SlideShare a Scribd company logo
AN AUTHENTICATED IP CONFIGURATION
SCHEME FOR MANETS
Presented by : Piyush P. Shekdar
Roll. No: 14EC65R06
1
WHAT IS A MANET?
 Mobile Ad Hoc network (MANET) is a collection
mobile nodes communicating over wireless links[6].
2
Figure1: Simplified MANET
Source: http://cwi.unik.no/images
Figure2: Cellular network and MANET
Source : http://cwi.unik.no/images[6]
3
CHARACTERISTICS[6]
 Autonomous and infrastructureless
 Multi-hop routing
 Dynamic network topology
 Device heterogeneity
 Energy constrained operation
 Bandwidth constrained links
 Limited physical security
 Network scalability
 Self-creation, self-organization and self
administration
Source : http://cwi.unik.no/images
4
APPLICATIONS[6]
 Optionally a MANET can be connected to the
internet.
 Military applications
 Disaster management
 Multi-player gaming
 Wireless sensor networks
And many more….
5
THE ADDRESS ALLOCATION PROBLEM[1]
 AODV (Ad Hoc on demand distance vector ) routing
protocol [2]
 Unique IP address for every node
 Traditional approaches(inapplicable):
Manual configuration
DHCP(Dynamic Host Configuration protocol)[3]
6
THE ADDRESS ALLOCATION PROBLEM
 Existing approaches:
 1. Best effort allocation + DAD[5] (duplicate address
detection)
 2. Leader based allocation scheme.
Requires broadcast or advertising implying high
latency.
3. Decentralized allocation.(DHCP or DAD)
it is desirable to avoid DAD.
7
SECURITY THREATS IN DYNAMIC ADDRESS
CONFIGURATION[1]
 Address spoofing (common, occurs during
allocation )
 Address exhaustion
 False address conflict
 False deny message
 Many others can be imagined(Eg.: black hole
attack, grey hole attack etc.) 8
PROTOCOL REQUIREMENTS
 Unique IP address for all nodes
 Denial only upon address exhaustion
 Handling partitions and mergers
 Authentication of nodes: using MAC(message
authentication code)
9
THE ADIP ALGORITHM[1]
 A new node Nn can obtain its IP address from its
neighbouring (single hop)node(proxy).
 Each proxy node computes a unique IP address
from its own IP address.
 No need for DAD.
 No broadcast storms.
10
FLOW CHART FOR THE NEW NODE
11
FLOW CHART FOR THE PROXY NODE
12
AUTHENTICATION[1]
 Keyed hashing for message authentication code
(HMAC)
 MD5 hash function
 MAC = HMAC(K,M)
= H(K ⊕ opad|H(K ⊕ ipad|M)),
K: secret key
M: message
Opad =0x5C
Ipad= 0x36
H(x) is the hash function of x.
The MAC tag is appended to all the messages.
[message|MAC]
13
IP ADDRESS GENERATION[1]
 Class B IP address 169.X.j.i
 Approximately 216 = 65536 possible addresses
inside one MANET.
 169.X.0.0/16 is the network address.
 IP address is generated as follows
 i’= ((i-1)xK +count)%254
 j’=j+ ((i-1)xK +count)/254
 K= number of address that a proxy can assign
 Count = number of addresses assigned by the
proxy
 Hence 1<= count<=K. 14
IP ADDRESS GENERATION[1]
15
Figure 3: An example of address allocation tree K=10
Source: [R.Datta,U.Ghosh.,”ADIP for MANETs”WOCN2009]
2
GRACEFUL DEPARTURE
16
If the root node wants to leave the MANET, then it informs the
lowest descendent to be the new root.
GRACELESS DEPARTURE
 It is important to detect the departure of a node if it
departs gracelessly.
 Graceless departure can be detected by the
periodic HELLO messages of the AODV protocol.
 Every node scans the IP address of its children.
 If a child node is missing, then the parent node
updates its recycle list.
17
NETWORK PARTITIONING AND MERGING
 A node detects network partition when it stops
receiving the periodic HELLO messages.
 The node then becomes the new root and creates a
new Network id and assumes the IP address
169.X.1.1 in the new MANTE.
 Merger:
 If a node from network Y joins a network X, then it
checks for IP address conflicts using the AODV
protocol RREQ and RREP messages.
 If there is an address conflict, then the node resets
its configuration and calls the ADIP algorithm.
18
DISADVANTAGES
 The proposed scheme does not address the
graceless departure of the root node.
 A new node requesting IP address may be denied
an address if the address pools of neighbours are
exhausted.
19
CONCLUSION
 Low latency protocol for address allocation
 Low complexity address generation algorithm
 Secured messaging i.e., protection against
attacks
 Unique IP addresses and no DAD
 No overheads for network partitions and mergers 20
REFERENCES
 [1] R. Datta and U. Ghosh, “An Authenticated Dynamic IP Configuration
Scheme for Mobile Ad Hoc Networks”, IFIP international conference on
Wireless and Optical Communications Networks,2009 pp. 1-6.
 [2] C. Perkins, E. Belding-Royer, and S. Das ,“Ad hoc On-Demand Distance
Vector (AODV) Routing,” RFC3561, July 2003.
 [3] R. Droms, “Dynamic host configuration protocol”, RFC 2131, Mar. 1997.
 [4] S. Nesargi and R. Prakash, in “MANETconf: Configuration of Hosts in a
Mobile Ad Hoc Network”, in Proc. INFOCOM, 2002, pp. 1059-1068.
 [5] K. Weniger., “Passive Duplicate Address Detection in Mobile Ad Hoc
Networks”, In WCNC, Florence, Italy, February 2003.
 [6] http://cwi.unik.no/images
 [7]Kurose J., Ross K.(2012), ”Computer networking a top down approach”.
Pearson education Inc.
21

More Related Content

Similar to MANTE_SEMINAR for IP configuration scheme

Wireless adhoc multi access networks
Wireless adhoc multi access networksWireless adhoc multi access networks
Wireless adhoc multi access networks
IJCNCJournal
 
class28.ppt
class28.pptclass28.ppt
class28.ppt
webhostingguy
 
IP fundamentals
IP fundamentals IP fundamentals
IP fundamentals
sumit singh
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Eric Vanderburg
 
Ccna1 presentation
Ccna1 presentationCcna1 presentation
Ccna1 presentation
Shantnu Matharoo
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
Networkershome
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
Eric Vyncke
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptx
ahmadfaisal744721
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptx
ManojGowdaKb
 
Networking
NetworkingNetworking
Networking
Rashmi
 
EC 8004 wireless networks -Two marks with answers
EC 8004   wireless networks -Two marks with answersEC 8004   wireless networks -Two marks with answers
EC 8004 wireless networks -Two marks with answers
KannanKrishnana
 
Ccna 1 final
Ccna 1  finalCcna 1  final
Ccna 1 final
Vahdet Shehu
 
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
RashidFaridChishti
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
nnmaurya
 
Digital network lecturer2
Digital network  lecturer2Digital network  lecturer2
Digital network lecturer2
Jumaan Ally Mohamed
 
Data link layer
Data link layerData link layer
Data link layer
Abdul MaTéèñ
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
IJCNCJournal
 
Cisco discovery d homesb module 3 - v.4 in english.
Cisco discovery   d homesb module 3 - v.4 in english.Cisco discovery   d homesb module 3 - v.4 in english.
Cisco discovery d homesb module 3 - v.4 in english.
igede tirtanata
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topic
DurgaDeviP2
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
githe26200
 

Similar to MANTE_SEMINAR for IP configuration scheme (20)

Wireless adhoc multi access networks
Wireless adhoc multi access networksWireless adhoc multi access networks
Wireless adhoc multi access networks
 
class28.ppt
class28.pptclass28.ppt
class28.ppt
 
IP fundamentals
IP fundamentals IP fundamentals
IP fundamentals
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
 
Ccna1 presentation
Ccna1 presentationCcna1 presentation
Ccna1 presentation
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptx
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptx
 
Networking
NetworkingNetworking
Networking
 
EC 8004 wireless networks -Two marks with answers
EC 8004   wireless networks -Two marks with answersEC 8004   wireless networks -Two marks with answers
EC 8004 wireless networks -Two marks with answers
 
Ccna 1 final
Ccna 1  finalCcna 1  final
Ccna 1 final
 
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Digital network lecturer2
Digital network  lecturer2Digital network  lecturer2
Digital network lecturer2
 
Data link layer
Data link layerData link layer
Data link layer
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Cisco discovery d homesb module 3 - v.4 in english.
Cisco discovery   d homesb module 3 - v.4 in english.Cisco discovery   d homesb module 3 - v.4 in english.
Cisco discovery d homesb module 3 - v.4 in english.
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topic
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 

Recently uploaded

The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
exukyp
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
aqzctr7x
 
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
slg6lamcq
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
SaffaIbrahim1
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
bmucuha
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
nyfuhyz
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
yuvarajkumar334
 
Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024
facilitymanager11
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens""Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
sameer shah
 

Recently uploaded (20)

The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
 
Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens""Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
 

