Ad Hoc Communication Networks

And Security

Submitted by:

G.Sri SumanthA.Srikanth Reddy

SIR CRR COLLEGE OF ENGG.,

ELURU.

Abstract:

Ad hoc networks are a new paradigm of wireless communication for mobile hosts (which we call nodes). In an ad hoc network, there is no fixed infrastructure such as base stations or mobile switching centers. Mobile nodes that are within each other’s radio range communicate directly via wireless links, while those that are far apart rely on other nodes to relay messages as routers. Node mobility in an ad hoc network causes frequent changes of the network topology. In this paper, we study what the ad hoc network is, and types of ad hoc network. The architecture of the ad hoc network and the protocols used are described in this paper.The main issue ad hoc network security has also described. Finally applications, advantages, and disadvantages are given.

What is ad hoc network?

Anad-hoc (or "spontaneous") network is a local area network or other small network, especially one with wireless or temporary plug-in connections, in which some of the network devices are part of the network only for the duration of a communications session or, in the case of mobile or portable devices, while in some close proximity to the rest of the network.

In Latin, ad hoc literally means "for this," further meaning "for this purpose only," and thus usually temporary. The term has been applied to future office or home networks in which new devices can be quickly added. using, for example, the proposed Bluetooth technology in which devices communicate with the computer and perhaps other devices using wireless transmission.

Key terms: ad hoc networks, types, architecture, protocols, applications.

Communication through Ad Hoc network:

An ad hoc network is a (possibly mobile) collection of communications devices (nodes) that wish to communicate, but have no fixed infrastructure available, and have no pre-determined organization of available links. Individual nodes are responsible for dynamically discovering which other nodes they can directly communicate with. A key assumption is that not all nodes can directly communicate with each other, so nodes are required to relay packets on behalf of other nodes in order to deliver data across the network. Thus the nodes in ad hoc form multihop radio network.

Fig. Ad hoc network representation

The nodes communicate with each other over wireless links. Each node in a wireless ad hoc network functions as both a host and a router, and the control of the network is distributed among the nodes. The network topology is in general dynamic, because the connectivity among the nodes may vary with time due to node departures, new node arrivals, and the possibility of having mobile nodes. There are no explicit links in an ad hoc network, and all communication is by broadcast.Devices may search for target nodes that are out of range by flooding the network with broadcasts that are forwarded by each node. Connections are possible over multiple nodes (multihop ad hoc network). Routing protocols then provide stable connections even if nodes are moving around.

Types of Wireless Ad Hoc Networks:

There are two major types of wireless ad hoc networks

  1. Mobile ad hoc networks
  2. Smart sensor networks.

Mobile ad hoc networks (MANETs):

A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes. The network scenarios such as establishing survivable, efficient, dynamic communication for emergency/rescue operations, disaster relief efforts, and military networks cannot rely on centralized and organized connectivity, and can be conceived as applications of MANETs.

Factors such as variable wireless link quality, propagation path loss, fading, multi-user interference, power expended, and topological changes affect performance and dependability of the network.

Requirements of MANET:

  • The design of network protocols regardless of the application. (A complex issue.)
  • Efficient distributed algorithms to determine network organization, link scheduling, and routing.
  • Determinination of viable routing paths and delivering messages in a decentralized environment where network topology fluctuates. (Which is not a well-defined problem?)
  • The network should be able to adaptively alter the routing paths to alleviate any of the above-mentioned effects.
  • Reservation of security, latency, reliability, intentional jamming, and recovery from failure.

Smart sensor networks:

A smart sensor network consists of a number of sensors spread across a geographical area. Each sensor has wireless communication capability and sufficient intelligence for signal processing and networking of the data. Some examples of smart sensor networks are the following:

  • Military sensor networks to detect enemy movements, the presence of hazardous material (such as poison gases or radiation), explosions, etc.
  • Environmental sensor networks (such as in plains or deserts or on mountains or ocean surfaces) to detect and monitor environmental changes.
  • Wireless surveillance sensor networks for providing security in a shopping mall, parking garage, or other facility.

Basic goals of a smart sensor network are to determine the value of some

Parameter at a given location, determine the occurrence of events of interest and estimate parameters of the detected event(s), detect an object and track the object.

Sensor network requirements:

  • Large number of (mostly stationary) sensors.
  • Low energy use.
  • Network self-organization.
  • Collaborative signal processing.
  • Querying ability.

ARCHITECTURE:

A set of layers and protocols is called network architecture.

Layered Approach:

To reduce design complexity networks are organized as series of levels called Layers. Ad hoc network is multi-layer containing physical layer, multiple access control layer (MAC), network layer, transport layer and application layer. Flat-routed and two-tired design approaches in ad hoc are discussed in sub-point Connectivity in ad hoc network.

Protocol:

Layer ‘n’ on one machine carries on a conversation with layer ‘n’ on another machine. The rules and conventions used in this conversation are collectively known as layer ‘n’ protocol. TCP/IP protocol is making universal service possible. It is used in Internetworks, Novell NetWare, APRANET etc. networks. But there are some problems using TCP/IP for ad hoc as TCP performs less predictable on wireless networks than the wired.

Two critical problems over wireless multi-hop are:

  • Conflicts between data packets and ACKs which causes TCP performance to degrade for window sizes greater than 1 packet.
  • The interaction between MAC and TCP layer backoff timers which cause severe unfairness and capture conditions.

Thus special protocols used for wireless, multi-hop ad hoc networks are Distance vector routing protocol (DVRP), Line state protocol, Dynamic source routing protocol, Destination sequence distance vector routing protocol (DSDVRP), Multicast routing protocol, zone routing protocol (ZRP) and Novel distributed routing protocol. These are discussed in protocol section with detail working of Novel distributed routing protocol.

Connectivity in Ad Hoc Network:

Basically, there are two approaches in providing ad-hoc network connectivity:

  1. Flat-routed network architectures.
  2. Hierarchical network architectures.

An example of a flat-routed network is shown in Figure 3 and that of a two-tiered hierarchical network in Figure 4.

Fig.3A flat-routed ad hoc network

In flat-routed networks, all the nodes are “equal” and the packet routing is done based on peer-to-peer connections, restricted only by the propagation conditions.

Fig.4 A two tiered ad hoc network

In hierarchical networks, there are at least two tiers; on the lower0 tier, nodes in geographical proximity create peer-to-peer networks. In each one of these lower-tier networks, at least one node is designated to serve as a "gateway” to the higher tier. These “gateway” nodes create the higher-tier network, which usually requires more powerful transmitters/receivers. Although routing between nodes that belong to the same lower-tier network is based on peer-to-peer routing, routing between nodes that belong to different lower-tier networks is through the gateway nodes

We note that the flat-routed networks are more suitable for the highly versatile communication environment as the RWN-s. The reason is that the maintenance of the hierarchies (and the associated cluster heads) is too costly in network.

Protocols:

Classification:

Protocols are broadly classified as

  1. Proactive protocols.
  2. Reactive protocols.

Proactive protocols:

These attempts to continuously evaluate the routes within the network, so that when a packet needs to be forwarded, the route is already known and can be immediately used. The advantage of the proactive schemes is that, once a route is requested, there is little delay until route is determined. Pure proactive schemes are not appropriate for the ad-hoc (e.g.RWN) environment, as they continuously use large portion of the network capacity to keep the routing information current. Since in an ad-hoc nodes move quite fast, and as the changes may be more frequent than the routing requests, most of this routing information is never used. This results in an excessive waste of the network capacity.

Reactive protocols:

These on the other hand, invoke the route determination procedures on demand only. Thus, when a route is needed, some sort of global search procedure is employed.

In reactive protocols, because route information may not be available at the time a routing request is received; the delay to determine a route can be quite significant. Because of this long delay, pure reactive routing protocols may not be applicable to real-time communication.

What is needed is a protocol that, on one hand, initiates the route determination procedure on demand, but with limited cost of the global search. The wired Internet uses routing protocols based on topological broadcast, such as the SPF. These protocols are not suitable for the RWN due to the relatively large bandwidth required for update messages.

Protocols used in ad-hoc networks:

The following routing protocols are generally used in ad hoc networks.

  • Distance vector RP.
  • Link state RP.
  • Dynamic source RP.
  • Novel distributed RP
  • Destination sequence distance vector RP.
  • Zone routing.
  • Multicast routing.

Distance-vector routing protocol:

In distance vector routing, each router maintains a table giving the distance from itself to all possible destinations. Each router periodically broadcasts this information to each of its neighbor routers, and uses the values received from its neighbors to compute updated values for its own table. By comparing the distances received for each destination from each of its neighbors, a router can determine which of its neighbors is the correct “next hop” on the shortest path toward each destination. The salient advantage of DVRP is the considerable reduction in the probability of loops in the calculated routes. The main disadvantage of DVRP for the RWN is in the fact that routing nodes constantly maintain full routing information in each network node, which was obtained at relatively high cost in wireless resources. Examples of distance vector routing protocols include the routing protocol used in the DARPA Packet Radio Network; the original routing protocol for the ARPANET; RIP (used in parts of the Internet, in Novell’s IPX, and in Xerox’s XNS); and RTMP (used in AppleTalk).

Link state routing protocol:

In this protocol each router maintains a complete picture of the topology of the entire network. Each router monitors the cost of the link to each of its neighbor routers, and periodically broadcasts an update of this information to all other routers in the network. Given this information of the cost of each link in the network, each router computes the shortest path to each possible destination. Examples of link state routing protocols include the “new” routing protocol that replaced the original protocol for the ARPANET, IS-IS (adopted by ISO as a standard routing protocol), and OSPF (used in parts of the Internet).

Dynamic source routing protocol:

It is a protocol for routing packets between wireless mobile hosts in an ad hoc network. Unlike routing protocols using distance vector or link state algorithms, this protocol uses dynamic source routing which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently. Here to send a packet to another host, the sender constructs a source route in the packet’s header, giving the address of each host in the network through which the packet should be forwarded in order to reach the destination host. The sender then transmits the packet over its wireless network interface to the first hop identified in the source route. When a host receives a packet, if this host is not the final destination of the packet, it simply transmits the packet to the next hop identified in the source route in the packet’s header. Once the packet reaches its final destination, the packet is delivered to the network layer software on that host. Dynamic source routing protocol utilizes flooding to discover a route to a destination. Optimization techniques, such as route caching reduce the route determination or maintenance overhead. In a highly dynamic environment, such as the RWN is, this type of protocols lead to a large delay and the techniques to reduce overhead may not perform well.

Protocol multicast routing protocol:

As ad-hoc networks are multi-hop wireless networks they use Multicast Routing Protocol. A multicast protocol builds upon a cluster based wireless network infrastructure. The multicast protocol is inspired by the Core Based Tree (CBT) scheme. Each multicast group has a unique multicast identifier (Mid). Each multicast address identifies a host group, the group of hosts that should receive a packet sent to that address. Each multicast group is initialized and maintained by a multicast server (MS) which becomes the core of the CBT for this multicast group. Initially the multicast server broadcasts the Mid and its own node id (MSid) using a flooding algorithm. When a node receives this information, it records the pair Mid and MSid into its multicast database which can be used to join or quit this multicast group. Alternatively to avoid flooding, the multicast server registers themed on a directory server. Any node which wants to join a particular multicast group can query the directory server. Future research directions include:

  • The dynamic relocation of the CORE
  • The extension of the Internet (or ATM) multicast tree solutions to the wireless segments and
  • QoS multicasting

DSDV protocol:

Destination sequence distance vector protocol is enhancement to the distance-vector Bellman-Ford routing protocol made to support ad hoc MHs. Because each MH periodically advertises its view of network topology, this scheme is inefficient. Similar to cluster based routing this scheme uses broadcast routing and connectionless and packet forwarding approach.

Zone routing protocol:

In this protocol routing in the RWN is based on the notion of a routing zone, which is defined for each node and includes the nodes whose distance (e.g., in hops) is at most some predefined number. This distance is referred to here as the zone radius. Each node is required to know the topology of the network within its routing zone only and nodes are updated about topological changes only within their routing zone. Thus, even though a network can be quite large, the updates are only locally propagated. Since for radius greater than 1 the routing zones heavily overlap, the routing tends to be extremely robust. The routes within the network are specified as a sequence of nodes separated by approximately the zone radius. The Route Discovery protocol is illustrated by an example shown in figure 5

:

Fig.5 An example of zone routing

Ad Hoc Network Security:

Ad hoc networks are a new paradigm of wireless communication for mobile hosts (which we call nodes).

In an ad hoc network, there is no fixed infrastructure such as base stations or mobile switching centers. Mobile nodes that are within each other’s radio range communicate directly via wireless links, while those that are far apart rely on other nodes to relay messages as routers. Node mobility in an ad hoc network causes frequent changes of the network topology. Fig shows such an example: initially, nodes A and D have a direct link between them. When D moves out of A’s radio range, the link is broken. However, the network is still connected, because A can reach D through C, E, and F. Military tactical operations are still the main application of ad hoc networks today. For example, military units (e.g., soldiers, tanks, or planes), equipped with wireless communication devices, could form an ad hoc network when they roam in a battlefield. Ad hoc networks can also be used for emergency, law enforcement, and rescue missions. Since an ad hoc network can be deployed rapidly with relatively low cost, it becomes an attractive option for commercial uses such as sensor networks or virtual classrooms.

Security goals:

Security is an important issue for ad hoc networks, especially for those security-sensitive applications. To

secure an ad hoc network, we consider the following attributes: availability, confidentiality, integrity, authentication, and non-repudiation.