SlideShare a Scribd company logo
1 of 19
Download to read offline
Dr. M Nasir Mumtaz Bhutta
Institute of Computing
Bahauddin Zakariya University
Multan, Punjab, 60,000
Pakistan
Email: nasir.bhutta@bzu.edu.pk
www.bzu.edu.pk
Introduction to Secure
Delay/Disruption Tolerant
Networks
21 January 2015
Dr. M N M Bhutta www.bzu.edu.pk2
 Introduction to Delay/Disruption Tolerant
Networking (DTN).
 Overview of Security Architecture in DTN:
• Hop-by-Hop Authentication and Integrity.
• End-to-End Authentication and Integrity.
• End-to-End Confidentiality.
 Requirements of Key Management in DTN.
Objectives
Dr. M N M Bhutta www.bzu.edu.pk3
Introduction to DTN
 Wired, TCP/IP based internet is no doubt
a success.
 Some design assumptions and
characteristics of TCP/IP based internet
are:
• Devices are always connected.
• Data loss rate is comparatively low.
• Small round trip times. etc
Dr. M N M Bhutta www.bzu.edu.pk4
Wireless Networks Applications
 With advancement in wireless technology new
kinds of networks have grown/growing. For
example,
• Satellite Networks
• Sensor Networks
• Ad-hoc networks
• Mobile Phone Networks
• Vehicular Networks etc.
 In wired internet, some new applications are
also developing which are different from
traditional internet. For example, Peer-to-Peer
networks etc.
Dr. M N M Bhutta www.bzu.edu.pk5
Future Internetworking
Dr. M N M Bhutta www.bzu.edu.pk6
Future Networking Issues
 Characteristics of these wireless networks
are different from wired networks and also
vary within different domains as well.
Some characteristics are as follows:
• High Loss rate
• Large and/or variable delays.
• Links are not always connected,
Disconnectivity”.
Dr. M N M Bhutta www.bzu.edu.pk7
Future Networking Issues
(continued)
 Heterogeneity
• Sensor networks are very low powered
devices and usually delays tolerant (e.g.
monitoring applications).
• Satellite are long delayed networks (e.g. inter
planet networks).
• Mobile phone networks have their own
characteristics (mobility).
• Adhoc have variable disconnectivity.
Dr. M N M Bhutta www.bzu.edu.pk8
Solutions
 TCP/IP without modification
• Maximum RTT = 2 mins (high delays ?)
• Lossy links (Congestion Control ?)
• Sensor Networks (Low Powered devices ?)
• Mobile Phone networks (Better Performance &
Handoffs ?)
 TCP with Modifications
• Have to solve each individual problem (e.g. Long
delays, applications on top of TCP, IPSec etc).
Dr. M N M Bhutta www.bzu.edu.pk9
Solutions (continued..)
 Overlay networking approach
• Different protocols have been developed for
different networks (Heterogeneity will be
solved).
• Long and variable delays, high loss rate, and
disconnectivity need to be handled on upper
layer than TCP to give better performance.
• Here DTN comes..
Dr. M N M Bhutta www.bzu.edu.pk10
Overview of DTN
• DTN is an overlay
network which runs
on top of existing
different networks to
better handle high &
variable delays,
disruptions.
• It introduces new
layer called bundle
layer on top of TCP
layer in TCP/IP stack.
Node Router Gateway
Persistent storage Optional Application Layer
Physical A
Link A
Network A
Transport A
Bundle
Application
Physical A
Link A
Network A
Transport A
Physical A
Link A
Network A
Transport A
Bundle
Application
Physical B
Link B
Network B
Transport B
Physical A
Link A
Network A
Transport A
Bundle
Application
Dr. M N M Bhutta www.bzu.edu.pk11
High Delays/Disruptions and DTN
• High delays/disruptions are handled using
custodian transfer on bundle layer.
Dr. M N M Bhutta www.bzu.edu.pk12
Heterogeneous Networks and DTN
• Different protocols family runs in
different region.
Dr. M N M Bhutta www.bzu.edu.pk13
Security Architecture in DTN
 Security Architecture for Internet (IPSec)
can not be used with DTN for provision of
security services.
 Some highlighted issues for using with
DTN are as follows:
• Very chatty in nature.
• Intermediate devices will have conflict with
IPSec.
• Cross-Layer Optimization will not work for
IPSec. etc.
Dr. M N M Bhutta www.bzu.edu.pk14
Security Architecture in DTN
(continued..)
 DTN security architecture use its own idea
compliant with DTN networking
architecture for security services.
 The security goals are given below:
• Hop-by-Hop integrity.
• Hop-by-Hop Authentication.
• End-to-End Integrity.
• End-to-End Authentication.
• End-to-End Confidentiality.
Dr. M N M Bhutta www.bzu.edu.pk15
Hop-by-Hop Integrity and
Authentication.
Dr. M N M Bhutta www.bzu.edu.pk16
End-to-End Integrity
Dr. M N M Bhutta www.bzu.edu.pk17
End-to-End Confidentiality
Dr. M N M Bhutta www.bzu.edu.pk18
Key Management in DTN
 For secure and efficient key management for
DTN, following are some of the requirements.
• Key management should be communication efficient
and computational efficiency should also be taken
into consideration. Key Transport will be more
suitable
• Should support the DTN security architecture
functionality and components. Public Key
Cryptography should be supported.
Dr. M N M Bhutta www.bzu.edu.pk19
Thanks for listening !
»Questions ?

