DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE...

13
DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008

Transcript of DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE...

Page 1: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

DTN, ONE & Our Plan

Yuan JINSept. 17, 2008

Page 2: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

Outline

• Objective• Introduction to DTN• Demo of ONE• Introduction to ONE• Our (current) work

Page 3: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

Objective

• Based on DTN ONE simulator, we want to propose and implement a low-overhead security scheme to resist attacks like Flooding, Blackhole, Rushing, Wormhole and “Strong attacks”.

Go back >>

Page 4: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

Introduction to DTN

• What is DTN?• What are its features? (What are differences

from other Networks?)• What is the catch (right now)?

Page 5: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

What is DTN?• Delay-Tolerant Networks or Disruption-Tolerant Networks is

“an approach to computer network architecture that seeks to address the technical issues in mobile or extreme environments, such as deep-space, that lack continuous network connectivity.”[Wiki]

See real life example <KioskNet of Waterloo> about 10 mins

Page 6: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

What are its features?

• Small in size• Discontinuous• Store-and-forward• Multiple routing paths• Lack of instantaneous end-to-end paths• Ad-hoc topology

[Wiki]

Page 7: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

What is the catch?

• Ad-hoc? So, Security– No real implementation of any security scheme on

DTN so far– If proposed, draft-irtf-dtnrg-bundle-security-03 for

example, it is very heavy-weighted– Unable to handle different kinds of hazards

And our proposal would >>

Page 8: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

Demo of ONE

Click the tree to start ONE

Page 9: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

Introduction to ONE

• Overview• Structure, Classes & Relations

Page 10: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

Overview of ONE

• Opportunistic Network Environment• A GPL-licensed Java implementation of DTN

protocols <Download>

• Written by Ari Keränen of DTN TKK Lab of Helsinki University of Technology

Page 11: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

Classes of ONE

• Primary Classes– DTNSimGUI– DTNHost– Message– MovementModel– NetworkLayer, Connection– MessageRouter– SimScenario, Settings– World– Report

How do they

work?

Page 12: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

Structure & Relations of ONE

DTNHost/MessageRouterNetworkLayer

Connection

MovementModel

Page 13: DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

Our work

• Prove several attacks, i.e. flooding, blackhole, rushing, wormhole and “strong attack”, are influential to the network

• Propose a scheme based on Zhong Xu’s EISM• Prove it works