Paper Menu >>
Journal Menu >>
J. Software Engineering & Applications, 2009, 2:50-54 Published Online April 2009 in SciRes (www.SciRP.org/journal/jsea) Copyright © 2009 SciRes JSEA Research on Survivability of Mobile Ad-hoc Network Yuan Zhou1, Chunhe Xia1, Haiquan Wang1, Jianzhong Qi1 1Key Laboratory of Beijing Network Technology, School of Computer Science and Engineering, Beihang University, Beijing, China. Email: zhouyuan84825@163.com Received November 26th, 2008; revised January 7th, 2009; accepted February 16th, 2009. ABSTRACT In this paper, we analyze the survivability of Mobile Ad Hoc Network systemically and give a detailed description of the survivability issues related to the MANET. We begin our work with analyzing the requirements of survivability of ad hoc network, and then we classify the impacts that affect survivability into three categories: dynamic topology, faults and attacks. The impacts of these factors are analyzed individually. A simulation environment for the MANET towards survivability is designed and implemented as well. Experiments that under the requirements and the impacts we de- clared are done based on this environment. Keywords: Ad hoc, Survivability, GTNeTS, Simulation 1. Introduction A mobile ad-hoc network (MANET) is a kind of self-organized wireless network with a collection of mo- bile hosts that is multi-hop instead of using any fixed infrastructure or centralized management [1,2,3]. There are a lot of potential applications of MANET in both ci- vilian and military areas. For instance, it can be applied in disaster communications, used as the back-up network of traditional mobile communication networks and used to build tactical network, etc. With the characteristic of MANET like: dynamic topology, no infrastructure or trust institution and limited power resources, research on survivability of MANET is becoming an academic hot- spot. The concept of survivability was first presented by Barnes in 1993. After that, Knight, K.Sullivan, R. J. Elli- son and many research institutes have done lots of effort on issues of survivability. To be brief, survivability is the capability of a system to provide essential services under attacks, failures or accidents. At present, many researches of MANET survivability put emphasis on designing new survivable routing protocols for specific problems [4,5]. However, there is few integrated and systematic analysis in the MANET survivability area [6]. On the other hand, research institutions usually use simulation approaches for experimental verification on MANET. However, the existing MANET simulators are mainly constructed for the purpose of experimenting performance or protocol of MANET [7]. Attributions related to MANET survivabil- ity are absent in the simulator structure. Additionally, threats like faults and attacks can not to be brought in to those simulators easily to verify MANET survivability issues. For the above reasons, this paper presents a systematic analysis of MANET towards survivability. It describes how various impacts affect the survivability of MANET in details. Meanwhile, a simulation environment is designed and implemented for MANET towards survivability, which incorporates not only the attributions related to MANET survivability but also fault events and attack events against MANET. Users can draw many kinds of scenarios of MANET to test survivability issues under this simulation environment. 2. Analysis of Survivability of MANET 2.1 Definition of Survivability Barnes presented the conception of “Survivability” for the first time in 1993, but until now, there is no all- acceptant definition of Survivability. The most influ- encing definition is presented by a research group of CMU/SEI, who define survivability as the capability of a system to fulfill its mission in a timely manner, in the presence of attacks, failures, or accidents [8]. Many other researchers define survivability from different perspective: In the area of software engineering, Deutsch defined surviva- bility as the degree to which essential functions are still available even though some part of the system is down [9]. Ellison et al. introduced the following definition: survivability is the ability of a network computing system to provide essential services in the presence of attacks and failures, and recover full services in a timely manner [10]. Researchers like Moi- tra [11], Jha [12], and Wilson [13] also defined the sur- vivability similarly. This work was supported by three projects: the National 863 Projec t -Research on high level description of network survivability model and its validation simulation platform under Grant No.2007AA01Z407, The Co-Funding Project of Beijing Municipal education Commission unde r Grant No.JD100060630 and National Foundation Research Project. Research on Survivability of Mobile Ad-hoc Network 51 Copyright © 2009 SciRes JSEA The definitions above well describe the meaning of survivability in natural language, but attributions towards survivability are not embodied, especially those of the MANET. Compared with the descriptive definition, a formal description can give a more rigorous definition of survivability of MANET. 2.2 Definition of Survivability of MANET After analyzing the definitions listed above, we find that the essence of survivability is the ability of providing essential system-wide service. Papers [6,14,15] presented that the essential service a mobile ad hoc network must provide is the communication service. That is to say, in the context of MANET, the essential service is primarily pivotal to a fundamental requirement: establishing a connection between any two nodes in an ad hoc network at any instant. So the survivability issue depends on how well an ad hoc network demands the requirement. On the other hand, the threads mobile ad hoc network must face to are as follows: 1) Dynamic topology influence. Nodes in an MANET can move arbitrarily. Consequently, network topology may change rapidly and randomly. 2) Faults that may happen in nodes and links. For in- stance, a node can shutdown itself for certain reasons, and a link may be influenced by an obstacle. 3) Every layer of ad hoc network architecture may be under attack. The Wormhole, Blackhole attacks aim at the network layer, jamming and eavesdropping attacks aim at the physical layer, and SYN flooding attacks aims at the transport layer, to name a few. With the above analysis we can define the survivability of a mobile ad hoc network as, the ability of establishing a communication service between any two nodes in the network at any instant under the impact of dynamic to- pology, faults and attacks. 2.3 Detailed Description of Survivability of MANET Based on the definition of survivability of MANET above, the system of MANET towards survivability is- sues can be abstracted into three members: mobile ad hoc network, the impacts which can affect the survivability of the mobile ad hoc network, and the essential service that a mobile ad hoc network must provide. It can be de- scribed as follows. Then, we will analyze them in detail SurvivalAdhoc={ADHOC,SERVICE,IMPACT} (1) The mobile ad hoc network is composed of a number of nodes with certain attributions related to the surviv- ability and directed links. We consider the node obtaining following attributions: IP address, location, radio range, state (transmit, receive, idle and down), power, protocol type and, mobility type. All these attributions are related to the survivability of MANET. It can also be described as follows: ADHOC::={NODE,LINK} (2) NODE::={node1,node2,…noden} (3) LINK::={<nodei,nodej>|nodei,nodej ∈ NODE} (4) node=(ip,id,location,R,state,power, protocoltype,mobilitytype) (5) The essential service of a mobile ad hoc network is to establish a communication service between any two nodes in the network at any instant. The ad hoc network establishes a connection by two steps. First, connections between any two adjacent nodes are provided by the link layer and physical layer, and then such connections are extended by the network layer form one-hop to multi- hops. That is to say: for an ad hoc network with N nodes, there need to be a directional path (Nodei, Nodej….Nodel, Nodm,) between any two nodes. And the path must meet the following requirements: 1) The distance between any two nodes in neighbors, Nodei and Nodei+1, is less than the transmission range of Nodei. 2) Any node in this path must possess a routing entry that sets the target node as the destination node, and the next hop is the succeeding node. The impacts affecting the ad hoc network survivability are dynamic topology, faults and attacks. The essence of all these three factors is to destroy the path between two nodes so that the network is disconnected. Thus, the fac- tors are described as follows: :: { |()() (), } I MPACTaDynamicToplogy aFaulta Attack aaActions = ∨ ∨∈ (6) The factor of dynamic topology is caused by the ac- tions such as mobility of nodes. It can result in the loca- tion changed of the node, and lead to the distance re- quirement of link layer connection dissatisfied. The in- fluence of dynamic topology is that the new distance of two nods in neighbor may be larger than the transmission range of the first node, so that the path is destroyed. If there is no other path between the destination node and target node, they can’t afford the communication service. Faults are considered to include node faults and link faults [14]. Node faults are the actions that cause the state of the nodes changed to down. If the state of a node is changed to down, the transmission range will be changed to 0, which will make the path dissatisfy the requirement. Link faults are introduced by obstacles between nodes, or by signals fading effect which may influence the transmission range of nodes. It can be de- scribed as follows: ()() (), F aultaNodeaLinkaaActions→∨ ∈ (7) Attacks of MANET are usually classified by network layers. The attack aiming at the application layer is more or less the same as the wired network. Its main object is to disrupt the application service, and worm is an in- stance. Attacks to the transportation layer are the actions to disrupt the transportation layer protocols, like SYN flooding. The attacks to the network layer are the actions that destroy the routing and forwarding processes in ad hoc network [16]. The attacks to link layer are the actions 52 Research on Survivability of Mobile Ad-hoc Network Copyright © 2009 SciRes JSEA which destroy the connection of adjacent nodes. The at- tacks to physical layer are actions to jam, intercept or to eavesdrop the wireless channel. The description of at- tacks to network survivability is: ()() () () ()() Attack aPhysicalAttack aLinkAttack a NetworkAttack aTranspAttack aApplicationAttack a →∨ ∨∨∨ (8) 3. Simulation Environment Existing simulators are not well-equipped to serve our purpose. Hence, we design a survivability-based simulation environment of MANET to test how those factors influ- ence the network. 3.1 Characteristics of Simulation Environment While designing the simulation environment, we concern the following factors: ·Towards Survivability: The users can configure the pa- rameters freely, such as node amount, mobility model, radio range, and power of node, which may affect MANET sur- vivability. Fault events and attack events can be added to simulate scenarios towards survivability thoroughly. ·Expandability: Users can easily expand the simulation environment by adding new protocols of various layers, modules, attack events and fault events. For this reason, MANET towards survivability description language is designed and a language translator is implemented for it. Users can add new protocols, functions, faults and attacks through appending new keywords. ·Introduce Fault-event and Attack-event: Based on the definition and description of MANET survivability, faults and attacks are described, modeled and simulated to support MANET survivability verification. ·Data Acquisition Interface: One of the most important purposes of simulation is collecting data for further analysis from simulation process. Thus, data acquisition interface is incorporated in the simulation environment and users are allowed to configure what kind of result to be collected. Based on the analysis above, simulation environment includes description language of MANET towards sur- vivability and its interpreter. Then, we choose Georgia Tech Network Simulator (GTNetS) [17] as the underly- ing network simulation platform. 3.2 Simulation Environment Architecture The system architecture is as shown in Figure 1: ·Graphic Configuration Interface: MANET properties, attack-events and fault-events information are configured by users through graphic user interface (GUI) and then be saved in the configuration file. ·Event interpretation: it analyzes and interpreters the configuration file, executes corresponding events by calling functions from event class library. The event class library consists of fault class library and attack class li- brary, each of which is built up by specific classes. Cur- rently, there are node fault classes, link fault classes in fault class library. And the attack class library contains energy-consuming attack class, signal interference attack class, black hole attack class, SYNflooding attack class and Worn attack class. All these classes are used by re- ceiving parameters from the interpreter and calling sup- port functions from GTNetS. Figure 1. Simulation environment architecture Research on Survivability of Mobile Ad-hoc Network 53 Copyright © 2009 SciRes JSEA ·Network configuration interpretation: it interprets the network configure file and makes function calls from GTNetS to construct simulation of MANET. All these network properties are supported: energy-consumption modal, AODV and DSR routing protocol, Random Waypoint, Random Walk and Random Direction mobil- ity models, data transfer service, node information and topology information. ·Data Collection Module: it displays the simulation process graphically. After that, it parses the collected data that users care about, including total data transferred amount, average connectivity node-pairs and so on, then saves data into the result data file. 4. Experiments on MANET Survivability Analysis 4.1 Related Definition For the simulation test of the definition of MANET sur- vivability, the capability to provide connectivity service under various threats, terms that used in this paper are as follows: Average Connectivity Efficiency [6] (E): It means the ratio of connected node pairs to all the node pairs within an N-node MANET in a certain period. In such MANET, each link between two nodes is directed, which means node pair (i,j) is different from node pair (j,i). The value of (E) reflects the capability of a MANET to provide connectivity service at a certain time. It reaches 100% when all the node pairs in the network can be connected. (%) (. )*100 1 * Average ConnectivityEfficiency T no ofconnectednodepairs i T NumberOfNodepairs = ∑ = − (9) 4.2 Experiment of Influences of Dynamic Topology We choose number of node, radio range of node and mo- bility speed of node as the variables in this experiment. We would like to figure out that how the dynamic topol- ogy influences the survivability of MANET. We carry out the experiment in a 1000×1000 bounded squared topology, and Parameters used in the test of the influences on MANET survivability of dynamic topology are as follows: ·Simulation time:300 ·Node amount:20-80 ·Radio range of each node:50-250 ·Mobile way of node: Random Walk, 10-20 ·Routing protocol of each node :AODV ·Bandwidth of each link:1Mb From the results we can easily find out that when the radio range increases, the connectivity efficiency increases. Howeverm, its effect to the connectivity efficiency is not obvious when the radio range invreases to a certain level.As a result, when choosing the radio range, we should consider its effort to the connectivity efficiency and its cost to the power consumption. When the moving speed of node increases, the topol- ogy is more instable, which means the node will be easier to move out of other nodes’ transmission range, so that the connectivity efficiency decreases. A larger number of nodes mean a higher node density. So from the results we can see in a bounded area, large number of nodes will contribute to the connectivity effi- ciency. 4.3 Experiment of Influence of Faults and Attacks There are node faults and link faults. When node faults happen, nodes can shut down themselves randomly. When link faults happen, it can be emerging obstacles that affect the links. This paper assumes that only one fault happens at one time, and ignores the mobility attri- bution of the nodes, so that the topology is stable when dealing with the influences of faults. Figure 2. Average connectivity efficiency vs. transmission range for different number of node when speed =10 Figure 3. Average connectivity efficiency vs. transmission range for different number of node when speed =15 Figure 4. Average connectivity efficiency vs. transmission range for different number of node when speed =20 Speed=10 N=20 N=30 N=50 N=80 90.000% 80.000% 70.000% 60.000% 50.000% 40.000% 30.000% 20.000% 10.000% 0.000% A ver. C onnect i v i ty Efficiency 0 50 100 150 200 250 300 Radio Range 0 50 100 150 200 250 300 Radio Range Speed=15 N=20 N=30 N=50 N=80 Aver. Connectivity Efficiency 90.000% 80.000% 70.000% 60.000% 50.000% 40.000% 30.000% 20.000% 10.000% 0.000% 80.000% 70.000% 60.000% 50.000% 40.000% 30.000% 20.000% 10.000% 0.000% A ver. C onnect i v i ty Efficiency 0 50 100 150 200 250 300 Radio Range N=20 N=30 N=50 N=80 Speed=20 54 Research on Survivability of Mobile Ad-hoc Network Copyright © 2009 SciRes JSEA Figure 5. Average connectivity efficiency vs. different event number per minute In this paper, attacks of network layer, data-link layer and physical layer are the three types of attacks that are included in the experiment. Energy consumption attacks, for network layer attack testing, and jamming attacks, for physical layer attack testing, are selected as examples to test the influences on MANET survivability under attacks. Node mobility is not considered either. We make the simulation in a 1000*1000 bounded square area under different event frequency, which means we set different number of event that happen per minute. For every minute we choose these events randomly. Parameters used in the experiment of the influences on MANET survivability of faults or attacks are as follows: ·Simulation time:300 ·Average fault/attack amount per minute:3-20 ·Node amount:100 ·Radio range of each node:100 ·Mobile way of each node: quite ·Routing protocol of each node: AODV ·Bandwidth of each link:1Mb From the results we can find out that when event fre- quency of faults or attacks increases, more nodes can’t provide stable services for routing and forwarding, and the connectivity efficiency decreases. 