Skip to main content

ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge

  • Chapter
  • First Online:
Book cover Logic, Rewriting, and Concurrency

Abstract

Situational awareness applications used in disaster response and tactical scenarios require efficient communication without support from a fixed infrastructure. As commercial off-the-shelf mobile phones and tablets become cheaper, they are increasingly deployed in volatile ad-hoc environments. Despite wide use, networking in an efficient and distributed way remains as an active research area, and few implementation results on mobile devices exist. In these scenarios, where users both produce and consume sensed content, the network should efficiently match content to user interests without making any fixed infrastructure assumptions. We propose the ICEMAN (Information CEntric Mobile Ad-hoc Networking) architecture which is designed to support distributed situational awareness applications in tactical scenarios. We describe the motivation, features, and implementation of our architecture and briefly summarize the performance of this novel architecture.

This work was supported in part by SRI International and by the Defense Advanced Research Projects Agency (DARPA) and SPAWAR Systems Center Pacific (SSC Pacific) under Contract N66001-12-C-4051. The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. Approved for Public Release, Distribution Unlimited, Case 21098 and 23317.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    It is sometimes referred to as the “last tactical mile” problem.

References

  1. ENCODERS. http://encoders.csl.sri.com/

  2. Federal Information Processing Standards, Publication 197: Advanced encryption standard. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  3. ENCODERS software design description v. 1.0 (2013). http://encoders.csl.sri.com/wp-content/uploads/2014/08/CBMEN-SRI-Design-Description-V1.0-Dist-A.pdf

  4. ENCODERS software design description v. 2.0 (2014). http://encoders.csl.sri.com/wp-content/uploads/2014/08/CBMEN-SRI-Design-Description-V2.0-Dist-A.pdf

  5. Shikfa, A., Oenen, M. (eds.): Haggle 027918: an innovative paradigm for autonomic opportunistic communication prototype of trust and security mechanisms. Technical report (2009). http://www.haggleproject.org/deliverables/D4.3_final.pdf

  6. Adamson, B., Bormann, C., Handley, M., Macker, J.: Negative-acknowledgment (NACK)-oriented reliable multicast (NORM) protocol. Internet Society Request for Comments RFC 3940 (2004)

    Google Scholar 

  7. Ahrenholz, J., Danilov, C., Henderson, T.R., Kim, J.H.: Core: a real-time network emulator. In: 2008 IEEE Military Communications Conference, MILCOM 2008, pp, 1–7. IEEE (2008)

    Google Scholar 

  8. Akinyele, J., Green, M., Rubin, A.: Charm: a framework for rapidly prototyping cryptosystems. Technical report, Johns Hopkins University (2011)

    Google Scholar 

  9. Basu, P., Krishnan, R., Brown, D.W.: Persistent delivery with deferred binding to descriptively named destinations. In: Proceedings of the IEEE Military Communications Conference (2008)

    Google Scholar 

  10. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 28th IEEE Symposium on Security and Privacy (2007)

    Google Scholar 

  11. Chand, N., Joshi, R.C., Misra, M.: Cooperative caching in mobile ad hoc networks based on data utility. Mobile Inf. Syst. 3, 19–37 (2007)

    Article  Google Scholar 

  12. Defense Advanced Research Projects Agency (DARPA). Content-based mobile edge networking (2012). http://www.darpa.mil/Our_Work/STO/Programs/Content-Based_Mobile_Edge _Networking_(CBMEN).aspx

  13. Djamaa, B., Richardson, M., Aouf, N., Walters, B.: Towards efficient distributed service discovery in low-power and lossy networks. Wireless Netw. 20(8), 2437–2453 (2014)

    Article  Google Scholar 

  14. Lindgren, A. et al.: Probabilistic routing protocol for intermittently connected networks. Internet Draft draft-irtf-dtnrg-prophet-10 (2012)

    Google Scholar 

  15. Finn, W.: Improving battlefield connectivity for dismounted forces, pp. 6–10. Defense Tech Briefs (2012)

    Google Scholar 

  16. Frink, S.: Secure cell phone technology gets ready for deployment. Military and Aerospace Electronics (2012)

    Google Scholar 

  17. Ghadimi, E., Landsiedel, O., Soldati, P., Duquennoy, S., Johansson, M.: Opportunistic routing in low duty-cycle wireless sensor networks. ACM Trans. Sen. Netw. 10(4), 67:1–67:39 (2014)

    Article  Google Scholar 

  18. Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., Wilcox, J.: Information-centric networking: seeing the forest for the trees. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, p. 1. ACM (2011)

    Google Scholar 

  19. Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C.: Pocket switched networks and human mobility in conference environments. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking, WDTN 2005, pp. 244–251, ACM, New York (2005)

    Google Scholar 

  20. Ioannidis, S., Chaintreau, A., Massoulié, L.: Distributing content updates over a mobile social network. SIGMOBILE Mob. Comput. Commun. Rev. 13, 44–47 (2009)

    Article  Google Scholar 

  21. Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: Proceedings of the 5th International Conference on Emerging Networking Experiments And Technologies, pp. 1–12. ACM (2009)

    Google Scholar 

  22. Kim, M., Kim, J.-M., Stehr, M.-O., Gehani, A., Tariq, D., Kim, J.S.: Maximizing availability of content in disruptive environments by cross-layer optimization. In: 28th ACM Symposium on Applied Computing (SAC) (2013)

    Google Scholar 

  23. Kim, M., Stehr, M.-O., Kim, J., Ha, S.: An application framework for loosely coupled networked cyber-physical systems. In: 8th IEEE International Conference on Embedded and Ubiquitous Computing (EUC-10), Hong Kong, December 2010

