Está en la página 1de 5

International Journal of Scientific Research Engineering &Technology (IJSRET) Volume 1 Issue1 pp 047-051 March 2012 www. ijsret.

org ISSN 2278 - 0882

MOBILE AD-HOC AND SENSOR NETWORK


Kirtika Goel1, Akhil Kaushik2, Shilpi Rani3, Sakshi Goel4
1 (CSE Department, SIT Meerut, UP Email: Kirtikagoel_88@yahoo.co.in, kirtika.goel@gmail.com) 2 (CSE Department, SIT Meerut, UP Email: akhil.cse.07@gmail.com) 3 (CSE Department, SIT Meerut, UP Email: sh.2507.cse@gmail.com) 4 (CSE Department, SIT Meerut, UP Email: sakshi.kur15@gmail.com)

Abstract The Mobile Adhoc Network refers to a multi hop packet based wireless network which is a combination of a set of mobile nodes that can communicated and moved at the same time , without using any kind of fixed wired infrastructure. MANET is a self organizing and adaptive network that can be formed and deformed on-the-fly without the need of any centralized administration. A "mobile ad hoc network" (MANET) is an autonomous system of mobile routers connected by wireless links and thats union form an arbitrary graph. The routers move randomly and organize themselves arbitrarily; thus, the networks wireless topology may change unpredictably and rapidly. Such a network may operate in a standalone fashion, or may be connected to the larger Internet. The wireless links are quite susceptible to time varying statistical behavior caused by many factors which including the physics of the propagation medium, inner city fading characteristics, shadowing, and potential power control, induced effects that need addressing even in pseudo-static scenarios. Key Words: Clustering, Inter-Domain mobility, Macro Mobility, MANET, Mobile- IP, Packets, Traffic Sensor.

An ad-hoc network can be classified into two main types: mobile ad-hoc network and mobile ad-hoc sensors network. Unlike typical sensor networks, which communicate directly with the centralized controller, a mobile ad-hoc sensor network follows a broader sequence of operational scenarios, thus demanding a less complex setup procedure. A mobile ad-hoc sensor or hybrid ad-hoc network consists of a number of sensor spreads in a geographical area. Each sensor is capable of mobile communication and has some level of intelligence to process signals and to transmit data. II. Mobile Ad hoc and Sensor Network

I.

Introduction

The phrase ad-hoc originates from Latin, which means "for this or for this only". Mobile ad-hoc networks are the temporary networks which can be deployed anyplace and anytime without the need of a pre-existing infrastructure. One of the fundamental purposes of any network formation is to exchange information between two parties. Basically, in mobile ad-hoc networks, nodes have to rely on each other in order to forward data packets from one to the other node in the network. An ad-hoc network can be deployed in remote geographical locations and requires minimum setup and administration costs. However, communication in an adhoc network between different hosts that are not directly linked is an issue not only for search and rescue operations, but also for educational and business purposes.

A mobile ad-hoc network (MANET) is a selfconfiguring infrastructure less network of mobile devices connected by wireless links. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Such networks may operate by themselves or may be connected to the larger Internet. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a Link Layer ad hoc network. A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. The more modern networks are bidirectional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on.

IJSRET @ 2012

International Journal of Scientific Research Engineering &Technology (IJSRET) Volume 1 Issue1 pp 047-051 March 2012 www. ijsret.org ISSN 2278 - 0882
The WSN is built of "nodes" from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. III. Some Examples detect different local events. Moreover, an ad-hoc sensor network offers low setup and administration costs.

V.

Challenges in the design of Mobile Adhoc and Sensor network

No infrastructure Peer-to-peer architecture with multi-hop routing Mobile device physical vulnerability Stringent resource constraints Wireless medium Node mobility Problems for Mobile Ad-hoc and Sensor networks

Fig: Mobile Sensor Network

VI.

Problems are due to, 1. Lack of central entity for organization available: Without a central entity (like a base station), participants must organize themselves into a network (self-organization). 2. Limited range of wireless communication: For many scenarios, communication with peers outside immediate communication range is required. 3. Mobility of participants: In many (not all) ad hoc network applications, participants move around: In cellular network: simply hand over to another base station. In mobile ad hoc networks (MANET). Mobility changes neighborhood relationship. Must be compensated for e.g. routes in the network have to be changed. Complicated by scale. Large number of such nodes difficult to support. 4. Battery-operated entities: Often (not always), participants in an ad hoc network draw energy from batteries. Desirable: long run time for Individual devices Network as a whole

Fig: Mobile Ad-hoc Network

IV. Why to use Mobile Ad-hoc and Sensor


Network MANETS can be used for facilitating the collection of sensor data for data mining for a variety of applications such as air pollution monitoring and different types of architectures can be used for such applications.[3] It should be noted that a key characteristic of such applications is that nearby sensor nodes monitoring an environmental feature typically register similar values. This kind of data redundancy due to the spatial correlation between sensor observations inspires the techniques for in-network data aggregation and mining. By measuring the spatial correlation between data sampled by different sensors, a wide class of specialized algorithms can be developed to develop more efficient spatial data mining algorithms as well as more efficient routing strategies The mobile ad-hoc sensor network is a new invention with long-term potential for transforming our daily lives. In mobile ad-hoc sensor networks, each host may be equipped with a variety of sensors that can be organized to

