Mobile Computing Unit 5
Mobile Computing Unit 5
1. 2.
J. Schiller, Mobile Communications, Addison Wesley Charles Perkins, Ad-hoc Networks, Addison Wesley.
Ad-hoc Networks
A collection of wireless mobile hosts dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Due to the limited transmission range of wireless network interfaces, multiple network hops may be needed for one node to exchange data with another across the network. Need a dynamic routing protocol that can efficiently find routes between two nodes.
UNIT- V MOBILE COMPUTING 3
Ad-hoc Routing
Source
Destination
Packet losses due to transmission errors Mobility-induced route changes Mobility-induced packet losses Potentially frequent network partitions Ease of snooping on wireless transmissions (security hazard)
UNIT- V MOBILE COMPUTING 5
Source-initiated On-Demand
When a node requires a route to destination it initiates a route discovery process within the network. AODV, DSR, TORA, ABR, SSR
MANET (Mobile ad hoc networking) has been formed within the IETF (Internet Engineering Task Force) to develop a routing framework for IP-based protocols in ad hoc networks.
UNIT- V MOBILE COMPUTING 6
Proactive Protocols
Hybrid Protocols
ZRP
Hierarchical Protocols
CBRP
GSR
Geographical Protocols
LAR
GLS
PARO
EADSR
Multicast Protocols
CBM
NZR
Geocasting Protocols
LBM Geo TORA UNIT- V MOBILE COMPUTING
13
Proactive Protocols
Proactive: maintain routing information independently of need for communication Update messages send throughout the network periodically or when network topology changes. Low latency, suitable for real-time traffic Bandwidth might get wasted due to periodic updates Pro-active (Table-driven) (DSDV (Highly Dynamic Destination-Sequenced Distance Vector routing protocol) , IARP (Intrazone Routing Protocol/pro-active part of the ZRP) They maintain O(N) state per node, N = #nodes
UNIT- V MOBILE COMPUTING 14
Hybrid Routing
Proactive for neighborhood, Reactive for far away (Zone Routing Protocol, Haas group) Proactive for long distance, Reactive for neighborhood (Safari) Attempts to strike balance between the two Hybrid (Pro-Active/Reactive) :- e.g. ZRP (Zone Routing Protocol)
16
Hierarchical Routing
Nodes are organized in clusters Cluster head controls cluster Trade off Overhead and confusion for leader election Scalability: intra-cluster vs intercluster One or Multiple levels of hierarchy Hierarchical :- CBRP (Cluster Based Routing Protocol) , GSR (Global State Routing protocol) , DDR (Distributed Dynamic Routing Algorithm)
UNIT- V MOBILE COMPUTING 17
Geographical Routing
This type of protocols acknowledges the influence of physical distances and distribution of nodes to areas as significant to network performance. The main disadvantages of such algorithms are: Efficiency depends on balancing the geographic distribution versus occurrence of traffic. Any dependence of performance with traffic load thwarting the negligence of distance may occur in overload Nodes know their geo coordinates (GPS) Route to move packet closer to end point Protocols DREAM, GPSR, LAR Propagate geo info by flooding (decrease frequency for long distances) Geographical :- LAR (Location-Aided Routing protocol) , GLS(Grid) (Geographic Location Service)
UNIT- V MOBILE COMPUTING 18
Power Aware
Energy required to transmit a signal is proportional to the square of the distance. Transmitting a signal half the distance requires one fourth of the energy and if there is a node in the middle willing spend another fourth of its energy for the second half, data would be transmitted for half of the energy than through a direct transmission. This however introduces a delay. e.g PARO (Power-Aware Routing Optimization Protocol) , EADSR (Energy Aware Dynamic Source Routing Protocol)
UNIT- V MOBILE COMPUTING 19
Multicast
When a message needs to be sent to a varying number of receivers, it is more efficient to multicast the message to a multicast group instead of unicasting an identical message to many different receivers. Unfortunately, as noted in (Chiang et al., 1997) multicast communication is difficult in an Ad-hoc network. Ad-hoc networks are fundamentally dynamic in nature; thus, multicast protocols that handle this dynamic nature are needed. In a static network, multicast protocols build a tree to route multicast messages. The root of the tree is either the multicast source or a core, which is strategically located near the middle of the multicast receivers. Unfortunately, tree-based approaches for multicast communication do not work well in an Ad-hoc network because the tree often changes as the MNs move. Thus, recent multicast protocols developed for an Ad-hoc network are based on either flooding multicast messages or on building a mesh to transmit multicast messages e.g CBM (Content Based Multicast) , MZR (Multicast Zone Routing) ODMRP (On-Demand Multicast Routing Protocol)
