A Survey on Ad Hoc Networks

3 downloads 0 Views 2MB Size Report
Ad Hoc networks (for this purpose). • Infrastructure-less : No fixed base stations. • Nodes (each with transceiver) can communicate without external assistant.
A Survey on Ad Hoc Networks Prof. Dr. El-Sayed M. El-Rabaie Eng. Nancy A. Al-Shaer

Types of wireless networks • Infrastructure Networks • Base stations are the bridges • A mobile host communicates with the nearest base station • Hand over occurs when a mobile moves from one cell to another

Types of wireless networks contd. • Ad Hoc networks (for this purpose) • Infrastructure-less : No fixed base stations. • Nodes (each with transceiver) can communicate without external assistant. • Multi hop is needed to route information between nodes.

MANET versus Cellular networks contd.

Mobile Ad Hoc network versus cellular networks Mobile Ad Hoc Network

Cellular network

No fixed base stations, very rapid deployment

Fixed, pre-located cell sites and base stations

Highly dynamic network topologies Static backbone network topology with multi-hop Hostile environment (losses, noise) and Relatively benign environment and stable sporadic connectivity connectivity Automatic adaptation to changes

Detailed planning before base stations can be installed

Infrastructure-less networks

Infrastructure networks

Cost-effective

High setup costs

Less setup time

Large setup time

History of mobile Ad Hoc Networks • Earliest MANETs were called “packet radio” networks, sponsored by DARPA (1970) • These packet radio systems predated the Internet and were part of motivation of the original IP suite • Later DARPA experiments included the Survivable Radio Network (SURAN) project (1980s) • 1990s – the advent of inexpensive 802.11 radio cards for personal computer • Current MANETs are designed primary for military utility; examples include JTRS (Joint Tactical Radio System) and NTDR (Near-Term Digital Radio).

Types of Ad Hoc Networks • Mobile Ad Hoc Networks (MANETs) • Internet based MANET (IMANET). • Vehicular Ad Hoc Networks (VANET). • Intelligent Vehicular Ad Hoc Networks (InVANET).

• Quasi-static (hybrid) Ad Hoc networks • Wireless Sensor Networks (WSN) • Wireless Mesh Networks (WMN)

Types of Ad Hoc Networks contd. Wireless Sensor Networks

Wireless Mesh Networks

Important characteristics of MANET • Infrastructure-less: No need for pre-existing or fixed infrastructure. • Independent terminals: Each node can operate as a router and host. • Distributed (decentralized)operation: Network functions (routing, security)are divided among nodes. • Dynamic topology: Its topology changes randomly and frequently. Y X

X

Y

Important characteristics of MANET contd. • Multi hop routing: No default routes available, each node acts as a router. • Lightweight terminals: The MANET nodes are mobile devices with less CPU processing capability, small memory size, and low power storage. So, optimized algorithms for computing and communicating is required. • Energy-constrained operation: Batteries make electricity saving an issue. • Fluctuating link capacity: One end-to-end path can be shared by several sessions • Limited- bandwidth: Because of wireless links.

Applications of MANETs

• Military environments: • Soldiers, tanks, planes

• Civilian environments: • • • •

Taxi cab Meeting rooms Sports stadium Boats, small aircraft

• Personal Area Networks (PAN): • Cell phone, laptop, ear phone, wrist watches

• Emergency operations: • Search-and-rescue • Policing and fire fighting

MANET challenges • Conventional problems of wireless communications: • Limited transmission range • wireless medium impairments: interference, fading, external noise, signal att • Battery constraint (limited power)

• Additional problems due to special features (multi hop, dynamic topology, absence of fixed infrastructure): • • • •

Quality of Service Scalability Power control: running with batteries, little computing power. Routing: no infrastructure and dynamin topology with unpredictable and frequently changes.

• Security: new vulnerabilities, nasty neighbors, ease of snooping on wireless medium • Mobility: induced route changes and packet losses

MANET advantages • Rapid deployment with minimum number of users: • Because of self-organizing, self-administering, and self-creating capabilities.

• Well suited for unlicensed spectrum. • Provide access to services and information irrespective to the geographical area. • Suitable in situations where a fixed infrastructure is not trusted, not available, un reliable or too expensive. • Can work in a stand alone manner or integrate with the Internet. • Quickly connected and communicated. • Detailed planning of BSs installation or wiring is not required.

MANET advantages contd. • Decentralized network: • Easy adaptation to changes in network configuration.

• Scalability allows addition of more nodes. • Lower getting-started costs. • Can integrate with existing cellular networks.

