SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Mobile ad hoc networking: imperatives and challenges ImrichChlamtac, Marco Conti, Jennifer J.N. Liu Presenter: Tanzir Musabbir
Agendas Wireless networks Ad hoc networks Mobile ad hoc networks (MANET) MANET applications Enabling technologies Security issues Conclusions Questions
IP backbone Gateways Server Router Wireless networks Computer network that is wireless Infrastructure-based networks Less expensive to setup
Disadvantages Disaster areas  no infrastructure Large construction sites Too expensive Inconvenient Military operations Less time to setup
Solution??? Mobile ad hoc network Mobile ad hoc network (MANET), or simply ad hoc network, comprises nodesthatfreely and dynamically self-organizeintoarbitrary and temporary network topologywithoutany infrastructure support. (Chlamtac, Conti, and Liu, 2003)
MANET Formed by wireless hosts Without using pre-installed infrastructure Routes between hops may contain multiple hops Does not use centralized administration MANETs are often referred to as multihop wireless and hoc networks
Key Elements of MANETs Formed dynamically through independent nodes Nodes do not have any pre-specified nodes Make decision based on the current network situation Nodes are expected to behave as routers As routers, nodes must assist in discovery and maintenance of network routes
MANET applications Tactical Networks Military communication, operation Automated Battlefields Sensor Networks Home applications: allow users to manage home device locally and remotely Environment applications: tracking the movements of animals
MANET applications (continued) Emergency Services Replacement of a fixed infrastructure in case of earthquake, hurricanes Home and Enterprise Networking Shared whiteboard applications Use PDA to print anywhere Entertainment Multi-user games Robotic pets
Mobility Space divided into cells A base station is responsible to communicate with hosts in its cell Mobile hosts can change cells while communicating Hand-off occurs when a mobile host starts communicating via a new base station
MANET Architecture
MANET Research activities Based on its architecture, research activities are grouped into three main areas Enabling technologies Networking Middleware and application
Enabling Technologies Classification depends on networks coverage area Body (BAN) Personal (PAN) Local (LAN) Metropolitan (MAN) Wide (WAN)
Collision – Hidden-Station Problem A wishes to communicate with B.  However A cannot detect communication from C but can detect communication from B. C also wishes to communicate with B.  Again C cannot detect communication from A but can detect Communication from B. C is hidden from A and A is hidden from C. Both A and C transmit and their signals collide leading to loss of both packets.
Collision – Exposed-station Problem Nodes A, B, and C can all detect communications from one another.  However, Only C can detect communication from D. Node B wishes to send to Node A and Node C wishes to send to Node D. So Node B begins transmitting to Node A and Node C recognizes this.  The medium is in use so Node C can not transmit to Node D.   Even though both transmission requests could be made going in opposite directions, the transmission does not happen.  This is because Node C is exposed to Nodes A and B while D is not.
Research issues Energy conservation Network security and cooperation Simulation and performance evaluation Quality of service
Energy conservation Energy conservation Battery power is finite Limits services and applications that the network can support Solution Topology management – goal is to reduce overall network power consumption Routing protocols – minimize routing paths
Energy conservation (Continued)
Network Security - MANET Physically insecure network Network security requirements Confidentiality Authentication Integrity Non-repudiation Availability
Eavesdropping A B C Who has a radio receiver Same frequency used by the ad hoc network Man-in-the-middle attack
Impersonation - Security Attacks Nodes join to the network undetectably Black hole attack Malicious node uses the same routing protocol Advertise itself as having the shortest path Worm hole attack Create a tunnel(wormhole link) between two malicious nodes Captures wireless transmission from one end Sends them to the other end through that tunnel
Denial of Service - Security Attacks Attempts to create routes to non-existent node The attacker attempts to consume batteries of other nodes by requesting routes Forwards unnecessary packets Causes a system to be unavailability A violation of security policy
Disclosure Attack - Security Attacks Reveal the physical location of nodes Reveal the structure of the network Two security mechanisms are applied Preventive Detective Mechanisms are based on key-based cryptography Secret keys are distributed through a secure channel Public keys are distributed through certificates
Quality of Service - MANET Capability of network to provide better service Controls jitter and latency Manages and minimizes network congestion Sharps network traffic Sets network traffic priorities
Conclusion MANETs is challenging and promising system concepts Requires new type of architectures and protocols Popular research topic Open areas Secure routing protocol Quality of service Low power consumption
Questions
References I Chlamtac, M Conti, JJN Liu, "Mobile ad hoc networking: imperatives and challenges." Ad Hoc Networks, 1(1), pp. 13-64, 2003. http://cs.utsa.edu/faculty/boppana/6393/ www.ietf.org/html.charters/manet-charter.html http://www.antd.nist.gov/wahn_mahn.shtml

Weitere ähnliche Inhalte

Was ist angesagt?

Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile ComputingKABILESH RAMAR
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networksArunChokkalingam
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applicationsDeepshika Reddy
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) ArunChokkalingam
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 

Was ist angesagt? (20)

Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
MANET
MANETMANET
MANET
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
MANET
MANETMANET
MANET
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
 
Manet
ManetManet
Manet
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 

Andere mochten auch

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkTarun Varshney
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
IP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and FutureIP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and FutureJohn Loughney
 
My Final Project
My Final ProjectMy Final Project
My Final Projectaskkathir
 
P2P on the local network
P2P on the local networkP2P on the local network
P2P on the local networkPeter Elst
 
Preventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyPreventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyRumana Firdose
 
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksPacket-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksSwapnil Salunke
 
Nanosensor networks with electromagnetic wireless communication
Nanosensor networks with electromagnetic wireless communicationNanosensor networks with electromagnetic wireless communication
Nanosensor networks with electromagnetic wireless communicationajeesh28
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)Sri Safrina
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer SystemsUwe Schmidt
 

Andere mochten auch (20)

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
IP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and FutureIP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and Future
 
My Final Project
My Final ProjectMy Final Project
My Final Project
 
testbmr
testbmrtestbmr
testbmr
 
P2P on the local network
P2P on the local networkP2P on the local network
P2P on the local network
 
Preventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyPreventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptography
 
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksPacket-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
 
Nanosensor networks with electromagnetic wireless communication
Nanosensor networks with electromagnetic wireless communicationNanosensor networks with electromagnetic wireless communication
Nanosensor networks with electromagnetic wireless communication
 
Manet
ManetManet
Manet
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
Social Networking Site in JAVA
Social Networking Site in JAVASocial Networking Site in JAVA
Social Networking Site in JAVA
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 

Ähnlich wie Mobile ad hoc networking: imperatives and challenges

Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
An Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc NetworksAn Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc Networkseditor1knowledgecuddle
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 

Ähnlich wie Mobile ad hoc networking: imperatives and challenges (20)

Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
N0363079085
N0363079085N0363079085
N0363079085
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
An Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc NetworksAn Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc Networks
 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
1705 1708
1705 17081705 1708
1705 1708
 
