1 manets – an overview. 2 manets model and definitions simulatability – mobility models routing...

27
1 MANETS – An overview

Upload: geraldine-james

Post on 04-Jan-2016

218 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

1

MANETS – An overview

Page 2: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

2

MANETs

• Model and Definitions• Simulatability – mobility models• Routing algorithms• Security issues with routing algorithms• Tracing malicious faults• Multipath & Multichannel routing

Page 3: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

3

Model and Definitions

• Definition 1: Model of an ad hoc network

Let V be a finite state system with state space S. The elements of V are mobile nodes: -- each node is a probabilistic finite state machine A mobile ad hoc network is a random process: G = { (G1,S1), {(G2,S2), … … {(GT,ST) }

where the G1 = (V,Nt) are graphs with node set V and St S,

subject to the following constraints:

Page 4: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

4

Model and Definitions

• Markov constraint– given (Gt,St) the next state (Gt+1,St+1) is independent of

all previous states (G1,S!) … … (Gt-1,St-1)

• Mobility constraint– The transitional probabilities Pr [(Gt+1,St+1) | (Gt,St)] are

independent of time t. The distribution generated by these is called the

mobility distribution.

Page 5: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

5

Model and Definitions

• Medium constraint The communication medium is

– is promiscuous– has limited bandwidth– is bidirectional

Page 6: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

6

Model and Definitions

• Definition 2: Simulatability

G is simulatable if there is an efficient algorithm that simulates G , that is generates samples

(G*1,S*1), … , {(G*t,S*t)

such that Pr[(G*1,S*1), … , {(G*t,S*t)] = Pr[(G1,S1), … , {(Gt,St)]

Page 7: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

7

Model and Definitions

• Definition 3: Route

A route R(s,d) with source s and destination d is a list of nodes of G that start at s and end at d through

which packets are forwarded. The nodes need not know the list, not even their

successor on the list!

Page 8: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

8

Model and Definitions• Definition 3: Adversary

Let be a family of subsets V’ of V. We call an Adversary Structure. The adversary Adv = Adv selects a subset V’ of V

and can corrupt all its nodes during the lifetime of the system. These nodes are called corrupted or faulty. Adv is called a - adversary.

.

Page 9: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

9

Model and Definitions• Definition 3: Adversary -- continued

The adversary Adv may be passive or active. A passive adversary eavesdrops on the network communication. An active adversary uses the corrupted nodes to prevent the normal functioning of the network.

Page 10: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

10

Model and Definitions• Definition 3: Adversary -- continued

The Byzantine threats model

For this model = { V’ V | |V’| ≤ k } for some threshold k. In this case the adversary can corrupt up to k nodes.

Page 11: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

11

Mobility models

The Random Walk model• Nodes move in turns• Each node at the beginning of its turn selects at

random: – a value v for its velocity– a value for its direction, and– a value t for the duration of the turn.– Alternatively instead of t a value d for the distance to be

traveled is selected.Problem: Brownian motion

Page 12: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

12

Mobility models

The Random Waypoint model• An extension of the Random Walk model.• Each node at the beginning of its turn first moves to a new position selected at random in the unit square.Problem: This addresses the Brownian motion, but nowNodes congregate to the centre of the unit square.Solution: Wrap around the parallel edges of the square to get a torus: now nodes can cross over boundaries.

Page 13: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

13

Mobility models

The Random Waypoint model

Problem: There is an speed decay for the nodes.Solution: Use special distribution of nodes at start time, minimum speed and warm up period.

Problem: Abrupt changes in node direction at the beginning of turns.

Page 14: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

14

Mobility models

The Random Direction model• An extension of the Random Waypoint model.• Each node at the beginning of its turn first

– chooses

-- see the Notes for a more control between the deterministic and random movement of nodes

oldnew vvv

oldnew

Page 15: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

15

Mobility models

Group models

Group behavior is simulated by using a common reference point.As the reference point moves, the nodes move along with it.

Page 16: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

16

Mobility models

Nomadic group model

Nodes move randomly around the common reference point.

rrefposnew

Page 17: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

17

Mobility models

Target group model

The common reference point is used as a target.

rposrefaccpospos oldoldnew )(

Page 18: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

18

Mobility models

Hybrid modelsThe movement of the common reference point is simulated by using one of the first three non groupmodels.All these models are Markovian

Page 19: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

19

Mobility models

Ad Hoc Network simulators

Discussion on (and toy implementation?) of:– ns2– OPNETR modeler– GLoMoSim

Page 20: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

20

Routing algorithms

DefinitionRouting = ( Pathfinder, Communication )• Pathfinder is a distributive algorithm that takes as input G,

s,d and generates a path that links s,d. Path information xi

is then distributed to all nodes on the path– With source-centric* routing, the source gets the complete path (from

neighbor lists).– With network-centric* routing the path information is distributed

among the nodes of (as distance vectors).-----------------------------------See later for definitions

Page 21: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

21

Routing algorithms• Communication is a distributed algorithm on . On input data to s:

– s broadcasts pkt[s] = (header[s],data),– If xi s,d on receives pkt[xj], it verifies it, and if correct computes and broadcasts:

pkt[xj] = (header[xj],data).

– If d receives pkt[xk], it verifies it, and if correct outputs data.

header[x] contains information about the path known to x. From this information, and from the local path information distributed by Pathfinder, any neighbor y of x can determine whether it is on , and if so, it computes header[y] and broadcasts pkt[y]. Eventually, if s,d are linked in G, data will be delivered to the destination d.

Page 22: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

22

Routing algorithms

Definition• Routing is reliable if:

– when Adv is passive, on input G, s,d : any data input to s will be delivered to d.

• Routing will tolerate , if it is reliable in the presence of any active - adversary.

Page 23: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

23

Routing algorithms

Definition• Routing updates• Route settling

Page 24: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

24

Routing algorithms

Definition

There are two types of routing:• network-centric and• source-centric.

With network-centric routing the routing effort is distributed within the network –discussion on tables and vectors. With source-centric routing most of the effort is done by the source, with the other nodes restricted to relaying packets and usually making only minor checks.

Page 25: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

25

Routing algorithms• Discussion on basic source-centric routing algorithms:

– DSDV, AODV, WRP, etc (Tina Suen)• Discussion on basic network-centric routing

algorithms– DSR etc

Page 26: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

26

Security issues for routing algorithms

• From a security point of view network-centric routing requires substantial cooperation between nodes and strong trust relations. These algorithms are therefore more vulnerable to malicious faults

• Source centric routing lessens the dependency on node cooperation and therefore is less vulnerable to malicious attacks.

Page 27: 1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing

27

Security associations and PKIs• Crypto mechanisms are used to support the basic

security requirements for ad hoc networks.• Whether secret key or public key systems are used

security associations must be established between the nodes of the network.

• One way is to use an external PKI• Other ways to be discussed in class.