Abstract
Situational awareness applications used in disaster response and tactical scenarios require efficient communication without support from a fixed infrastructure. As commercial off-the-shelf mobile phones and tablets become cheaper, they are increasingly deployed in volatile ad-hoc environments. Despite wide use, networking in an efficient and distributed way remains as an active research area, and few implementation results on mobile devices exist. In these scenarios, where users both produce and consume sensed content, the network should efficiently match content to user interests without making any fixed infrastructure assumptions. We propose the ICEMAN (Information CEntric Mobile Ad-hoc Networking) architecture which is designed to support distributed situational awareness applications in tactical scenarios. We describe the motivation, features, and implementation of our architecture and briefly summarize the performance of this novel architecture.
This work was supported in part by SRI International and by the Defense Advanced Research Projects Agency (DARPA) and SPAWAR Systems Center Pacific (SSC Pacific) under Contract N66001-12-C-4051. The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. Approved for Public Release, Distribution Unlimited, Case 21098 and 23317.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
It is sometimes referred to as the “last tactical mile” problem.
References
ENCODERS. http://encoders.csl.sri.com/
Federal Information Processing Standards, Publication 197: Advanced encryption standard. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
ENCODERS software design description v. 1.0 (2013). http://encoders.csl.sri.com/wp-content/uploads/2014/08/CBMEN-SRI-Design-Description-V1.0-Dist-A.pdf
ENCODERS software design description v. 2.0 (2014). http://encoders.csl.sri.com/wp-content/uploads/2014/08/CBMEN-SRI-Design-Description-V2.0-Dist-A.pdf
Shikfa, A., Oenen, M. (eds.): Haggle 027918: an innovative paradigm for autonomic opportunistic communication prototype of trust and security mechanisms. Technical report (2009). http://www.haggleproject.org/deliverables/D4.3_final.pdf
Adamson, B., Bormann, C., Handley, M., Macker, J.: Negative-acknowledgment (NACK)-oriented reliable multicast (NORM) protocol. Internet Society Request for Comments RFC 3940 (2004)
Ahrenholz, J., Danilov, C., Henderson, T.R., Kim, J.H.: Core: a real-time network emulator. In: 2008 IEEE Military Communications Conference, MILCOM 2008, pp, 1–7. IEEE (2008)
Akinyele, J., Green, M., Rubin, A.: Charm: a framework for rapidly prototyping cryptosystems. Technical report, Johns Hopkins University (2011)
Basu, P., Krishnan, R., Brown, D.W.: Persistent delivery with deferred binding to descriptively named destinations. In: Proceedings of the IEEE Military Communications Conference (2008)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 28th IEEE Symposium on Security and Privacy (2007)
Chand, N., Joshi, R.C., Misra, M.: Cooperative caching in mobile ad hoc networks based on data utility. Mobile Inf. Syst. 3, 19–37 (2007)
Defense Advanced Research Projects Agency (DARPA). Content-based mobile edge networking (2012). http://www.darpa.mil/Our_Work/STO/Programs/Content-Based_Mobile_Edge _Networking_(CBMEN).aspx
Djamaa, B., Richardson, M., Aouf, N., Walters, B.: Towards efficient distributed service discovery in low-power and lossy networks. Wireless Netw. 20(8), 2437–2453 (2014)
Lindgren, A. et al.: Probabilistic routing protocol for intermittently connected networks. Internet Draft draft-irtf-dtnrg-prophet-10 (2012)
Finn, W.: Improving battlefield connectivity for dismounted forces, pp. 6–10. Defense Tech Briefs (2012)
Frink, S.: Secure cell phone technology gets ready for deployment. Military and Aerospace Electronics (2012)
Ghadimi, E., Landsiedel, O., Soldati, P., Duquennoy, S., Johansson, M.: Opportunistic routing in low duty-cycle wireless sensor networks. ACM Trans. Sen. Netw. 10(4), 67:1–67:39 (2014)
Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., Wilcox, J.: Information-centric networking: seeing the forest for the trees. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, p. 1. ACM (2011)
Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C.: Pocket switched networks and human mobility in conference environments. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking, WDTN 2005, pp. 244–251, ACM, New York (2005)
Ioannidis, S., Chaintreau, A., Massoulié, L.: Distributing content updates over a mobile social network. SIGMOBILE Mob. Comput. Commun. Rev. 13, 44–47 (2009)
Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: Proceedings of the 5th International Conference on Emerging Networking Experiments And Technologies, pp. 1–12. ACM (2009)
Kim, M., Kim, J.-M., Stehr, M.-O., Gehani, A., Tariq, D., Kim, J.S.: Maximizing availability of content in disruptive environments by cross-layer optimization. In: 28th ACM Symposium on Applied Computing (SAC) (2013)
