wireless mesh network

Post on 10-Apr-2017

694 views 0 download

Transcript of wireless mesh network

Wireless Mesh Network

1

Presented by PRIYAN T

KOSHY BMCE,SASTHAMCOTA

OBJECTIVES

INTRODUCTIONMESH TOPOLOGYCLASSIFICATION OF NETWORKWIRELESS MESH NETWORKBATMAN PROTOCOLBATMAN FLLODING MECHANISMROUTINGROUTING MANIPULATION ATTACKDETECTION OF ATTACKFUTURE SCOPECONCLUSION

2

INTRODUCTION

WHAT IS A NETWORK? *Set of devices connected by

communication links

NETWORK CRITERIA*performance*security

3

Contd…

TWO TYPES OF CONNECTION

*Point to point connection*Multi point connection

NETWORK TOPOLOGY* way in which a network is setup.

TYPES OF TOPOLOGY* Mesh,star,bus,ring

4

MESH TOPOLOGY

EVERY DEVICE HAS A DEDICATED POINT TO POINT LINK.

ADVANTAGE*Eliminating traffic problems*Strong*Privacy or Security

5

Contd…

DISADVANTAGE* Space loss.*Installation and Reconnection are

difficult.*Hardware is expensive.

6

CLASSIFICATION OF NETWORK

BASED ON*medium

*scale*topology*organizational scope

BASED ON MEDIUM *Wired *Wireless

7

Wireless Mesh NetworkCommunication network made up of radio

nodes.

Class of ad-hoc network.

Two types of mesh node *Mesh Router *Mesh Client 8

CHARACTERISTICS

Dynamic self organization

Self-configuration

Self-healing

9

10

Contd.WMN

11

ADVANTAGE*Stable topology*Reliable*Offers redundancy

DISADVANTAGE*Vulnerable to attacks

APPLICATIONS

U.S military forces

Electric meter

66-satellite Iridium constellation

12

BATMAN PROTOCOLBorn out of a response to the

shortcomings of OLSR.Optimized Link State Routing Protocol

Routing protocol Design

Maximize traffic throughput minimize packet delay

Implement FLOODING MECHANISM. 13

BATMAN FLOODING MECHANISMEach node broadcast hello messages

Hello messages are also referred as OGMs.

An OGM has *originator address *sending node address *time to live *sending node address

Bad route causes packet loss, delay .14

15

(a) mesh networkContd…

16

(b)OGMs broadcasted by node O1

c)Routing table of On

contd

ROUTINGProcess of selecting paths.

Performed in many kinds of network.*Telephone Network*Electronic data Network*Transportation Network

Routing table construction17

ROUTING MANIPULATION ATTACK

Malicious node disrupts the network routes.

Two attacking methods *attacking method 1 *attacking method 2

18

19

ROUTING MANIPULATION ATTACK

A1-ATTACKERT1,T2,T3,T4-TARGET NODE

DETECTION OF ATTACK

BATMAN ADVANCED CONTROL AND MANAGEMENT TOOL (batcl).

Analyze bat-adv debugging output.

Batcl create*data base*tree structure

20

CONCLUSIONDIFFERENT ATTACKING METHODS ARE

ANALYSED.

ROUTING OPERATIONS ARE SERIOUSLY AFFECTED BY FLOODING FORGED OGM

BATMAN PROTOCOL HAS PROVED TO BE VULNERABLE TO ROUTE MANIPULATION ATTACK.

21

FUTURE SCOPE

IT OFFER INTERNET ACCESS IN AN INEXPENSIVE,CONVENIENT AND QUICK WAY.

22

REFERENCE[1] Anderson Morais,Ana Cavalli,”Detection of

attacks in wireless mesh network” from IEEE 2009-2010

[2] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Computer Networks, vol. 47, pp. 445-487, Jan. 2005.

[3] W. Zhang, Z. Wang, S. K. Das, and M. Hassan,

“Security issues in wireless mesh networks”, In Book

Wireless Mesh Networks: Architectures and protocols. New York: Springer, 2008.

23

contd…

[4] D. Johnson, N. Ntlatlapa, and C. Aichele, “A simple Pragmatic approach to mesh routing using BATMAN”, In IFIP International Symposium on Wireless Communications and Information Technology in Developing Countries .

[5] A. Neumann, C. Aichele, M. Lindner, and S.Wunderlich, “Better approach to mobile ad-hoc networking (B.A.T.M.A.N.)”, April 2008, IETF Internet-Draft (expired October 2008)

[6 ] http://www.open-mesh.net.

24

THANK YOU

25