Routing in Ad Hoc networks • Routing is a real issue in wireless Ad Hoc networks: • • • •

No infrastructure Dynamic topology Multi hop Destination node may stand outside the transmission range of a source node. So, each node must be able to act as a router.

• Routing depends on many factors: • • • • •

Selection of routers Network topology Request initiation Mobility and the increase in the number of moving nodes Specific underlying C\Cs as a guide in finding the path efficiently and quickly

Objectives of Routing Protocols • Establishment of the efficient and correct route between Source and destination.

• Correct packet delivery in the appropriate time.

Desired Prosperities of Routing Protocols • Considering bandwidth consumption and minimum overhead. N1 • A routing protocol should be distributed. • Assume routes as unidirectional links. • Power efficient • Considering security and reliability. • Supporting QoS requirements • Quick adaptation to changes in traffic pattern • Ease of implementation and simplicity • Hybrid protocols are preferred.

N3

N2

N4

N5

Classifications of Routing Protocols Routing Protocols for ad hoc networks

Proactive (Table-Driven)

Reactive (On-Demand)

Hybrid ZRP

DSDV

CBRP

GSR

DSR

FSR

AODV

WRP

TORA

CGSR

Three Main categories of Protocols 1. Table Driven Routing Protocols Proactive, learn the network’s topology before a forwarding request comes in

2. On-Demand Routing Protocols Reactive, become active only when needed

3. Hybrid Routing Protocols Compromise between Table driven and on-demand protocols

Proactive (Table Driven)Routing • Continuously evaluate the routes • Attempt to maintain consistent, up-to-date routing information • when a route is needed, one may be ready immediately • When the network topology changes • the protocol responds by propagating updates throughout the network to maintain a consistent view

• Examples DSDV, GSR, FSR, WRP, CGSR

Reactive (on-Demand)Routing • on-demand style: create routes only when it is desired by the source node • route discovery: invoke a route-determination procedure • the procedure is terminated when • a route has been found • no route is found after all route permutations are examined

• longer delay: sometimes a route may not be ready for use immediately when data packets come • Examples CBRP, DSR, AODV, TORA

Hybrid Routing • Combines the advantages of both proactive and reactive routing protocols • Examples ZRP

Comparison between Proactive and Reactive protocols Parameter Delay level Control traffic

Proactive Small as routes are predetermined Usually higher reactive

than

Reactive High as routes are computed on demand Increases with the mobility of active routes.

Periodic updates Route availability

Always required Always available

Handling mobility

Updates occur at regular Localized route intervals discovery is used

Scalability

Nearly

Storage requirement

Higher than reactive.

Communication overhead

High

Depends on the number of required routes. Low

Route structure

Flat/Hierarchical

Flat, except CBRP

Bandwidth requirement

High

Low

Power requirement

High

Low

up to 150 nodes.

Not required Computed on-demand

Higher than proactive.

Destination Sequenced Distance Vector Protocol (DSDV) • Based on Bellman-Ford Next Hop Routing (algorithm). • Each node maintains tables for : Next hop on path Listing all available destinations Distance (in hops) to destinations The attributes of each destination Sequence number ( keep current route) which is originated by the destination node

DSDV Draw Backs: • The main complexity in DSDV is in generating and maintaining these routing tables • Topology changes are slowly propagated • Count-to-infinity problem

• Moving nodes create confusion: • They carry connectivity data which are wrong at new place

• Table exchange eats bandwidth

Global State Routing (GSR) • Almost the same as DSDV • It employs the idea of link-state routing • The improvement is that, it can avoid the flooding of routing messages • Each node preserve four tables • Distance Table • Neighbor List • Topology Table • Next Hop Table • As in the link-state protocols, the routing messages are generated in accordance with a link change. • Advantage: the control over head is greatly reduced by using rout cache • Disadvantage: large size of packet header which increases with route length due to source routing

Fisheye State Routing (FSR) • It is a refinement of GSR. • Avoid the problem of BW wasting of GSR. • Update message will not include information about all messages • Instead, closer nodes’ information is more frequently exchanged than farther nodes’ information. So, the size of the update message is reduced. • The rule is that the accuracy and details of neighbor’s information are inversely proportional to its distance from the node itself. • Advantages: Reliable packet delivery • Disadvantage:

Cluster Head Gateway Switch Routing (CGSR) •

Uses DSDV as an underlying protocol and Least Cluster Change (LCC) clustering algorithm to select cluster heads and minimize routing changes. A cluster head is able to control a group of ad-hoc hosts Each node maintains two tables:

• •

1. 2.



A cluster member table, containing the cluster head for each destination node A DV-routing table, containing the next hop to the destination

The routing principle: • • • •

Lookup of the cluster head of the destination node Lookup of next hop Packet send to destination Destination cluster head delivers packet

• •

too frequent cluster head selection (with high mobility) introduces large overhead. Increased battery drains at cluster head

• Drawbacks:



Advantages:

• •

Better BW utilization Easy to implement priority scheduling scheme.

Cluster Head Gateway Switch Routing (CGSR) contd. 6 12

5

4 2

11

7

10

8

1

9 Gateway node

3

Cluster head Internal node

The Wireless Routing Protocol (WRP) • Table-based protocol with the goal of maintaining routing information among all nodes in the network • Each node is responsible for four tables: • • • •

Distance table Routing table Link-cost table Message retransmission list (MRL) table

• Link exchanges are propagated using update messages sent between neighboring nodes • Hello messages are periodically exchanged between neighbors • This protocol avoids count-to-infinity problem by forcing each node to check predecessor information • Drawbacks: four tables requires a large amount of memory and periodic hello message consumes power and bandwidth • Advantages: route setup process is very fast

Comparison Between Proactive Protocols Proactive Routing selection

DSDV Link state

FSR Shortest path

WRP Shortest path

CGSR Shortest path

Method

Broadcast

Broadcast

Broadcast

Broadcast

Route computation

Distributed

Distributed

Distributed

Distributed

Route support

Single

Single /Multiple Single

Single /Multiple

Topology structure

Flat

Hierarchal

Flat

Hierarchal

Critical nodes

None

None

None

Cluster-head

Updates repetition

Periodic and needed

Periodic

Periodic

Loop-free

Yes

Yes, but not instantaneous

Yes

Periodic and when local

Yes

Ad-Hoc On-Demand Distance Vector Routing (AODV) • Builds on DSDV algorithm and the improvement is on minimizing the number of required broadcasts by creating routes on an on-demand basis (not maintaining a complete list of routes) • Broadcast is used for route request • Advantages: • Use bandwidth efficiently

• Responsive to changes in topology • Scalable and ensures loop free routing

• Drawbacks: • Nodes use the routing caches to reply to route queries. • Result: “uncontrolled” replies • And repetitive updates in hosts’ caches yet early queries cannot stop the propagation of all query messages which are flooded all over the network

Dynamic Source Routing (DSR) • Based on the concept of source routing • Mobile nodes are required to maintain route caches that contain the source routes of which the mobile is aware • Two major phases: • Route discovery – uses route request and route reply packets • Route maintenance – uses route error packets and acknowledgments

• Advantages: No periodic hello message and fast recovery - cache can store multiple paths to a destination • Drawbacks: • The packets may be forwarded along stale cached routes. • It has a major scalability problem due to the nature of source routing. • Same as AODV, nodes use the routing caches to reply to route queries

Temporally-Ordered Routing Algorithm (TORA) • Highly adaptive, loop-free, distributed routing algorithm based on the concept of link reversal • Proposed to operate in a highly dynamic mobile networking environment • It is source initiated and provides multiple routes for any desired source/ destination pair • This algorithm requires synchronized clocks

Temporally-Ordered Routing Algorithm (TORA) contd. • Three basic functions: • Route creation • Route maintenance • Route erasure

• Advantages: • provides loop free paths at all instants and multiple routes so that if one

path is not available, other is readily available. • It establishes routes quickly so that they may be used before the topology changes.

• Drawbacks: • exhibits instability behavior similar to "count-to-infinity" problem in distance vector routing protocols.

Cluster Based Routing Protocol (CBRP) • Design Objective: A distributed, efficient, scalable protocol

• Major design decisions: • use clustering approach to minimize on-demand route discovery traffic • use “local repair” to reduce route acquisition delay and new route discovery traffic

• Advantages: • Reduced connection setup delay

• Disadvantages: • Large overhead control

Comparison Between Reactive Protocols Reactive Route maintained in

CBRP Cluster-head route table

DSR Route cache

Route reconfiguration

Remove path and Erase route and local path repair notify source

AODV Route

table

Erase route

and

notify source

TORA Route

Link reversal and route repair

Routing selection

First available path

Shortest and

up-

Shortest and

dated path

dated path

table

Shortest path up-

Route support

Multiple

Multiple

Single

Multiple

Topology structure

Hierarchal

Flat

Flat

Flat

Casting property

Broadcast

Unicast

Unicast

Broadcast

Overall complexity

Medium

Medium

Medium

Loop-free

Yes

Yes

Yes

No

Need of Hybrid Routing Protocols Proactive routing • Because of fast node mobility • The routes are frequently updated • However, most of the routing information is never used • So, the scarce bandwidth is wasted.

