Module 4 (1)
Module 4 (1)
Explain about issues in designing of a transport layer protocol used for Ad-hoc wireless
network
Induced traffic: Unlike wired networks, ad hoc wireless networks utilize multi-hop radio relaying.
A link-level transmission affects the neighbour nodes of both the sender and receiver of the link. In
a path having multiple links, transmission at a particular link affects one upstream link and one
downstream link. This traffic at any given link (or path) due to the traffic through neighbouring
links (or paths) is referred to as induced traffic.
Induced throughput unfairness: This refers to the throughput unfairness at the transport layer due
to the throughput/delay unfairness existing at the lower layers such as the network and MAC layers.
Separation of congestion control, reliability, and flow control: A transport layer protocol can
provide better performance if end-to-end reliability, flow control, and congestion control are
handled separately. Reliability and flow control are end-to-end activities, whereas congestion can at
times be a local activity.
Power and bandwidth constraints: Nodes in ad hoc wireless networks face resource constraints
including the two most important resources: (i) power source and (ii) bandwidth. The performance
of a transport layer protocol is significantly affected by these constraints.
Misinterpretation of congestion: Traditional mechanisms of detecting congestion in networks,
such as packet loss and retransmission timeout, are not suitable for detecting the network
congestion in ad hoc wireless networks. This is because the high error rates of wireless channel,
location-dependent contention, hidden terminal problem, packet collisions in the network, path
breaks due to the mobility of nodes, and node failure due to a drained battery can also lead to packet
loss in ad hoc wireless networks.
Completely decoupled transport layer: Another challenge faced by a transport layer protocol is
the interaction with the lower layers. Wired network transport layer protocols are almost completely
decoupled from the lower layers. In ad hoc wireless networks, the cross-layer interaction between
the transport layer and lower layers such as the network layer and the MAC layer is important for
the transport layer to adapt to the changing network environment.
Dynamic topology: Some of the deployment scenarios of ad hoc wireless networks experience
rapidly changing network topology due to the mobility of nodes. This can lead to frequent path
breaks, partitioning and emerging of networks, and high delay in re-establishment of paths. Hence,
the performance of a transport layer protocol is significantly affected by the rapid changes in the
network topology.
2. Explain about design goals of transport layer protocol for AD HOC wireless networks
The following are the important goals to be met while designing a transport layer protocol for ad
hoc wireless networks:
• The protocol should maximize the throughput per connection.
• It should provide throughput fairness across contending flows.
• The protocol should incur minimum connection setup and connection maintenance overheads. It
should minimize the resource requirements for setting up and maintaining the connection in order to
make the protocol scalable in large networks.
• The transport layer protocol should have mechanisms for congestion control and flow control in
the network.
• It should be able to provide both reliable and unreliable connections as per the requirements of the
application layer.
• The protocol should be able to adapt to the dynamics of the network such as the rapid change in
topology and changes in the nature of wireless links from uni-directional to bidirectional or vice
versa.
• One of the important resources, the available bandwidth, must be used efficiently.
• The protocol should be aware of resource constraints such as battery power and buffer sizes and
make efficient use of them.
• The transport layer protocol should make use of information from the lower layers in the protocol
stack for improving the network throughput.
• It should have a well-defined cross-layer interaction framework for effective, scalable, and
protocol-independent interaction with lower layers.
• The protocol should maintain end-to-end semantics.
3.Explain the classification of ad hoc network protocols defined for transport layer.
5. Uni-Directional Paths
• Overhead in Acknowledgments: TCP relies on end-to-end acknowledgments for reliability.
In ad hoc networks, this results in significant bandwidth consumption and additional
overhead for reverse-path communication.
• Result: Reduced efficiency and throughput.
6. Multipath Routing
• Packet Reordering: Ad hoc networks may use multipath routing, leading to out-of-order
packet delivery.
• Consequence: TCP misinterprets out-of-order packets as packet loss, invoking congestion
control unnecessarily.
7. Network Partitioning and Merging
• Node Mobility: Frequent network partitions and mergers disrupt established paths.
• Outcome: TCP interprets these disruptions as network issues, triggering unnecessary
retransmissions.
