnnMany protocols have been proposedSome specifically invented for MANETOthers adapted from protocols for wired networksNo single protocol works well in all environmentsnnsome attempts made to develop adaptive/hybrid protocolsStandardization efforts in IETFnnMANET, MobileIP working groupshttp://www.ietf.org25Unicast Routing ProtocolsnProactive ProtocolsnnnnnReactive ProtocolsnnnnTraditional distributed shortest-path protocolsMaintain routes between every host pair at all timesBased on periodic updates; High routing overheadExample: DSDV (destination sequenced distance vector)Determine route if and when neededSource initiates route discoveryExample: DSR (dynamic source routing)Hybrid ProtocolsnnAdaptive; Combination of proactive and reactiveExample : ZRP (zone routing protocol)2613

Protocol Trade-offsnProactive ProtocolsnnnnnReactive ProtocolsnnnnnAlways maintain routesLittle or no delay for route determinationConsume bandwidth to keep routes up-to-dateMaintain routes which may never be usedLower overhead since routes are determined on demandSignificant delay in route determinationEmploy flooding (global search)Control traffic may be burstyWhich approach achieves a better trade-off depends on the trafficand mobility patterns27Mobile Ad hoc NetworksIII. Routing Protocols1. Reactive protocols14

Dynamic Source Routing (DSR) [Joh96]nWhen node S wants to send a packet to node D, but doesnot know a route to D, node S initiates a route discoverynSource node S floods Route Request (RREQ)nEach node appends own identifier when forwardingRREQ29Route Discovery in DSRYZSEFBCMJALGHKIDNRepresents a node that has received RREQ for D from S3015

Route Discovery in DSRYBroadcast transmission[S]SZEFBCMJALGHDKINRepresents transmission of RREQ[X,Y]Represents list of identifiers appended to RREQ31Route Discovery in DSRYZSE[S,E]FBCAMJ[S,C]HGKILDN Node H receives packet RREQ from two neighbors:potential for collision3216

Route Discovery in DSRYZSEFB[S,E,F]CMJALGH[S,C,G]IDKN Node C receives RREQ from G and H, but does not forwardit again, because node C has already forwarded RREQ once33Route Discovery in DSRYZSE[S,E,F,J]FBCMJALGHKID[S,C,G,K]N Nodes J and K both broadcast RREQ to node D Since nodes J and K are hidden from each other, theirtransmissions may collide3417

Route Discovery in DSRYZSE[S,E,F,J,M]FBCMJALGHKDIN Node D does not forward RREQ, because node Dis the intended target of the route discovery35Route Discovery in DSRnDestination D on receiving the first RREQ, sends aRoute Reply (RREP)nRREP is sent on a route obtained by reversing the routeappended to received RREQnRREP includes the route from S to D on which RREQwas received by node D3618

Route Reply in DSRYZSERREP [S,E,F,J,D]FBCMJALGHKIDNRepresents RREP control message37Route Reply in DSRnRoute Reply can be sent by reversing the route in RouteRequest (RREQ) only if links are guaranteed to be bidirectionalnnTo ensure this, RREQ should be forwarded only if it receivedon a link that is known to be bi-directionalIf unidirectional (asymmetric) links are allowed, thenRREP may need a route discovery for S from node DnnUnless node D already knows a route to node SIf a route discovery is initiated by D for a route to S, then theRoute Reply is piggybacked on the Route Request from D3819

Dynamic Source Routing (DSR)nNode S on receiving RREP, caches the route included in theRREPnWhen node S sends a data packet to D, the entire route is includedin the packet headernnhence the name source routingIntermediate nodes use the source route included in a packet todetermine to whom a packet should be forwarded39Data Delivery in DSRYDATA [S,E,F,J,D]SZEFBCMJALGHKIDNPacket header size grows with route length4020

DSR Optimization: Route CachingnnnnnnEach node caches a new route it learns by any meansWhen node S finds route [S,E,F,J,D] to node D, node S also learnsroute [S,E,F] to node FWhen node K receives Route Request [S,C,G] destined for nodeD, node K learns route [K,G,C,S] to node SWhen node F forwards Route Reply RREP [S,E,F,J,D], node Flearns route [F,J,D] to node DWhen node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D]to node DA node may also learn a route when it overhears Data packets41Use of Route CachingnWhen node S learns that a route to node D is broken, it usesanother route from its local cache, if such a route to D exists in itscache. Otherwise, node S initiates route discovery by sending aroute requestnNode X on receiving a Route Request for some node D can send aRoute Reply if node X knows a route to node DnUse of route cachenncan speed up route discoverycan reduce propagation of route requests4221

