Wan Unit Iv
Wan Unit Iv
Wan Unit Iv
UNIT-IV
TRANSPORT LAYER PROTOCOL FOR ADHOC WIRELESS NETWORKS
INTRODUCTION
The objectives of transport layer protocol include the setting up of an end-to-end connection, end-to-end
delivery of data packets, flow control, congestion control.
1. Induced Traffic:
In a path having multiple links, the traffic at any given link (or path) due to the traffic through
neighboring links (or paths) is referred to as induced traffic.
This is due to the broadcast nature of the channel and the location-dependent contention on the
channel
Induced Traffic affects the throughput achieved by the transport layer protocol.
2. Induced throughput unfairness:
This refers to the throughput unfairness at the transport layer due to the throughput/delay
unfairness existing at the lower layer such as the n/w and MAC layers.
A transport layer should consider these in order to provide a fair share of throughput across
contending flows
3. Separation of congestion control, reliability, and flow control:
A transport layer protocol can provide better performance if end-to-end reliability, flow
control and congestion control are handled separately.
Reliability and flow control are end-to-end activities, whereas congestion can at times be a
local activity
Objective minimization of the additional control overhead generated by them
4. Power and Band width constraints:
Nodes in ad hoc wireless networks face resource constraints including the two most important
resources: (i) power source and (ii) bandwidth
The performance of a Transport layer protocol is significantly affected by these resource
constraints
5. Interpretation of congestion:
Interpretation of network congestion as used in traditional networks is not appropriate in ad
hoc networks.
This is because the high error rates of wireless channel, location-dependent contention, hidden
terminal problem, packet collisions in the network, path breaks due to mobility of nodes, and
node failure due to drained battery can also lead to packet loss in ad hoc wireless networks
6. Completely decoupled transport layer:
Another challenge faced by Transport layer protocol is the interaction with the lower layers.
Cross-layer interaction between the transport layer and lower layers is important to adapt to
the changing network environment
7. Dynamic topology:
Experience rapidly changing network topology due to mobility of nodes
Leads to frequent path breaks, partitioning and remerging of networks & high delay in re-
establishment of paths
Performance is affected by rapid changes in network topology.
WIRELESS ADHOC NETWORKS IV-I (R20) KHIT UNIT-IV
Discuss briefly the reasons why TCP does not perform well in Adhoc wireless network
The major reasons behind throughput degradation that TCP faces when used in ad hoc wireless networks are
the following.
1. Misinterpretation of packet loss:
WIRELESS ADHOC NETWORKS IV-I (R20) KHIT UNIT-IV
In traditional TCP design, the packet loss is mainly attributed to network congestion.
Ad hoc wireless network experience a much higher packets loss due to
High bit rate
Increased Collections etc.
7. Multipath Routing:
For TCP, multipath routing leads to significant amount of out of order packets, when intern generates a
set of duplicate acknowledgement (DUPACKs),which cause additional power consumption and
invocation of congestion control.
Fig below illustrates the effect of network partitions in ad hoc wireless networks.
A network with two TCP sessions A & B is shown in (a) at time t1.
WIRELESS ADHOC NETWORKS IV-I (R20) KHIT UNIT-IV
At time t2, the network gets partitioned into two as shown in (b) due to dynamic topological changes.
Now TCP session A’s sender & receiver belong to two different partitions & TCP session B experiences
path break.
9. The use of sliding window based transmission:
TCP uses a sliding window for flow control.
This can contribute to degraded performance in bandwidth constrained ad hoc wireless network.
It can also lead to burstiness in traffic due to the subsequent transmission of TCP segments.
Operation:
In TCP-F, an intermediate node, upon detection of a path break, originates route failure notification
(RFN) packet. This intermediate node is called Failure point (FP).
This RFN packet is routed toward the sender of the TCP session, Sender information that is obtained
from TCP packets.
If any intermediate nodes that receive RFN has an alternate route to the same destination, then it
discards the RFN packet and uses the alternate path for forwarding further data packets, thus reducing
control overhead involved in the route reconfiguration process.
When TCP sender receives an RFN packet, it goes into a state called snooze. In this state, a sender,
o Stops sending any more packets to the destination.
o Cancels all timers.
o Freezes its congestion window.
o Freezes the retransmission timer.
o Sets up a route failure timer.
When route failure timer expires, the TCP sender changes from snooze state to connected state.
When the route re-establishment has been done, then the failure point sends Route Re-establishment
Notification (RRN) packet to the sender and the TCP state is updated back to the connected state.
Advantages :
Simple feedback solution for problem arising
from path breaks.
Permits TCP congestion control mechanism
to respond to congestion in the network.
Disadvantages:
If a route to sender is not available at the FP,
then additional control packets may need to
be generated for routing RFN packets.
TCP-F has an additional state compared to
traditional TCP state mechanism.
Congestion window used after a new route is
obtained may not reflect the acheivable
transmission rate acceptable to the network
and the TCP-F receiver.
Operation:
ELFN is originated by the node detecting a path break upon detection of a link failure to the TCP sender.
This can be implemented in two ways :
1. By sending an ICMP Destination Unreachable (DUR) message to the sender.
(or)
2. By piggy-backing this information to the sender.
Once the TCP sender receives the ELFN packet, it disables its retransmission timers and enters a
standby state.
In this state, it periodically originates probe packets to see if a new route is established.
Upon reception of an ACK by the TCP receiver for the probe packets, it leaves the standby state, and
continues to function as normal.
Advantages:
Improves TCP performance by decoupling the path break information from the congestion information
by the use of ELFN.
Less dependent on routing protocol & requires only link failure notification about the path break.
Disadvantages:
When the network is temporarily partitioned, the path failure may last longer & this can lead to the
origination of periodic probe packets consuming bandwidth & power.
Congestion window used after a new route is obtained may not reflect the achievable transmission rate
acceptable to the network and the TCP receiver.
Operation:
Upon detection of a path break, an upstream intermediate node, called pivot node (PN),originates an
explicit route disconnection notification ( ERDN ) message to the TCP-BuS sender.
ERDN propagated in a reliable way.
Upon receiving ERDN packet, the TCP-BuS sender stops transmission and freezes all timers and
windows as in TCP-F.
The packets in transmit at the intermediate nodes from the TCP-BuS sender to the PN are buffered
until a new partial path from the PN to the TCP-BuS receiver is obtained by the PN.
Upon detection of a path break, the downstream node originates a Route Notification (RN) packet to
the TCP-BuS receiver, which is forwarded by all the downstream nodes in the path.
PN attempts to find new partial path (route) to the TCP-BuS receiver , and the availability of such a
partial path to destination is intimated to the TCP-BuS sender through an explicit route successful
notification (ERSN) packet.TCP utilizes route reconfiguration mechanism of ABR to obtain partial path
to the destination.
Upon a successful LQ-REPLY process to obtain a new route to the TCP-BuS receiver, PN informs the
TCP-BuS sender of the new partial path using ERSN Packet.(it is sent reliably)
TCP-BuS sender also periodically originates probe packets to check the availability of a path to the
destination.
Below figure illustrates the operation of TCP-BuS.
WIRELESS ADHOC NETWORKS IV-I (R20) KHIT UNIT-IV
Advantages:
Performance improvement.
Avoidance of fast retransmission due to
the use of buffering, sequence numbering,
and selective acknowledgement.
Also takes advantage of the underlying
routing protocols.
Disadvantages:
Increased dependency on the routing
protocol and the buffering at the
intermediate nodes.
The failure of intermediate nodes that
buffer the packets may lead to loss of
packets and performance degradation.
The dependency on the routing protocol
may degrade its performance with order
routing protocols that do not have similar
control messages as in ABR.
AD HOC TCP
Based on feedback information received from the intermediate nodes, the TCP sender changes its state
to the
o Persist state.
o Congestion control state or
o Retransmission state.
When an intermediate node finds that the network is partitioned, then the TCP sender state is changed
to the persist state where it avoids unnecessary retransmissions.
Figure shows the thin layer implementation of ATCP between the traditional TCP layer and the IP layer.
This does not require changes in the existing TCP protocol.
This layer is active only at the TCP sender.
Advantages:
o It maintains the end to end semantics of TCP.
o It is compatible with traditional TCP.
o Improves throughput of TCP in adhoc wireless network.
Disadvantages:
o Dependency on the network layer protocol to detect the route changes and partitions.
o Addition of thin ATCP layer to TCP/IP protocol stack requires changes in the interface functions
currently being used
Split TCP
Major issues that affect the performance of TCP over adhoc wireless network is the degradation of
throughput with increasing path length.
This can also lead to unfairness among TCP sessions where one session may obtain much higher
throughput than other sessions.
This unfairness problem is further worsened by the use of MAC protocols, which are found to give a
higher throughput for certain link level sessions, leading to an effect known as channel capture.
Split TCP provides a unique solution to this problem by splitting the transport layer objectives into:
Congestion control.
End to End reliability.
In addition, split TCP splits a long TCP connection into a set of short concatenated TCP connections
(called segments or zones) with a number of selected intermediate nodes (known as proxy nodes) as
terminating points of these short connections.
Figure illustrates the operation of split-TCP where a three segment split –TCP connection exists
between source node1 and destination node 15.
A proxy node receives the TCP packets, reads its contents, stores it in its local buffer, and sends an
acknowledgement to the source (or the previous proxy)
This acknowledgement is called Local acknowledgement (LACK) does not guarantee end to end
delivery.
The responsibility of further delivery of packets is assigned to the proxy node.
In figure, node 1 initiates a TCP session to node 15, node 4 and node 13 are chosen as proxy nodes.
WIRELESS ADHOC NETWORKS IV-I (R20) KHIT UNIT-IV
The number of proxy nodes in a TCP session is determined by the length of the path between source &
destination node.
Based on a distributed algorithm, the intermediate nodes that receive TCP packets determine whether
to act as a proxy node or just as a simple forwarding node.
In figure, the path between nodes 1 & 4 is the first zone (segment), the path between nodes 4 to 13 is
the second zone (segment), and the last zone is between node 13 and 15.
The proxy node 4, upon receipt of each TCP packet from source node1,acknowledges it with a LACK
packet, & buffers the received packets. This buffered packet is forwarded to the next proxy node at a
transmission rate proportional to the arrival of LACKs from the next proxy node or destination.
Advantages:
Improved throughput.
Improved throughput fairness.
Lessened impact of mobility.
Disadvantages:
Requires modifications to TCP
protocol.
End to End connection handling of
traditional TCP is violated.
The failure of proxy nodes can lead
to throughput degradation.
Disadvantage:
Not compatible with TCP
Advantages:
Improved performance
Decoupling congestion control and reliability mechanisms
avoidance of congestion window fluctuations
Disadvantage:
lack of interoperability with TCP
WIRELESS ADHOC NETWORKS IV-I (R20) KHIT UNIT-IV
2. Integrity:
a. The data sent by the source node should reach the destination node without being altered.
b. It should not be possible for any malicious node in the network to tamper with the data during
transmission
3. Availability:
a. The network should remain operational all the time.
b. It must be robust enough to tolerate link failures and also be capable of surviving various
attacks mounted on it.
c. It should be able to provide guaranteed services whether an authorized user requires them
4. Non-Repudiation:
a. It is a mechanism to guarantee that the sender of a message cannot later deny having sent the
message and that the recipient cannot deny having received the message.
b. Digital signatures are used for this purpose.
4. Physical Vulnerability :
a. Nodes in these networks are usually compact & hand-held in nature.
b. They could get damaged easily & are also vulnerable to theft.
a. In wired networks & infrastructure-based wireless networks, it would be possible to monitor the
traffic on the network through certain important central points & implement security mechanisms
at such points.
b. Since adhoc –wireless networks do not have central points, these mechanisms cannot be applied in
ad hoc wireless networks.
6. Lack of associations:
a. Since these networks are dynamic in nature, a node can join or leave the network at any pont of
time.
b. If no proper authentication mechanism is used for associating nodes in a network, an intruder
would be able to join into the network quite easily & carry out his/her attacks.
Attacks on adhoc wireless networks can be classified into 2 broad categories, namely:
1. Passive attack
a. It does not disrupt the operation of the network; the adversary snoops the data exchanged in
the network without altering it.
b. One way to overcome such problems is to use powerful encryption mechanisms to encrypt the
data being transmitted.
2. Active attack
a. An active attack attempts to alter or destroy the data being exchanged in the network, thereby
disrupting the normal functioning of the network.
b. They can be further classified into 2 categories :
i. External attacks, which are carried out by nodes that do not belong to the network. They
can be prevented using standard encryption techniques and firewalls.
ii. Internal attacks are from compromised nodes that are actually part of the network.
a. In this attack, an attacker receives packets at one location in the network & tunnels them
(possibly selectively) to another location in the network, where the packets are resent into the
network. This tunnel between 2 colliding attackers is referred to as a wormhole.
b. If proper mechanisms are not employed to defend the network against wormhole attacks,
existing routing protocols for adhoc wireless networks may fail to find valid routes.
2. Blackhole attack:
a. In this attack, a malicious node falsely advertises good paths to destination node during path-
finding process or in route update messages.
b. The intention of malicious node could be to hinder the path-finding process or to intercept all
data packets being sent to the destination node.