Reactive routing • Routes are established on demand • The bandwidth is efficiently utilized • Less suitable for real-time traffic due to: • long route request delays • And significant control traffic resulting from global flooding

Zone Routing Protocol (ZRP) • A hybrid example of proactive and reactive routing protocol is zone routing protocol . • It combines the best features of both. • Intra-zone Routing Protocol (IARP) utilizes proactive discovery within a nod e's local neighborhood. • Inter-zone Routing Protocol (IERP) utilizes reactive routing for communication between these neighborhoods. • ZRP divides the network into different zones. • The zone is defined as the node's local neighborhood. • Zone size is not fixed • The zone is determined in hops not by geographical measurement. • The zone radius expressed in hops is 2. • Each node may be within multiple overlapping zones • Because the zones overlap, ZRP can be classified as a flat protocol not hierarchical. • Network congestion can be reduced and optimal routes can be detected.

I A J B M

F

D K C H

E G

Comparison Between Proactive, Reactive and Hybrid Protocols Proactive

Reactive

Hybrid

Routing protocols

DSDV, GSR, FSR, WRP, CBRP, DSR, AODV, CGSR TORA

ZRP

Control overhead

High

Low

Medium

Route acquisition delay

Higher

Lower

Lower for intrazone, Higher for inter-zone

Bandwidth requirement

High

Low

Medium

Power requirement

High

Low

Medium

Security in Mobile Ad Hoc Networks • MANETs have larger security problems than conventional wired and wireless networks due to: • Dynamic topology • Absence of infrastructure

• The present security solutions of conventional networks cannot be directly applied to wireless MANET. • New security challenges have to be considered in the design of MANETs • Security aspects that must be well known when dealing with security challenges.

MANET Security Aspects

Security Requirements

Security Threats

Availability

misbehavior

Authenticity

Attacks

Confidentiality

Integrity

No-repudiation

Security Requirements of MANET • Availability: • Availability indicates that even though there is a latent problem in the system the required services are available in a timely manner.

• Authenticity: • This network service has the responsibility of determining the identity of each user. • Without an authentication mechanism, the competitor could impersonate a precious node and thus get access to private sources, or disturb the network by propagating some false messages.

• Confidentiality: • Confidentiality ensures that the specific data in the network can be accessed only by authorized users. • To satisfy confidentiality the specific data has to be kept in privacy from all participants that do not have the permission to access it.

Security Requirements of MANET contd. • Data Integrity: • Integrity guarantees that the data forwarded between nodes has not been altered during its transmission by pledging the data identity. • Information may be changed both accidentally or intentionally. • According to this service, only authorized users can edit, create or delete data.

• No-repudiation: • It makes sure that the data founder (source or destination) cannot disavow having sent or received such data. • This will help in isolating or detecting compromised nodes in the network.

MANETs Security Threats • misbehavior It results from a forbidden behavior of an internal node. The node does not intend to launch an attack. But, the node may aim to have an unfair advantage compared with the other nodes. That can cause unintentionally a damage to other nodes

• Attacks A secure system can be achieved via detecting attacks or preventing them and presenting a mechanism that can recover the attacks. Attacks can be defined as any action that purposely intent to cause any network damage.

Categories of Security Attacks in MANETs MANET Security Attacks

Based on Attack origin

Based on Attack nature

Internal

Active

External

Passive

Classification of MANET security attacks in various layers Layers Physical

Attack Type Eavesdropping Jamming Active interferences

Data link

Selfish misbehavior of nodes Malicious behavior of nodes Traffic analysis

Network

Black hole attack Wormhole attack Rushing attack

Transport

Session hijacking

SYN flooding attack Applicatio n

Malicious code attack Repudiation attack

Mode of Attack

Result of Attack

By receiver tuning to proper frequency By malicious node with known communication frequency Blocks the communication channel Selfish nodes

Reading messages by unintended receiver Prevents reception of legitimate packets Change order of messages

Drops the packets

Disrupts operation of routing Misdirects traffic protocol Topology information Information to unintended receiver Fake optimum route message Loss of confidential information on packets Tunnel between malicious Loss of safe route nodes Subvert route discovery Loss of safe route process Spoofs victim node IP address DoS attack

Open TCP connection with DoS attack victim node Viruses worms Attack to OS Denial of participation in parts Communication failure of communication

Security Attacks and Mitigation Techniques Security Attack

Black-hole Attack

Attack Type (Function)

Routing Protocol employed

Mitigation Techniques

No Packet The intruder drops DSR, forwarding all the packets AODV, forwarded to it in SAR, OLSR this attack

1- A path-based approach is used to detect and mitigate the attack. 2-Creditable routing table is employed detect the black holes and eliminate them.