UNIT- V MOBILE COMPUTING 20
Contain knowledge about the whole network Routing only to neighborhood Information sharing at regular interval
22
26
DSDV
DSDV basically is distance vector with small adjustments to make it better suited for Ad-hoc networks. These adjustments consist of triggered updates that will take care of topology changes in the time between broadcasts. To reduce the amount of information in these packets there are two types of update messages defined: full and incremental dump. The full dump carries all available routing information and the incremental dump only carries the information that has changed since the last dump. Destination-Sequenced Distance Vector (DSDV) is a variation of the Distributed Bellman-Ford algorithm modified to address problems inherent to Ad-hoc networks, such as time dependent topologies. These modifications reduce the looping properties that would otherwise be present. Since DSDV is table-driven, each node maintains a routing table with the next hop entry for each destination and the metric for the link. In addition, each link has a sequence number associated with it. This sequence number is periodically incremented by the destination node for the link. Other nodes then choose the route with highest sequence number, as that is the least stale route to the destination. If a node detects that a link has broken, it sets the metric to infinity, and issues a route update to the other nodes regarding the link status. Other nodes repeat this action until they receive an update with a higher sequence number to provide it with a fresh route again.
UNIT- V MOBILE COMPUTING 28
DSDV
DSDV is a hop-by-hop distance vector routing protocol in which each node has a routing table for all reachable destinations , stores the next-hop and number of hops for that destination. Like distance-vector, DSDV requires that each node periodically broadcast routing updates. The advantage with DSDV over traditional distance vector protocols is that DSDV guarantees loop-freedom. To guarantee loop-freedom DSDV uses a sequence numbers to tag each route. The sequence number shows the freshness of a route and routes with higher sequence numbers are favorable. A route R is considered more favorable than R' if R has a greater sequence number or, if the routes have the same sequence number but R has lower hop-count. The sequence number is increased when a node A detects that a route to a destination D has broken. So the next time node A advertises its routes, it will advertise the route to D with an infinite hop-count and a sequence number that is larger than before.
UNIT- V MOBILE COMPUTING 29
DSDV
Due to the lack of synchronization between nodes in the network, a time delay is imposed to prevent nodes from responding immediately based on a single potentially disruptive update. This settling time allows for the routing table at each node to stabilize before it begins issuing route updates to other nodes. The main advantage to DSDV is that it maintains a loop-free fewest-hop path to every destination in the network. However, this protocol also contains both periodic and triggered route updates. While the triggered updates tend to be small (allowing quick discovery of invalid links), the each nodes periodic update includes its entire routing table. This means the overhead associated with those updates effectively limiting the number of nodes in the network. Because DSDV is dependent on periodic broadcasts it needs some time to converge before a route can be used. This converge time can probably be considered negligible in a static wired network, where the topology is not changing so frequently. In an Ad-hoc network on the other hand, where the topology is expected to be very dynamic, this converge time will probably mean a lot of dropped packets before a valid route is detected. The periodic broadcasts also add a large amount of overhead into the network
UNIT- V MOBILE COMPUTING 30
DSDV
DSDV Advantages:
Short delay brought by the proactive feature Difficult for the attackers to control the propagation of false information Loop Free Fewest hop path
DSDV Disadvantages:
Difficult to scale to large networks Computation and communication resources wasted on unused routes Periodic updates Maintaining routes in presence of mobility Routing information may be expensive and unnecessary
UNIT- V MOBILE COMPUTING 31
Requires no periodic packets of any kind at any level within the network- purely on demand. Allows uni-directional links. Supports internetworking between different types of wireless networks and mobile IP.
