wireless mesh network
TRANSCRIPT
Wireless Mesh Network
1
Presented by PRIYAN T
KOSHY BMCE,SASTHAMCOTA
OBJECTIVES
INTRODUCTIONMESH TOPOLOGYCLASSIFICATION OF NETWORKWIRELESS MESH NETWORKBATMAN PROTOCOLBATMAN FLLODING MECHANISMROUTINGROUTING MANIPULATION ATTACKDETECTION OF ATTACKFUTURE SCOPECONCLUSION
2
INTRODUCTION
WHAT IS A NETWORK? *Set of devices connected by
communication links
NETWORK CRITERIA*performance*security
3
Contd…
TWO TYPES OF CONNECTION
*Point to point connection*Multi point connection
NETWORK TOPOLOGY* way in which a network is setup.
TYPES OF TOPOLOGY* Mesh,star,bus,ring
4
MESH TOPOLOGY
EVERY DEVICE HAS A DEDICATED POINT TO POINT LINK.
ADVANTAGE*Eliminating traffic problems*Strong*Privacy or Security
5
Contd…
DISADVANTAGE* Space loss.*Installation and Reconnection are
difficult.*Hardware is expensive.
6
CLASSIFICATION OF NETWORK
BASED ON*medium
*scale*topology*organizational scope
BASED ON MEDIUM *Wired *Wireless
7
Wireless Mesh NetworkCommunication network made up of radio
nodes.
Class of ad-hoc network.
Two types of mesh node *Mesh Router *Mesh Client 8
CHARACTERISTICS
Dynamic self organization
Self-configuration
Self-healing
9
10
Contd.WMN
11
ADVANTAGE*Stable topology*Reliable*Offers redundancy
DISADVANTAGE*Vulnerable to attacks
APPLICATIONS
U.S military forces
Electric meter
66-satellite Iridium constellation
12
BATMAN PROTOCOLBorn out of a response to the
shortcomings of OLSR.Optimized Link State Routing Protocol
Routing protocol Design
Maximize traffic throughput minimize packet delay
Implement FLOODING MECHANISM. 13
BATMAN FLOODING MECHANISMEach node broadcast hello messages
Hello messages are also referred as OGMs.
An OGM has *originator address *sending node address *time to live *sending node address
Bad route causes packet loss, delay .14
15
(a) mesh networkContd…
16
(b)OGMs broadcasted by node O1
c)Routing table of On
contd
ROUTINGProcess of selecting paths.
Performed in many kinds of network.*Telephone Network*Electronic data Network*Transportation Network
Routing table construction17
ROUTING MANIPULATION ATTACK
Malicious node disrupts the network routes.
Two attacking methods *attacking method 1 *attacking method 2
18
19
ROUTING MANIPULATION ATTACK
A1-ATTACKERT1,T2,T3,T4-TARGET NODE
DETECTION OF ATTACK
BATMAN ADVANCED CONTROL AND MANAGEMENT TOOL (batcl).
Analyze bat-adv debugging output.
Batcl create*data base*tree structure
20
CONCLUSIONDIFFERENT ATTACKING METHODS ARE
ANALYSED.
ROUTING OPERATIONS ARE SERIOUSLY AFFECTED BY FLOODING FORGED OGM
BATMAN PROTOCOL HAS PROVED TO BE VULNERABLE TO ROUTE MANIPULATION ATTACK.
21
FUTURE SCOPE
IT OFFER INTERNET ACCESS IN AN INEXPENSIVE,CONVENIENT AND QUICK WAY.
22
REFERENCE[1] Anderson Morais,Ana Cavalli,”Detection of
attacks in wireless mesh network” from IEEE 2009-2010
[2] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Computer Networks, vol. 47, pp. 445-487, Jan. 2005.
[3] W. Zhang, Z. Wang, S. K. Das, and M. Hassan,
“Security issues in wireless mesh networks”, In Book
Wireless Mesh Networks: Architectures and protocols. New York: Springer, 2008.
23
contd…
[4] D. Johnson, N. Ntlatlapa, and C. Aichele, “A simple Pragmatic approach to mesh routing using BATMAN”, In IFIP International Symposium on Wireless Communications and Information Technology in Developing Countries .
[5] A. Neumann, C. Aichele, M. Lindner, and S.Wunderlich, “Better approach to mobile ad-hoc networking (B.A.T.M.A.N.)”, April 2008, IETF Internet-Draft (expired October 2008)
[6 ] http://www.open-mesh.net.
24
THANK YOU
25