Man-in-themiddle attack

The attacker records the packets at one side of the network and forward it to another side.

Any Ad Hoc routing protocol

1-Implementing digital signature to detect and prevent the attack. 2-A cooperative approach is used among the nodes to detect and minify the attack.

Disturbing Communicatio n

Malicious node pulls all network traffic towards itself and can fabricate or modify the packets.

Any Ad Hoc routing protocol

1-Trust based algorithm is used to minimize sink-hole attack. 2-Mobile agents are used in a technique to detect and reduce the attack.

Wormhole Attack

Sink-hole Attack

Brief Description of the Attack

Security Attacks and Mitigation Techniques contd. Security Attack

Grey-hole attack

Flooding attack

Route Fabrication

Spoofing

Packet dropping

Attack Type (Function)

Brief Description of the Attack

Selectively drops The attacker drops packets part of the data and cheats the previous node. Reduce system The intruder floods the efficiency network with faked traffic to damage the efficient functionality and the smooth of the network.

Routing Protocol employed

Mitigation Techniques

Detection mechanism involves proactively invoking of collaborative and distributive algorithm involving neighbors. Any Ad Hoc 1-Delaying the RREP from target routing to source to reduce the number protocol of messages sent in the network and so the flooding is controlled. 2-A capability based messages are forwarded by each node to preserve the global view of throughput and hence failing the attack. False data The malicious node AODV Fuzzy logic soft computing Insertion sent wrong routing method is used to create a messages into the quantifiable trust value among network. the network nodes. Impersonating The attacker assumes Any Ad Hoc To use secure public key other nodes’ the identity of another routing authentication which is based on identity node in the network. protocol the trust model. Dropping packets

AODV

of Selfish nodes drop all DSR, AODV the packets that they received.

Point Detection Algorithm (PDA) is employed.

Ad Hoc network Simulation Software • As a variety of MANET simulators are available • The choice of the suitable simulation platform that satisfies the researcher requirements and helps in performing necessary tests is vital NS-3

OMNET++

NS-2 GLOMOSIM

SIMULATORS

NCTUNs J-SIM

SWAN OPNET QUALNET

Comparison of Ad Hoc network Simulators Simulator License Type Language GUI Simulation Technique Documentation Support Scalability Ease of Use Emulation Support

Available Modules

Parallelism

Supported Operating System

OS-2

OS-3

Open Source Open Source

OMNET++

GLOMOSIM

Open Source C++, NED

Open Source

Yes Discrete Event Medium

Limited Discrete Event Poor

Yes Discrete Event Good

Large Easy Limited Support Wired, Wireless, Ad Hoc networks

Large Hard No

Medium Hard Yes

Wired, Wireless, Ad Hoc networks

Wired, Wireless, Ad Hoc networks

SMP/Beowulf

No

C++, OTCL

C++, Python

Limited Discrete Event Excellent

Limited Discrete Event

Small Hard Limited Support Wired, Wireless, Sensor, Ad Hoc networks No

Large Hard Yes

No

MPI/PVM

GNU/Linux, FreeBSD, Mac OS X, Windows XP, Windows Vista, Win.7

GNU/Linux, FreeBSD, Mac OS X, Windows XP, Windows Vista, Win.7

Windows XP Windows, or later, Linux, Sun Linux, Mac SPARC Solaris OS X

Excellent

IP, Non-IP based networks

NCTUNs

C

Open Source C

Free BSD, Fedora, Red hat, Ubuntu, Debian

Comparison Between Available Simulators • NS-3 is the fastest simulator among the mentioned simulators. While NS-3, OMNET++, and GloMoSim are recommended to carry out largescale network simulations. • NS-2 supports all range of protocols in all layers. It also facilitates the specific MANET routing protocols. • Hierarchical modeling and the powerful GUI are supported by OMNET++. • So, NS-2 and OMNET++ are the best choices for MANETs. • GloMoSim is a good and strong scalability power simulation tool. So, it will be useful to use with the wireless networks containing a large number of nodes

