You are on page 1of 5

BLDEA'S

V.P.DR.P.G.HALAKATTI. COLLEGE OF ENGG & TECH., BIJAPUR

“MOBILE AD-HOC NETWORK”


Submitted by: Amol Ganganawar (6th sem EC) USN: 2BL08EC002
(amole345@gmail.com)

Pradeep S Gabasavalagi (6th sem EC) USN: 2BL08EC045


(pradeep21sg@gmail.com)
Department of Electronics And Communication, DR.P.G.H.C.E.T, BIJAPUR

Abstract network may operate in a standalone fashion, or may be


connected to the larger Internet. The strength of the
As human being grown up from Stone Age to till now, connection can change rapidly in time or even disappear
communication is an indispensable part of his life in the completely. Nodes can appear, disappear and re-appear as the
society. So he invented many ways of communication like time goes on and all the time the network connections should
Kalidas used clouds to send his message. One of the work between the nodes that are part of it. As one can easily
modern ways of communication is Ad-hoc (MANET). Ad- imagine, the situation in ad hoc networks with respect to
hoc networks are an emerging area of mobile computing. ensuring connectivity and robustness is much more
Ad hoc networking is the basis of the future military demanding than in the wired case.
network-centric warfare architecture. Such networks are Ad hoc networks are the networks which are not
highly dynamic in nature. Strict requirements on security (necessarily) connected to any static (i.e. wired) infrastructure.
and reliability combined with the dynamic nature of the An ad-hoc network is a LAN or other small network,
network provide a strong motivation for self-forming, self- especially one with wireless connections, in which some of
configuring, and self-healing capabilities in the network. the network devices are part of the network only for the
This paper describes a policy-based mobile ad hoc duration of a communications session or, in the case of mobile
network management system that addresses these needs. or portable devices, while in some close proximity to the rest
The system provides the capability to express networking of the network. The ad hoc network is a communication
requirements in the form of policies at a high level and network without a pre-exist network infrastructure. In cellular
have them automatically realized in the network by networks, there is a network infrastructure represented by the
intelligent agents, working and applications of Manet in base-stations, Radio network controllers… etc. In ad hoc
various fields. We tried to cover all possible areas of networks every communication terminal (or radio terminal RT)
Manet. communicates with its partner to perform peer to peer
Communication. If the required RT is not a neighbour to the
Introduction initiated call RT (outside the coverage area of the RT) then the
other intermediate RTs are used to perform the
The word AD HOC is derived from Latin which means "for communication link. This is called multi-hope peer to peer
this and for this purpose only”. - It is a good and emblematic communication. This collaboration between the RTs is very
description of the idea why ad hoc networks are needed. They important in the ad hoc networks. In ad hoc networks all the
can be set up anywhere without any need for external communication network protocols should be distributed
infrastructure (like wires or base stations). They are often throughout the communication terminals (i.e. the
mobile and that's why a term MANET is often used when communication terminals should be independent and highly
talking about Mobile Ad hoc NETworks. MANETs are often cooperative). A MANET can be a standalone network or it can
defined as follows: A "mobile ad hoc network" (MANET) is be connected to external networks (Internet). MANETs are a
an autonomous system of mobile routers (and associated hosts) kind of wireless ad hoc networks that usually has a routable
connected by wireless links - the union of which forms an networking environment on top of a Link Layer ad hoc
arbitrary graph. The routers are free to move randomly and network. Unlike in Wi-Fi, every nodes in MANET acts as
organize themselves arbitrarily; thus, the network's wireless server in disguise.
topology may change rapidly and unpredictably. Such a
The mobile devices usually have limited storage and low
computational capabilities. They heavily depend on other
hosts and resources for data access and information processing.
A reliable network topology must be assured through efficient
and secure routing protocols for Ad Hoc networks.

Mechanisms required in a MANET

1. Multihop operation requires a routing mechanism


designed for mobile nodes.
2. Internet access mechanisms.
3. Self configuring networks require an address
allocation mechanism.
4. Mechanism to detect and act on, merging of existing
networks.
5. Security mechanisms.
Fig (a); A multi-hop wireless network for internet access.
Routing protocol requirements

Characteristics 1. Self starting and self organizing


2. Multi-hop, loop-free paths
Mobile Ad hoc Network (MANET) is a collection of 3. Dynamic topology maintenance
independent mobile nodes that can communicate to each other 4. Rapid convergence
via radio waves. The mobile nodes that are in radio range of 5. Minimal network traffic overhead
each other can directly communicate, whereas others needs 6. Scalable to large networks
the aid of intermediate nodes to route their packets. These
networks are fully distributed, and can work at any place Working of MANET
without the help of any infrastructure. This property makes IP-Layer Mobile Routing
these networks highly exible and robust.
The characteristics of these networks are summarized as An improved mobile routing capability at the IP layer can
follows: provide a benefit similar to the intention of the original
Internet, viz. "an interoperable internet working capability
•Communication via wireless means. over a heterogeneous networking infrastructure". In this case,
•Nodes can perform the roles of both hosts and routers. the infrastructure is wireless, rather than hardwired, consisting
•No centralized controller and infrastructure. Intrinsic mutual of multiple wireless technologies, channel access protocols,
trust. etc. Improved IP routing and related networking services
•Dynamic network topology. Frequent routing updates. provide the glue to preserve the integrity of the mobile
•Autonomous, no infrastructure needed. internetwork segment in this more dynamic environment. In
•Can be set up anywhere. other words, a real benefit to using IP-level routing in a
•Energy constraints MANET is to provide network-level consistency for multihop
• Limited security networks composed of nodes using a *mixture* of physical-
layer media; i.e. a mixture of what are commonly thought of
Generally, the communication terminals have a mobility as subnet technologies. A
nature which makes the topology of the distributed networks MANET node principally consists of a router, which may be
time varying. The dynamical nature of the network topology physically attached to multiple IP hosts (or IP-addressable
increases the challenges of the design of ad hoc networks. devices), which has potentially *multiple* wireless interfaces-
Each radio terminal is usually powered by energy limited -each interface using a *different* wireless technology. Thus,
power source (as rechargeable batteries). The power a MANET node with interfaces using technologies A and B
consumption of each radio terminal could be divided generally can communicate with any other MANET node possessing an
into three parts, power consumption for data processing inside interface with technology A or B. The multihop connectivity
the RT, power consumption to transmit its own information to of technology A forms a physical-layer multihop topology,
the destination, and finally the power consumption when the the multihop connectivity of technology B forms *another*
RT is used as a router, i.e. forwarding the information to physical-layer topology (which may differ from that of A's
another RT in the network. The energy consumption is a topology), and the *union* of these topologies forms another
critical issue in the design of the ad hoc networks. topology (in graph theoretic terms--a multigraph), termed the
"IP routing fabric", of the MANET. MANET nodes making the amount of route advertisement required for interoperation
routing decisions using the IP fabric can intercommunicate with the existing fixed Internet. For stub operation, routing
using either or both physical-layer topologies simultaneously. interoperability in the near term may be achieved using some
As new physical-layer technologies are developed, new device combination of mechanisms such as MANET-based any cast
drivers can be written and another physical-layer multihop and mobile IP. Future interoperability may be achieved using
topology can be seamlessly added to the IP fabric. Likewise, mechanisms other than mobile IP.
older technologies can easily be dropped. Such is the Interaction with Standard IP Routing will be greatly
functionality and architectural flexibility that IP-layer routing facilitated by usage of a common MANET addressing
can support, which brings with it hardware economies of scale. approach by all MANET routing protocols. Development of
such an approach is underway which permits routing through
a multi-technology fabric, permits multiple hosts per router
and ensures long-term interoperability through adherence to
the IP addressing architecture. Supporting these features
appears only to require identifying host and router interfaces
with IP addresses, identifying a router with a separate Router
ID, and permitting routers to have multiple wired and wireless
interfaces.

Network Security

Network security extends computer security, thus all the


Fig (b); A Wireless Ad Hoc Network. for Mobile Handheld Devices things in computer security are still valid, but there are other
things to consider as well. Computer security is defined as
follows:
The concept of a "node identifier" (separate and apart from the
concept of an "interface identifier") is crucial to supporting the
-Broadly speaking, security is keeping anyone from doing
multigraph topology of the routing fabric. It is what *unifies*
things you do not want them to do to, with, or from your
a set of wireless interfaces and identifies them as belonging to computers or any peripherals- -William R. Cheswick.
the same mobile platform. This approach permits maximum
flexibility in address assignment. Node identifiers are used at
Network securities are then computer security plus secure
the IP layer for routing computations. communication between the computers or other devices. Not
all nodes are computers in an Ad Hoc network, thus nodes
cannot be assumed to implement the security services
normally existent in computers' operating systems. That is
why network security should be defined as:

-Making sure that the nodes enforce a proper computer


security and then securing the communication between them-.

Different variables have different impact on security


issues and design. Especially environments, origin, range,
quality of service and security criticality are variables that
affect the security in the network.

If the environment is concerned, networks can operate in


Fig (c): Simple network for MANET systems.
hostile or friendly environments. A battlefield has totally
Interaction with Standard IP Routing different requirements for security if compared with home
networks. On a battlefield also physical security and durability
In the near term, it is currently envisioned that MANETs might be needed to ensure the functionality of the network.
will function as *stub* networks, meaning that all traffic
carried by MANET nodes will either be sourced or slinked The ways to implement security vary if the range of the
within the MANET. network varies. If the nodes are very far from each others, the
Because of bandwidth and possibly power constraints, risk of security attacks increases. On the other hand, if the
MANETs are not presently envisioned to function as *transit* nodes are so close to each others that they actually can have a
networks carrying traffic which enters and then leaves the physical contact, some secret information (e.g. secret keys)
MANET (although this restriction may be removed by can be transmitted between the nodes without sending them on
subsequent technology advances). This substantially reduces air. That would increase the level of security, because the
physical communication lines are more secure than wireless • These networks can be set up at any place and time.
communication lines. • These networks work without any pre-existing infrastructure.

Quality of service issues deal with questions like -Is it Limitations


crucial that all messages reach their destination?- or -Is it
crucial that some information reaches the destination in Some of the limitations of MANETs are:
certain time?-. QoS is generally demanded in real time
applications where reliable and deterministic communication • Limited resources, limited physical security.
is required. These issues refer to security e.g. in process • Intrinsic mutual trust vulnerable to attacks.
control applications. We could have an Ad Hoc network in • Lack of authorization facilities.
some process and all the measurements and control signals • Volatile network topology makes it hard to detect malicious
could be transmitted through the network. In order to have nodes.
secure and reliable control of the process, quality of service • Security protocols for wired networks cannot work for ad
requirements need to be met. hoc networks.
The last variable of Ad Hoc networks described with
respect to security is security criticality. This means that Application Areas
before we think of the ways to implement security, we must
consider carefully whether security is required at all or Some of the applications of MANETs are
whether it matters or not if someone outside can see what
packets are sent and what they contain. Is the network • Military or police exercises.
threatened if false packets are inserted and old packets are • Disaster relief operations.
retransmitted? Security issues are not always critical, but it • Mine site operations.
might cost a lot to ensure it. Sometimes there is trade-off • Urgent Business meetings
between security and costs. • Robot data acquisition

Security Problems in MANETs : It is easy to imagine a number of applications where this


type of properties would bring benefits. One interesting
MANETs are much more vulnerable to attack than wired research area is inter-vehicle communications. It is one area
network. This is because of the following reasons: where the ad hoc networks could really change the way we
communicate covering personal vehicles as well as
• Open Medium - Eavesdropping is easier than in wired professional mobile communication needs. Also, it is area
network. where no conventional (i.e. wired) solutions would do because
of the high level of mobility. When considering demanding
• Dynamically Changing Network Topology - Mobile Nodes surroundings, say mines for example, then neither would the
comes and goes from the network, thereby allowing any base station approach work but we must be able to accomplish
malicious node to join the network without being detected. routing via nodes that are part of the network i.e. we have to
use ad hoc network.
• Cooperative Algorithms - The routing algorithm of Such networks can be used to enable next generation of
MANETs requires mutual trust between nodes which violates battlefield applications envisioned by the military including
the principles of Network Security. situation awareness systems for manoeuvring war fighters,
and remotely deployed unmanned micro-sensor networks. Ad
• Lack of Centralized Monitoring - Absence of any centralized Hoc networks can provide communication for civilian
infrastructure prohibits any monitoring agent in the system. applications, such as disaster recovery and message exchanges
among medical and security personnel involved in rescue
• Lack of Clear Line of Defence - The only use of I line of missions.
defence - attack prevention may not sure. Experience of
security research in wired world has taught us that we need to
deploy layered security mechanisms because security is a Conclusion
process that is as secure as its weakest link. In addition to
prevention, we need II line of defence - detection and response. Ad hoc networks can be implemented using various
techniques like Bluetooth or WLAN for example. The
Advantages definition itself does not imply any restrictions to the
implementing devices.
The following are the advantages of MANETs: Ad Hoc networks need very specialized security methods.
There is no approach fitting all networks, because the nodes
• They provide access to information and services regardless can be any devices. The computer security in the nodes
of geographic position. depends on the type of node, and no assumptions on security
can be made. In this paper the computer security issues have
not been discussed, because the emphasis has been on network
security.
But with the current MAC layer and routing solutions the
true and working ad hoc network is just a dream for now.
However, it can be used with relatively small networks and
potentially some very nice applications can be realized.
Although some peer-to-peer type of solutions work nicely
already today, it would be nice to see that some new and
innovative solutions would be seen in the arena of ad hoc
networks since it is not hard for one to imagine a countless
number of nice ad hoc based applications that would make the
world at least a bit better place.

References:
1) http://user.it.uu.se/~henrikl/aodv/
2) http://www.ietf.org/html.charters/manet-charter.html
3) http://pf.itd.nrl.navy.mil/projects/olsr/
4) http://wikipedia.com
5) Routing Security in Ad Hoc Networks, Janne Lundberg,
Helsinki University of Technology
6) Security-Aware Ad-Hoc Routing for Wireless Networks,
Seung Yi, Prasad Naldurg, Robin Kravets, Department of
Computer Science.
7) Mitigating Routing Misbehaviour in Ad Hoc Networks,
8) Key Establishment in Ad Hoc Networks, Maarit Hietalahti,
Helsinki University of Technology.
9) Key Agreement in Dynamic Peer Groups, Michael Steiner,
Gene Tsudik, Michael Waidner, IEE Computer Society.
10) Mobile Ad Hoc Networking (MANET): Routing Protocol
Performance Issues and Evaluation Consideration, S. Corson,
J. Macker.
11) The Resurrecting Duckling: Security Issues for Wireless
Ad Hoc Mobile Networks. , F. Stajano and R. Anderson.
12) A Review of Current Routing Protocols for Ad Hoc
Mobile Wireless Networks, E. M. Royer and C.K. Toh .
13) The Dynamic Source Routing Protocol for Mobile Ad Hoc
Networks. J. Broch and D.B. Johnson
14) Ad Hoc On-Demand Distance Vector Routing Protocol.
C. E. Perkins and E. M. Royer.
15) The Zone Routing Protocol (ZRP) for Ad Hoc Networks,
Z. Haas and M. Pearlman.

You might also like