More Related Content

What's hot

Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
Meena S Pandi
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
Abdullah Mukhtar
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
Phearin Sok
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
Piyush Mittal
 

What's hot (20)

Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...
 
DTN
DTNDTN
DTN
 
Multilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet ProtocolsMultilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet Protocols
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
 

Viewers also liked

Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
Noorin Fatima
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Waldir Moreira
 
Social-aware Opportunistic Routing
Social-aware Opportunistic RoutingSocial-aware Opportunistic Routing
Social-aware Opportunistic Routing
Waldir Moreira
 

Viewers also liked (20)

Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant Networks
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
 
Delay telerant network
Delay telerant networkDelay telerant network
Delay telerant network
 
Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networks
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
 
Social-aware Opportunistic Routing
Social-aware Opportunistic RoutingSocial-aware Opportunistic Routing
Social-aware Opportunistic Routing
 
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
 
DTN ProphetX® - At a Glance
DTN ProphetX® - At a GlanceDTN ProphetX® - At a Glance
DTN ProphetX® - At a Glance
 
Alien Far Side 3 Moon
Alien Far Side 3 MoonAlien Far Side 3 Moon
Alien Far Side 3 Moon
 
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
 
Crowd Assisted Approach for Pervasive Opportunistic Sensing
Crowd Assisted Approach for Pervasive Opportunistic SensingCrowd Assisted Approach for Pervasive Opportunistic Sensing
Crowd Assisted Approach for Pervasive Opportunistic Sensing
 
How Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN RoutingHow Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN Routing
 
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionDTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
 
SocialDTN: a DTN Implementation for Digital and Social Inclusion
SocialDTN: a DTN Implementation for Digital and Social InclusionSocialDTN: a DTN Implementation for Digital and Social Inclusion
SocialDTN: a DTN Implementation for Digital and Social Inclusion
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 

Similar to Introduction to Secure Delay/Disruption Tolerant Networks (DTN)

Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
IJNSA Journal
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
Emily Jones
 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...
Susan Cox
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
TnNguyn57021
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
Kyle Ly
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
Firas Alsayied
 
Fiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptxFiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptx
VERSITRONINC
 

Similar to Introduction to Secure Delay/Disruption Tolerant Networks (DTN) (20)

OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Project report
Project reportProject report
Project report
 
Project report
Project reportProject report
Project report
 
networking
networking networking
networking
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 
Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptxIntroduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boost
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Fiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptxFiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptx
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Unit 1 1 introduction
Unit 1   1 introductionUnit 1   1 introduction
Unit 1 1 introduction
 
Fiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptxFiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptx
 

More from Nasir Bhutta

Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
Nasir Bhutta
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsIntroduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and Applications
Nasir Bhutta
 
Cloud computing overview & current research
Cloud computing  overview & current researchCloud computing  overview & current research
Cloud computing overview & current research
Nasir Bhutta
 

More from Nasir Bhutta (12)

Blockchain for Interdisciplinary Research
Blockchain for Interdisciplinary ResearchBlockchain for Interdisciplinary Research
Blockchain for Interdisciplinary Research
 
Basics of Blockchain Technology
Basics of Blockchain TechnologyBasics of Blockchain Technology
Basics of Blockchain Technology
 
secure smart cities
 secure smart cities secure smart cities
secure smart cities
 
Ccsit cyberlympics 2017 workshop 3 - presentation
Ccsit cyberlympics 2017  workshop 3 - presentationCcsit cyberlympics 2017  workshop 3 - presentation
Ccsit cyberlympics 2017 workshop 3 - presentation
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
Different types of networks
Different types of networksDifferent types of networks
Different types of networks
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsIntroduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and Applications
 
Cloud computing overview & current research
Cloud computing  overview & current researchCloud computing  overview & current research
Cloud computing overview & current research
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Introduction to Secure Delay/Disruption Tolerant Networks (DTN)

  • 1. Dr. M Nasir Mumtaz Bhutta Institute of Computing Bahauddin Zakariya University Multan, Punjab, 60,000 Pakistan Email: nasir.bhutta@bzu.edu.pk www.bzu.edu.pk Introduction to Secure Delay/Disruption Tolerant Networks 21 January 2015
  • 2. Dr. M N M Bhutta www.bzu.edu.pk2  Introduction to Delay/Disruption Tolerant Networking (DTN).  Overview of Security Architecture in DTN: • Hop-by-Hop Authentication and Integrity. • End-to-End Authentication and Integrity. • End-to-End Confidentiality.  Requirements of Key Management in DTN. Objectives
  • 3. Dr. M N M Bhutta www.bzu.edu.pk3 Introduction to DTN  Wired, TCP/IP based internet is no doubt a success.  Some design assumptions and characteristics of TCP/IP based internet are: • Devices are always connected. • Data loss rate is comparatively low. • Small round trip times. etc
  • 4. Dr. M N M Bhutta www.bzu.edu.pk4 Wireless Networks Applications  With advancement in wireless technology new kinds of networks have grown/growing. For example, • Satellite Networks • Sensor Networks • Ad-hoc networks • Mobile Phone Networks • Vehicular Networks etc.  In wired internet, some new applications are also developing which are different from traditional internet. For example, Peer-to-Peer networks etc.
  • 5. Dr. M N M Bhutta www.bzu.edu.pk5 Future Internetworking
  • 6. Dr. M N M Bhutta www.bzu.edu.pk6 Future Networking Issues  Characteristics of these wireless networks are different from wired networks and also vary within different domains as well. Some characteristics are as follows: • High Loss rate • Large and/or variable delays. • Links are not always connected, Disconnectivity”.
  • 7. Dr. M N M Bhutta www.bzu.edu.pk7 Future Networking Issues (continued)  Heterogeneity • Sensor networks are very low powered devices and usually delays tolerant (e.g. monitoring applications). • Satellite are long delayed networks (e.g. inter planet networks). • Mobile phone networks have their own characteristics (mobility). • Adhoc have variable disconnectivity.
  • 8. Dr. M N M Bhutta www.bzu.edu.pk8 Solutions  TCP/IP without modification • Maximum RTT = 2 mins (high delays ?) • Lossy links (Congestion Control ?) • Sensor Networks (Low Powered devices ?) • Mobile Phone networks (Better Performance & Handoffs ?)  TCP with Modifications • Have to solve each individual problem (e.g. Long delays, applications on top of TCP, IPSec etc).
  • 9. Dr. M N M Bhutta www.bzu.edu.pk9 Solutions (continued..)  Overlay networking approach • Different protocols have been developed for different networks (Heterogeneity will be solved). • Long and variable delays, high loss rate, and disconnectivity need to be handled on upper layer than TCP to give better performance. • Here DTN comes..
  • 10. Dr. M N M Bhutta www.bzu.edu.pk10 Overview of DTN • DTN is an overlay network which runs on top of existing different networks to better handle high & variable delays, disruptions. • It introduces new layer called bundle layer on top of TCP layer in TCP/IP stack. Node Router Gateway Persistent storage Optional Application Layer Physical A Link A Network A Transport A Bundle Application Physical A Link A Network A Transport A Physical A Link A Network A Transport A Bundle Application Physical B Link B Network B Transport B Physical A Link A Network A Transport A Bundle Application
  • 11. Dr. M N M Bhutta www.bzu.edu.pk11 High Delays/Disruptions and DTN • High delays/disruptions are handled using custodian transfer on bundle layer.
  • 12. Dr. M N M Bhutta www.bzu.edu.pk12 Heterogeneous Networks and DTN • Different protocols family runs in different region.
  • 13. Dr. M N M Bhutta www.bzu.edu.pk13 Security Architecture in DTN  Security Architecture for Internet (IPSec) can not be used with DTN for provision of security services.  Some highlighted issues for using with DTN are as follows: • Very chatty in nature. • Intermediate devices will have conflict with IPSec. • Cross-Layer Optimization will not work for IPSec. etc.
  • 14. Dr. M N M Bhutta www.bzu.edu.pk14 Security Architecture in DTN (continued..)  DTN security architecture use its own idea compliant with DTN networking architecture for security services.  The security goals are given below: • Hop-by-Hop integrity. • Hop-by-Hop Authentication. • End-to-End Integrity. • End-to-End Authentication. • End-to-End Confidentiality.
  • 15. Dr. M N M Bhutta www.bzu.edu.pk15 Hop-by-Hop Integrity and Authentication.
  • 16. Dr. M N M Bhutta www.bzu.edu.pk16 End-to-End Integrity
  • 17. Dr. M N M Bhutta www.bzu.edu.pk17 End-to-End Confidentiality
  • 18. Dr. M N M Bhutta www.bzu.edu.pk18 Key Management in DTN  For secure and efficient key management for DTN, following are some of the requirements. • Key management should be communication efficient and computational efficiency should also be taken into consideration. Key Transport will be more suitable • Should support the DTN security architecture functionality and components. Public Key Cryptography should be supported.
  • 19. Dr. M N M Bhutta www.bzu.edu.pk19 Thanks for listening ! »Questions ?