MANTE_SEMINAR for IP configuration scheme

  • 1. AN AUTHENTICATED IP CONFIGURATION SCHEME FOR MANETS Presented by : Piyush P. Shekdar Roll. No: 14EC65R06 1
  • 2. WHAT IS A MANET?  Mobile Ad Hoc network (MANET) is a collection mobile nodes communicating over wireless links[6]. 2 Figure1: Simplified MANET Source: http://cwi.unik.no/images
  • 3. Figure2: Cellular network and MANET Source : http://cwi.unik.no/images[6] 3
  • 4. CHARACTERISTICS[6]  Autonomous and infrastructureless  Multi-hop routing  Dynamic network topology  Device heterogeneity  Energy constrained operation  Bandwidth constrained links  Limited physical security  Network scalability  Self-creation, self-organization and self administration Source : http://cwi.unik.no/images 4
  • 5. APPLICATIONS[6]  Optionally a MANET can be connected to the internet.  Military applications  Disaster management  Multi-player gaming  Wireless sensor networks And many more…. 5
  • 6. THE ADDRESS ALLOCATION PROBLEM[1]  AODV (Ad Hoc on demand distance vector ) routing protocol [2]  Unique IP address for every node  Traditional approaches(inapplicable): Manual configuration DHCP(Dynamic Host Configuration protocol)[3] 6
  • 7. THE ADDRESS ALLOCATION PROBLEM  Existing approaches:  1. Best effort allocation + DAD[5] (duplicate address detection)  2. Leader based allocation scheme. Requires broadcast or advertising implying high latency. 3. Decentralized allocation.(DHCP or DAD) it is desirable to avoid DAD. 7
  • 8. SECURITY THREATS IN DYNAMIC ADDRESS CONFIGURATION[1]  Address spoofing (common, occurs during allocation )  Address exhaustion  False address conflict  False deny message  Many others can be imagined(Eg.: black hole attack, grey hole attack etc.) 8
  • 9. PROTOCOL REQUIREMENTS  Unique IP address for all nodes  Denial only upon address exhaustion  Handling partitions and mergers  Authentication of nodes: using MAC(message authentication code) 9
  • 10. THE ADIP ALGORITHM[1]  A new node Nn can obtain its IP address from its neighbouring (single hop)node(proxy).  Each proxy node computes a unique IP address from its own IP address.  No need for DAD.  No broadcast storms. 10
  • 11. FLOW CHART FOR THE NEW NODE 11
  • 12. FLOW CHART FOR THE PROXY NODE 12
  • 13. AUTHENTICATION[1]  Keyed hashing for message authentication code (HMAC)  MD5 hash function  MAC = HMAC(K,M) = H(K ⊕ opad|H(K ⊕ ipad|M)), K: secret key M: message Opad =0x5C Ipad= 0x36 H(x) is the hash function of x. The MAC tag is appended to all the messages. [message|MAC] 13
  • 14. IP ADDRESS GENERATION[1]  Class B IP address 169.X.j.i  Approximately 216 = 65536 possible addresses inside one MANET.  169.X.0.0/16 is the network address.  IP address is generated as follows  i’= ((i-1)xK +count)%254  j’=j+ ((i-1)xK +count)/254  K= number of address that a proxy can assign  Count = number of addresses assigned by the proxy  Hence 1<= count<=K. 14
  • 15. IP ADDRESS GENERATION[1] 15 Figure 3: An example of address allocation tree K=10 Source: [R.Datta,U.Ghosh.,”ADIP for MANETs”WOCN2009] 2
  • 16. GRACEFUL DEPARTURE 16 If the root node wants to leave the MANET, then it informs the lowest descendent to be the new root.
  • 17. GRACELESS DEPARTURE  It is important to detect the departure of a node if it departs gracelessly.  Graceless departure can be detected by the periodic HELLO messages of the AODV protocol.  Every node scans the IP address of its children.  If a child node is missing, then the parent node updates its recycle list. 17
  • 18. NETWORK PARTITIONING AND MERGING  A node detects network partition when it stops receiving the periodic HELLO messages.  The node then becomes the new root and creates a new Network id and assumes the IP address 169.X.1.1 in the new MANTE.  Merger:  If a node from network Y joins a network X, then it checks for IP address conflicts using the AODV protocol RREQ and RREP messages.  If there is an address conflict, then the node resets its configuration and calls the ADIP algorithm. 18
  • 19. DISADVANTAGES  The proposed scheme does not address the graceless departure of the root node.  A new node requesting IP address may be denied an address if the address pools of neighbours are exhausted. 19
  • 20. CONCLUSION  Low latency protocol for address allocation  Low complexity address generation algorithm  Secured messaging i.e., protection against attacks  Unique IP addresses and no DAD  No overheads for network partitions and mergers 20
  • 21. REFERENCES  [1] R. Datta and U. Ghosh, “An Authenticated Dynamic IP Configuration Scheme for Mobile Ad Hoc Networks”, IFIP international conference on Wireless and Optical Communications Networks,2009 pp. 1-6.  [2] C. Perkins, E. Belding-Royer, and S. Das ,“Ad hoc On-Demand Distance Vector (AODV) Routing,” RFC3561, July 2003.  [3] R. Droms, “Dynamic host configuration protocol”, RFC 2131, Mar. 1997.  [4] S. Nesargi and R. Prakash, in “MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network”, in Proc. INFOCOM, 2002, pp. 1059-1068.  [5] K. Weniger., “Passive Duplicate Address Detection in Mobile Ad Hoc Networks”, In WCNC, Florence, Italy, February 2003.  [6] http://cwi.unik.no/images  [7]Kurose J., Ross K.(2012), ”Computer networking a top down approach”. Pearson education Inc. 21