DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE...

Preview:

Citation preview

DTN, ONE & Our Plan

Yuan JINSept. 17, 2008

Outline

• Objective• Introduction to DTN• Demo of ONE• Introduction to ONE• Our (current) work

Objective

• Based on DTN ONE simulator, we want to propose and implement a low-overhead security scheme to resist attacks like Flooding, Blackhole, Rushing, Wormhole and “Strong attacks”.

Go back >>

Introduction to DTN

• What is DTN?• What are its features? (What are differences

from other Networks?)• What is the catch (right now)?

What is DTN?• Delay-Tolerant Networks or Disruption-Tolerant Networks is

“an approach to computer network architecture that seeks to address the technical issues in mobile or extreme environments, such as deep-space, that lack continuous network connectivity.”[Wiki]

See real life example <KioskNet of Waterloo> about 10 mins

What are its features?

• Small in size• Discontinuous• Store-and-forward• Multiple routing paths• Lack of instantaneous end-to-end paths• Ad-hoc topology

[Wiki]

What is the catch?

• Ad-hoc? So, Security– No real implementation of any security scheme on

DTN so far– If proposed, draft-irtf-dtnrg-bundle-security-03 for

example, it is very heavy-weighted– Unable to handle different kinds of hazards

And our proposal would >>

Demo of ONE

Click the tree to start ONE

Introduction to ONE

• Overview• Structure, Classes & Relations

Overview of ONE

• Opportunistic Network Environment• A GPL-licensed Java implementation of DTN

protocols <Download>

• Written by Ari Keränen of DTN TKK Lab of Helsinki University of Technology

Classes of ONE

• Primary Classes– DTNSimGUI– DTNHost– Message– MovementModel– NetworkLayer, Connection– MessageRouter– SimScenario, Settings– World– Report

How do they

work?

Structure & Relations of ONE

DTNHost/MessageRouterNetworkLayer

Connection

MovementModel

Our work

• Prove several attacks, i.e. flooding, blackhole, rushing, wormhole and “strong attack”, are influential to the network

• Propose a scheme based on Zhong Xu’s EISM• Prove it works