Future Scope • The integration of Ad Hoc networks with fixed infrastructure and other wireless networks which expected to be an essential part of the progress towards fourth generation communication networks. Technologically, the realization of this scope requires a large number of challenges related to protocols, services, and devices. • The design of Ad Hoc networks that can possess the advantage of the properties of new hardware technologies is an emerging challenge. For example, the utilization of smart (beamforming) antennas will require new medium access and neighbor discovery protocols. • Progress in hop-by-hop TCP is necessary to minimize end-to-end packet delivery time while minimizing the number of retransmission, maintaining reasonable bandwidth utilization, and decreasing network congestion occurrence.

Future Scope contd. • Innovations at the higher levels are required to provide the ability to dynamically alter modulation schemes, spread spectrum codes, and waveforms. • The MAC layer has to treat with exposed and hidden terminals, decrease packet collision rate and permit fair channel access. • At the network layer devices need to collaborate to calculate the routes. • The transport layer has to be able to deal with packet delay and loss properties which completely differ from wired networks. • Application layer must be capable of handling possible reconnections and disconnections. • All network protocol improvements have to consider possible security problems and integrate gradually with traditional networks

• Mobility and wireless nature of Ad Hoc network bring new security challenges to the design of the network. • One challenge is the difficulty to implement centralized security control due to infrastructureless and distributed nature of the Ad Hoc network. • The network needs to depend on singular security solution from each node which requires designers’ efforts. • Another challenge is that in MANETs an attack may come from different layers and from any direction. • There are many kinds of attack. So, it is necessary to understand the possible form of attack to develop successful security solution. • Due to the decentralized nature of the Ad Hoc network, authentication and encryption are challengeable.

Future Scope contd. • Another challenge is to extend the peer-to-peer Ad Hoc network to the Internet. This may be achieved by using a peer that establish a link to the Internet over a 3G service provider or via a wireless LAN access point. • In order to support multimedia services, an adaptive QoS must be implemented over the traditional resource reservation. • Ad Hoc routing protocols must satisfy the requirements of QoS to provide high throughput, more energy efficiency, lower end-to-end delay, and reduced routing overhead. • Improving an energy-aware routing protocol is important to maximize the life of batteries of small, light-weight mobile nodes that depend on portable batteries. • Due to continuous change of network topology, packet routing between any pair of nodes becomes a great challenge. • The design of distributed network functions is another challenge which related to the service availability problems. It could be investigated whether and which services or their locations could be circulated or shared among nodes

Conclusion • Ad-Hoc networks are the reliable solution in case of natural disasters, wars, or financial shortage. • The included history of Ad-Hoc networks confirmed the importance of such networks due to which many valuable research projects since 1972 have made a lot of efforts to study and develop Ad-Hoc networks. • The main characteristics of Ad-Hoc networks are • • • •

No infrastructure Network dynamic topology Easy and quick setup hop-by-hop communications.

• These characteristics have imposed a number of challenges • • • • •

Routing Security Quality of Service Reliability Power Consumption

• The challenges of Ad-Hoc networks necessitate a large amount of research and development in the incoming years

Conclusion contd. • The Ad-Hoc advantages mentioned in the survey make it sure that Ad-Hoc networks have become an essential part of today’s communication systems. • Because of the unique features and advantages of Ad-Hoc networks, they can provide some special applications. Such as military battlefield and disaster management. • As routing is one of the most critical and important challenges, the working principles and various types of proactive and reactive routing protocols are discussed and compared in a compact form. Which make it easier for the network designer to select the suitable routing protocol. • The development of ZRP hybrid routing protocol provides a compromise between proactive and reactive routing protocols.

Conclusion contd.

• Dynamic topology distributed operation, and infrastructure-less nature of the Ad Hoc network bring new security challenges to the design of the network. • There are many kinds of attacks and it is necessary to understand the possible forms of attack to develop successful security solutions. • This survey discussed briefly the security aspects that must be well known when dealing with security challenges. • Also, security threats in terms of misbehaviors and attack types are mentioned. • And a summary of the most popular security attacks and the proposed techniques to mitigate them is introduced

• A comparison of MANET simulators is introduced which can help researchers to choose the appropriate software that satisfies the network requirements in shorter time. • Finally, a spot is focused on the future scopes. Such as securing the Ad-Hoc network against malicious nodes and behaviors. And, providing mechanisms to reduce processing time and packet overhead of the routing protocols.

Thank you Any questions??