UNIT- V MOBILE COMPUTING 32
Route Discovery
RREQ (Route Request packet)
Is broadcast when node S needs do send a packet to D and does not already know a route. Each RREQ includes source and destination address, unique request id and complete route record of all intermediate nodes.
Z
S B A H I C G K D N E F M L
[S]
S B A H I C G K D E F M
Represents transmission of RREQ [X,Y] Represents UNIT-of MOBILE COMPUTING list V identifiers appended to RREQ
35
Z
S B A H I C [S,C] G K D N E [S,E] F M L
Node H receives packet RREQ from two neighbors: potential for collision
UNIT- V MOBILE COMPUTING 36
Z
S B A H I C G [S,C,G] K D N E F [S,E,F] M L
Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once
UNIT- V MOBILE COMPUTING 37
Z
S B A H I C G K D [S,C,G,K] N E F [S,E,F,J] M L
Nodes J and K both broadcast RREQ to node D Since nodes J and K are hidden from each other, their transmissions may UNIT- V MOBILE COMPUTING collide
38
Z
S B A H I C G K D N E F [S,E,F,J,M]
Node D does not forward RREQ, because node D is the intended target of the route discovery
UNIT- V MOBILE COMPUTING
39
Z
S B A H I C G K D N E RREP [S,E,F,J,D] F M L
41
Intermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded
UNIT- V MOBILE COMPUTING 42
DATA [S,E,F,J,D]
S B A H I C G K D E F M
DSR
N2 N1-N2-N5-N8 N1-N2 N1 N1 N1-N3-N4 N1 N4 N1-N3-N4 N1-N3-N4 N7 N5 N1-N2-N5-N8
RREP
N1-N2-N5-N8 N8 N1-N2-N5 Destination
Source
N1-N3-N4-N7
N1-N3-N4-N6
N1-N3 N3 N6
RREQ
UNIT- V MOBILE COMPUTING 44
Route Maintenance
Hop-by-hop acknowledgement
Link-level acknowledgement IEEE 802.11 Passive acknowledgement (Overhearing) DSR specific acknowledgement
Additional Optimizations
Packet Salvaging
An intermediate node can use an alternate route from its own cache in case of a failed link.
Promiscuous listening
When a node overhears packet checks to see whether it could be routed via itself to gain a shorter route and sends a gratuitous RREP to source. Learn different routes without participating in routing process.
46
47
DSR Advantages
Routes maintained only between nodes who need to communicate
reduces overhead of route maintenance
Route caching can further reduce route discovery overhead A single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches
UNIT- V MOBILE COMPUTING 48
DSR Disadvantages
Packet header size grows with route length due to source routing Flood of route requests may potentially reach all nodes in the network Care must be taken to avoid collisions between route requests propagated by neighboring nodes
insertion of random delays before forwarding RREQ
Increased contention if too many route replies come back due to nodes replying using their local cache
Route Reply Storm problem Reply storm may be eased by preventing a node from sending RREP if it hears another RREP with a shorter route
An intermediate node may send Route Reply using a stale cached route, thus polluting other caches This problem can be eased if some mechanism to purge (potentially) invalid cached routes is incorporated. For some proposals for cache invalidation,
Static timeouts Adaptive timeouts based on link stability
49
Path Discovery
Every node maintains two separate counters:
Node sequence number Maintain freshness information of route Broadcast id Incremented for every new RREQ
Z
S B A H I C G K D N E F M L
Z
S B A H I C G K D N E F M L
Z
S B A H I C G K D N E F M L
Z
S B A H I C G K D N E F M L
Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once
UNIT- V MOBILE COMPUTING 56
Z
S B A H I C G K D N E F M L
57
Z
S B A H I C G K D N E F M L
Node D does not forward RREQ, because node D is the intended target of the RREQ
