UNIT 3 (1)
UNIT 3 (1)
UNIT – IV
Unit - IV
MOBILE AD-HOC NETWORKS
Dijkstra’s
Link State Algorithm
Received IP Routing
Database
LSAs Table
A 1 B 1 C
Dest. Next Metri Seq Dest. Next Metri Seq Dest. Next Metric Seq.
A A c 0 A-550 A A c 1 A-550 A B 2 A-550
B B 1 B-102 B B 0 B-102 B B 1 B-102
C B 2 C-588 C C 1 C-588 C C 0 C-588
DSDV (Respond to Topology Changes)
Immediate advertisements
Information on new Routes, broken Links, metric
change is immediately propagated to neighbors.
Full/Incremental Update:
Full Update: Send all routing information from own
table.
Incremental Update: Send only entries that has
changed. (Make it fit into one single packet)
DSDV (New Node)
2. Insert entry for D with sequence
number D-000
Then immediately broadcast own
table 1. D broadcast for first time
Send Sequence number D-000
(D, 0, D-000)
A B C D
Dest. Next Metri Seq. Dest. Next Metri Seq. Dest. Next Metri Seq.
A A c 0 A-550 A A c 1 A-550 A B c 2 A-550
B B 1 B-104 B B 0 B-104 B B 1 B-104
C B 2 C-590 C C 1 C-590 C C 0 C-590
D D 1 D-000
DSDV (New Node cont.)
3. C increases its sequence
number to C-592 then
4. B gets this new information broadcasts its new table.
and updates its table…….
A B C D
Dest. Next Metri Seq. Dest. Next Metri Seq. Dest. Next Metri Seq.
A A c 0 A-550 A A c 1 A-550 A B c 2 A-550
B B 1 B-104 B B 0 B-102 B B 1 B-102
C B 2 C-590 C C 1 C-592 C C 0 C-592
D C 2 D-000 D D 1 D-000
DSDV (No loops, No count to infinity)
2. B does its broadcast
-> no affect on C (C knows that B
has stale information because C has
higher seq. number for destination
D) 1. Node C detects broken Link:
-> no loop -> no count to infinity -> Increase Seq. Nr. by 1
(only case where not the destination
sets the sequence number -> odd
number)
(D, 2, D-100) (D, 2, D-100)
A B C D
Dest. Next Metri Seq. Dest. Next Metri Seq. Dest. Next Metri Seq.
… … c… c… … c… … … c…
D B 3 D-100 D C 2 D-100 D D D-101
DSDV (Immediate Advertisement)
3. Immediate propagation 2. Immediate propagation
B to A: C to B:
(update information has higher (update information has higher
Seq. Nr. -> replace table entry) Seq. Nr. -> replace table entry)
1. Node C detects broken Link:
-> Increase Seq. Nr. by 1
(only case where not the destination
sets the sequence number -> odd
number)
(D, , D-101) (D, , D-101)
A B C D
Dest. Next Metri Seq. Dest. Next Metri Seq. Dest. Next Metri Seq.
… … c… ... c… … c… ... … … c…
D
D B
B 4
3 D-100
D-100 D
D C
C 3
2 D-100
D-100 D
D B
D 1
1 D-100
D-100
D B D-101 D C D-101 D D D-101
DSDV (Problem of Fluctuations)
What are Fluctuations
Entry for D in A: [D, Q, 14, D-100]
A D makes Broadcast with Seq. Nr. D-102
P Q
A receives from P Update (D, 15, D-102)
-> Entry for D in A: [D, P, 15, D-102]
A must propagate this route immediately.
11 10 A receives from Q Update (D, 14, D-102)
Hops Hops -> Entry for D in A: [D, Q, 14, D-102]
A must propagate this route immediately.
This can happen every time D or any other
(D,0,D- node does its broadcast and lead to
102)
D unnecessary route advertisements in the
network, so called fluctuations.
DSDV (Damping Fluctuations)
How to damp fluctuations
Record last and avg. Settling Time of every
A
P
Route in a separate table. (Stable Data)
Q
Settling Time = Time between arrival of
first route and the best route with a given
seq. nr.