Kim, M., Stehr, M.-O., Kim, J., Ha, S.: An application framework for loosely coupled networked cyber-physical systems. In: 8th IEEE International Conference on Embedded and Ubiquitous Computing (EUC-10), Hong Kong, December 2010
Kopena, J.B., Loo, B.T.: Ontonet: scalable knowledge-based networking. In: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering Workshop, ICDEW 2008, pp. 170–175. IEEE Computer Society, Washington, DC, USA (2008)
Lakhani, H., McCarthy, T., Kim, M., Wilkins, D., Wood, S.: Evaluation of a delay-tolerant ICN architecture. In: International Conference on Ubiquitous and Future Networks, July 2015
Lee, U., Park, J.-S., Yeh, J., Pau, G., Gerla, M.: Code torrent: content distribution using network coding in vanet. In: Proceedings of the 1st International Workshop on Decentralized Resource Sharing in Mobile Computing And Networking, MobiShare 2006, pp. 1–5. ACM, New York (2006)
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011)
Li, H., Costantini, R., Anhalt, D., Alonso, R., Stehr, M.-O., Talcot, C., Kim, M., McCarthy, T., Wood, S.: Adaptive interest modeling improves content services at the network edge. In: 2014 IEEE Military Communications Conference (MILCOM), pp. 1027–1033, October 2014
Lindgren, A., Doria, A., Schelén, O.: Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Comput. Commun. Rev. 7(3), 19–20 (2003)
Mtibaa, A., May, M., Diot, C., Ammar, M.: Peoplerank: social opportunistic forwarding. In: Proceedings of the 29th Conference on Information Communications, INFOCOM 2010, pp. 111–115. IEEE Press, Piscataway, NJ, USA (2010)
Musolesi, M., Hui, P., Mascolo, C., Crowcroft, C.: Writing on the clean slate: Implementing a socially-aware protocol in Haggle. In: Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 1–6. IEEE Computer Society, Washington, DC, USA (2008)
Nordstrom, E., Gunningberg, P., Rohner, C.; A search-based network architecture for mobile devices. Technical report, Uppsala University (2009)
Oh, S.-Y., Lau, D., Gerla, M.: Content centric networking in tactical and emergency MANETs. In: Wireless Days, pp. 1–5. IEEE (2010)
Shikfa, A., Önen, M., Molva, R.: Bootstrapping security associations in opportunistic networks. In: PerCom Workshops, pp. 147–152. IEEE (2010)
Shikfa, A., Önen, M., Molva, R.: Privacy and confidentiality in context-based and epidemic forwarding. Comput. Commun. 33, 1493–1504 (2010)
Solis, I., Garcia-Luna-Aceves, J.J.: Robust content dissemination in disrupted environments. In: Proceedings of the Third ACM Workshop on Challenged Networks, CHANTS 2008, pp. 3–10. ACM, New York (2008)
Stehr, M.-O., Talcott, C.: Planning and learning algorithms for routing in disruption-tolerant networks. In: IEEE Military Communications Conference (2008)
Obraczka, K., Spyropoulos, T., Turletti, T.: Routing in delay-tolerant networks comprising heterogeneous node populations. IEEE Trans. Mobile Comput. 8, 1132–1147 (2009)
Vahdat, A., Becker, D. et al.: Epidemic routing for partially connected ad hoc networks. Technical report, Technical Report CS-200006, Duke University (2000)
Wood, S., Mathewson, J., Joy, J., Stehr, M.O., Kim, M., Gehani, A., Gerla, M., Sadjadpour, H., Garcia-Luna-Aceves, J.J.: ICEMAN: a system for efficient, robust and secure situational awareness at the network edge. In: Proceedings of IEEE Military Communications Conference (2013)
Acknowledgements
Apart from building on results from earlier projects, such those funded in the context of the DARPA Disruption Tolerant Networking program and our NSF- and ONR- funded projects on Networked Cyber Physical Systems at SRI, the ENCODERS project has also leveraged some results and ideas developed by International Fellows in their own research while visiting SRI. Here we would like to use the opportunity to thank Hasnain Lakhani, Jong-Seok Choi, Dawood Tariq, Rizwan Asghar, Je-Min Kim, Francoise Sailhan, Sathiya Kumar, and Sylvain Lefebvre for their valuable ideas and contributions. We would like to thank our team member SET Corp. (David Anhalt, Ralph Costantini, Dr. Hua Li, and Dr. Rafael Alonso) for their support and collaboration on interest modeling. At the beginning of the program we selected SAIC as our Mobile Systems Integrator. Hence we would like to thank the entire SAIC team (led by Dr. William Merrill and George Weston) for providing the development platform and successfully demonstrating an integrated CBMEN system based on the SRI ENCODERS architecture at Ft. AP Hill, VA, and MIT Lincoln Labs (the team led by Dr. Andrew Worthen) for their independent evaluation of the performance in testbed experiments and in the field.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Wood, S. et al. (2015). ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge. In: Martí-Oliet, N., Ölveczky, P., Talcott, C. (eds) Logic, Rewriting, and Concurrency. Lecture Notes in Computer Science(), vol 9200. Springer, Cham. https://doi.org/10.1007/978-3-319-23165-5_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-23165-5_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23164-8
Online ISBN: 978-3-319-23165-5
eBook Packages: Computer ScienceComputer Science (R0)