UNIT- V MOBILE COMPUTING
58
Z
S B A H I C G K D N E F M L
Forward links are setup when RREP travels along the reverse path
UNITRepresentsVaMOBILE COMPUTING link on the forward path 59
AODV
N2 N5
RREP
N8 Destination
N1
Source
N4
N7
N3
N6
RREQ
UNIT- V MOBILE COMPUTING 61
Path Maintenance
Detecting link failures
Periodic hello messages Link Layer acknowledgements (LLACKS) Attempts to forward packet to next hop fail
AODV
AODV Advantages:
Low overhead and smaller routing tables in light load networks Fast expiration of unused routes
AODV Disadvantages:
On-demand feature brings a longer delay for the first packet Malicious nodes have more flexibility on conducting attacks
63
Route caching
More routing information Fast recovery from failure More RREP
Supports uni-directional links Only broadcast No mechanism to expire stale routes or prefer fresher routes RERR backtracks the data packet UNIT- V MOBILE COMPUTING
Only bi-directional links Multicast capability Expiration timers remove stale routes and sequence numbers RERR informs all predecessor nodes of link failure
64
A
DEST
B D
SRC
A E D F
G E F
C
B
D G
A
C D G F
67
When a node has no downstream links, it reverses the direction of one or more links
B A E B A E D F C G A E D F C B C D E B D F
68
G
F C G
71
72
73
74
75
76
77
Route maintenance in TORA has five different cases according to the flowchart below:
1 Generate: The node has lost its last downstream link due to a failure. The node defines a new "reference level", so it sets oid (originator id) to its node id and t to the time of the failure. This is done only if the node has upstream neighbours. If not it sets its height to NULL. 2 Propagate: The node has no more downstream link due to a link reversal following the receipt of an update packet and the reference levels (t,oid,r) of its neighbours are not equal. The node then propagates the references level of its highest neighbour and sets the offset to a value which is lower (-1) than the offset of all its neighbours with the maximum level. 3 Reflect: The node has lost its downstream links due to a link reversal following the receipt of an update packet and the reference heights of the neighbours of the node are equal with the reflection bit not set. The node then reflects back the refence height by setting the reflection bit. It's d value is set to 0.
UNIT- V MOBILE COMPUTING 78
4 Detect: The node has lost its downstream links due to a link reversal following the receipt of an update packet and the reference heights of the neighbours of the node are equal with the reflection bit set. This means that the node has detected a partition and begins the route erasure procedure. The height values are set to NULL. 5 Generate: The node has lost its last downstream link due to a link reversal following the receipt of an update packet and the reference haights of all the neighbours are equal with the reflection bit set and the oid of the neighbours heights isn't the node's id. The node then sets t to the time of the link failure and sets oid to its own id. The d value is set to 0. This means that the link failure required no reaction. The node experienced a link failure between the time it propagated a higher reference (from someone else) and the time this level got reflected from a place further away in the network. Because the node didn't define the new reference level itself this is not necessarily an indication of a partitioning of the network. So the node simply defines a new higher reference level with the time of the link failure.
