Your SlideShare is downloading. ×
0
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Presentation.pptx
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Presentation.pptx

331

Published on

An introduction to Ad hoc network

An introduction to Ad hoc network

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
331
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  1. Mobile Ad-hoc Networks (manets) Submitted by: Shruti Maharishi markandeshwar university,mullana Ambala(haryana)
  2. Table of Contents <ul><li>Introduction </li></ul><ul><li>Routing </li></ul><ul><li>Attacks </li></ul><ul><li>Security goals </li></ul><ul><li>Applications </li></ul>
  3. Introduction <ul><li>All nodes are mobile and can be connected dynamically in an arbitrary manner. </li></ul><ul><li>Rapidly deployable, self configuring. </li></ul><ul><li>No need for existing infrastructure. </li></ul><ul><li>Wireless links. </li></ul><ul><li>Nodes are mobile, topology can be very dynamic. </li></ul><ul><li>A MANET can be a standalone network or it can </li></ul><ul><li>be connected to external networks(Internet ). </li></ul>
  4.  
  5. Proactive Protocol (Table Driven): <ul><li>Every node maintains the network </li></ul><ul><li>topology information in the form of routing tables by </li></ul><ul><li>periodically exchanging routing information. </li></ul><ul><li>Routing information is generally flooded in the whole network. </li></ul>
  6. <ul><li>Protocols obtain the necessary path when it is required. </li></ul><ul><li>They do not maintain the network topology information </li></ul><ul><li>They do not exchange routing information periodically. </li></ul><ul><li>Reactive routing protocols often outperform proactive ones due to their ability to adjust the amount of network overhead created to track the mobility in the network. </li></ul>Reactive Protocol (on Demand)
  7. <ul><li>Hybrid routing protocols combine the best features of both reactive and proactive routing protocols. </li></ul><ul><li>For example, a node communicates with its neighbors using a proactive routing protocol, and uses a reactive protocol to communicate with nodes farther away </li></ul>Hybrid Protocol :
  8. Hybrid Mobile Ad-hoc Network
  9. Hybrid Mobile Ad-hoc Network
  10. Hybrid Mobile Ad-hoc Network
  11. Hybrid Mobile Ad-hoc Network
  12. Hybrid Mobile Ad-hoc Network
  13. ATTACKS IN AD HOC NETWORKS <ul><li>The absence of any central coordination mechanism and shared wireless medium makes MANETs more vulnerable to digital/cyber attacks than wired networks. These attacks are generally classified into two types: </li></ul><ul><li>Passive and Active attacks . </li></ul>
  14. Active attacks <ul><li>Aim to change or destroy the data of transmission or attempt to influence the normal functioning </li></ul><ul><li>of the network. Active attacks when performed from foreign networks are referred to as external attacks. If nodes from within the ad hoc network are involved, the attacks are referred to as internal attacks. </li></ul>
  15. Passive attacks <ul><li>These do not influence the functionality of a </li></ul><ul><li>connection. An adversary aims to interfere in a network and read the transmitted information without changing it. If it is also possible for the adversary to interpret the captured data, the requirement of confidentiality is violated. It’s difficult to recognize passive attacks because under such attacks the network operates normally. In generally, encryption is used to combat such attacks. </li></ul>
  16. Security Goals <ul><li>1. Confidentiality ensures payload data and header </li></ul><ul><li>information is never disclosed to unauthorized </li></ul><ul><li>nodes. </li></ul><ul><li>2. Integrity ensures that message is never corrupted </li></ul><ul><li>3. Availability ensures that services offered by the </li></ul><ul><li>node will be available to its users when expected, </li></ul><ul><li>i.e. survivability of network services despite denial </li></ul><ul><li>of service attacks. </li></ul><ul><li>4. Authentication enables a node to ensure the identity </li></ul><ul><li>of peer mode it is communicating with. </li></ul>
  17.  
  18. Applications <ul><li>● Military scenarios </li></ul><ul><li>● Sensor networks </li></ul><ul><li>● Rescue operations </li></ul><ul><li>● Students on campus </li></ul><ul><li>● Free Internet connection sharing </li></ul><ul><li>● Conferences </li></ul>
  19. Thank You

×