11 10 A still must update his routing table on the
Hops Hops
first arrival of a route with a newer seq. nr.,
but he can wait to advertising it. Time to
wait is proposed to be 2*(avg. Settling
(D,0,D- Time).
102)
D
Like this fluctuations in larger networks
can be damped to avoid unnecessary
advertisement, thus saving bandwidth.
DSR General
Route discovery
Is the mechanism by which a source
node S, obtains a route to a destination D
Used only when S attempt to send a
packet to D and does not already knows
a route to D
DSR General
Route maintainance
Is the mechanism by which source node S is
able to detect if the network topology has
changed and can no longer use its route to D
If S knows another route to D, use it
Else invoke route discovery process again to
find a new route
Used only when S wants to send a packet to D
DSR General
D S Source node
D Destination node
Z Id=2, {S, Y}
W Z Neighbor nodes
Id=2, {S, W}
V
RREQ packet
W
Y
Id=2, {S} U
S Id=2, {S, Y}
The source
Removes from the routing table the broken route
Retransmission of the original packet is a function of upper
layers (e.g. TCP)
It searches the routing table for another route, or start a
new Route Discovery process
(DSR) Basic Route Maintenance
S Source node
Route Table U
S
D: S, W, Z, D
V: S, Y, V
AODV Overview
AODV is a packet routing protocol designed for use in
mobile ad hoc networks (MANET)
Intended for networks that may contain thousands of
nodes
One of a class of demand-driven protocols
The route discovery mechanism is invoked only if a
route to a destination is not known
UDP is the transport layer protocol
Source, destination and next hop are addressed using IP
addressing
Each node maintains a routing table that contains
information about reaching destination nodes.
Each entry is keyed to a destination node.
AODV Overview
Routing table size is minimized by only including next
hop information, not the entire route to a destination
node.
Sequence numbers for both destination and source are
used.
Managing the sequence number is the key to efficient
routing and route maintenance
Sequence numbers are used to indicate the relative
freshness of routing information
Updated by an originating node, e.g., at initiation of
route discovery or a route reply.
Observed by other nodes to determine freshness.
AODV Overview
B?
B?
B?
B?
B?
B? B?
B
AODV Operation – Message Types
RREP Messages
When a RREQ reaches a destination node, the
destination route is made available by unicasting a RREP
back to the source route.
A node generates a RREP if:
It is itself the destination.
It has an active route to the destination. Ex: an
intermediate node may also respond with an RREP if
it has a “fresh enough” route to the destination.
As the RREP propagates back to the source node,
intermediate nodes update their routing tables (in the
direction of the destination node).
RREP Message
A
A
A
A
A
A
A
B
AODV Operation – Message Types
RERR Messages
This message is broadcast for broken links
Generated directly by a node or passed on when
received from another node
Hello Messages
Hello Message = RREP with TTL = 1
This message is used for broadcasting connectivity
information.
A node should use Hello messages only if it is part
of an active route.
Message routing
Source
G
A RREQ RREQ
RREQ
RREP RREQ
B D RREQ
RREP
RREQ
RREQ RREP
F Destination
C RREQ
RREQ
E
Congestion Handling
Destination Sequence #
Update sequence # for case i and ii
Copy sequence # for case iii
Invalidate route entry
Update Lifetime field as (current time +
DELETE_PERIOD)
Only now may route entry be deleted
RERR message transmission
Unicast
A node detects that a link with adjacent neighbor is
broken (destination no longer reachable).
Send RERR to single recipient
If it gets a data packet destined to a node for which it
does not have an active route and is not repairing.
If it receives a RERR from a neighbor for one or more
active routes.
Unicast iterative
Send RERR to a number of recipients individually
Broadcast
Notify multiple recipients simultaneously
Broadcast via 255.255.255.255 TTL = 1
A Combined Protocol
It is possible to exploit the good features of
both reactive and proactive protcols and the
Zone routing protocol does that.
The proactive part of the protocol is restricted
to a small neighbourhood of a node and the
reactive part is used for routing across the
network.
This reduces latency in route discovery and
reduces the number of control messages as
well.
Routing Zones
Each node S in the network has a routing
zone. This is the proactive zone for S as S
collects information about its routing zone in
the manner of the DSDV protocol.