10. Explain issues and challenges in security provisioning in AD HOC wireless networks
Shared broadcast radio channel: Unlike in wired networks where a separate dedicated
transmission line can be provided between a pair of end users, the radio channel used for
communication in ad hoc wireless networks is broadcast in nature and is shared by all nodes in the
network. Data transmitted by a node is received by all nodes within its direct transmission range. So
a malicious node could easily obtain data being transmitted in the network. This problem can be
minimized to a certain extent by using directional antennas.
• Insecure operational environment: The operating environments where ad hoc wireless networks
are used may not always be secure. One important application of such networks is in battlefields. In
such applications, nodes may move in and out of hostile and insecure enemy territory, where they
would be highly vulnerable to security attacks.
• Lack of central authority: In wired networks and infrastructure-based wireless networks, it
would be possible to monitor the traffic on the network through certain important central points
(such as routers, base stations, and access points) and implement security mechanisms at such
points. Since ad hoc wireless networks do not have any such central points, these mechanisms
cannot be applied in ad hoc wireless networks.
• Lack of association: Since these networks are dynamic in nature, a node can join or leave the
network at any point of the time. If no proper authentication mechanism is used for associating
nodes with a network, an intruder would be able to join into the network quite easily and carry out
his/her attacks.
• Limited resource availability: Resources such as bandwidth, battery power, and computational
power (to a certain extent) are scarce in ad hoc wireless networks. Hence, it is difficult to
implement complex cryptography-based security mechanisms in such networks.
• Physical vulnerability: Nodes in these networks are usually compact and hand-held in nature.
They could get damaged easily and are also vulnerable to theft.
11. Explain the classification of the different types of attacks possible in ad hoc wireless
networks
1. Passive Attacks
2. Active Attacks
These attacks disrupt the normal functioning of the network by modifying, fabricating, or
destroying packets. These are of 2 types
• External Attacks: Originating from nodes outside the network.
• Internal Attacks: Carried out by compromised or malicious nodes within the
network, making them more difficult to detect and mitigate.
3. Network Layer Attacks: This section lists and gives brief descriptions of the attacks pertaining
to the network layer in the network protocol stack.
• Wormhole attack: In this attack, an attacker receives packets at one location in the network
and tunnels them (possibly selectively) to another location in the network, where the packets
are resent into the network. This tunnel between two colluding attackers is referred to as a
wormhole.
• Blackhole attack: In this attack, a malicious node falsely advertises good paths (e.g.,
shortest path or most stable path) to the destination node during the path-finding process (in
on-demand routing protocols) or in the route update messages (in table-driven routing
protocols). The intention of the malicious node could be to hinder the path-finding process
or to intercept all data packets being sent to the destination node concerned.
• Byzantine attack: Here, a compromised intermediate node or a set of compromised
intermediate nodes works in collusion and carries out attacks such as creating routing loops,
routing packets on non-optimal paths, and selectively dropping packets. Byzantine failures
are hard to detect.
• Information disclosure: A compromised node may leak confidential or important
information to unauthorized nodes in the network. Such information may include
information regarding the network topology, geographic location of nodes, or optimal routes
to authorized nodes in the network.
• Resource consumption attack: In this attack, a malicious node tries to consume/waste
away resources of other nodes present in the network. The resources that are targeted are
battery power, bandwidth, and computational power, which are only limitedly available in
ad hoc wireless networks. The attacks could be in the form of unnecessary requests for
routes, very frequent generation of beacon packets, or forwarding of stale packets to nodes.
12. With example explain wormhole attack & black-hole attack, routing attack in Ad Hoc
networks
1. Wormhole Attack
• In a wormhole attack, two malicious nodes create a high-speed, low-latency link (a "tunnel")
between them in the network.
• They intercept packets at one location and replay them at another, often bypassing legitimate
routes.
• This disrupts routing as other nodes might mistakenly choose this shortcut, thinking it's the
optimal path.
Example:
1. Consider a network with nodes A, B, C, D, E and F.
2. Malicious nodes M1 and M2 establish a wormhole tunnel between each other.
3. M1 captures a route request (RREQ) from A to F and forwards it through the tunnel to M2
4. M2 replays the RREQ near F, making the route A→M1→M2→F appear shorter.
5. Nodes use this route, allowing M1 and M2 to intercept, drop, or manipulate data packets.
2. Blackhole Attack
• A blackhole attack involves a malicious node falsely advertising itself as having the shortest
or most optimal path to a destination.