79
80
81
82
83
84
85
TORA
TORA Advantages : It supports multiple routes to any source/destination pair. Failure or removal of one node is quickly resolved without source intervention by switching to an alternate route. Loop Free Path Establish routes quickly , before topology changes Able to detect partitions very quickly
TORA Disadvantages : It relies on synchronized clocks among nodes in the network. It also relies on intermediate lower layers for certain functionality. TORA is not energy efficient and does not scale to large networks. exhibits instability behavior similar to "count-to-infinity" problem in distance vector routing protocols
UNIT- V MOBILE COMPUTING 86
87
CBRP
Functions Link Sensing Clusters Routing
88
CBRP
The algorithm The following algorithm is used to form the clusters! When an node comes up, it has the "undecided" state! The first action of this node is to start a timer and broadcasts a HELLO message! When a cluster-head receives this HELLO message, it replies immediately with a triggered HELLO message. After that, when the node receives this answer, it will change his state into the "member" state. But when the node gets no message from any clusterhead, it makes itself as cluster-head, but only, when it has bi-directional link to one or more neighbors! Otherwise, when it has no link to any other node, it stays in the "undecided" state and repeats the procedure with sending an HELLO message again! Cluster-heads are changed as infrequently as possible
UNIT- V MOBILE COMPUTING 89
DATA STRUCTURES
Neighbor Table
Id, Role , Status of the link
HELLO MESSAGES
HELLO message from a node contains its neighbor table and its cluster adjacency table (CAT). Nodes update their neighbor tables and CAT when they receive HELLO messages from their neighbors. When a node A receives HELLO message from say a node B
A adds B to its neighbor table if B is not present in its table. If B is already in the table update the status of link from B to A if required. Update the role of B if it has changed.
92
CLUSTER FORMATION
A node can be in any of the three states A cluster head A cluster member Undecided ( Looking for a head ) An undecided node starts a timer and broadcasts a HELLO message. Any cluster head that receives this message sends out HELLO message back. If the node has bi-directional link to that cluster head it chooses that node as its cluster head and regards itself as a member of that cluster head. If it does not find any head till the timer expires and it declares itself as a cluster head. If two cluster heads have bi-directional links to each other one of them gives his status as a head and becomes member of the other head. The node with a smaller id continues to be a cluster head. However the cluster heads wait for a certain period of time before this This ensures that if two cluster heads are just close for a short time when they are on a move cluster re-formation does not happen.
UNIT- V MOBILE COMPUTING 93
11
4
Adj cluster ID Gateway 8 9 6 2
8 10
2
5 6
95
ROUTE DISCOVERY
When a node say A wants to discover route to a node say D it broadcasts a RREQ packet. This packet contains a list of host and neighboring clusters heads. For neighboring cluster heads even the gateway nodes are mentioned. The idea is only cluster heads should forward the packet further. If a member node receives RREQ packet it simply drops it. However if a member node is listed as a Gateway node it unicasts the RREQ to the cluster head for which it is a Gateway node. When a cluster head receives RREQ, it adds itself on the partial route contained in the packet. It adds the neighboring cluster heads to which the packet is to be forwarded from its own CAT along with their gateway nodes and then re-broadcasts their packet.
Thus the RREQ passes through a number of cluster heads and eventually reaches D. D upon receiving the RREQ sends and RREP back. The RREP travels the same set of cluster heads that the RREQ traveled. On the way entire hop-by-hop path is added to the RREP along with the Gateway nodes. UNIT- V MOBILE COMPUTING 96
Route Discovery
Source S floods all clusterheads with Route Request Packets (RREQ) to discover 11 (D) [3,1,8,11] destination D
9 4 8 [3,1,8]
10
3 (S) [3]
5
1
[3,1] 2 6 UNIT- V MOBILE COMPUTING [3,1,6]
97
Route Reply
Route reply packet (RREP) is sent back to source along reversed loose source route of clusterheads. Each clusterhead along the way incrementally compute a hop-byhop strict source route.
11 (D) the reversed loose source route of RREP: [11,8,1,3] 3 (S) [11,9,4,3] the computed strict source route of 3->11 is: [11,9,4,3] 5
UNIT- V MOBILE COMPUTING
9 8
[11]
10
7
98
Route Reply
Route reply packet (RREP) is sent back to source along reversed loose source route of clusterheads. Each clusterhead along the way incrementally compute a hop-byhop strict source route.