If the radius of the routing zone is k, each node
in the zone can be reached within k hops from
S.
The minimum distance of a peripheral node
from S is k (the radius).
A Routing Zone
K L
A
B
I
G
S
C E
D
S
Intrazone Routing
Each node collects information about all
the nodes in its routing zone proactively.
This strategy is similar to a proactive
protocol like DSDV.
Each node maintains a routing table for its
routing zone, so that it can find a route to
any node in the routing zone from this
table.
Intrazone Routing
B
S
A C
D
E
F
B
S
A C
E D
F
B
S
A C
D
E
F
S C
B
D H
Route Reply in Interzone Routing
If a node P finds that the destination D is
within its routing zone, P can initiate a route
reply.
Each node appends its address to the RREQ
message during the route request phase. This
is similar to route request phase in DSR.
This accumulated address can be used to send
the route reply (RREP) back to the source
node S.
Route Reply in Interzone Routing
An alternative strategy is to keep forward and
backward links at every node´s routing table
similar to the AODV protocol. This helps in
keeping the packet size constant.
A RREQ usually results in more than one
RREP and ZRP keeps track of more than one
path between S and D. An alternative path is
chosen in case one path is broken.
Route Maintenance
When there is a broken link along an active
path between S and D, a local path repair
procedure is initiated.
A broken link is always within the routing
zone of some node.
B
A
Route Maintenance
Hence, repairing a broken link requires
establishing a new path between two nodes
within a routing zone.
The repair is done by the starting node of the
link (node A in the previous diagram) by
sending a route repair message to node B
within its routing zone.
This is like a RREQ message from A with B as
the destination.
How to Prevent Flooding of the Network
Interzone routing may generate many copies of
the same RREQ message if not directed
correctly.
The RREQ should be steered towards the
destination or towards previously unexplored
regions of the network.
Otherwise, the same RREQ message may
reach the same nodes many times, causing the
flooding of the network.
Routing Zones Overlap Heavily
Since each node has its own routing zone,
the routing zones of neighbouring nodes
overlap heavily.
Since each peripheral node of a zone
forwards the RREQ message, the message
can reach the same node multiple times
without proper control.
Each node may forward the same RREQ
multiple times.
Guiding the Search in InterZone Routing
A Q
B
P
C
X
N
V2V
RSU
VANETs
Applications
Active Road-Safety Applications
To avoid the risk of car accidents: e.g., cooperative collision
warning, pre-crash sensing, lane change, traffic violation
warning
Traffic efficiency and management applications
To optimize flows of vehicles: e.g., enhanced route
guidance/navigation, traffic light optimal scheduling, lane
merging assistance
Comfort and Infotainment applications
To provide the driver with information support and
entertainment: e.g., point of interest notification, media
downloading, map download and update, parking access,
media streaming, voice over IP, multiplayer gaming, web
browsing, social networking
VANET
s
VANETs applications exhibit very
heterogeneous requirements
Safety applications require reliable, low-latency,
and efficient message dissemination
Non-safety applications have very different
communication requirements, from no special
real-time requirements of traveler information
support applications, to guaranteed Quality-of-
Service needs of multimedia and interactive
entertainment applications
Connectivity in
VANETs
There are three primary models for
interconnecting vehicles based on
Network infrastructure
Inter-vehicle communications
Hybrid configuration
Connectivity in
VANETs
Network infrastructure
Vehicles connect to a centralized server or a backbone
network such as the Internet, through the road-side
infrastructure, e.g., cellular base stations, IEEE 802.11
Access Points, IEEE 802.11p RSUs
Connectivity in
VANETs
Inter-vehicle communications
Use of direct ad-hoc connectivity among vehicles via
multihop for applications requiring long-range
communications (e.g., traffic monitoring), as well as
short-range communications (e.g., lane merging)
Connectivity in
Hybrid VANETs
configuration
Use of a combination of V2V and V2I. Vehicles in
range directly connect to the road-side infrastructure,
while exploit multi-hop connectivity otherwise
Connectivity in
VANETs
Vehicles’ connectivity is determined by a
combination of several factors, like:
Space and time dynamics of moving vehicles
