0% found this document useful (0 votes)
29 views36 pages

Unit-3 MANET Routing Protocols

This document discusses several routing protocols for mobile ad hoc networks (MANETs) including DSDV, DSR, AODV, ZRP, and multicast routing protocols. It also covers security issues specific to MANETs such as lack of physical boundaries, low power transmissions, limited capabilities, and types of attacks like passive snooping and active attacks like wormholes, black holes, and grey holes.

Uploaded by

srivel12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views36 pages

Unit-3 MANET Routing Protocols

This document discusses several routing protocols for mobile ad hoc networks (MANETs) including DSDV, DSR, AODV, ZRP, and multicast routing protocols. It also covers security issues specific to MANETs such as lack of physical boundaries, low power transmissions, limited capabilities, and types of attacks like passive snooping and active attacks like wormholes, black holes, and grey holes.

Uploaded by

srivel12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 36

MANET Routing Protocols

Dr.R.Srivel AP/CSE
Destination - Sequenced Distance Vector
Routing
❖ It is a table driven (proactive) protocol.
❖ It extended from distance vector routing for Bellman-Ford Algorithm.
❖ Main advancement done for routing loop avoidance using sequencing scheme.
❖ Routing information always readily available.
❖ Each node maintains the routes for all known destination.
❖ Routing information updated periodically.
DSDV Working
❖ Sequence numbering system is used to allow mobile nodes to distinguish the blocked
routes from new one.
❖ Updated routing table is shared and updated for table consistency.
❖ Lot of table exchange and updates leads to poor utilization of the network.
❖ To overcome this problem DSTV uses two routing update packets.
➢ Full Dump
■ It contains all the routing data and it can require multiple network packet data unit (NPDU).
■ Route labeled with most recent sequence numbers and used.
DSDV Working

Source Destination Next Hop Metric Sequence Install


Number time

N1 N1 N1 0 S1-321 T4-001
N1 N2 N2 1 S2-218 T4-001
N1 N3 N2 2 S3-043 T4-002
N1 N4 N4 1 S4-092 T4-001
N1 N5 N4 2 S5-163 T4-002
DSDV Steps
❖ Each router (node) in the network collects node information of all its neighbors.
❖ After gathering information node determines shortest path to the destinations.
❖ Based on the information new routing table is generated.
❖ Routers broadcasts the tables to it’s neighbors.
❖ Neighbors will recomputes the routes for their respective tables.
❖ This process continues till the routing information becomes stable.
Dynamic Source Routing (DSR) Protocol
❖ It is developed for small network size 5 to 10 hops and nodes have minimum
mobility.
❖ It is on-demand (reactive) protocol.
❖ Node does not compute all routes readily.
❖ When the route is actually needed then the route is discovered.
❖ Packets routing is based on source organization that is each packet is created with full
route information discovered by DSR. so each node can find next hop easily.
❖ Route information is updated in route cache. Whenever node finds the new route it
will added to cache.
❖ Network overhead is minimized.
Dynamic Source Routing (DSR) Protocol
❖ DSR Works in two steps

1. Route Discovery

2. Route Maintenance
DSR Route Discovery
❖ It helps the dynamically discover when the route is needed in ad-hoc network.
❖ When a packet is ready to sent it checks for the route in routing cache, if available it uses the
route or else it initiates the route discovering mechanisms.
❖ Route request packet is broadcasted in the networks.
❖ Routes request packet contains source address, id, route record to record the route while
reaching the destination.
❖ Each node either forwards (if it is not a destination ) the route request packets or reply with route
replay packet if it is a destination or it knows the destination.
❖ Replay packet is piggybacked with all routing information and sent back to route requester.
DSR Route Discovery
N1-N2 Destination
N2 N1-N2-N5

N1 N5 N8
Source N1-N3-N4-N7
N1-N3-N4
N1

N4 N1-N3-N4
N7

N1 N1-N3
N3
N1-N3-N4 N6 N1-N3-N4-N6
DSR Route Reply
N1-N2-N5-N8 Destination
N2 N1-N2-N5-N8