Route Error (RERR)YRERR [J-D]SZEFBCMJALGHKDINJ sends a route error to S along route J-F-E-S when its attempt toforward the data packet S (with route SEFJD) on J-D failsNodes hearing RERR update their route cache to remove link J-D43Route Caching: Beware!nStale caches can adversely affect performancenWith passage of time and host mobility, cached routesmay become invalidnA sender host may try several stale routes (obtainedfrom local cache, or replied from cache by other nodes),before finding a good route4422

Ad Hoc On-Demand Distance Vector(AODV) Routing [Per99]nDSR includes source routes in packet headersnResulting large headers can sometimes degrade performancenparticularly when data contents of a packet are smallnAODV attempts to improve on DSR by maintaining routing tablesat the nodes, so that data packets do not have to contain routesnAODV retains the desirable feature of DSR that routes aremaintained only between nodes which need to communicate45AODVnRoute Requests (RREQ) are forwarded in a manner similar toDSRnWhen a node re-broadcasts a Route Request, it sets up a reversepath pointing towards the sourcenAODV assumes symmetric (bi-directional) linksnWhen the intended destination receives a Route Request, it repliesby sending a Route ReplynRoute Reply travels along the reverse path set-up when RouteRequest is forwarded4623

Temporally-Ordered Routing Algorithm(TORA) [Par00]nIn TORA, routes to a destination are defined by aDirectional Acyclic Graph (DAG) rooted at the destinationnIt is a merger of the proactive link reversal algorithm fordestination-oriented Directional-Acyclic-Graph creationproposed in [Gaf81] and the on-demand query-replymechanism of Lightweight Mobile Routing (LMR) [Cor95]nTORA also supports a proactive mode47Mobile Ad hoc NetworksIII. Routing Protocols2. Proactive protocols24

Destination-Sequenced Distance-Vector(DSDV) Routing [Per94]nImproves over the conventional Bellman-Ford distance-vectorprotocolnnEach node maintains a routing table which storesnnnnnIt eliminates route looping, increases convergence speed, and reducescontrol message overheadnext hop towards each destinationa cost metric for the path to each destinationa destination sequence number that is created by the destination itselfSequence numbers used to avoid formation of loopsEach node periodically forwards the routing table to its neighborsnnEach node increments and appends its sequence number when sending itslocal routing tableThis sequence number will be attached to route entries created for this49nodeDestination-Sequenced Distance-Vector(DSDV)nAssume that node X receives routing information fromY about a route to node ZXnYZLet S(X) and S(Y) denote the destination sequencenumber for node Z as stored at node X, and as sent bynode Y with its routing table to node X, respectively5025

Destination-Sequenced Distance-Vector(DSDV)nNode X takes the following steps:XYZnIf S(X) S(Y), then X ignores the routing information received from YnIf S(X) S(Y), and cost of going through Y is smaller than the routeknown to X, then X sets Y as the next hop to ZnIf S(X) S(Y), then X sets Y as the next hop to Z, and S(X) is updated toequal S(Y)51Wireless Routing Protocol (WRP)[Mur96]nAgain, improves over the Bellman-Ford distance-vector protocolnnEach node maintains a distance-table matrixnnnnIt reduces amount of route looping, and has a mechanism to ensurereliable exchange of update messagescontains all destination nodes,all neighbors through which the destination node can be reachedFor each neighbor-destination pair, if a route exists, the route length isrecordedEach node neighbor broadcasts its current best route to selecteddestinations on an event driven incremental basisnnacknowledgments are expected from all neighbor nodesIf some acknowledgments are missing, the broadcast will be repeated,with a message retransmission list specifying the subset of neighbors thatneed to respond5226

Optimized Link State Routing (OLSR)[Jac00]nIt’s a link-state protocol where the link information isdisseminated through an efficient flooding techniquenThe overhead of flooding link state information is reduced byrequiring fewer nodes to forward the informationnA broadcast from node X is only forwarded by its multipointrelaysnMultipoint relays of node X are its neighbors such that each twohop neighbor of X is a one-hop neighbor of at least one multipointrelay of XnEach node transmits its neighbor list in periodic beacons, so that all nodescan know their 2-hop neighbors, in order to choose the multipoint relays53Optimized Link State Routing (OLSR)nNodes C and E are multipoint relays of node AFBACGJEHKDNode that has broadcast state information from A5427

Optimized Link State Routing (OLSR)nNodes C and E forward information received from AFBAJEHCGKDNode that has broadcast state information from A55Optimized Link State Routing (OLSR)nnNodes E and K are multipoint relays for node HNode K forwards information received from HnE has already forwarded the same information onceFBACGJEHKDNode that has broadcast state information from A5628

Optimized Link State Routing (OLSR)nOLSR floods information through the multipoint relaysnThe flooded itself is fir links connecting nodes torespective multipoint relaysnRoutes used by OLSR only include multipoint relays asintermediate nodes57Mobile Ad hoc NetworksIII. Routing Protocols3. Hybrid protocols29

Zone Routing Protocol (ZRP) [Pea99]nnnnnZRP combines proactive and reactive approachesAll nodes within hop distance at most d from a node Xare said to be in the routing zone of node XAll nodes at hop distance exactly d are said to beperipheral nodes of node X’s routing zoneIntra-zone routing: Proactively maintain routes to allnodes within the source node’s own zone.Inter-zone routing: Use an on-demand protocol (similarto DSR or AODV) to determine routes to outside zone.59Zone Routing Protocol (ZRP) [Pea99]6030

Core-Extraction Distributed Ad hocRouting (CEDAR) [Siv99]nnnA subset of nodes in the network is identified as the coreEach node in the network must be adjacent to at leastone node in the coreEach core node determines paths to nearby core nodesby means of a localized broadcast61Location-Aided Routing (LAR) [Ko98]nExploits location information to limit scope of route request floodnnExpected Zone is determined as a region that is expected to holdthe current location of the destinationnnLocation information may be obtained using GPSExpected region determined based on potentially old locationinformation, and knowledge of the destination’s speedRoute requests limited to a Request Zone that contains theExpected Zone and location of the sender node6231

Expected Zone in LARX last known location of nodeD, at time t0Y location of node D at currenttime t1, unknown to node Sr (t1 - t0) * estimate of D’s speedrXYExpected Zone63Request Zone in LARNetwork SpaceRequest ZonerBAXYS6432

LARnOnly nodes within the request zone forward routerequestsnNode A does not forward RREQ, but node B does (seeprevious slide)nRequest zone explicitly specified in the route requestnEach node must know its physical location to determinewhether it is within the request zone65LARnOnly nodes within the request zone forward routerequestsnIf route discovery using the smaller request zone fails tofind a route, the sender initiates another route discovery(after a timeout) using a larger request zonennthe larger request zone may be the entire networkRest of route discovery protocol similar to DSR6633

Other Routing ProtocolsnPlenty of other routing protocolsnDiscussion here is far from exhaustive67Mobile Ad hoc NetworksIV. Transport Issues34

User Datagram Protocol (UDP)nUDP provides unreliable deliverynStudies comparing different routing protocols for MANETtypically measure UDP performancenSeveral performance metrics are often usednnnRouting overhead per data packetPacket loss ratePacket delivery delay69UDP PerformancennSeveral relevant ,Das00Infocom,Jacquet00Inria]Results comparing a specific pair of protocols do not alwaysagree, but some general (and intuitive) conclusions can be drawnnnnReactive protocols may yield lower routing overhead than proactiveprotocols when communication density is lowReactive protocols tend to loose more packets (assuming than networklayer drops packets if a route is not known)Proactive protocols perform better with high mobility and densecommunication graph7035

UDP PerformancenMany variables affect performancennnnnTraffic characteristicsn one-to-many, many-to-one, many-to-manyn small bursts, large file transfers, real-time, non-real-timeMobility characteristicsn low/high rate of movementn do nodes tend to move in groupsNode capabilitiesn transmission range (fixed, changeable)n battery constraintsPerformance metricsn delayn throughputn latencyn routing overheadStatic or dynamic system characteristics (listed above)71UDP PerformancenDifficult to identify a single scheme that will performwell in all environmentsnHoly Grail: Routing protocol that dynamically adapts toall environments so as to optimize “performance”nPerformance metrics may differ in different environments7236