• Once it becomes part of the route, it drops or alters packets instead of forwarding them.
Example:
1. Nodes A, B, C, D and E are part of a network.
2. Malicious node M broadcasts that it has the shortest path to destination D, even though it
doesn’t.
3. Node A sends data via the route A→M→D
4. M drops all packets instead of forwarding them to D.
3. Routing Attack
• Routing attacks target the routing protocol to disrupt the normal operation of the network.
Examples include Routing Table Overflow and Routing Table Poisoning.
13. With example explain Byzantine attack & information disclosure, resource consumption
attack in Ad Hoc networks
1. Byzantine Attack
A Byzantine attack is carried out by one or more compromised nodes in the network. These nodes
collude to disrupt routing by creating loops, dropping packets, or forwarding them along non-
optimal paths.
Example:
1. Consider a network with nodes A, B, C, D and E.
2. Nodes C and D are compromised and work together to disrupt the network.
3. When A sends data to E, C and D collude to:
• Create routing loops (e.g., A→B→C→D→C).
• Selectively drop data packets while forwarding control messages to appear normal.
• Route data through unnecessarily long paths (e.g., A→B→C→D→E)
2. Information Disclosure
• In an information disclosure attack, a malicious or compromised node leaks sensitive
information about the network, such as:
• Network topology.
• Node locations.
• Routing paths.
Example:
1. In a battlefield communication network, node M is compromised.
2. M observes and transmits:
• The locations of command nodes.
• Optimal routes used for secure communication.
• Active node connections.
3. The leaked information helps adversaries to plan targeted attacks, such as selectively
jamming communication between critical nodes.
Example:
1. Nodes A, B, C, D and E form an ad hoc network.
2. Malicious node M:
• Floods the network with fake route requests (RREQs), causing legitimate nodes to
process them unnecessarily.
• Sends frequent beacon messages, consuming bandwidth and battery of neighbouring
nodes.
• Resends stale packets to increase congestion.
Repudiation
Repudiation occurs when a node denies performing an action such as sending or receiving data,
making it challenging to trace or verify malicious activity. This can disrupt accountability in the
network. Techniques like digital signatures and logging mechanisms can mitigate repudiation
issues.
Denial of Service (DoS)
A DoS attack involves overwhelming a node or the entire network with excessive traffic, making
resources unavailable to legitimate users. This could include flooding the network with route
requests or excessive data packets. It results in resource depletion and network downtime.
Jamming
Jamming is a physical layer attack where an adversary disrupts communication by emitting radio
signals on the same frequency as the network. This interference prevents nodes from sending or
receiving data, causing a complete communication breakdown. Anti-jamming techniques like
frequency hopping can help mitigate this threat.
16. Explain the active attack with the passive attacks in ad hoc networks
Active Attacks
An active attack involves a malicious node that tries to disrupt or alter the normal
functioning of the network. These attacks typically interfere with data transmission, corrupt packets,
or consume network resources, causing direct damage to the system. Active attacks can be easily
detected by monitoring the network for irregularities. Examples include:
1. Denial of Service (DoS): An attacker floods the network with excessive traffic, causing
nodes to become overloaded and making resources unavailable for legitimate users.
2. Blackhole Attack: A malicious node advertises itself as having the best route and then drops
the packets that it receives, preventing delivery to the destination.
3. Wormhole Attack: Two colluding malicious nodes create a tunnel between them, allowing
them to forward packets and disrupt routing protocols.
4. Routing Table Poisoning: A malicious node sends false routing information to nodes,
causing them to route data along incorrect paths.
Passive Attacks
In a passive attack, the attacker monitors and listens to the communication in the network
without altering the data or affecting the normal operation. These attacks focus on gaining
unauthorized access to confidential information, such as encryption keys or private communication.
Passive attacks are harder to detect because they don't disrupt the network's operations. Examples
include:
1. Eavesdropping: The attacker intercepts and listens to the communication between nodes to
gather sensitive information such as passwords, encryption keys, or data content.
2. Traffic Analysis: By observing traffic patterns, an attacker can infer information about
network structure, node activities, or even the types of data being exchanged.
3. Information Disclosure: Malicious nodes might leak sensitive network information, such as
routing paths or node locations, which can be used for further attacks.