Using ICN in disaster scenarios (draft-seedorf-icn-disaster-01) M. Arumaithurai, J. Seedorf, A. Tagami, K. Ramakrishnan, N. Blefari Melazzi IETF 88, Vancouver.

Slides:



Advertisements
Similar presentations
VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Advertisements

Network Resource Broker for IPTV in Cloud Computing Lei Liang, Dan He University of Surrey, UK OGF 27, G2C Workshop 15 Oct 2009 Banff,
Delay Tolerance in a Network of Information Dirk Kutscher – NEC Labs SAIL Project Consortium DTNRG IETF
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 From Grids to Service-Oriented Knowledge Utilities research challenges Thierry Priol.
“Challenges and Methodologies
Information-centric networking: Concepts for a future Internet David D. Clark, Karen Sollins MIT CFP November, 2012.
Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
Distributed mobility management in the context of the MEDIEVAL project MEVICO Final Seminar, part 2 23 rd November 2012 Carlos J. Bernardos, UC3M
Fraunhofer FOKUS Context Management in Dynamic Environments IWCMC 2009, June 2009 Jens Tiemann Humberto Astudillo Evgenij Belikov Fraunhofer Institute.
Contextualized Information-Centric Home Networking (draft-ravindran-cibus-01.txt) IRTF/ICN-RG (IETF-89) Ravi Ravindran, Asit Chakraborti, G.Q.Wang.
Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
European Network Technologies Connecting the Digital Society Future Networks EU Research for the ubiquitous ultrafast Internet of the future enabling every.
Fully Decentralised Authentication Scheme for ICN in Disaster Scenarios (Demonstration on Mobile Terminals) Jan Seedorf, Bilal Gill, and Dirk Kutscher.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Network Evolution in Coming 10 Years: What's the Future of Network?
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
Named Data Networking for Social Network Content delivery P. Truong, B. Mathieu (Orange Labs), K. Satzke (Alu) E. Stephan (Orange Labs) draft-truong-icnrg-ndn-osn-00.txt.
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Jang, Donghyun 2011/4/4 1/21.
Adaptive Web Caching Lixia Zhang, Sally Floyd, and Van Jacob-son. In the 2nd Web Caching Workshop, Boulder, Colorado, April 25, System Laboratory,
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
1 Attribute Based Communications University of California, Irvine Presented By : Ala Khalifeh (Note: Presented)
A Scalable, Commodity Data Center Network Architecture.
Infrastructure to Application Exposure - USE CASE: CDN – Jan Seedorf IETF 83, Paris i2aex BoF Monday, March
© 2009 AT&T Intellectual Property. All rights reserved. Multimedia content growth: From IP networks to Medianets Cisco-IEEE ComSoc Webinar. Sept. 23, 2009.
Chapter 8.  Network Management  Organization Management  Risk Assessment & Management  Service Management  Performance Management  Problem Management.
GOVERNMENT SERVICES INTEGRATION INDUSTRY SOLUTION.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
ComNets Tutorial: Future Internet with Information Centric Networks Asanga Udugama (1), Carmelita Goerg (1) and Andreas Timm-Giel (2) (1) Communications.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Advanced Next gEneration Mobile Open NEtwork Tridentcom th International Conference on Testbeds and Research Infrastructures for the Development.
The Network of Information: Architecture and Applications SAIL – Scalable and Adaptable Internet Solutions Bengt Ahlgren et. al Presented by wshin.
Application Policy on Network Functions (APONF) G. Karagiannis and T.Tsou 1.
AKARI New Generation Network Architecture SeungHo Lee.
Let’s ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking Zhenkai Zhu Alexander Afanasyev (presenter) Tuesday, October 8,
Group Meeting Ming Hong Tsai Date : Toward Ubiquitous Massive Accesses in 3GPP Machine-to- Machine Communications 2.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Main trends affecting research and innovation in the communications networks area Societal drivers: Urbanisation Smart cities Mobility Information availability.
Doc.: IEEE /0691r0 Submission May 2011 Dorothy Stanley, Aruba NetworksSlide 1 IEEE IETF Liaison Report Date: Authors:
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Multimedia & Mobile Communications Lab.
Ad Hoc Network.
National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN MobileMAN: II year expected results.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Ασύρματες και Κινητές Επικοινωνίες
Extension of the MLD proxy functionality to support multiple upstream interfaces 1 Luis M. Contreras Telefónica I+D Carlos J. Bernardos Universidad Carlos.
Multicast in Information-Centric Networking March 2012.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Delay Tolerant Network (DTN) Security Key Management Design Alternatives IETF94 DTN Working Group November 3, 2015 Fred L. Templin
Presented by Edith Ngai MPhil Term 3 Presentation
Route Optimization of Mobile IP over IPv4
Network Cost Services for Network-Aware FI Applications
CCN application-domains: brainstorming from GreenICN project
PLUG-N-HARVEST ID: H2020-EU
Privacy in Content-Oriented Networking: Threats and Countermeasures
Consideration on applying ICN to Edge Computing
New York Institute of Technology- Amman Campus
Presentation transcript:

Using ICN in disaster scenarios (draft-seedorf-icn-disaster-01) M. Arumaithurai, J. Seedorf, A. Tagami, K. Ramakrishnan, N. Blefari Melazzi IETF 88, Vancouver ICNRG November 2013

Outline 1.Background of this Work – GreenICN Project Overview 2.Using ICN in disaster scenarios – What disasters are we talking about – Research challenges – Why ICN approaches may be promising – Concrete use cases and requirements (new) 2

Background: GreenICN Project GreenICN: Architecture and Applications of Green Information Centric Networking Duration: 3 years (1 Apr 2013 – 31 Mar 2016) Website: GreenICN Project Overview 3 EU Coordinator: Prof. Xiaoming Fu University of Göttingen Germany JP Coordinator: Mr. Shigehiro Ano KDDI R&D Labs Japan

Project Consortium GreenICN Project Overview 4

GreenICN Objectives ICN: A new networking paradigm where the network provides users with named content, instead of communication channels between hosts – Many issues stay open: naming, routing, resource control, security, privacy and migration path from today’s Internet – Missing seamless support of content-based publish/subscribe for efficient information dissemination – Existing solutions do not sufficiently address energy efficiency GreenICN 's scientific aim: – Develop innovative methodologies and approaches to optimize ICN paradigm in a highly-scalable and energy-efficient manner – Support two use scenarios: disaster recovery; video delivery GreenICN Project Overview 5 Focus of draft-seedorf-icn-disaster

Disaster Scenarios What scenarios are we considering? – The aftermath of a disaster, e.g. hurricane, earthquake, tsunami, or a human-generated network breakdown E.g. the enormous earthquake which hit Northeastern Japan (Tohoku areas) on March 11, 2011, and caused extensive damages including blackouts, fires, tsunamis and a nuclear crisis What are the constraints and requirements in such situations? – Energy and communication resources are at a premium E.g. due to failure of certain devices and communication links – It is critical to efficiently distribute disaster notification and critical rescue information Authorities would like to inform the citizens of possible shelters, food, or even of impending danger Relatives would like to communicate with each other and be informed about their wellbeing Affected citizens would like to make enquiries of food distribution centres, shelters or report trapped, missing people to the authorities Using ICN in disaster scenarios 6

Vision: Green Disaster Information Delivery and Rescue Management 7 Objective: Provide support for large-scale energy-efficient disaster information delivery for fragmented/disrupted mobile networks, including routing and cache management algorithm for highly fragmented networks Support Routing and caching in fragmented networks Investigating energy efficient information delivery mechanisms for fragmented mobile networks. Access Control and Management in fragmented networks Designing access control and information management in fragmented networks. Implementation and validation of applications for Disaster and Rescue Management Extending/adapting essential functions to support fragmented networks in disaster stricken areas and design applications exploiting such functionality. Fragmented Network Refugees Rescurres Using ICN in disaster scenarios

High-Level Research Challenges Enabling usage of functional parts of the infrastructure, even when these are disconnected from the rest of the network – it is desirable to be able to continue using functional components for communication as much as possible – challenging when these components are disconnected from the backhaul, thus forming fragmented networks Decentralised authentication – In today’s mobile networks, users are authenticated via central entities; in order to communicate in fragmented or disconnected parts of a mobile network, the challenge of decentralising user authentication arises – data origin authentication of content retrieved from the network is challenging when being 'offline' (e.g. disconnected from servers of a security infrastructure such as a PKI) Delivering/obtaining information in congested networks – Significant congestion can be expected in parts of the infrastructure due to broken cables, failed routers, etc. – even more important as in the case of a disaster aftermath, it may be crucial to deliver certain information to recipients (e.g. warnings to citizens) Using ICN in disaster scenarios 8

How ICN can be Beneficial Routing-by-name – very handy in a fragmented network where reference to location-based, fixed addresses may not work as a consequence of disruptions – for instance, name resolution with ICN does not necessarily rely on the reachability of application-layer servers (e.g. DNS resolvers) Authentication of named data objects – With 'self-certifying data' approaches, the origin of data retrieved from the network can be authenticated without relying on a trusted third party or PKI Content-based access control – ICN can regulate access to data objects (e.g. only to a specific user or class of users) by means of content-based security – this functionality could facilitate trusted communications among peer users in isolated areas of the network Caching – Caching helps in handling huge amounts of traffic, and can help to avoid congestion in the network (e.g. congestion in backhaul links can be avoided by delivering content from caches at access nodes) Using ICN in disaster scenarios 9

Use Cases and Requirements New Section in draft-seedorf-icn-disaster-01 Example Use Cases – Delivering Messages to Relatives/Friends Citizens want to confirm to each other that they are safe Technical Requirements: – A scalable message forwarding scheme that dynamically adapts to changing conditions in disconnected networks – DTN-like mechanisms for getting information from disconnected island to another disconnected island – Data origin authentication to be able to confirm that messages are indeed from relatives or friends – Spreading Crucial Information to Citizens State authorities want to be able to convey important information (e.g. warnings, or information on where to go or how to behave) to citizens Technical Requirements: – Data origin authentication – Mechanisms that guarantee the timeliness and loss-free delivery of such information – DTN-like mechanisms for getting information from disconnected island to another disconnected island – Verifying and Spreading Information from Citizens to Citizens Citizens want to spread observations and warnings, these potentially need to be verified by authorities before making available to all users Technical Requirements: – Mechanisms that guarantee the timeliness and loss-free delivery of such information – DTN-like mechanisms for getting information from disconnected island to another disconnected island – Third party verification so that users can confirm that the messages they receive are verified by authorities 10

Acknowledgements This work has been supported by the GreenICN project (GreenICN: Architecture and Applications of Green Information Centric Networking ), a research project supported jointly by the European Commission under its 7th Framework Program (contract no ) and the National Institute of Information and Communications Technology (NICT) in Japan (contract no. 167). The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the GreenICN project, the European Commission, or NICT. 11