You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/323967539

Wireless Ad-Hoc Networks: Types, Applications, Security Goals

Conference Paper · March 2015

CITATIONS READS

0 12,750

1 author:

Ankur Bang
Sardar Vallabhbhai National Institute of Technology
9 PUBLICATIONS   56 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Ankur Bang on 23 March 2018.

The user has requested enhancement of the downloaded file.


International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015

Wireless Ad-Hoc Networks: Types, Applications,


Security Goals
Ms. Monika G. Ghorale, Prof. A. O. Bang
M.E CSE Scholar, Assistant Professor
Pankaj Laddhad Institute of Technology and Management Studies, Buldana- 443001 Maharashtra
monikaghorale38@gmail.com, mr.ankurbang@gmail.com

Abstract- This review paper focus on Wireless Ad communication technology to deal with the
Hoc networks where I took review of its types, unexpected conditions emerged. Ad hoc networks
applications and security goals. The concept of help to reduce administrative cost. Wireless ad hoc
dynamic mobility is also introduced in Ad Hoc network
network because nodes are moving from one place to
another place, within this network any node can join
the network and can leave the network at any time. A
wireless ad hoc network is a decentralized type of is a special structure of the wireless communication
wireless network. The network is ad hoc because it network, whose communication relies on their
does not rely on a pre existing infrastructure, such as cooperation among the nodes and achieves it in the
routers in wired networks or access points in manner of wireless multi-hop. Therefore, this kind of
managed (infrastructure) wireless networks. The network does not rely on any fixed infrastructure, and
decentralized nature of wireless ad-hoc networks has the properties of self-organizing and self-
makes them suitable for a variety of applications managing.
where central nodes can't be relied on and may
improve the scalability of networks compared to
wireless managed networks. Wireless Ad hoc
networks are networks in which communication links
are based on wireless technologies and the network
structure or topology is not pre-defined rather build
through dynamic network connectivity.

Keywords- AD-HOC Network, MANET, VANET,


WMN, WSN
Fig 1: Ad Hoc Network and Infrastructure
1. INTRODUCTION Network

Wireless networks can be classified in two types: - 2. TYPES


infrastructure network and infrastructure less (ad hoc) As we seen in introduction, classification of Wireless
networks. Infrastructure network consists of a networks are infrastructure network and infrastructure
network with fixed and wired gateways. Ad-hoc is a less (ad hoc) networks and According to their
Latin word, which means "for this or for this only." application types of Wireless ad hoc networks are:
An ad hoc network is made up of multiple “nodes”
connected by “links. Nodes can be the form of 2.1 Mobile Ad Hoc Network (MANET)
systems or devices i.e. mobile phone, laptop, personal A mobile ad-hoc network is a self-configuring
digital assistance, MP3 player and personal computer infrastructure less network of mobile devices
that are participating in the networks. An ad hoc connected by wireless links. Where no centralize
network typically refers to any set of networks where authority is available and all nodes are independently
all devices have equal status on a network and are free follow the routine of mobility. Due to absence of the
to associate with any other ad hoc network device in centralize authority the attacker easily join the
link range. Ad hoc network often refers to a mode of network and perform the malicious activity. Beyond
operation of IEEE 802.11 wireless networks. The this gap to overcome this fault or problem various
three common sub types of these networks are Mobile trust based security architecture are proposed for
Ad hoc Networks (MANETs), Wireless Sensor MANET. In general two types of communications can
Networks and Wireless Mesh Networks. Ad hoc be considered in classical MANETs, broadcast
networks have been proposed as an appealing communications and multihop communications via

128
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015

routing protocols. constraints, driver behavior, and high mobility,


VANETs exhibit characteristics that are dramatically
The mobile ad hoc network has typical features different from many generic MANETs.
namely Unreliability of wireless links between nodes
and constantly changing topology. Each device in a 2.1.1.2 Internet Based Mobile Ad-hoc Network
MANET is free to move independently in any (IMANET)
direction, and will therefore change its links to other Internet Based Mobile Ad-hoc Networks are ad hoc
devices frequently. Each must forward traffic networks that link mobile nodes and fixed Internet-
unrelated to its own use, and therefore be a router. gateway nodes. In such type of networks normal ad
The primary challenge in building a MANET is hoc routing algorithms don't apply directly. Internet
equipping each device to continuously maintain the Based Mobile Ad-hoc Networks are ad-hoc networks
information required to properly route traffic. Such that link mobile nodes and fixed Internet-gateway
networks may operate by themselves or may be nodes. In such type of networks normal ad hoc routing
connected to the larger Internet. The achievement of algorithms don't apply directly. Wireless networks can
MANET is hug growth of laptops and wireless or Wi- generally be classified as wireless fixed networks, and
Fi networking. wireless, or mobile ad-hoc networks. MANETs
(mobile ad-hoc networks) are based on the idea of
establishing a network without taking any support
from a centralized structure. By nature these types of
networks are suitable for situations where either no
fixed infrastructure exists, or to deploy one is not
possible.

