ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge

  • Samuel Wood
  • James Mathewson
  • Joshua Joy
  • Mark-Oliver Stehr
  • Minyoung Kim
  • Ashish Gehani
  • Mario Gerla
  • Hamid Sadjadpour
  • J. J. Garcia-Luna-Aceves
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9200)

Abstract

Situational awareness applications used in disaster response and tactical scenarios require efficient communication without support from a fixed infrastructure. As commercial off-the-shelf mobile phones and tablets become cheaper, they are increasingly deployed in volatile ad-hoc environments. Despite wide use, networking in an efficient and distributed way remains as an active research area, and few implementation results on mobile devices exist. In these scenarios, where users both produce and consume sensed content, the network should efficiently match content to user interests without making any fixed infrastructure assumptions. We propose the ICEMAN (Information CEntric Mobile Ad-hoc Networking) architecture which is designed to support distributed situational awareness applications in tactical scenarios. We describe the motivation, features, and implementation of our architecture and briefly summarize the performance of this novel architecture.

References

  1. 1.
  2. 2.
    Federal Information Processing Standards, Publication 197: Advanced encryption standard. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  3. 3.
  4. 4.
  5. 5.
    Shikfa, A., Oenen, M. (eds.): Haggle 027918: an innovative paradigm for autonomic opportunistic communication prototype of trust and security mechanisms. Technical report (2009). http://www.haggleproject.org/deliverables/D4.3_final.pdf
  6. 6.
    Adamson, B., Bormann, C., Handley, M., Macker, J.: Negative-acknowledgment (NACK)-oriented reliable multicast (NORM) protocol. Internet Society Request for Comments RFC 3940 (2004)Google Scholar
  7. 7.
    Ahrenholz, J., Danilov, C., Henderson, T.R., Kim, J.H.: Core: a real-time network emulator. In: 2008 IEEE Military Communications Conference, MILCOM 2008, pp, 1–7. IEEE (2008)Google Scholar
  8. 8.
    Akinyele, J., Green, M., Rubin, A.: Charm: a framework for rapidly prototyping cryptosystems. Technical report, Johns Hopkins University (2011)Google Scholar
  9. 9.
    Basu, P., Krishnan, R., Brown, D.W.: Persistent delivery with deferred binding to descriptively named destinations. In: Proceedings of the IEEE Military Communications Conference (2008)Google Scholar
  10. 10.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 28th IEEE Symposium on Security and Privacy (2007)Google Scholar
  11. 11.
    Chand, N., Joshi, R.C., Misra, M.: Cooperative caching in mobile ad hoc networks based on data utility. Mobile Inf. Syst. 3, 19–37 (2007)CrossRefGoogle Scholar
  12. 12.
    Defense Advanced Research Projects Agency (DARPA). Content-based mobile edge networking (2012). http://www.darpa.mil/Our_Work/STO/Programs/Content-Based_Mobile_Edge _Networking_(CBMEN).aspx
  13. 13.
    Djamaa, B., Richardson, M., Aouf, N., Walters, B.: Towards efficient distributed service discovery in low-power and lossy networks. Wireless Netw. 20(8), 2437–2453 (2014)CrossRefGoogle Scholar
  14. 14.
    Lindgren, A. et al.: Probabilistic routing protocol for intermittently connected networks. Internet Draft draft-irtf-dtnrg-prophet-10 (2012)Google Scholar
  15. 15.
    Finn, W.: Improving battlefield connectivity for dismounted forces, pp. 6–10. Defense Tech Briefs (2012)Google Scholar
  16. 16.
    Frink, S.: Secure cell phone technology gets ready for deployment. Military and Aerospace Electronics (2012)Google Scholar
  17. 17.
    Ghadimi, E., Landsiedel, O., Soldati, P., Duquennoy, S., Johansson, M.: Opportunistic routing in low duty-cycle wireless sensor networks. ACM Trans. Sen. Netw. 10(4), 67:1–67:39 (2014)CrossRefGoogle Scholar
  18. 18.
    Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., Wilcox, J.: Information-centric networking: seeing the forest for the trees. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, p. 1. ACM (2011)Google Scholar
  19. 19.
    Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C.: Pocket switched networks and human mobility in conference environments. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking, WDTN 2005, pp. 244–251, ACM, New York (2005)Google Scholar
  20. 20.
    Ioannidis, S., Chaintreau, A., Massoulié, L.: Distributing content updates over a mobile social network. SIGMOBILE Mob. Comput. Commun. Rev. 13, 44–47 (2009)CrossRefGoogle Scholar
  21. 21.
    Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: Proceedings of the 5th International Conference on Emerging Networking Experiments And Technologies, pp. 1–12. ACM (2009)Google Scholar