5. Conclusions and Future Work In this paper, we systematically analyzed MANET sur- vivability and the impacts that affect it. Based on this, we designed and implemented the simulation environment. The simulation environment represents characteristics of MANET towards survivability and events that impact survivability of MANET like fault events and attack events. We then tested the influences of the above- men- tioned impacts under the simulation environment. Users can also configure new topologies, attacks and faults to test MANET survivability in this simulation environment using their own scenario. In our current research, the in- fluences of each factor were tested independently. That means, future work shall be done to present cross-analysis of the influences of these impacts. REFERENCES [1] P. Papadimitratos and Z. Haas, “Handbook of ad hoc wireless networks,” chapter Securing mobile ad hoc networks, CRC Press, 2002. [2] F. Adelstein, S. K. S. Gupta, and G. G. Richard III, “Funda-mentals of mobile and pervasive computing,” McGraw-Hill, 2005. [3] D. Djenouri, L. Khelladi, and A. N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Communications surveys & tutorials, 7(4): pp. 2-28, 2005. [4] M. G. Zapata, “Secure ad hoc on-demand distance vector routing,” ACM SIGMOBILE Mobile Computing and Communications Review, 6(3): pp. 106-107, 2002. [5] Y. Xue and K. Nahrstedt, “Providing fault-tolerant ad hoc routing service in adversarial environments,” Wireless personal communications: an international journal, 29 (3-4): pp. 367-388, 2004. [6] K. Paul, R. R. Choudhuri, and S. Bandyopadhyay, “Survivability analysis of ad hoc wireless network architecture,” Proceedings of the IFIP-TC6/European Commission International Workshop on Mobile and Wireless Communication Networks, pp. 31-46, May 16-17, 2000. [7] J. Short, R. Bagrodia, and L. Kleinrock, “Mobile wireless network system simulation,” Wireless Network Journal, Vol. 1, No. 4, 1995. [8] R. J. Ellison, D. A. Fisher, and R. C. Linger, “An approach to survivable systems,” In: NATO IST Symposium on Protecting Information Systems in the 21st Century, 1999. [9] M. S. Deutsch and R. R.Willis, “Software quality engineering: A total technical and management approach,” IST Symposium on Protecting Information Systems in the 21st Century, 1999, Englewood Cliffs, NJ: Prentice- Hall, 1988. [10] B. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead, “Survivable network systems: An emerging discipline,” Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, November 1997. [11] D. Moitrasoumyo and L. K. Suresh, “A simulation model of managing survivability of network of emergent Systems,” [J], TechniealRePort CMU/SEI-2000-TR-020, 2000. [12] K. J. Sanjay, M. W. Jeannette, and C. L. Richard, “Survivability Analysis of Network Spesifications,” In: Workshop on Depended ability Despite Malicious Fault, 2000 Intemational Conefreneeon Dependable Systemsand Networks (DSN2000); 2000, NewYork USA: IEEE ComPuterSoeiety: 2000, June 25-28, 2000. [13] R. W. Makr, “The quantitative impact of survivable network architectural on service availbaility,” [J], IEEE Communications Magazine, 36(5): pp. 71-77, 1998. [14] D. Y. Chen, S. Garg, and K. S. Trivedi, “Network survivability performance evaluation: A quantitative approach with applications in wireless ad-hoc networks,” Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, Atlanta, Georgia, USA, pp. 28-28, September 2002. [15] Dahlberg, T. S. Ramaswamy, and D. Tipper, “Issues in the survivability of wireless networks,” Proceedings IEEE Mobile and Wireless Communication Networks Workshop, May 1997. [16] B.Wu, J. M. Chen, and J. Wu, “A survey of attack and countermeasures in mobile ad hoc networks,” Wireless Network Security, Springer US, pp. 103-135, 2007. [17] G. F. Riley, “The georgia tech network simulator,” In Proceedings of the ACM SIGCOMM, New York, pp. 5-12, August 2003. 100.000% 90.000% 80.000% 70.000% 60.000% 50.000% 40.000% 30.000% 20.000% 10.000% 0.000% 0 5 10 15 20 25 Event Num Attack Event A ver. C onnect i v i ty Effi c i enc y Fault Event |