(i.e., vehicle density and speed)
Density of RSUs
Radio communication range RSU
Vehicle
density/speed
Communication
Connectivity
range
Vehicular
Time of day
scenario
Market • Urban
penetration • Highway
Improving Connectivity in
• VANETs
Opportunistic approaches for connectivity
support in VANETs
– Opportunistic contacts, both among vehicles and from
vehicles to available RSUs, can be used to instantiate
and sustain both safety and non-safety applications
• Opportunistic forwarding is the main technique
adopted in DTN
– In VANETs bridging technique links the
,
partitioning that exists between clusters traveling in
the same direction of the roadway
Improving Connectivity in
VANETs
The use of a vehicular grid together with an
opportunistic infrastructure placed on the roads
guarantees seamless connectivity in dynamic
vehicular scenarios
Hybrid communication paradigms for vehicular
networking are used to limit intermittent connectivity
Vehicle-to-X (V2X) works in heterogeneous
scenarios, where overlapping wireless networks
partially cover the vehicular grid. It relies on the
concept of multi-hop communication path
Improving Connectivity in
VANETs
Different connectivity phases
Phase 1 (No connectivity)
A vehicle is traveling alone in the vehicular grid (totally-
disconnected traffic scenario). The vehicles are completely
disconnected
Phase 2 (Short-range connectivity)
A vehicle is traveling in the vehicular grid and forming a
cluster with other vehicles. Only V2V connectivity is
available
Phase 3 (Long-range connectivity)
A vehicle is traveling in the vehicular grid with available
neighboring RSUs. Only V2I connectivity is assumed to be
available
Examples
Applications for
VANETs
Public Safety Applications
Traffic Management Applications
Traffic Coordination and Assistance Applications
Traveller Information Support Applications
Comfort Applications
Air pollution emission measurement and reduction
Law enforcement
Broadband services
Problems in MANET
Routing
Security and Reliability
Quality of Service
Internetworking
Power Consumption
SECURITY
Secure Multicasting
Secure routing
Privacy-aware Routing
Key management
Intrusion detection System
Issues Contd..
Secure multicasting: Is a communication method where
a single data packet can be transmitted from a sender and
replicated to a set of receivers.
Secure routing: Most MANET routing protocols are
vulnerable to attacks that can freeze the whole network.
Need some solutions that work even if some nodes
compromised.
Privacy-aware Routing: Building routing protocols that
prevent intermediate nodes from performing traffic
analysis.
Schemes for minimizing size of crypto-tags( digital
signatures) are needed.
Issues Contd..
Key Management
security goals in MANET are mainly achieved
through trusted Certificate Authority (CA)
compromised CA can easily damage the entire
network.
Intrusion detection and response schemes:
Anomaly detection is difficult in MANETs
(ex: types of attacks and their source).
collaborative IDS schemes are needed.
Security Goals
Authentication
Confidentiality
Integrity
Non-repudiation
Availability
Detection and Isolation
Security Goals
Authentication: A node must know the identity of the peer node it
is communicating with. Without authentication, an attacker could
gain sensitive information and interfere with other nodes
Confidentiality: Ensures certain information is never disclosed to
unauthorized entities.
Integrity: Message being transmitted is never corrupted.
Non-Repudiation: The sender cannot later deny sending
the
information and the receiver cannot deny the reception.
Availability: Nodes should be available for communication at
all
times. A Key
E.g.: nodemanagement
need continue to provide services despite
service.
attacks.
Detection and Isolation: Require the protocol can identify
misbehaving nodes and render them unable to interfere with
routing.
IDS-MANET
IDS: Intrusion detection System which is used to detect and report
the malicious activity in ad hoc networks.
Ex: Detecting critical nodes using IDS
Intrusion Detection System (IDS) can collect and analyze audit data
for the entire network.
Critical node is a node whose failure or malicious behavior
disconnects or significantly degrades the performance of the
network.
Packets may be dropped due to network congestion or because a
malicious node is not faithfully executing a routing algorithm.
Researchers have proposed a number of collaborative IDS systems.
Some of the schemes are neighbor-monitoring, trust-building, and
cluster-based voting schemes which are used to detect and report
the malicious activity in ad hoc networks.