Presentation is loading. Please wait.

Presentation is loading. Please wait.

DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work.

Similar presentations


Presentation on theme: "DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work."— Presentation transcript:

1 DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008

2 Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work

3 Objective Based on DTN ONE simulator, we want to propose and implement a low-overhead security scheme to resist attacks like Flooding, Blackhole, Rushing, Wormhole and “Strong attacks”. Go back >>

4 Introduction to DTN What is DTN? What are its features? (What are differences from other Networks?) What is the catch (right now)?

5 What is DTN? Delay-Tolerant Networks or Disruption-Tolerant Networks is “an approach to computer network architecture that seeks to address the technical issues in mobile or extreme environments, such as deep-space, that lack continuous network connectivity.” [Wiki]Wiki See real life example about 10 minsKioskNet of Waterloo

6 What are its features? Small in size Discontinuous Store-and-forward Multiple routing paths Lack of instantaneous end-to-end paths Ad-hoc topology [Wiki]Wiki

7 What is the catch? Ad-hoc? So, Security – No real implementation of any security scheme on DTN so far – If proposed, draft-irtf-dtnrg-bundle-security-03 for example, it is very heavy-weighteddraft-irtf-dtnrg-bundle-security-03 – Unable to handle different kinds of hazards And our proposal would >>

8 Demo of ONE Click the tree to start ONE

9 Introduction to ONE Overview Structure, Classes & Relations

10 Overview of ONE Opportunistic Network Environment A GPL-licensed Java implementation of DTN protocols Download Written by Ari Keränen of DTN TKK Lab of Helsinki University of TechnologyDTN TKK Lab

11 Classes of ONE Primary Classes – DTNSimGUI – DTNHost – Message – MovementModel – NetworkLayer, Connection – MessageRouter – SimScenario, Settings – World – Report How do they work? How do they work?

12 Structure & Relations of ONE DTNHost/ MessageRouter NetworkLayer Connection MovementModel

13 Our work Prove several attacks, i.e. flooding, blackhole, rushing, wormhole and “strong attack”, are influential to the network Propose a scheme based on Zhong Xu’s EISM Prove it works


Download ppt "DTN, ONE & Our Plan Yuan JIN Sept. 17, 2008. Outline Objective Introduction to DTN Demo of ONE Introduction to ONE Our (current) work."

Similar presentations


Ads by Google