VII. Security Criteria for Mobile Ad-hoc and


Sensor networks Before we survey the solutions that can help secure the mobile ad hoc network, we think it necessary to find out how we can judge if a mobile ad hoc network is secure or not, or in other words, what should be

IJSRET @ 2012

International Journal of Scientific Research Engineering &Technology (IJSRET) Volume 1 Issue1 pp 047-051 March 2012 www. ijsret.org ISSN 2278 - 0882
covered in the security criteria for the mobile ad hoc network when we want to inspect the security state of the mobile ad hoc network. In the following, we briefly introduce the widely-used criteria to evaluate if the mobile ad hoc network is secure. 1. Availability The term Availability means that a node should maintain its ability to provide all the designed services regardless of the security state of it. This security criterion is challenged mainly during the denial-of-service attacks, in which all the nodes in the network can be the attack target and thus some selfish nodes make some of the network services unavailable, such as the routing protocol or the key management service. 2. Integrity Integrity guarantees the identity of the messages when they are transmitted. Integrity can be compromised mainly in two ways: Malicious altering Accidental altering A message can be removed, replayed or revised by an adversary with malicious goal, which is regarded as malicious altering; on the contrary, if the message is lost or its content is changed due to some benign failures, which may be transmission errors in communication or hardware errors such as hard disk failure, then it is categorized as accidental altering. 3. Confidentiality Confidentiality means that certain information is only accessible to those who have been authorized to access it. In other words, in order to maintain the confidentiality of some confidential information, we need to keep them secret from all entities that do not have the privilege to access them. 4. Authenticity Authenticity is essentially assurance that participants in communication are genuine and not impersonators. It is necessary for the communication participants to prove their identities as what they have claimed using some techniques so as to ensure the authenticity. If there is not such an authentication mechanism, the adversary could impersonate a benign node and thus get access to confidential resources, or even propagate some fake messages to disturb the normal network operations. 5. No repudiation Non repudiation ensures that the sender and the receiver of a message cannot disavow that they have ever sent or received such a message. This is useful especially when we need to discriminate if a node with some abnormal behavior is compromised or not: if a node recognizes that the message it has received is erroneous, it can then use the incorrect message as an evidence to notify other nodes that the node sending out the improper message should have been compromised. 6. Authorization Authorization is a process in which an entity is issued a credential, which specifies the privileges and permissions it has and cannot be falsified, by the certificate authority. Authorization is generally used to assign different access rights to different level of users. For instance, we need to ensure that network management function is only accessible by the network administrator. Therefore there should be an authorization process before the network administrator accesses the network management functions. 7. Anonymity Anonymity means that all the information that can be used to identify the owner or the current user of the node should default be kept private and not be distributed by the node itself or the system software. This criterion is closely related to privacy preserving, in which we should try to protect the privacy of the nodes from arbitrary disclosure to any other entities.

VIII.

Routing misbehavior in mobile ad-hoc and Sensor networks

Routing is the transfer of data packets from one location to another, and it's one of the fundamental network functions. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selsh nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we propose the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme

IJSRET @ 2012

International Journal of Scientific Research Engineering &Technology (IJSRET) Volume 1 Issue1 pp 047-051 March 2012 www. ijsret.org ISSN 2278 - 0882
region where networks are deployed. These losses can't be reduced with the improvement in ad-hoc routing protocols. Each mobile device in an ad-hoc network has to rely on others for forwarding data packets to other nodes in the network. Routing protocols of a mobile ad-hoc network is another way to transmit data from one device to another. NWB (Network-wide Broadcast) is considered to be one of the routing or data exchange related operations and it's used to discover routes for both unicast (one-to-one) and multi-cast (one-tomany) data exchange operations. NWB can also be defined as a process through which one mobile device sends a packet to all other devices in the network. NWB in mobile ad-hoc networks provides important control and route establishment functionality to different protocols of mobile ad-hoc networks. It's especially important for paging, alarming, location updates, route discoveries or even routing in highly mobile ad-hoc environments. Network-wide broadcasting is normally achieved via flooding. In a flooding or broadcasting task, a source mobile device floods or broadcasts the same message to all the devices in the network. Some of the desirable properties of a scalable flooding scheme are reliability and power and bandwidth efficiency, which can be measured by savings in rebroadcasts. XI. Ad Hoc Networks and Internet Connectivity

Fig: a traditional fixed network

IX.

Distributed management services in Mobile ad-hoc and Sensor networks

Mobile ad-hoc networks need an effective distributed management solution which can handle various tasks in emergency and rescue operations. This solution should be able to tackle some of the other components of a management system, such as resource management, privacy management and key management. The dynamic nature of a mobile ad-hoc network makes middleware services unsuitable for synchronous communication because they are too vulnerable to communication disruptions. For example, devices might suddenly be out of reach or turned off. The classic alternative to synchronous solutions is a distributed event notification system, shown in Figure A.

Among several technical challenges of mobile ad-hoc networks, the sharing of information among various computing devices can be regarded as one of the important issues. Information access and sharing is difficult in mobile ad-hoc networks because of their dynamic nature, scarce resources, and heterogeneous user devices.

X.

Network wide broadcasting, handling data loss in Mobile Ad-hoc networks

Mobile ad-hoc networks offer a unique art of network formation where mobile devices can communicate with each other without a pre-existing infrastructure. Ad-hoc networks have been considered to be the foundation for new technologies. One important issue is to try to reduce the packet or the data loss during an active transmission. In mobile ad-hoc networks, mobile link transmission errors, mobility, and network congestion are some of the major causes of data loss. Data loss due to transmission errors is mainly affected by the physical condition of the channel and the

Most of existing research limits mobile ad hoc networks to stand-alone isolated networks. Such networks are not suitable for applications that require access to services from other networks. With advancement in technology when portable devices, such as laptops, cellular phones and PDAs (Personal Digital Assistants) are widely in use, a portable device can provide many wireless interfaces, such as WLAN (Wireless LAN), GPRS (General Packet Radio Service), PHS (Personal Handy phone System) and Bluetooth. Users with portable devices equipped with these facilities want connectivity to Internet to benefit with its unlimited resources. As illustrated in Fig.3, in order to provide Internet connectivity to the nodes in an ad hoc network, routers or one or more nodes in the ad hoc network can serve as gateways to an external network, where the external network can be an infrastructure network such as LAN, Internet or a cellular network, or even an infrastructure-less network such as another ad hoc network.

IJSRET @ 2012

International Journal of Scientific Research Engineering &Technology (IJSRET) Volume 1 Issue1 pp 047-051 March 2012 www. ijsret.org ISSN 2278 - 0882
appropriate business scenarios, applications and economical models need to be identified, together with technological advances, making a transition of ad hoc networks to the commercial world viable. References [1] Ittai Abraham, Danny Dolev, Dahlia Malkhi, LLS: A Locality Aware Location Service for Mobile Ad hoc Networks. [2] J. Beutel, O. Kasten, M. Ringwald, BTnodesA Distributed Platform for Sensor Nodes, in: Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys), 2003. [3] Basagni, S., Conti, M., Giordano S., and Stojmenovic, I. (Eds.) Ad Hoc Networking. IEEE Press Wiley, New York, 2003. [4] Chlamtac, I., Conti, M., and Liu, J. J.-N. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1(1), 2003, pp. 1364. [5] Freebersyser, J. A., and Leiner, B. A DoD perspective on mobile ad hoc networks. In: Perkins, C. (Ed.) Ad Hoc Networking, Addison Wesley, Reading, MA, 2001, pp. 2951. [6] IETF MANET Working Group. http:// www.ietf.org/html.charters/manetcharter.html [7] Toh, C-K. Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall, 2002. [8] Corson, S., and Macker, J. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC 2501, IETF, Jan. 1999. [9] Abolhasan, M., Wysocki, T., and Dutkiewicz, E. A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 2004, pp. 122. [10] Royer, E., and Toh, C. A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications, 6(2), Apr. 1999, pp. 4655. [11] Hoebeke, J., Moerman, I., Dhoedt, B., and Demeester, P. Towards adaptive ad hoc network routing. International Journal of Wireless and Mobile Computing: Special Issue on Wireless Ad Hoc Networking, to be published. [12] Kozat, U. C., and Tassiulas, L. Service discovery in mobile ad hoc networks: an overall perspective on architectural choices and network layer support issues. Ad Hoc Networks.

Fig. 3. Internet Connectivity in Ad Hoc Networks As a solution, an integration of Mobile IP and ad hoc networks is implemented, such that Mobile IP enables nodes to move between different gateways while maintaining the connectivity and ad hoc routing protocols provide connectivity among the nodes within the ad hoc network. In other words we can say that Mobile IP provides macro mobility and ad hoc routing protocols provide micro mobility. Micro mobility, also called IntraDomain mobility, is the movement of a mobile node within its own network, while macro mobility, also called InterDomain mobility, is the movement of mobile node between different networks. XII. Conclusion

The rapid evolution in the field of mobile computing is driving a new alternative way for mobile communication, in which mobile devices form a self-creating, selforganizing and self-administering wireless network, called a mobile ad hoc network. Its intrinsic flexibility, lack of infrastructure, ease of deployment, auto-configuration, low cost and potential applications make it an essential part of future pervasive computing environments. As a consequence, the seamless integration of mobile ad hoc networks with other wireless networks and fixed infrastructures will be an essential part of the evolution towards future fourth generation communication networks. From a technological point of view, the realization of this vision still requires a large number of challenges to be solved related to devices, protocols, applications and services. The concise discussion in this paper shows that, despite the large efforts of the MANET research community and the rapid progress made during the last years, a lot of challenging technical issues remain unanswered. From an economical point of view, mobile ad hoc networks open up new business opportunities for telecom operators and service providers. To this end,

IJSRET @ 2012

También podría gustarte