Transmission Control Protocol (TCP)nReliable ordered deliverynImplements congestion avoidance and controlnReliability achieved by means of retransmissions ifnecessary73Throughput over Multi-Hop WirelessPaths[Gerla99]nConnections over multiple hops are at a disadvantagecompared to shorter connections, because they have tocontend for wireless access at each hop7437

Impact of Multi-Hop Wireless roughtput(Kbps)12345 6789 10Number of hopsTCP Throughput using 2 Mbps 802.11 MAC75Throughput Degradations withIncreasing Number of HopsnPacket transmission can occur on at most one hop among threeconsecutive hopsnIncreasing the number of hops from 1 to 2, 3 results in increased delay,and decreased throughputnIncreasing number of hops beyond 3 allows simultaneoustransmissions on more than one link, however, degradationcontinues due to contention between TCP Data and Acks travelingin opposite directionsnWhen number of hops is large enough, the throughput stabilizesdue to effective pipelining7638

Ideal Throughputnf(i) fraction of time for which shortest path lengthbetween sender and destination is InT(i) Throughput when path length is InnFrom previous figureIdeal throughput Σ f(i) * T(i)77Actual throughputImpact of MobilityTCP Throughput2 m/s10 m/sIdeal throughput (Kbps)7839

Actual throughputImpact of Mobility20 m/s30 m/sIdeal throughput79Throughput generally degrades withincreasing speed IdealAverageThroughputOver50 runsActualSpeed (m/s)8040

But not always 30 m/s20 m/sActualthroughputMobility pattern #81Why Does Throughput Degrade?mobility causeslink breakage,resulting in routefailureRoute isrepairedTCP sender times out.Starts sending packets againNo throughputNo throughputdespite route repairTCP data and acksen route discarded8241

Why Does Throughput Degrade?mobility causeslink breakage,resulting in routefailureTCP sendertimes out.Backs off timer.TCP sendertimes out.ResumessendingRoute isrepairedNo throughputNo throughputdespite route repairLarger route repair delaysespecially harmfulTCP data and acksen route discarded83Why Does Throughput Improve?Low Speed ScenarioCBDCDBACDBAA1.5 second route failureRoute from A to D is broken for 1.5 second.When TCP sender times after 1 second, route still broken.TCP times out after another 2 seconds, and only then resumes.8442

Why Does Throughput Improve?Higher (double) Speed ScenarioCDBCDBACDBAA0.75 second route failureRoute from A to D is broken for 0.75 second.When TCP sender times after 1 second, route is repaired.85Why Does Throughput Improve?General PrinciplenThe previous two slides show a plausible cause for improvedthroughputnTCP timeout interval somewhat (not entirely) independent of speednNetwork state at higher speed, when timeout occurs, may be morefavorable than at lower speednNetwork statennnLink/route statusRoute cachesCongestion8643

How to Improve Throughput(Bring Closer to Ideal)nNetwork feedbacknInform TCP of route failure by explicit messagenLet TCP know when route is repairednnProbingExplicit notificationReduces repeated TCP timeouts and backoffn87Performance ImprovementWith feedbackActual throughputWithout networkfeedbackIdeal throughput2 m/s speed8844

Performance ImprovementWithout networkfeedbackActual throughputWith feedbackIdeal throughput30 m/s speed89throughput as a fraction ofidealPerformance with Explicit Notification10.8Base TCP0.6With explicitnotification0.40.202102030mean speed (m/s)9045

Impact of CachingnRoute caching has been suggested as a mechanism to reduce routediscovery overhead [Broch98]nEach node may cache one or more routes to a given destinationnWhen a route from S to D is detected as broken, node S may:nnUse another cached route from local cache, orObtain a new route using cached route at another node91Actual throughput (as fraction of expected throughput)To Cache or Not to CacheAverage speed (m/s)9246

Why Performance Degrades WithCachingnWhen a route is broken, route discovery returns a cachedroute from local cache or from a nearby nodenAfter a time-out, TCP sender transmits a packet on the newroute.However, the cached route has also broken after it wascachedtimeout dueto route failurenntimeout, cached timeout, second cachedroute is brokenroute also brokenAnother route discovery, and TCP time-out intervalProcess repeats until a good route is found93IssuesTo Cache or Not to CachenCaching can result in faster route “repair”nFaster does not necessarily mean correctnIf incorrect repairs occur often enough, cachingperforms poorlynNeed mechanisms for determining when cachedroutes are stale9447

Caching and TCP performancenCaching can reduce overhead of route discovery even ifcache accuracy is not very highnBut if cache accuracy is not high enough, gains inrouting overhead may be offset by loss of TCPperformance due to multiple time-outs95TCP PerformanceTwo factors result in degraded throughput in presence of mobility:nLoss of throughput that occurs while waiting for TCP sender totimeout (as seen earlier)nnThis factor can be mitigated by using explicit notifications and betterroute caching mechanismsPoor choice of congestion window and RTO values after a newroute has been foundnHow to choose cwnd and RTO after a route change?9648

IssuesWindow Size After Route RepairnSame as before route break: may be too optimisticnSame as startup: may be too conservativenBetter be conservative than overly optimisticnnnReset window to small value after route repairLet TCP figure out the suitable window sizeImpact low on paths with small delay-bw product97IssuesRTO After Route RepairnSame as before route breaknnSame as TCP start-up (6 second)nnnIf new route long, this RTO may be too small, leading to timeoutsMay be too largeMay result in slow response to next packet lossAnother plausible approach: new RTO function of old RTO, old route length,and new route lengthnnnExample: new RTO old RTO * new route length / old route lengthNot evaluated yetPitfall: RTT is not just a function of route length9849

Mobile Ad hoc NetworksV. Security IssuesSecurity Issues in Mobile Ad HocNetworksnNot much work in this area as yetnMany of the security issues are same as those intraditional wired networks and cellular wirelessnWhat’s new ?10050

What’s New ?nWireless medium is easy to snoop onnDue to ad hoc connectivity and mobility, it is hard toguarantee access to any particular node (for instance, toobtain a secret key)nEasier for trouble-makers to insert themselves into amobile ad hoc network (as compared to a wirednetwork)101Resurrecting DucklingnBattery exhaustion threat: A malicious node may interact with amobile node often with the goal of draining the mobile node’sbatterynAuthenticity: Who can a node talk to safely?nnResurrecting duckling: Analogy based on a duckling and its mother.Apparently, a duckling assumes that the first object it hears is the motherA mobile device will trust first device which sends a secret key10251

Secure RoutingnAttackers may inject erroneous routing informationnBy doing so, an attacker may be able to divert network traffic, ormake routing inefficientnSuggests use of digital signatures to protect routing informationand data bothnSuch schemes need a Certification Authority to manage theprivate-public keys103Secure RoutingnEstablishing a Certification Authority (CA) difficult in amobile ad hoc network, since the authority may not bereachable from all nodes at all timesnSuggests distributing the CA function over multiplenodes10452

MANET Authentication ArchitecturenDigital signatures to authenticate a messagenKey distribution via certificatesnNeed access to a certification authoritynSpecifies message formats to be used to carry signature, etc.105Techniques for Intrusion-Resistant AdHoc Routing Algorithms (TIARA)nFlow disruption attack: Intruder (or compromised) nodeT may delay/drop/corrupt all data passing through, butleave all routing traffic unmodifiedBCADTintruder10653

Techniques for Intrusion-Resistant AdHoc Routing Algorithms (TIARA)nResource Depletion Attack: Intruders may send datawith the objective of congesting a network or depletingbatteriesUBintruderCADTBogus trafficintruder107Intrusion DetectionnDetection of abnormal routing table updatesnnnSimilar abnormal behavior may be detected at other protocol layersnnnUses “training” data to determine characteristics of normal routing tableupdates (such as rate of change of routing info)Efficacy of this approach is not evaluated, and is debatableFor instance, at the MAC layer, normal behavior may be characterized foraccess patterns by various hostsAbnormal behavior may indicate intrusionSolutions proposed in [Zhang00Mobicom] are preliminary, notenough detail provided10854

Mobile Ad hoc Networks

2 Mobile Ad hoc Networks I. Introduction 4 Wireless Networks n Need: Access computing and communication services, on the move n Infrastructure-based Networks n traditional cellular systems (base station infrastructure) n Wireless LANs n typically radio links (802.11, etc), can be Infrared n very flexible within the reception area;