Download presentation
Presentation is loading. Please wait.
Published byDonna Whitehead Modified over 9 years ago
1
DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008
2
Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work
3
Objective Based on DTN ONE simulator, we want to propose and implement a low-overhead security scheme to resist attacks like Flooding, Blackhole, Rushing, Wormhole and “Strong attacks”. Go back >>
4
Introduction to DTN What is DTN? What are its features? (What are differences from other Networks?) What is the catch (right now)?
5
What is DTN? Delay-Tolerant Networks or Disruption-Tolerant Networks is “an approach to computer network architecture that seeks to address the technical issues in mobile or extreme environments, such as deep-space, that lack continuous network connectivity.” [Wiki]Wiki See real life example about 10 minsKioskNet of Waterloo
6
What are its features? Small in size Discontinuous Store-and-forward Multiple routing paths Lack of instantaneous end-to-end paths Ad-hoc topology [Wiki]Wiki
7
What is the catch? Ad-hoc? So, Security – No real implementation of any security scheme on DTN so far – If proposed, draft-irtf-dtnrg-bundle-security-03 for example, it is very heavy-weighteddraft-irtf-dtnrg-bundle-security-03 – Unable to handle different kinds of hazards And our proposal would >>
8
Demo of ONE Click the tree to start ONE
9
Introduction to ONE Overview Structure, Classes & Relations
10
Overview of ONE Opportunistic Network Environment A GPL-licensed Java implementation of DTN protocols Download Written by Ari Keränen of DTN TKK Lab of Helsinki University of TechnologyDTN TKK Lab
11
Classes of ONE Primary Classes – DTNSimGUI – DTNHost – Message – MovementModel – NetworkLayer, Connection – MessageRouter – SimScenario, Settings – World – Report How do they work? How do they work?
12
Structure & Relations of ONE DTNHost/ MessageRouter NetworkLayer Connection MovementModel
13
Our work Prove several attacks, i.e. flooding, blackhole, rushing, wormhole and “strong attack”, are influential to the network Propose a scheme based on Zhong Xu’s EISM Prove it works
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.