N1-N2-N5-N8 N5 N8

N1

N4
Source
N7

N3 N6
DSR Route Maintenance
❖ When the known route is broken then route maintenance is initiated.
❖ Route maintenance is monitoring the correct operation of the route and taking the corrective
actions.
❖ When node send a packet and sense that route is broken then the packet is responded with route
error message to the source.
❖ It deletes the broken route from the routing cache and if it has alternative routes to the
destination it will resend the packet in that route or else it will initiate route discovery process
again.
Ad-Hoc On - Demand Distance Vector
(AODV)
❖ The route discovery and route maintenance are very similar to DSR.
❖ It uses the hop-by-hop routing, sequence numbers and beacons.
❖ If a node generates the route request message is forwarded by intermediate nodes.
❖ Intermediate nodes also learns the reverse route from the source while forwarding the packets.
❖ When the route request reaches the destination and then it replied with no of hops to reach the
destination.
❖ All the nodes will participate the forwarding the reply to source and learns the forward route to
the destination.
❖ Large header is avoided the AODV when compared to DSR.
Zone Routing Protocol
❖ The Zone Routing Protocol is Hybrid Protocol (ZHP).
❖ It uses the routing zone and this is similar to cluster.
❖ Within a zone it uses the table driven protocols.
❖ If a destination node it out from the zone then it will act as on-demand protocols.
❖ When a node want to send a packet to other zone nodes the packet sent to border node.
❖ Border node activate the reactive protocols and forwards the request to other zone.
❖ Border node act as proxy for two zones.
Zone Routing Protocol
Advantages:
● Reduces the control traffic produced by periodic flooding of routing
information packets.
● Decrease the latency caused by route discovery in reactive routing
protocols.
● Reduces the wastage of bandwidth.
Disadvantages:
● Since each node has higher level topological information, Memory
requirement is greater.
● Large overlapping of routing zones.
Multicast Routing Protocols for MANET
❖ Efficient multicasting protocols are,
➢ Protocols that minimize the unnecessary packet transmissions.
➢ Minimized energy consumption.
❖ MANET is difficult to handle with multicast protocols.
❖ Problems,
➢ Nodes Mobility.
➢ Interferences.
➢ Noise.
❖ Popular MANET multicast protocols are,
➢ Tree-based protocol.
➢ Mesh-based protocol.
Multicast Routing Protocols for MANET
❖ Tree-based protocol
➢ Single path establishment in multicast group.
➢ It requires minimum number of copies per packet to send along the branches of the tree.
➢ Bandwidth efficient.
➢ Problems
■ If mobility increases, link failure will trigger the reconfiguration of entire tree.
■ When many source,
● Node must maintain shared tree.
● Losing path optimality.
● Maintaining multiple trees leads to storage and control overhead.
➢ Example:
■ Multicast Ad-Hoc On-Demand Distance Vector (MAODV) Protocol.
Multicast Routing Protocols for MANET
❖ Mesh-based protocol
➢ It establishes mesh paths that connect the sources and destinations.
➢ More resistive to link failures and mobility.
➢ Problem:
■ Multiple Copies of same packet are disseminated in the mesh.
■ Reduced packet delivery and Increased control overhead under highly mobile
conditions.
➢ Example:
■ On-demand Multicast Routing Protocol (ODMRP).
Security Issues in
MANET
Security Issues in MANET
❖ MANET is mobile in nature so this causes many problems,
❖ Identifying and fixing the problem is too difficult when compared to traditional
networks.
❖ Due to the dynamic topology the several security attack can be done in physical
layers itself an intruder can cause,
➢ Jamming.
➢ Overloading.
➢ Paralyzing.

Of the network.

❖ It may case the breakdown of the network.


Security Issues in MANET
❖ Attackers can modify the headers of the packets.
❖ The intruder may inject fake informations while routing packets, causing incorrect
routing table updates and thereby leading to frequent mis routings.
❖ Characteristics of Ad-Hoc network itself give the way to attackers,
➢ Lack of physical boundary.
■ Deployment of firewall to monitor the traffic is difficult.
➢ Low power RF transmissions.
■ Signal jamming that leads to DoS.
➢ Limited computational capabilities.
■ Security implementation may cause need of computation for encryption and decryption that is
not suits well for mobile nodes.
➢ Limited power supply.
Characteristics of secure Ad-Hoc
networks
❖ Availability.
➢ It should able to service on DoS attacks.
❖ Confidentiality.
➢ It should protects the confidentiality information by preventing its access by unauthorized users.
❖ Integrity.
➢ It should guarantee that no transferred message has been tampered with.
❖ Authentication.
➢ It should help a node to obtain guarantee about the true identity of the a peer node.
❖ Non-repudiation.
➢ It should ensure that a node having sent a message, cannot deny it.
Attacks on Ad-Hoc networks
❖ Two types of Attacks
➢ Passive Attacks
■ Passive attacks target to monitor and steal the data exchange without disturbing network
operations.
● Snooping.
● Eavesdropping.
● Traffic Analysis.
● Monitoring.
➢ Active Attacks
■ It is destructive and disturbs the normal functionality of the networks.
● Wormhole.
● Black hole.
● Grey hole.
● Resource consumption.
● Routing attacks.
Attacks on Ad-Hoc Networks Layers
Layer Attacks