    Google Scholar 

  24. Kopena, J.B., Loo, B.T.: Ontonet: scalable knowledge-based networking. In: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering Workshop, ICDEW 2008, pp. 170–175. IEEE Computer Society, Washington, DC, USA (2008)

    Google Scholar 

  25. Lakhani, H., McCarthy, T., Kim, M., Wilkins, D., Wood, S.: Evaluation of a delay-tolerant ICN architecture. In: International Conference on Ubiquitous and Future Networks, July 2015

    Google Scholar 

  26. Lee, U., Park, J.-S., Yeh, J., Pau, G., Gerla, M.: Code torrent: content distribution using network coding in vanet. In: Proceedings of the 1st International Workshop on Decentralized Resource Sharing in Mobile Computing And Networking, MobiShare 2006, pp. 1–5. ACM, New York (2006)

    Google Scholar 

  27. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  28. Li, H., Costantini, R., Anhalt, D., Alonso, R., Stehr, M.-O., Talcot, C., Kim, M., McCarthy, T., Wood, S.: Adaptive interest modeling improves content services at the network edge. In: 2014 IEEE Military Communications Conference (MILCOM), pp. 1027–1033, October 2014

    Google Scholar 

  29. Lindgren, A., Doria, A., Schelén, O.: Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Comput. Commun. Rev. 7(3), 19–20 (2003)

    Article  Google Scholar 

  30. Mtibaa, A., May, M., Diot, C., Ammar, M.: Peoplerank: social opportunistic forwarding. In: Proceedings of the 29th Conference on Information Communications, INFOCOM 2010, pp. 111–115. IEEE Press, Piscataway, NJ, USA (2010)

    Google Scholar 

  31. Musolesi, M., Hui, P., Mascolo, C., Crowcroft, C.: Writing on the clean slate: Implementing a socially-aware protocol in Haggle. In: Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 1–6. IEEE Computer Society, Washington, DC, USA (2008)

    Google Scholar 

  32. Nordstrom, E., Gunningberg, P., Rohner, C.; A search-based network architecture for mobile devices. Technical report, Uppsala University (2009)

    Google Scholar 

  33. Oh, S.-Y., Lau, D., Gerla, M.: Content centric networking in tactical and emergency MANETs. In: Wireless Days, pp. 1–5. IEEE (2010)

    Google Scholar 

  34. Shikfa, A., Önen, M., Molva, R.: Bootstrapping security associations in opportunistic networks. In: PerCom Workshops, pp. 147–152. IEEE (2010)

    Google Scholar 

  35. Shikfa, A., Önen, M., Molva, R.: Privacy and confidentiality in context-based and epidemic forwarding. Comput. Commun. 33, 1493–1504 (2010)

    Article  Google Scholar 

  36. Solis, I., Garcia-Luna-Aceves, J.J.: Robust content dissemination in disrupted environments. In: Proceedings of the Third ACM Workshop on Challenged Networks, CHANTS 2008, pp. 3–10. ACM, New York (2008)

    Google Scholar 

  37. Stehr, M.-O., Talcott, C.: Planning and learning algorithms for routing in disruption-tolerant networks. In: IEEE Military Communications Conference (2008)

    Google Scholar 

  38. Obraczka, K., Spyropoulos, T., Turletti, T.: Routing in delay-tolerant networks comprising heterogeneous node populations. IEEE Trans. Mobile Comput. 8, 1132–1147 (2009)

    Article  Google Scholar 

  39. Vahdat, A., Becker, D. et al.: Epidemic routing for partially connected ad hoc networks. Technical report, Technical Report CS-200006, Duke University (2000)

    Google Scholar 

  40. Wood, S., Mathewson, J., Joy, J., Stehr, M.O., Kim, M., Gehani, A., Gerla, M., Sadjadpour, H., Garcia-Luna-Aceves, J.J.: ICEMAN: a system for efficient, robust and secure situational awareness at the network edge. In: Proceedings of IEEE Military Communications Conference (2013)

    Google Scholar 

Download references

Acknowledgements

Apart from building on results from earlier projects, such those funded in the context of the DARPA Disruption Tolerant Networking program and our NSF- and ONR- funded projects on Networked Cyber Physical Systems at SRI, the ENCODERS project has also leveraged some results and ideas developed by International Fellows in their own research while visiting SRI. Here we would like to use the opportunity to thank Hasnain Lakhani, Jong-Seok Choi, Dawood Tariq, Rizwan Asghar, Je-Min Kim, Francoise Sailhan, Sathiya Kumar, and Sylvain Lefebvre for their valuable ideas and contributions. We would like to thank our team member SET Corp. (David Anhalt, Ralph Costantini, Dr. Hua Li, and Dr. Rafael Alonso) for their support and collaboration on interest modeling. At the beginning of the program we selected SAIC as our Mobile Systems Integrator. Hence we would like to thank the entire SAIC team (led by Dr. William Merrill and George Weston) for providing the development platform and successfully demonstrating an integrated CBMEN system based on the SRI ENCODERS architecture at Ft. AP Hill, VA, and MIT Lincoln Labs (the team led by Dr. Andrew Worthen) for their independent evaluation of the performance in testbed experiments and in the field.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Minyoung Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Wood, S. et al. (2015). ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge. In: Martí-Oliet, N., Ölveczky, P., Talcott, C. (eds) Logic, Rewriting, and Concurrency. Lecture Notes in Computer Science(), vol 9200. Springer, Cham. https://doi.org/10.1007/978-3-319-23165-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23165-5_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23164-8

  • Online ISBN: 978-3-319-23165-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics