Professional Documents
Culture Documents
christian.bettstetter@ei.tum.de
hannes.hartenstein@ccrle.nec.de
mauve@cs.uni-duesseldorf.de
Multi-hop communication
Decentralized, mobility-adaptive
operation
Applications
Accident warning
Floating car data
Multihop extensions of Infostations
Measurement
equipment
Pictures by Ch. Schwingenschlgl and T. Kosch
MoMuC 2003 Tutorial Ad Hoc Networking
measure temperature
detect vibrations
make photos
...
UC Berkeley
Key Challenges
Routing
Security
Clustering
Connectivity
Proactive approach:
Problem:
topology changes
significant network traffic
even when the route is not used
Flooding!
MoMuC 2003 Tutorial Ad Hoc Networking
Routing Protocols
Proactive protocols
Hybrid protocols
Trade-Off
z
Proactive protocols may have lower latency since routes are maintained at
all times
Reactive protocols may have higher latency because a route from X to Y
will be found only when X attempts to send to Y
Reactive protocols may have lower overhead since routes are determined
only if needed
Proactive protocols can (but not necessarily) result in higher overhead due
to continuous route updating
Y
Z
S
E
F
G
H
Broadcast transmission
Z
S
E
F
G
H
Y
Z
S
E
F
G
H
K
I
M
D
N
Y
Z
S
E
F
G
H
K
I
D
N
Y
Z
S
E
F
G
H
Y
Z
S
E
F
G
H
K
I
D
N
Y
Z
S
E
F
G
H
K
I
D
N
Flooding completed
Nodes unreachable from S do not receive packet P (e.g., node Z)
Nodes for which all paths from S go through the destination D
also do not receive packet P (example: node N)
MoMuC 2003 Tutorial Ad Hoc Networking
Y
Z
S
E
F
G
H
K
I
Route Reply travels along the reverse path set-up when Route
Request is forwarded
Y
Z
S
E
F
G
H
K
I
D
N
Broadcast transmission
Z
S
E
F
G
H
K
I
D
N
Y
Z
S
E
F
G
H
Y
Z
S
E
F
G
H
K
I
D
N
Y
Z
S
E
F
G
H
K
I
M
D
N
Y
Z
S
E
F
G
H
Y
Z
S
E
F
G
H
Y
Z
S
E
F
G
H
K
I
D
N
Y
DATA
Z
S
E
F
G
H
Timeouts
if no is data being sent using a particular routing table entry, that entry will
be deleted from the routing table (even if the route may actually still be
valid)
When the next hop link in a routing table entry breaks, all active
neighbors are informed
When node S wants to send a packet to node D, but does not know a
route to D, node S initiates a route discovery
Y
Z
S
E
F
G
H
K
I
D
N
Broadcast transmission
[S]
S
Z
E
F
G
H
K
I
D
N
Y
Z
S
[S,E]
F
[S,C]
G
K
D
N
Y
Z
S
E
[S,E,F,J]
G
H
K
I
D
[S,C,G,K]
Y
Z
S
RREP [S,E,F,J,D]
F
G
H
K
I
D
N
Y
DATA [S,E,F,J,D]
S
E
F
G
H
K
I
D
N
Status:
Key Problems:
References
z
z
z
z
z
Concept route
A
HD
S
Ul
Ul
HD
Positional information
Strong assumption
Positioning
z
Protocols:
{
{
1
Source
6
Destination
Time t+1s
Positioning
Position
Service
Forwarding
Strategy
MoMuC 2003 Tutorial Ad Hoc Networking
class
all-for-one
all-for-some
some-for-some
all-for-all
example
RLS
HomeZone, Grid LS
Quorum systems
DREAM
traditional classification
reactive
proactive/reactive
proactive/reactive
proactive
MFR,Greedy: C
NFP: A
Compass: B
face-2 [BMSU99]
Perimeter-Routing
[KK00]
Theoretical results
z
z
[KWZ02]: Worst Case Theorem: Let c denote the length of the shortest
route for a given source-destination pair. Every deterministic geographic
routing algorithm requires (c2) steps to find the optimal route.
[KWZ02]: AFR algorithm is asymptotically optimal.
Topology-based
Route Discovery
Position-based
Position Service
Route Maintenance
Route Maintenance
Challenges for
position-based routing:
(radio-) obstacles and voids!
Topology-based
(DSR)
Distance between source and destination [m]
Bandwidth:
[Hermann, DCAG]
6250m x 3450m
28 junctions
67 streets
32,29km total length
955 vehicles
position-based routing.
802.11, 2Mbps
Position-based
Topology-based
(DSR)
Topology-based
(DSR)
Position-based
unlimited
bandwidth
DSR-EMU
DSR
History / Future
z
2008: Galileo
z Position-based routing for inter-vehicle communication
z Position-based routing for sensor networks
MoMuC 2003 Tutorial Ad Hoc Networking
z
z
z
z
z
Position-based multicast
Load balancing, fairness
What is the optimal location service given some communication
patterns?
Routing in 2D scenarios with radio obstacles
Security, confidentiality of routing information
References
General:
z [MWH01] M. Mauve, J. Widmer, H. Hartenstein, A survey on positionbased routing in mobile ad hoc networks, IEEE Network, Nov/Dec
2001.
z [GS02] S. Giordano, I. Stojmenovic, Position-based ad hoc routes in
ad hoc networks, in: M. Illyas (ed.), The Handbook of Ad Hoc Wireless
Networks, CRC Press, 2002.
Positioning w/o GPS:
z [CHH01] S. Capkun, M. Hamdi, J.-P. Hubaux, GPS-free positioning in
mobile ad hoc networks, HICSS 2001.
z [IS03] R. Iyengar and B. Sikdar, Scalable and Distributed GPS Free
Positioning for Sensor Network, IEEE ICC 2003.
Geocast:
z [NI97] J. Navas, T. Imielinski, GeoCast geographic addressing and
routing, ACM Mobicom, Budapest, 1997.
References
Location services:
z [KFHM02] M. Ksemann, H. Fler, H. Hartenstein, M. Mauve, A
reactive location service for mobile ad hoc networks, Technical Report
TR-14-2002, Dept. Computer Science, University of Mannheim, Nov.
2002.
z [GH99] S. Giordano, M. Hamdi, Mobility Management: The Virtual
Home Region, Technical Report SSC/1999/037, EPFL-ICA, 1999.
z [LJCKM00] J. Li, J. Jannotti, D. De Couto, D. Karger, R. Morris, A
scalable location service for geographic ad hoc routing, ACM
Mobicom, Boston, 2000.
z [BCSW98] S. Basagni, I. Chlamtac, V. R. Syrotiuk, B. A. Woodward, A
distance routing effect algorithm for mobility (DREAM), ACM Mobicom,
Dallas, 1998.
Forwarding strategies:
z [TK84] H. Takagi, L. Kleinrock, Optimal transmission ranges for
randomly distributed packet radio terminals, IEEE Trans. on
Communications, March 1984.
z [F87] G. Finn, Routing and addressing problems in large metropolitanscale Internetworks, ISI Research Report ISU/RR-87-180, March 1987.
MoMuC 2003 Tutorial Ad Hoc Networking
References
z
References
z
Hitachis mu chip
- not yet a sensor ...
Berkeley Motes
Building
management
Weather
station
(C) Siemens
MoMuC 2003 Tutorial Ad Hoc Networking
Mobile self-configuring or
self-organizing sensor networks
From: Karlof/Wagner
Topical areas:
Designs, materials and concepts for new sensors and sensing systems
Signal Processing
Application
Machine-to-Machine, or Machine-to-Man
Application-specific
Networking
Vertically/horizontally
intra-node collaboration:
combining multiple sensing
modalities
inter-node collaboration:
combining measurements of
different nodes, particularly to
increase confidence in
measurements.
Seminal paper by
Intanagonwiwat, Govindan,
Estrin, Mobicom 2000.
Basic idea:
[from Mobicom
2000 paper]
=
=
=
=
type
=
instance =
location =
intensity =
confidence=
timestamp =
four-legged animal
20ms
10s
[-100, 100, 200, 400]
four-legged animal
elephant
[125,220]
0.6
0.85
01:20:40
Interest
Response
No source-destination addresses!
MoMuC 2003 Tutorial Ad Hoc Networking
Data rate can be tuned to first find nodes that actually can responed
to an interest with moderate network load. Upon success, the data rate
is increased but only for suitable paths/nodes.
Sensor node in the interests area sends data to all r-neighbors of this
interest.
z Nodes receiving data
Conclusions
Data-centric dissemination
Reinforcement-based adaptation to the
emperically best path
In-network data aggregation and caching.
References
z
So far:
MAC protocol design has been an active area of research for many
years [CGL00a]
carrier sensing
A
z
A
z
RTS/CTS Example
RTS = Request-to-Send
RTS
A
RTS/CTS Example
RTS = Request-to-Send
RTS
A
NAV = 10
RTS/CTS Example
CTS = Clear-to-Send
CTS
A
RTS/CTS Example
CTS = Clear-to-Send
CTS
A
NAV = 8
RTS/CTS Example
DATA
A
RTS/CTS Example
Reserved area
Consequence:
RTC/CTS often turned off for highly mobile multi-hop ad-hoc networks
Reliability
ARQ Example
DATA
A
ARQ Example
ACK
A
Implicit assumption:
Unlikely?
Note: broadcasts (used for route discovery) are not protected by ARQ
Ranges
Carrier sense
range
Interference
range
DATA
A
Transmit range
Consequence:
routes (found via broadcast) may not be usable for data traffic
called Grey Zones [LNT02a]
Conclusion
inter-vehicle communication
as access network
References
z
Structure
z
z
z
z
z
z
z
z
Privacy/anonymity
Features/needs:
z confidentiality, sort
of ...
z no unauthorized
dissemination of
personal data
z location, address,
service privacy
Dependability
Features/needs:
z availability
z ...
Passive attacks
Active attacks
get content
profiling
cryptography
monitoring
line of defense
Equipment
Battery
Radio
Jamming
DLC
Routing
Congestion control
Application
Spoofing
z ... modification of address ...
z
Examples:
z AODV/DSR: forming loops.
[Sanzgiri02]
z
[Sanzgiri02]
Open environment:
Requirements increase
but:
Assumptions to build on
increase, too
ARAN: checklist
z
z
z
z
Example: X.509 certificate is usually several hundred bytes long with 700
bytes a typical value (ANSI DER).
Compressed format with only mandatory fields is important.
F (x)
F (x)
Intermediate Intermediate
...
Top hash
n
F (x)
...
Examples Scenarios/Solutions:
z Key agreement in a local group (Asokan, Ginzboorg 2000)
based on encrypted key exchange; transforms weak secret into strong one.
based on threshold cryptography; only a min of t server can sign a certificate
Detection-based methods
Motivation-based methods
Intrusion detection
z
Source:
Zhang, Lee
Conclusions
z
z
z
z
z
References I
z
z
z
z
z
z
z
z
z
References II
z
z
Zhou, L., Haas, Z., Securing ad hoc networks, IEEE Network Magazine,
Nov/Dec 1999.
Capkun, S., Buttyan, L., Hubaux, J.-P., Self-organizing public-key
management for mobile ad hoc networks, IEEE Trans. on Mobile Computing,
vol. 2, no. 1. , January-March 2003.
S. Buchegger, J. Y. Le Boudec, Performance Analysis of the CONFIDANT
Protocol (Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks),
Proceedings of MobiHoc 2002, Lausanne, June 2002
K. Paul, D. Westhoff, "Context Aware Detection of Selfish Nodes in DSR
based Ad-hoc Networks", Proceedings of IEEE GLOBECOM `02, Taipei,
Taiwan, November 2002.
N. Ben Salem, L. Buttyn, J. P. Hubaux, and M. Jakobsson, A Charging and
Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks,
Fourth ACM International Symposium on Mobile Ad Hoc Networking and
Computing (MobiHoc), Annapolis, Maryland, USA. June 1-3, 2003
S. Zhong, Y. R. Yang, J. Chen, "Sprite: A Simple, Cheat-Proof, Credit-Based
System for Mobile Ad-hoc Networks", Proceedings of IEEE INFOCOM `03,
San Francisco, USA, March 2003.
B. Lamparter, K. Paul, D. Westhoff, "Charging Support for Ad Hoc Stub
Networks", Elsevier Journal of Computer Communication, Vol. 26, Issue 13,
August 2003, pp. 1504-1514.
Distributed Clustering
Christian Bettstetter, TU Mnchen
Clustering
Creates hierarchy
Useful for:
Hierarchical routing
Address assignment
In ad hoc networks:
Distributed algorithm
Online algorithms
Adaptive to mobility
Makes dynamic networks look less dynamic.
Cluster
two hop size
Example of Visualization
expected % of clusterheads
Clustering Algorithms
Problem Statement
Connectivity
Disk of radius a
MoMuC 2003 Tutorial Ad Hoc Networking
Connectivity
almost sure
as
In practice: Critical (r0, n)-pairs for P(no iso node) = 99% are
very tight bounds for P(con) = 99%. (see Bettstetter Mobihoc02)
Mathematical background: Penroses theorem on the
connectivity of geometric random graphs (1997, 1999)
Disk of radius R
Chr. Bettstetter, H. Hartenstein, M. Mauve
=1
=+
Further Issues
...
Some Literature
Piret, Cn the connectivity of radio networks, IEEE Trans. Inf. Theory, Sept 1991.
Gupta and Kumar, Critical power for asymptotic connectivity in wireless networks, in
Stoch. Analysis, Control, Optimization, and Appl, Birkhuser, 1998.
Santi, Blough, and Vainstein, A probabilistic analysis for the radio range assignment
problem in ad hoc networks, in Proc. ACM MobiHoc, Long Beach, Oct. 2001.
Dousse, Thiran, and Hasler, Connectivity in adhoc and hybrid networks, in Proc.
IEEE Infocom, New York, June 2002.
Santi, Blough, The critical transmitting range for connectivity in sparse wireless
ad hoc networks, IEEE Trans. Mobile Comp., March 2003
Access routers
Mobile IP
IP address:
subnet prefix
host
link-local prefix
interface ID
Destination
Multiple Addresses
Home IP address
for identification
Care-of IP address
MANET-local address
Summary
Address autoconfiguration
Hybrid routing
Path selection
Gateway selection
..
Some Literature
Routing
Security
Clustering
Connectivity
Future Research