  22. 22.
    Kim, M., Kim, J.-M., Stehr, M.-O., Gehani, A., Tariq, D., Kim, J.S.: Maximizing availability of content in disruptive environments by cross-layer optimization. In: 28th ACM Symposium on Applied Computing (SAC) (2013)Google Scholar
  23. 23.
    Kim, M., Stehr, M.-O., Kim, J., Ha, S.: An application framework for loosely coupled networked cyber-physical systems. In: 8th IEEE International Conference on Embedded and Ubiquitous Computing (EUC-10), Hong Kong, December 2010Google Scholar
  24. 24.
    Kopena, J.B., Loo, B.T.: Ontonet: scalable knowledge-based networking. In: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering Workshop, ICDEW 2008, pp. 170–175. IEEE Computer Society, Washington, DC, USA (2008)Google Scholar
  25. 25.
    Lakhani, H., McCarthy, T., Kim, M., Wilkins, D., Wood, S.: Evaluation of a delay-tolerant ICN architecture. In: International Conference on Ubiquitous and Future Networks, July 2015Google Scholar
  26. 26.
    Lee, U., Park, J.-S., Yeh, J., Pau, G., Gerla, M.: Code torrent: content distribution using network coding in vanet. In: Proceedings of the 1st International Workshop on Decentralized Resource Sharing in Mobile Computing And Networking, MobiShare 2006, pp. 1–5. ACM, New York (2006)Google Scholar
  27. 27.
    Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  28. 28.
    Li, H., Costantini, R., Anhalt, D., Alonso, R., Stehr, M.-O., Talcot, C., Kim, M., McCarthy, T., Wood, S.: Adaptive interest modeling improves content services at the network edge. In: 2014 IEEE Military Communications Conference (MILCOM), pp. 1027–1033, October 2014Google Scholar
  29. 29.
    Lindgren, A., Doria, A., Schelén, O.: Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Comput. Commun. Rev. 7(3), 19–20 (2003)CrossRefGoogle Scholar
  30. 30.
    Mtibaa, A., May, M., Diot, C., Ammar, M.: Peoplerank: social opportunistic forwarding. In: Proceedings of the 29th Conference on Information Communications, INFOCOM 2010, pp. 111–115. IEEE Press, Piscataway, NJ, USA (2010)Google Scholar
  31. 31.
    Musolesi, M., Hui, P., Mascolo, C., Crowcroft, C.: Writing on the clean slate: Implementing a socially-aware protocol in Haggle. In: Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 1–6. IEEE Computer Society, Washington, DC, USA (2008)Google Scholar
  32. 32.
    Nordstrom, E., Gunningberg, P., Rohner, C.; A search-based network architecture for mobile devices. Technical report, Uppsala University (2009)Google Scholar
  33. 33.
    Oh, S.-Y., Lau, D., Gerla, M.: Content centric networking in tactical and emergency MANETs. In: Wireless Days, pp. 1–5. IEEE (2010)Google Scholar
  34. 34.
    Shikfa, A., Önen, M., Molva, R.: Bootstrapping security associations in opportunistic networks. In: PerCom Workshops, pp. 147–152. IEEE (2010)Google Scholar
  35. 35.
    Shikfa, A., Önen, M., Molva, R.: Privacy and confidentiality in context-based and epidemic forwarding. Comput. Commun. 33, 1493–1504 (2010)CrossRefGoogle Scholar
  36. 36.
    Solis, I., Garcia-Luna-Aceves, J.J.: Robust content dissemination in disrupted environments. In: Proceedings of the Third ACM Workshop on Challenged Networks, CHANTS 2008, pp. 3–10. ACM, New York (2008)Google Scholar
  37. 37.
    Stehr, M.-O., Talcott, C.: Planning and learning algorithms for routing in disruption-tolerant networks. In: IEEE Military Communications Conference (2008)Google Scholar
  38. 38.
    Obraczka, K., Spyropoulos, T., Turletti, T.: Routing in delay-tolerant networks comprising heterogeneous node populations. IEEE Trans. Mobile Comput. 8, 1132–1147 (2009)CrossRefGoogle Scholar
  39. 39.
    Vahdat, A., Becker, D. et al.: Epidemic routing for partially connected ad hoc networks. Technical report, Technical Report CS-200006, Duke University (2000)Google Scholar
  40. 40.
    Wood, S., Mathewson, J., Joy, J., Stehr, M.O., Kim, M., Gehani, A., Gerla, M., Sadjadpour, H., Garcia-Luna-Aceves, J.J.: ICEMAN: a system for efficient, robust and secure situational awareness at the network edge. In: Proceedings of IEEE Military Communications Conference (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Samuel Wood
    • 1
    • 2
  • James Mathewson
    • 1
    • 2
  • Joshua Joy
    • 3
  • Mark-Oliver Stehr
    • 4
  • Minyoung Kim
    • 4
  • Ashish Gehani
    • 4
  • Mario Gerla
    • 3
  • Hamid Sadjadpour
    • 1
    • 2
  • J. J. Garcia-Luna-Aceves
    • 1
  1. 1.UC Santa CruzSanta CruzUSA
  2. 2.SUNS-tech, Inc.Santa CruzUSA
  3. 3.UC Los AngelesLos AngelesUSA
  4. 4.SRI InternationalMenlo ParkUSA

Personalised recommendations