Application Layer Malicious code, Repudiation, Data Corruption.

Transport Layer Session Hijacking, SYN Flooding.

Networks Layer Wormhole, Black hole, Fabrication Attack.

Data link Layer Resource Consumption

Physical layer Traffic analysis, monitoring, disruption,


jamming, interception, eavesdropping.

Multilayer Denial-of-Services (DoS), impersonation,


replay.
Attacks on Ad-Hoc networks
❖ Routing Loops.
❖ Malicious code attacks.
❖ Repudiation.
❖ SYN flooding attack.
❖ Session Hijacking.
❖ Fabrication attack.
❖ Black hole.
❖ Grey hole.
❖ Wormhole.
❖ Partitioning.
❖ Blacklist
❖ Dropping routing traffic.
Security Attack Countermeasures
Layers Security measures incorporated

Data link Layer Use of spread spectrum transmission and


directional antennae

Network Layer Use of authentication measures and keeping


track of the trusted devices.

Transport Layer Securing and authenticating end-to-end


communications through data encryption
techniques.

Application Layer Detection and prevention of virus, worms,


malicious code through code analysis.
Vehicular Ad-Hoc
Networks
(VANET)
Overview
❖ VANET is special kind of MANET.
❖ Vehicle systems are connected with the networks.
❖ VANET initially used by,
➢ Police vehicles.
➢ Fire Engines.
➢ Ambulances.
❖ In this network's vehicles can communicate with other vehicles within 100 to 300
meters.
❖ Multi-hop networks.
❖ In the city or highways networks size may be an kilometers wide.
Important uses of VANET
❖ Drivers can get advanced warnings and information from nearby environment via
message exchanges.
❖ Road accidents may trigger chain of events in highways. It helps to apply emergency
brake system to avoid further collision.
❖ It give the geographical information to the drivers. For example food malls, petrol
filling stations, map display, etc.
❖ Driver can communicate with mobile networks and enjoy the services like VoIP,
news highlights, Video conferencing and entertainment.
ARCHITECTURE OF VANET:
● Each node in VANET is equipped with two types of unit i.e. On
Board Unit(OBU) and Application Unit (AU).
● OBU has the communicational capability whereas AU executes the
program making OBU‘s communicational capabilities.
● An RSU can be attached to the infrastructure network which is
connected to the Internet.
COMMUNICATION IN VANET
Two types of communication
● V2V Communication: Pure wireless ad hoc network provides vehicle to vehicle
communication without any support of infrastructure.

● V2R Communication: Communication between the Road Side Units (RSU), a


fixed infrastructure, and vehicle.
● TECHNOLOGY USED IN VANET
○ To establish a VANET, IEEE has defined the standard 802.11p or 802.16 (WiMax). A Dedicated Short
Range Communication (DSRC) is proposed which is operating on 5.9GHz band and uses 802.11 access
methods.

○ It is standardized as 802.11p which provides short range communication with low latency.
Communication in VANET
VANET and Road Accidents
Crowdsourcing in VANET
MANET and VANET
MANET VANET

Collection of mobile node that communicate with It is special kind of MANET. Nodes on the move
each other without having any infrastructure and can establish an ad-hoc with other vehicle and
as well stand alone roadside units (RSU) for
communication.

Movement of nodes in MANET is more random. Node mobility is constrained to the road topologies.

We can’t expect fastest topological changes in VANET goes fastest topological changes because of
MANET. speed of vehicle.

Power is major constraint in MANET Vehicle can power VANET more effectively.

Moving speed does not consider for MANET Moving speed of the node has design effect on
design. VANET

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy