UNIT 5 (1) Notes of Adhoc
UNIT 5 (1) Notes of Adhoc
Transport Layer Protocols: Design Goals - Issue in Designing a Transport Layer Protocol -
Classification of Transport Layer Solutions - TCP over MANET.
Security Protocols: Security over MANET - Security Requirements - Issue and Challenges in Security
Provisioning - Network Security Attacks - Security Routing in MANET.
INTRODUCTION
The objectives of transport layer protocol include the setting up of an end -to-end connection, end-to-end
delivery of data packets, flow control, congestion control.
1. Induced Traffic:
existing at the lower layer such as the n/w and MAC layers.
oughput across contending
flows
5. Interpretation of congestion:
ngestion as used in traditional networks is not appropriate in ad hoc
networks.
-dependent contention, hidden terminal
problem, packet collisions in the network, path breaks due to mobility of nodes, and node failure due to
drained battery can also lead to packet loss in ad hoc wireless networks
-layer interaction between the transport layer and lower layers is important to adapt to the
changing network environment
SECX1055 MOBILE ADHOC NETWORKS
7. Dynamic topology:
nection.
to provide both reliable and unreliable connections as per the requirements of the
application layer.
resource constraints such as battery power and buffer sizes and make efficient
use of them.
TCP is reliable, end-to-end, connection-oriented TL protocol that provides a byte stream based service.
Congestion control.
Flow control.
In-order delivery of packets.
Reliable transportation of packets.
The major reasons behind throughput degradation that TCP faces when used in ad hoc wireless net
works are the following.
6. Unidirectional path:
-to-end ACK for ensuring reliability. Path break on an entirely different reverse path
can affect the performance of the network as much as a path breaks in the forward path.
7. Multipath Routing:
intern generates a
set of duplicate acknowledgement (DUPACKs),which cause additional power consumption and invocation
of congestion control.
Fig 4.3 illustrates the effect of network partitions in ad hoc wireless networks.
n B experiences
path break.
Operation:
TCP-F, an intermediate node, upon detection of a path break, originates route failure notification
(RFN) packet. This intermediate node is called Failure point (FP).
is obtained
from TCP packets.
discards the RFN packet and uses the alternate path for forwarding further data packets, thus reducing
control overhead involved in the route reconfiguration process.
SECX1055 MOBILE ADHOC NETWORKS
-establishment has been done, and then the failure point sends Route Re-
establishment Notification (RRN) packet to the sender and the TCP state is updated back to the
connected state.
Advantages:
Simple feedback solution for problem arising from path breaks.
Permits TCP congestion control mechanism to respond to congestion in the network.
Disadvantages:
If a route to sender is not available at the FP, then additional control packets may need to be
generated for routing RFN packets.
TCP-F has an additional state compared to traditional TCP state mechanism.
Congestion window used after a new route is obtained may not reflect the achievable
transmission rate acceptable to the network and the TCP-F receiver.
twork
-F
Operation:
standby state.
.
SECX1055 MOBILE ADHOC NETWORKS
Advantages:
Improves TCP performance by decoupling the path break information from the congestion
information by the use of ELFN.
Less dependent on routing protocol & requires only link failure notification about the path break.
Disadvantages:
When the network is temporarily partitioned, the path failure may last longer & this can lead to
the origination of periodic probe packets consuming bandwidth & power.
Congestion window used after a new route is obtained may not reflect the achievable
transmission rate acceptable to the network and the TCP receiver.
Operation:
-REPLY process to obtain a new route to the TCP-BuS receiver, PN informs the
TCP-BuS sender of the new partial path using ERSN Packet.(it is sent reliably)
-BuS sender also periodically originates probe packets to check the availability of a path to the
destination.
-BuS.
Advantages:
Performance improvement.
Avoidance of fast retransmission due to the use of buffering, sequence numbering, and selective
acknowledgement.
Also takes advantage of the underlying routing protocols.
Disadvantages:
Increased dependency on the routing protocol is high and the buffering at the intermediate
nodes. The failure of intermediate nodes that buffer the packets may lead to loss of packets and
performance degradation.
The dependency on the routing protocol may degrade its performance with order routing
protocols that do not have similar control messages as in ABR.
AD HOC TCP
Based on feedback information received from the intermediate nodes, the TCP sender changes its state
to the
Persist state
Congestion control state
Retransmission state
When an intermediate node finds that the network is partitioned, then the TCP sender state is changed
to the persist state where it avoids unnecessary retransmissions.
Figure shows the thin layer implementation of ATCP between the traditional TCP layer and the IP layer.
This does not require changes in the existing TCP protocol.
This layer is active only at the TCP sender.
1. NORMAL.
2. CONGESTED
3. LOSS
4. DISCONN
When a TCP connection is established, the ATCP sender state is in NORMAL, here ATCP does not
interfere with the operation of TCP and it remains invisible.
Advantages:
It maintains the end to end semantics of TCP.
It is compatible with traditional TCP.
Improves throughput of TCP in adhoc wireless network.
Disadvantages:
Dependency on the network layer protocol to detect the route changes and partitions.
Addition of thin ATCP layer to TCP/IP protocol stack requires changes in the interface functions
currently being used
Split TCP
Major issues that affect the performance of TCP over adhoc wireless network are the degradation of
throughput with increasing path length.
Congestion control
End to End reliability
(called segments or zones) with a number of selected intermediate nodes (known as proxy nodes) as
terminating points of these short connections.
destination node.
ted algorithm, the intermediate nodes that receive TCP packets determine whether to
act as a proxy node or just as a simple forwarding node.
the second zone (segment), and the last zone is between node 13 and 15.
packet, & buffers the received packets. This buffered packet is forwarded to the next proxy node at a
transmission rate proportional to the arrival of LACKs from the next proxy node or destination.
Advantages:
Improved throughput.
Improved throughput fairness.
Lessened impact of mobility.
Disadvantages:
Requires modifications to TCP protocol
End to End connection handling of traditional TCP is violated.
The failure of proxy nodes can lead to throughput degradation
A security protocol for ad hoc wireless networks should satisfy the following requirements
1. Confidentiality:
a) The data sent by the sender must be comprehensible only to the intended receiver.
b) Though an intruder might get hold of the data being sent, he / she must not be able to derive
any useful information out of the data.
c) One of the popular techniques used for ensuring confidentiality is data encryption.
2. Integrity:
a) The data sent by the source node should reach the destination node without being altered.
b) It should not be possible for any malicious node in the network to tamper with the data during
transmission
3. Availability:
a) The network should remain operational all the time.
b) It must be robust enough to tolerate link failures and also be capable of surviving various attacks
mounted on it.
c) It should be able to provide guaranteed services whether an authorized user requires them
4. Non-Repudiation:
a) It is a mechanism to guarantee that the sender of a message cannot later deny having sent the
message and that the recipient cannot deny having received the message.
b) Digital signatures are used for this purpose.
4. Physical Vulnerability:
a) Nodes in these networks are usually compact & hand-held in nature.
b) They could get damaged easily & are also vulnerable to theft.
SECX1055 MOBILE ADHOC NETWORKS
6. Lack of associations:
a) Since these networks are dynamic in nature, a node can join or leave the network at any point of
time.
b) If no proper authentication mechanism is used for associating nodes in a network, an intruder
would be able to join into the network quite easily & carry out his/her attacks
1. Passive attack
a. It does not disrupt the operation of the network; the adversary snoops the data
exchanged in the network without altering it.
b. One way to overcome such problems is to use powerful encryption mechanisms to
encrypt the data being transmitted.
2. Active attack
a. An active attack attempts to alter or destroy the data being exchanged in the network,
thereby disrupting the normal functioning of the network.
b. They can be further classified into 2 categories:
i. External attacks, which are carried out by nodes that do not belong to the network.
They can be prevented using standard encryption techniques and firewalls.
ii. Internal attacks are from compromised nodes that are actually part of the network.
There are many types of attacks pertaining to the network layer in network protocol stack. Some of them
are as follows:
1. Wormhole attack:
a) In this attack, an attacker receives packets at one location in the network & tunnels them
(possibly selectively) to another location in the network, where the packets are resent into the
network. This tunnel between 2 colliding attackers is referred to as a wormhole.
b) If proper mechanisms are not employed to defend the network against wormhole attacks,
existing routing protocols for adhoc wireless networks may fail to find valid routes.
SECX1055 MOBILE ADHOC NETWORKS
4. Information disclosure:
a) A compromised node may leak confidential or important information to unauthorized nodes in the
network.
6. Routing attacks:
There are several types of attacks mounted on routing protocol & they are as follows:
i. Routing table overflow:
In this type of attack, an adversary node advertises routes to non-existent nodes, to the
authorized nodes present in the network.
The main objective of this attack is to cause an overflow of routing tables, which would
in turn prevent the creation of entries corresponding to new routes to authorized nodes.
ii. Routing table poisoning:
Here, the compromised nodes in the networks send fictitious routing updates or modify
genuine route update packets sent to other uncompromised nodes.
This may result in sub-optimal routing, congestion in network or even make some parts
of network inaccessible.
iii. Packet replication:
In this attack, an adversary node would replicate state packets.
iv. Route cache poisoning:
Similar to routing table poisoning, an adversary can also poison the route cache to
achieve similar activities.
v. Rushing attack:
On-demand routing protocols that use duplicate suppression during the route discovery
process are vulnerable to this attack.
Ensuring secure communication in adhoc wireless networks include the mobility of nodes, a promiscuous
mode of operation, limited processing power & limited availability of resources such as battery power,
bandwidth & memory.
SECX1055 MOBILE ADHOC NETWORKS
The fundamental requirements for a secure routing protocol for adhoc wireless networks are listed as
below:
A secure routing protocol should be able to detect the presence of any malicious node in the
network & should avoid the participation of such nodes in the routing process.
ute discovery:
If a route between the source & destination node exist, the routing protocol should be able to
find the route, & should also ensure the correctness of the selected route
:
Once the network topology is known, the attacker may try to study the traffic pattern in the
network. If some of the nodes are found to be more active compared to others, the attacker may
try to mount attacks.
This may ultimately affect the ongoing routing process. Hence, confidentiality of network
topology is important.
Part A Questions
1. List the types of attacks in ad hoc wireless networks.
2. What do you mean by passive attacks?
3. What do you mean by active attacks?
4. Define Denial of attack.
5. List the major types of resource consumption attacks.
6. List the major security threats that exist in ad hoc wireless networks.
7. Give the major objectives of the transport layer protocol.
8. List the issues and challenges in security provisioning of transport layer.
9. Define secure routing.
10. What are not supported by the traditional TCP for handling Adhoc network?
11. How is secure routing done on wireless channels?
12. Why secure routing protocols are needed?
13. Why does TCP not work well in ad hoc network?
14. What are the issues in designing transport layer protocol?
15. List the network security requirements.
16. List some of the network layer attacks.
17. What are the effects of induced traffic in Adhoc network?
18. Define Wormhole attack.
Part B Questions