DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE...
-
Upload
donna-whitehead -
Category
Documents
-
view
212 -
download
0
Transcript of DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE...
DTN, ONE & Our Plan
Yuan JINSept. 17, 2008
Outline
• Objective• Introduction to DTN• Demo of ONE• Introduction to ONE• Our (current) work
Objective
• Based on DTN ONE simulator, we want to propose and implement a low-overhead security scheme to resist attacks like Flooding, Blackhole, Rushing, Wormhole and “Strong attacks”.
Go back >>
Introduction to DTN
• What is DTN?• What are its features? (What are differences
from other Networks?)• What is the catch (right now)?
What is DTN?• Delay-Tolerant Networks or Disruption-Tolerant Networks is
“an approach to computer network architecture that seeks to address the technical issues in mobile or extreme environments, such as deep-space, that lack continuous network connectivity.”[Wiki]
See real life example <KioskNet of Waterloo> about 10 mins
What are its features?
• Small in size• Discontinuous• Store-and-forward• Multiple routing paths• Lack of instantaneous end-to-end paths• Ad-hoc topology
[Wiki]
What is the catch?
• Ad-hoc? So, Security– No real implementation of any security scheme on
DTN so far– If proposed, draft-irtf-dtnrg-bundle-security-03 for
example, it is very heavy-weighted– Unable to handle different kinds of hazards
And our proposal would >>
Demo of ONE
Click the tree to start ONE
Introduction to ONE
• Overview• Structure, Classes & Relations
Overview of ONE
• Opportunistic Network Environment• A GPL-licensed Java implementation of DTN
protocols <Download>
• Written by Ari Keränen of DTN TKK Lab of Helsinki University of Technology
Classes of ONE
• Primary Classes– DTNSimGUI– DTNHost– Message– MovementModel– NetworkLayer, Connection– MessageRouter– SimScenario, Settings– World– Report
How do they
work?
Structure & Relations of ONE
DTNHost/MessageRouterNetworkLayer
Connection
MovementModel
Our work
• Prove several attacks, i.e. flooding, blackhole, rushing, wormhole and “strong attack”, are influential to the network
• Propose a scheme based on Zhong Xu’s EISM• Prove it works