![Page 1: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/1.jpg)
Dr. M Nasir Mumtaz Bhutta
Institute of Computing
Bahauddin Zakariya University
Multan, Punjab, 60,000
Pakistan
Email: [email protected]
www.bzu.edu.pk
Introduction to Secure
Delay/Disruption Tolerant
Networks
21 January 2015
![Page 2: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/2.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 2
Introduction to Delay/Disruption Tolerant
Networking (DTN).
Overview of Security Architecture in DTN:
• Hop-by-Hop Authentication and Integrity.
• End-to-End Authentication and Integrity.
• End-to-End Confidentiality.
Requirements of Key Management in DTN.
Objectives
![Page 3: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/3.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 3
Introduction to DTN
Wired, TCP/IP based internet is no doubt
a success.
Some design assumptions and
characteristics of TCP/IP based internet
are:
• Devices are always connected.
• Data loss rate is comparatively low.
• Small round trip times. etc
![Page 4: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/4.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 4
Wireless Networks Applications
With advancement in wireless technology new kinds of networks have grown/growing. For example, • Satellite Networks
• Sensor Networks
• Ad-hoc networks
• Mobile Phone Networks
• Vehicular Networks etc.
In wired internet, some new applications are also developing which are different from traditional internet. For example, Peer-to-Peer networks etc.
![Page 5: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/5.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 5
Future Internetworking
![Page 6: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/6.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 6
Future Networking Issues
Characteristics of these wireless networks
are different from wired networks and also
vary within different domains as well.
Some characteristics are as follows:
• High Loss rate
• Large and/or variable delays.
• Links are not always connected,
Disconnectivity”.
![Page 7: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/7.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 7
Future Networking Issues
(continued)
Heterogeneity
• Sensor networks are very low powered
devices and usually delays tolerant (e.g.
monitoring applications).
• Satellite are long delayed networks (e.g. inter
planet networks).
• Mobile phone networks have their own
characteristics (mobility).
• Adhoc have variable disconnectivity.
![Page 8: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/8.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 8
Solutions
TCP/IP without modification
• Maximum RTT = 2 mins (high delays ?)
• Lossy links (Congestion Control ?)
• Sensor Networks (Low Powered devices ?)
• Mobile Phone networks (Better Performance &
Handoffs ?)
TCP with Modifications
• Have to solve each individual problem (e.g. Long
delays, applications on top of TCP, IPSec etc).
![Page 9: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/9.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 9
Solutions (continued..)
Overlay networking approach
• Different protocols have been developed for
different networks (Heterogeneity will be
solved).
• Long and variable delays, high loss rate, and
disconnectivity need to be handled on upper
layer than TCP to give better performance.
• Here DTN comes..
![Page 10: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/10.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 10
Overview of DTN
• DTN is an overlay network which runs on top of existing different networks to better handle high & variable delays, disruptions.
• It introduces new layer called bundle layer on top of TCP layer in TCP/IP stack.
Node Router Gateway
Persistent storage Optional Application Layer
Physical A
Link A
Network A
Transport A
Bundle
Application
Physical A
Link A
Network A
Transport A
Physical A
Link A
Network A
Transport A
Bundle
Application
Physical B
Link B
Network B
Transport B
Physical A
Link A
Network A
Transport A
Bundle
Application
![Page 11: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/11.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 11
High Delays/Disruptions and DTN
• High delays/disruptions are handled using
custodian transfer on bundle layer.
![Page 12: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/12.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 12
Heterogeneous Networks and DTN
• Different protocols family runs in
different region.
![Page 13: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/13.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 13
Security Architecture in DTN
Security Architecture for Internet (IPSec) can not be used with DTN for provision of security services.
Some highlighted issues for using with DTN are as follows: • Very chatty in nature.
• Intermediate devices will have conflict with IPSec.
• Cross-Layer Optimization will not work for IPSec. etc.
![Page 14: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/14.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 14
Security Architecture in DTN
(continued..)
DTN security architecture use its own idea compliant with DTN networking architecture for security services.
The security goals are given below:
• Hop-by-Hop integrity.
• Hop-by-Hop Authentication.
• End-to-End Integrity.
• End-to-End Authentication.
• End-to-End Confidentiality.
![Page 15: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/15.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 15
Hop-by-Hop Integrity and
Authentication.
![Page 16: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/16.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 16
End-to-End Integrity
![Page 17: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/17.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 17
End-to-End Confidentiality
![Page 18: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/18.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 18
Key Management in DTN
For secure and efficient key management for DTN, following are some of the requirements. • Key management should be communication efficient
and computational efficiency should also be taken into consideration. Key Transport will be more suitable
• Should support the DTN security architecture functionality and components. Public Key Cryptography should be supported.
![Page 19: Introduction to Secure Delay/Disruption Tolerant Networks (DTN)](https://reader031.vdocuments.net/reader031/viewer/2022032114/55aa25be1a28ab80388b4580/html5/thumbnails/19.jpg)
Dr. M N M Bhutta www.bzu.edu.pk 19
Thanks for listening !
»Questions ?