1705 1708
1705 17081705 1708
1705 1708
 

Mobile ad hoc networking: imperatives and challenges

  • 1. Mobile ad hoc networking: imperatives and challenges ImrichChlamtac, Marco Conti, Jennifer J.N. Liu Presenter: Tanzir Musabbir
  • 2. Agendas Wireless networks Ad hoc networks Mobile ad hoc networks (MANET) MANET applications Enabling technologies Security issues Conclusions Questions
  • 3. IP backbone Gateways Server Router Wireless networks Computer network that is wireless Infrastructure-based networks Less expensive to setup
  • 4. Disadvantages Disaster areas no infrastructure Large construction sites Too expensive Inconvenient Military operations Less time to setup
  • 5. Solution??? Mobile ad hoc network Mobile ad hoc network (MANET), or simply ad hoc network, comprises nodesthatfreely and dynamically self-organizeintoarbitrary and temporary network topologywithoutany infrastructure support. (Chlamtac, Conti, and Liu, 2003)
  • 6. MANET Formed by wireless hosts Without using pre-installed infrastructure Routes between hops may contain multiple hops Does not use centralized administration MANETs are often referred to as multihop wireless and hoc networks
  • 7. Key Elements of MANETs Formed dynamically through independent nodes Nodes do not have any pre-specified nodes Make decision based on the current network situation Nodes are expected to behave as routers As routers, nodes must assist in discovery and maintenance of network routes
  • 8. MANET applications Tactical Networks Military communication, operation Automated Battlefields Sensor Networks Home applications: allow users to manage home device locally and remotely Environment applications: tracking the movements of animals
  • 9. MANET applications (continued) Emergency Services Replacement of a fixed infrastructure in case of earthquake, hurricanes Home and Enterprise Networking Shared whiteboard applications Use PDA to print anywhere Entertainment Multi-user games Robotic pets
  • 10. Mobility Space divided into cells A base station is responsible to communicate with hosts in its cell Mobile hosts can change cells while communicating Hand-off occurs when a mobile host starts communicating via a new base station
  • 12. MANET Research activities Based on its architecture, research activities are grouped into three main areas Enabling technologies Networking Middleware and application
  • 13. Enabling Technologies Classification depends on networks coverage area Body (BAN) Personal (PAN) Local (LAN) Metropolitan (MAN) Wide (WAN)
  • 14. Collision – Hidden-Station Problem A wishes to communicate with B. However A cannot detect communication from C but can detect communication from B. C also wishes to communicate with B. Again C cannot detect communication from A but can detect Communication from B. C is hidden from A and A is hidden from C. Both A and C transmit and their signals collide leading to loss of both packets.
  • 15. Collision – Exposed-station Problem Nodes A, B, and C can all detect communications from one another. However, Only C can detect communication from D. Node B wishes to send to Node A and Node C wishes to send to Node D. So Node B begins transmitting to Node A and Node C recognizes this. The medium is in use so Node C can not transmit to Node D. Even though both transmission requests could be made going in opposite directions, the transmission does not happen. This is because Node C is exposed to Nodes A and B while D is not.
  • 16. Research issues Energy conservation Network security and cooperation Simulation and performance evaluation Quality of service
  • 17. Energy conservation Energy conservation Battery power is finite Limits services and applications that the network can support Solution Topology management – goal is to reduce overall network power consumption Routing protocols – minimize routing paths
  • 19. Network Security - MANET Physically insecure network Network security requirements Confidentiality Authentication Integrity Non-repudiation Availability
  • 20. Eavesdropping A B C Who has a radio receiver Same frequency used by the ad hoc network Man-in-the-middle attack
  • 21. Impersonation - Security Attacks Nodes join to the network undetectably Black hole attack Malicious node uses the same routing protocol Advertise itself as having the shortest path Worm hole attack Create a tunnel(wormhole link) between two malicious nodes Captures wireless transmission from one end Sends them to the other end through that tunnel
  • 22. Denial of Service - Security Attacks Attempts to create routes to non-existent node The attacker attempts to consume batteries of other nodes by requesting routes Forwards unnecessary packets Causes a system to be unavailability A violation of security policy
  • 23. Disclosure Attack - Security Attacks Reveal the physical location of nodes Reveal the structure of the network Two security mechanisms are applied Preventive Detective Mechanisms are based on key-based cryptography Secret keys are distributed through a secure channel Public keys are distributed through certificates
  • 24. Quality of Service - MANET Capability of network to provide better service Controls jitter and latency Manages and minimizes network congestion Sharps network traffic Sets network traffic priorities
  • 25. Conclusion MANETs is challenging and promising system concepts Requires new type of architectures and protocols Popular research topic Open areas Secure routing protocol Quality of service Low power consumption
  • 27. References I Chlamtac, M Conti, JJN Liu, "Mobile ad hoc networking: imperatives and challenges." Ad Hoc Networks, 1(1), pp. 13-64, 2003. http://cs.utsa.edu/faculty/boppana/6393/ www.ietf.org/html.charters/manet-charter.html http://www.antd.nist.gov/wahn_mahn.shtml