11 (D) the reversed loose source route of RREP: [11,8,1,3] 3 (S) the computed strict source route of 3->11 is: [11,9,4,3] 9 4 1 2 5
UNIT- V MOBILE COMPUTING
10
7
99
11 (D)
Source route header of data packet: [3,4,9,11]
9 4 8 1 2 5 10
3 (S)
Route error (ERR) down link: {9->11}
7
100
ROUTE SHORTENING
Whenever a node receives a source-routed data packet, it tries to find out the furthest node in the unvisited route that is actually its neighbor. If it succeeds, it shortens the source route accordingly and FLAGS this in the packet. The destination upon receiving this flagged packet sends and unsolicited RREP back to the source containing the shortened route.
101
11 (D)
9 4 8 1 2 5 10
3 (S)
Route error (ERR) down link: {9->11}
7
102
11 (D)
9 4 8 1 2 5 10
3 (S)
Modified source route [3,4,9,8,11]
7
103
11 (D)
9 4 8 1 2 5 10
3 (S)
Gratuitous route reply [3,4,9,8,11]
7
104
CBRP
CBRP Advantages:
Uses local route repair and route shortening to improve routes Supports uni- and bi-directional links Reduction of communication traffic Reduction of information storage Robust against frequent network topology changes Loop free Support for multiple route
CBRP Disadvantages:
Overhead bytes according to source routing Only 2-level hierarchy Small clusters but when clusters grow, size of HELLO messages and tables increases Scalable to an extend.
UNIT- V MOBILE COMPUTING 105
Cost of one stream related not only to rate parameters, but also to reliability(energy per bit) and acceptable delay Best error- control coding techniques are at the physical and media- access layers
UNIT- V MOBILE COMPUTING 106
Wireless Systems
Varying Conditions of Radio interface QoS profile consists of parameters like
precedence: delay: includes radio access delay (uplink) or radio scheduling delay (downlink), radio transit delay, GPRS-network transit delay reliability: error rates much higher throughput: specified by maximum bit rate and mean bit rate
UNIT- V MOBILE COMPUTING 107
QoS in MANets
Availability of link state information and its management is difficult QoS of wireless link is apt to change in dynamic environment
mobility of hosts resource limitations (time varying)
QoS MACs must provide resource reservation and QoS guarantees to realtime traffic
Wireless LANs Black burst contention etc Manets MACA/PR
UNIT- V MOBILE COMPUTING 109
-Confidentiality information not disclosed to unauthorized entities -Integrity no corruption -Authentication ensure identity of correspondent
110
Problems: Causes
Infrastructure of ad-hoc networks no infrastructure: node router Dynamic topology of ad-hoc networks moving: @IP duplicated attacks Problems associated with wireless communication poor protection to noise and signal interferences Implicit trust relationship between neighbors suppose MOBILE COMPUTING are honest UNIT- V all participants
111
Malicious node announces better routes than the other nodes in order to be inserted in the ad-hoc network
How ?
- Redirection by changing the route sequence number - Redirection with modified hop count - Denial Of Service (DOS) attacks
UNIT- V MOBILE COMPUTING 112
Node A
Node B
Node C
Node D
- Node A will broadcast a message asking the better path to reach the node D. - The best path is chosen depending on the metric of the different routes - If an intruder replies with the shortest path, it inserts itself in the network UNIT- V MOBILE COMPUTING 113
Node A
Node B Intruder
Node C
Node D
114
Intruder
115
Node A
Node B Intruder
Node C
Node D
116
117
Node A
Node B
Intruder I
Node C
Node D
Node E
118
119
Forming loops by spoofing MAC address: - A malicious node M can listen all the nodes when the others nodes can only listen their closest neighbors
- Node M first changes its MAC address to the MAC address of the node A
A M B D E X C
- Node M moves closer to node B than node A is, and stays out of range of node A - Node M announces node B a shorter path to reach X than the node D gives
UNIT- V MOBILE COMPUTING
120
Forming loops by spoofing MAC address: - Node B changes its path to reach X - Packets will be sent first to node A
M B D E X
- Node M moves closer to node D than node B is, and stays out of range of node B - Node M announces node D a shorter path to reach X than the node E gives
UNIT- V MOBILE COMPUTING 121
M B D E X
Idea:
- Generates traffic to disturb the good operation of an ad-hoc
network
How ?
- Falsifying route error messages
- Corrupting routing state - Routing table overflow attack - Replay attack - Black hole attack
UNIT- V MOBILE COMPUTING 123
Falsifying route error messages: When a node moves, the closest node sends error message to the others
A malicious node can usurp the identity of another node (e.g. By using spoofing) and sends error messages to the others The other nodes update their routing tables with these bad information The victim node is isolated
124
126
Replay attack:
A hacker sends old advertisements to a node The node updates its routing table with stale routes
128
Examples:
Security-Aware ad-hoc Routing, SAR Secure Routing Protocol, SRP The Selfish Node, TSN
UNIT- V MOBILE COMPUTING 129
SAR
overview
Symmetric key encryption Only use routing paths having required trust level Shared symmetric keys for each trust level use existing infrastructure for CA and key distribution Requires managed open environment
SAR evaluation
Pros:
Secure as long as CA not compromised Network infrastructure not exposed (all packets encrypted)
Cons:
Excessive power consumption (enc/dec) Misbehaving nodes not prevented
UNIT- V MOBILE COMPUTING 130
SRP
Overview Based on a security association (SA) between the destination and source node (set up during key exchange) Public key encryption Routing path sent unencrypted with each packet Requires existing CA managed open environment SRP evaluation Pros: Secure as far as confidentiality goes Less processing overhead than SAR (only at endpoints) Cons: Exposes network infrastructure (unenc. routing path) Susceptible to Invisible Node attack
UNIT- V MOBILE COMPUTING 131
TSN
Overview Open environment no pre-requirements but can use existing infrastructure Primary threat: DOS attack Concept taken from Darwins theories Problem solution: Introduce penalty for misbehaving notes TSN components The monitor Neighborhood watch
Monitors other nodes network activity Sends warnings to the reputation system
132
TSN evaluation
Pros: Prevents misbehaving nodes from operating Can be combined with other techniques Cons: Confidentiality not guaranteed (no encryption) Causes extra overhead (processing and network)
133
ARAN overview
Managed-open environment Public key encryption based Requires certificate server Two phases:
Authentication
Ensures existence of secure path to destination Each intermediate node stores the route pair (previous node + destination node) Each node signs the message so that the following node can check the validity of the previous node The destination node replies by sending its certificate to be used in transmission
Transmission
Routing path discovery packets (RDP) are encrypted using destinations public key at each intermediate node Each intermediate node stores the route pair (previous node + destination node) until route times out (no traffic for a specified period of time) Destination node replies to the first RDP received and all RDP:s with a shorter route path Once source node has received a reply to the RDP communication can begin, all encrypted using receivers public key
UNIT- V MOBILE COMPUTING 135
ARAN Evaluation
Pros: Secure as long as CA is not compromised Confidentiality guaranteed (public key encryption) Network structure not exposed (encrypted) Resistant to most attacks Cons: Extra memory required (each node stores routing pairs) Moderate processing overhead for encryption
136
SPAAR overview
Managed-hostile environment Security more important than performance Requires certificate server GPS used to determine location of nodes Nodes only accepts packets from valid neighbors (shared group-key is used to encrypt traffic) Location and velocity is sent in packets to aid routing performance (increases need for confidentiality) Nodes only forward packets if their location is closer to the destination than previous node. Messages encrypted twice (destination public key and group key between intermediate nodes)
UNIT- V MOBILE COMPUTING 137
SPAAR evaluation
Pros: Secure as long as CA is not compromised Confidentiality guaranteed (public key encryption) Network structure not exposed (encrypted) Resistant to most attacks Shortest geographical path Cons: Extra memory required (each node stores routing pairs) Heavy processing overhead for encryption Hardware demands (GPS)
UNIT- V MOBILE COMPUTING 138