3. Byzantine attack:
a. Here, a compromised intermediate note or a set of compromised intermediate nodes work in
collusion & carries out attack such as creating routing loops, routing packets on non-optimal
paths & selectively dropping packets.
4. Information disclosure:
a. A compromised node may leak confidential or important information to unauthorized nodes in
the network.
6. Routing attacks:
a. There are several types of attacks mounted on routing protocol & they are as follows:
i. Routing table overflow:
o In this type of attack, an adversary node advertises routes to non-existent nodes,
to the authorized nodes present in the network.
o The main objective of this attack is to cause an overflow of routing tables, which
would in turn prevent the creation of entries corresponding to new routes to
authorized nodes.
ii. Routing table poisoning:
o Here, the compromised nodes in the networks send fictitious routing updates or
modify genuine route update packets sent to other uncompromised nodes.
o This may result in sub-optimal routing, congestion in network or even make
some parts of network inaccessible.
iii. Packet replication:
o In this attack, an adversary node would replicate state packets.
iv. Route cache poisoning:
o Similar to routing table poisoning, an adversary can also poison the route cache
to achieve similar activities.
v. Rushing attack:
o On-demand routing protocols that use duplicate suppression during the route
discovery process are vulnerable to this attack.
b. Since most authentication processes are carried out only at the start of session, once the session
between 2 nodes get established, the adversary node masquerades as one of the end-nodes of
the session & hijacks the sessions.
OTHER ATTACKS:
This section discusses security attacks that cannot strictly be associated with any specific layer in the network
protocol stack
MULTI-LAYER ATTACKS
Multi-layer attacks are those that could occur in any layer of the network protocol stack. Some of the multi-
layer attacks in adhoc wireless networks are:
1. Denial of Service
In this type of attack, an adversary attempts to prevent legitimate & authorized users of services offered by
the network from accessing those services.
This may lead to a failure in the delivery of guaranteed services to the end users.
Some of the DoS attacks are as follows:
o Jamming – in this form of attack, the adversary initially keeps monitoring the wireless medium in
order to determine the frequency at which the receiver node is receiving signals from the sender.
Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum (DSSS) are two
commonly used techniques that overcome jamming attacks
o SYN flooding – here, an adversary sends a large number of SYN packets to a victim node, spoofing
the return addresses of the SYN packets. The victim node builds up a table/data structure for
holding information regarding all pending connections. Since the maximum possible size of the
table is limited, the increasing number of half-connections results in an overflow in the table.
o Distributed DoS attack – here, several adversaries that are distributed throughout the network
collide and prevent legitimate users from accessing the services offered by the network.
2. Impersonation
In these attacks, an adversary assumes the identity & privileges of an authorized node, either to make use
of network resources that may not be available to it under normal circumstances, or to disrupt the normal
functioning of the network by injecting false routing information into the network.
A man-in-the-middle attack is another type of impersonation attack.
DEVICE TAMPERING
Unlike nodes in a wired network, nodes in adhoc wireless networks are usually compact, soft and hand-
held in nature.
They could get damaged or stolen easily.
Two paths exist between the two officers O1 and O2 who want to communicate with each other
One of these paths is a shorter path which runs through private nodes whose trust levels are very low
Hence, the protocol chooses a longer but secure path which passes through other secure nodes
Nodes of equal levels of trust distribute a common key among themselves and with those nodes having
higher levels of trust
The SAR mechanism can be easily incorporated into the traditional routing protocols for ad hoc
wireless networks
It could be incorporated into both on-demand and table-driven routing protocols
The SAR protocol allows the application to choose the level of security it requires
But the protocol requires different keys for different levels of security
This tends to increase the number of keys required when the number of security levels used increase
Each node maintains a routing table containing the list of all known routes to various destination nodes
in the network
The metric used for routing is the distance measured in terms of hop-count
The routing table is updated periodically by exchanging routing information
An alternative approach to this is triggered updates, in which each node broadcasts routing updates
only if its routing table gets altered.
ISSUE OF CERTIFICATES
There exists an authenticated trusted server whose public key is known to all legal nodes in the
network
The ARAN protocol assumes that keys are generated a priori by the server and distributed to all nodes
in the network
On joining the network, each node receives a certificate from the trusted server
The certificate received by a node A from the trusted server T looks like the following:
Where,
WIRELESS ADHOC NETWORKS IV-I (R20) KHIT UNIT-IV