2.1.1.3 Intelligent Vehicular Ad Hoc Network


(InVANET)
Intelligent Vehicular Ad-Hoc Network is a kind of
artificial intelligence that helps vehicles to behave in
intelligent manners during vehicle-to-vehicle
collisions, accidents, drunken driving etc. Intelligent
Vehicular Ad-Hoc Networking defines an intelligent
way of using Vehicular Networking. In VANET
integrates on multiple ad-hoc networking technologies
such as Wi-Fi IEEE 802.11, WAVE IEEE 1609,
Fig 2.1: Mobile Ad Hoc Network WiMAX, IEEE 802.16, Bluetooth, IRA, and ZigBee
for easy, accurate, effective and simple
2.1.1 Types of MANET communication between vehicles on dynamic
Mobile Ad Hoc Networks are further classified into mobility. Effective measures such as media
following three types: communication between vehicles can be enabled as
well methods to track the automotive vehicles are also
2.1.1.1 Vehicular Ad-hoc Network (VANET) preferred. InVANET helps in defining safety
Vehicular Ad hoc Network (VANET), a subclass of measures in vehicles, streaming communication
mobile Ad Hoc networks (MANETs). Vehicular Ad between vehicles, infotainment and telematics.
Hoc Networks is a class of special wireless ad hoc
network with the characteristics of high node mobility 2.2 Wireless Sensor Network (WSN)
and fast topology changes. A Vehicular Ad-Hoc A wireless sensor network (WSN) sometimes called a
Network is a technology that uses moving cars as wireless sensor and actor network (WSAN). WSN are
nodes in a network to create a mobile network. spatially distributed autonomous sensors to monitor
VANET turns every participating car into a wireless physical or environmental conditions, such as
router or node, allowing cars approximately 100 to temperature, sound, pressure, etc. and to
300 metres of each other to connect and, in turn, cooperatively pass their data through the network to a
create a network with a wide range. As cars fall out of main location. The more modern networks are bi-
the signal range and drop out of the network, other directional, also enabling control of sensor activity.
cars can join in, connecting vehicles to one another so The WSN is built of "nodes" – from a few to several
that a mobile Internet is created. It is a promising hundreds or even thousands, where each node is
approach for future intelligent transportation system connected to one (or sometimes several) sensors. Each
(ITS). These networks have no fixed infrastructure such sensor network node has typically several parts:
and instead rely on the vehicles themselves to provide a radio transceiver with an internal antenna or
network functionality. However, due to mobility connection to an external antenna, a microcontroller,

129
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015

an electronic circuit for interfacing with the sensors


and an energy source, usually a battery .
The development of wireless sensor networks was
motivated by military applications such as battlefield
surveillance; today such networks are used in many
industrial and consumer applications, such as
industrial process monitoring and control, machine
health monitoring, and so on. In computer science
and telecommunications, wireless sensor networks
are an active research area with numerous workshops
and conferences arranged each year, for example
IPSN, SenSys, and EWSN.

Fig 2.3: Wireless Mesh Network

3. APPLICATIONS

3.1 Applications of Mobile AdHoc Network


Some of the typical applications include:
Collaborative work: For some business environments,
the need for collaborative computing might be more
important outside office environments than inside and
Fig 2.2: Wireless Sensor Network2.3 Wireless Mesh where people do need to have outside meetings to
Network (WMN) cooperate and exchange information on a given
project.
A wireless mesh network (WMN) is a mesh network Military battlefield: Ad-Hoc networking would allow
created through the connection of wireless access the military to take advantage of commonplace
points installed at each network user's locale. A network technology to maintain an information
wireless mesh network (WMN) is a communications network between the soldiers, vehicles, and military
network made up of radio nodes organized in a mesh information head quarter. Local level: Ad-Hoc
topology. Wireless mesh networks often consist of networks can autonomously link an instant and
mesh clients, mesh routers and gateways. Well-known temporary multimedia network using notebook
examples of WMN are Laptops, cell phone and other computers to spread and share
wireless devices. The mesh routers forward traffic to
and from the gateways which may but need not
connect to the Internet. The coverage area of the radio information among participants at e.g. conference or
nodes working as a single network is sometimes classroom. Another appropriate local level application
called a mesh cloud. Access to this mesh cloud is might be in home networks where devices can
dependent on the radio nodes working in harmony communicate directly to exchange information.
with each other to create a radio network. Wireless Personal area network and Bluetooth : A personal area
mesh architecture is a first step towards providing cost network is a short range, localized network where
effective and dynamic high-bandwidth networks over nodes are usually associated with a given person.
a specific coverage area. Wireless mesh infrastructure Short-range MANET such as Bluetooth can simplify
is, in effect, a network of routers minus the cabling the inter communication between various mobile
between nodes. Wireless mesh networks can be devices such as a laptop, and a mobile phone.
implemented with various wireless technology Commercial Sector: Ad hoc can be used in
including 802.11, 802.15, 802.16, cellular emergency/rescue operations for disaster relief efforts,
technologies or combinations of more than one type. e.g. in fire, flood, or earthquake.

3.2 Applications of Wireless Sensor


Network
Area monitoring is a common application of WSNs.
In area monitoring, the WSN is deployed over a
region where some phenomenon is to be monitored. A
military example is the use of sensors to detect enemy
intrusion; a civilian example is the geo-fencing of gas

130
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015

or oil pipelines. networking is not only the Ad hoc network itself, but
the bridge it provides into other networks.
A disaster alert system that uses WSN and Analytic
Network Process (ANP) to predict any possible 1) Availability: Availability means the assets are
landslides disasters is proposed. In the authors accessible to authorized parties at appropriate times.
proposed a flashflood alerting system based on a Availability applies both to data and to services. It
WSN in a rural area. Regarding the work done for ensures the survivability of network service despite
post disaster scenarios, in the authors proposed a denial of service attack.
multi-agent system based WSN approach for crisis
management. In the authors evaluated using 2) Confidentiality: Confidentiality ensures that
autonomous mobile robots to deploy a WSN in a computer-related assets are accessed only by
disaster area. authorized parties. Protection of information which is
exchanging through a MANET. It should be protected
3.3 Applications of Wireless Mesh Network against any disclosure attack like eavesdropping-
Mesh networks may involve either fixed or mobile unauthorized reading of message.
devices. Due to their versatility, WMNs can
efficiently satisfy The needs of multiple applications. 3) Integrity: Integrity means that assets can be
The solutions are as diverse as communication needs, modified only by authorized parties or only in
for example in difficult environments such as authorized way.. Integrity assures that a message
emergency situations, tunnels, oil rigs, battlefield being transferred is never corrupted.
surveillance, high speed mobile video applications on
board public transport or real time racing car 4) Authentication: Authentication is essentially
telemetry. Some current applications: assurance that participants in communication are
authenticated and not impersonators. The recourses of
Electric meters now being deployed on residences network should be accessed by the authenticated
transfer their readings from one to another and nodes.
eventually to the central office for billing without the
need for human meter readers or the need to connect 5) Authorization: This property assigns different
the meters with cables. access rights to different types of users. For example a
network management can be performed by network
U.S. military forces are now using wireless mesh administrator only.
networking to connect their computers, mainly
ruggedized laptops, in field operations. 6) Non-repudiation: Non-repudiation will facilitate the
ability to identify the attackers even after the attack
The 66-satellite Iridium constellation operates as a happens. This prevents cheaters from denying their
mesh network, with wireless links between adjacent crimes. This ensures that the information originator
satellites. Calls between two satellite phones are cannot deny having sent the message.
routed through the mesh, from one satellite to another
across the constellation, without having to go through 5. CONCLUSION
an earth station.The laptops in the One Laptop per In this paper our main goal to make review of
Child program use wireless mesh networking to Wireless Ad Hoc networks where we study different
enable students to exchange files and get on the types of network namely MANET, WMN, WSN and
Internet even though they lack wired or cell phone or subtypes of MANET namely VANET, IMANET,
other physical connections in their area. InVANET. So the study of this network will be
helpful to understand Ad Hoc networks and its
4. SECURITY GOALS various application area and security goals.
Security is an essential requirement in Wireless ad
hoc networks as compared to wired networks. As we know wireless devices are getting more and
Security is an important issue for ad hoc networks, more popular in coming days. So in future we must
especially for those security-sensitive applications. have to concentrate on improving more effective and
Security in wireless network is becoming more and accurate communication of these networks.
more important while the using of mobile equipments
such as cellular phones or laptops is tremendously 6. ACKNOWLEDGMENTS
increasing. I would like to thank all those people who made this
review paper possible and an unforgettable experience
Security in MANETs is challenging task and difficult for me. I avail this opportunity to express my
to achieve as there is no central server and base gratitude and whole hearted thanks to Guide Prof. A.
station. In fact, the security hole provided by Ad hoc O. Bang, and also thank him for the systematic

131
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015

guidance and friendly advice during the review paper Position Paper, PAMPAS Workshop, Sept. 16/17
work. 2002.
[13] Bimal H Patel, Parth D Shah, Harikrishna B
I acknowledge my overwhelming gratitude and Jethva, Nishidh Chavda, “Issues and
respect to H.O.D., Prof. V. P. Narkhede and sincere Imperatives of Ad hoc
thanks and respect to Principal, Dr. P. M. Networks”, International Journal of
Jawandhiya who giving me support and Computer Applications (0975 – 8887)
encouragement whenever I was in need. Volume 62 – No.13, January 2013.

My thanks also goes to other staff members of AUTHORS:


Computer Science & Engineering Department, my
parents and my friends who are directly or indirectly
involved in my work. I am extremely grateful to all
the helping contribution for the successful completion
of this review paper.

REFERENCES
[1] S.Ganesan, B.Loganathan “A Survey of Ad-Hoc
Network: A Survey” International Journal of Miss. Monika G. Ghorale Student of First year M.E.
Computer Trends and Technology (IJCTT) – (Computer Science and Engineering) Pankaj Laddhad
volume 4 Issue 8– August 2013. Institute of Technology and Management Studies,
[2] K. Biswas and Md. Liaqat Ali, “Security threats Buldana. Sant Gadge Baba Amravati University. Has
in Mobile Ad-Hoc Network”, Master Thesis, earned degree of B.E (Computer Science and
Blekinge Institute of Technology” Sweden, 22nd Engineering) from Sant Gadge Baba Amravati
March 2007. University in 2014.
[3] M. Conti and S. Giordano. “Mobile Ad Hoc
Networking: Milestones, Challenges, and New
Research Directions” IEEE Communications
Magazine, Vol. 52, pp. 85-96. 2014.
[4] www.techoprdia.com/defination/14527/wireless
ssensor-Network-wmn, “Wireless sensor
network”.
[5] Pragya Singhal, Rakesh Kumar, “Analyzing Prof. A. O. Bang Assistant Professor and M.E. Co-
Misbehavior of Selfish Nodes in Mobile Ad hoc ordinator Computer Science and Engineering
Network”, International Journal of Computer Department, Pankaj laddhad Institute of technology
Applications (0975 – 8887) Volume 64 – No.3, and management studies, Buldana. Has earned M.E.
February 2013. (CSE) from Amravati University, Amravati and
[6] www.wikipedia.org/wik/Wireless-sensor- B.E.(CSE) From Amravati university, Amravati.
networks- “Wireless Sensor Network”.
[7] Sukumaran S, Venkatesh. J and Arunkorath, “A
Survey Of Methods to mitigate Selfishness in
Mobile Ad hoc Networks” IJICT, Vol 1, Issue
No. 2, June 2011.
[8] www.techoprdia.com/defination/14527/wirelesss
mesh-network-wmn,” Wireless mesh network”.
Engineering & Management, Vol. 11, January
2011.
[9] Senthilkumar P., Baskar M. and Saravanan K., “A
Study On Mobile Ad-Hock Networks
(MANETS)”, JMS, Vol. No.1,Issue No.1,
September 2011.
[10] D. A. McEntire, “Disaster Response and
Recovery”, Wiley. 2007.
[11] K. Biswas and Md. Liaqat Ali, “Security threats
in Mobile Ad-Hoc Network”, Master Thesis,
Blekinge Institute of Technology” Sweden,
22nd March 2007.
[12].V. Jani, “Security within Ad-Hoc Networks,”

132

View publication stats

You might also like