Title: SelfOrganization in Mobile AdHoc Networks: the Approach of Terminodes
1Self-Organization in Mobile Ad-Hoc Networks the
Approach of Terminodes
- Ljubica Blazevic
- Swiss Federal Institute of Technology
- IEEE Communications Magazine, June 2001
- Presented by Se-Hoon Kim
2Contents
- Introduction
- Packet Forwarding
- Mobility Management the Virtual Home Region
- GPS-free positioning
- Incentive to cooperation
- Security
- Conclusion
3Introduction
- Self-organized networks
- Distinguish themselves from traditional mobile
networks by emphasizing their self-organization
characteristics. - Are non-authority based networks
- Are potentially very large and not regularly
distributed - Are highly co-operative
4Terminal Node Terminode
- All network functions (packet forwarding, flow
control,..) and terminal functions (storage,
ciphering,..) are embedded in the terminode - Terminodes correspond to totally self-organized
mobile ad-hoc networks - All terminodes are potentially mobile
- A communication is relayed by intermediate
terminodes - The network is self-organized no human
intervention
5Packet Forwarding
EUI End-system Unique Identifier LDA
Location-Dependent Address
Design factors Scalability and Incentive for
Cooperation (based on Nuglets) Terminode Local
Routing-Does not use location information
Terminode Remote Routing-Geographical based
6Terminode Local Routing (TLR)
- Used in close range
- Usually several hops away
- Does not use location information
- TLR uses proactive approach
- Use TLR bit is set within the packet header
-
7Terminode Remote Routing (TRR)
- Geographical based
- Anchored Geodesic Packet Forwarding (AGPF)
- Anchor a point described by geographical
coordinates - TRR is constantly modified by Path Maintenance
- Friend Assisted Path Discovery (FAPD)
- Friend there exists a good path to node
- Cost of each path
- Packet loss, delay
8Friend Assisted Path Discovery
9Mobility Management the Virtual Home Region
- Virtual home region (VHR)
- Has a fixed center (calculated by hash function
H) and variable radius to accommodate number of
nodes - H(EUIA) CVHR, A?EUIi
- Nodes advertise their locations to their VHR
- Timer based or distance based
- When B wants to know As location, it queries As
VHR - Main functions of this architecture
- Maintaining the location information
- Distributing the location information inside the
network
10LDA Storage
11LDA Request
12LDA Response
13Packet Forwarding
14GPS-Free Positioning
- If GPS is available Each node is aware of its
own Location-Dependent Address (LDA) via GPS
(Global Positioning System)
- If GPS is not available Computation of relative
positions based on Time of Arrival (TOA) - Self-positioning algorithm (SPA)
15Self-positioning algorithm (SPA)
- A terminode
- measures distance to its neighbors and sends this
information to all its neighbors - builds its Local Coordinate System (LCS) and
computes the positions of its neighbors in LCS - computes the density factor of its n-hop
neighborhood - A terminode with the highest density factor forms
a Location Reference Group (the terminodes in its
n-hop neighborhood) and computes the center and
the direction of the Network Coordinate System
(NCS) - All terminodes compute their position in the
Network Coordinate System
16GPS-Free Positioning
Distance are typically estimated by time of
arrival measurement
17Local Coordinate System
Every Node Choose two nodes with known
distance between them defines a coordinate
system
18Convergence to a Single Coordinate System
19Incentive to cooperation
- Assumptions
- 1. Each node is its own authority domain ?
selfish nodes - 2. Each node contains a trusted, tamper-resistant
security module - Use virtual currency - NUGLETS
- Encourage end-users to let their terminode act as
a relay (keep them turned on) - Discourage end-users from overloading the
network in particular, limit the number of long
distance communications and useless data - 2 models, based on a virtual currency the nuglet
- Packet Purse Model (payment by the sender)
- Packet Trade Model (payment by the receiver)
20Packet Purse Model (PPM)
- Problems to be solved include
- - Nuglet forgery should be prevented
- - Nuglet robbery should be prevented
- - Each packet should indeed be forwarded
- The packet purse should be bundled to its packet
- Advantages
- - stimulate terminodes for cooperation
- - deter users from sending useless data
and overloading the network
21Packet Trade Model (PTM)
Advantages - The sender does not need to know the
amount of nuggets that is necessary to send a
packet - Intermediaries are interested in
forwarding the packet after having bought it -
Charging for multicast communications is
easier Drawback - There is no direct incentive to
refrain from overloading the network
22Security
- Use PKI (Public Key Infrastructure)
- Vulnerability of adopting PKI in ad-hoc networks
- to establish a key management service using a
single CA (Certification Authority)
A self-organization mobile ad hoc network has no
infrastructure and therefore no server
no certification authority
23Security
24Security
25Conclusion
- Present a global description of some aspects of
the project called Terminodes - Self-organized routing, location management,
GPS-free positioning, and nuglets - Nuglet is used as the basis for inciting users to
cooperate, and as a congestion control mechanism
for discovery and routing mechanisms