SlideShare a Scribd company logo
1 of 19
Download to read offline
Dr. M Nasir Mumtaz Bhutta
Institute of Computing
Bahauddin Zakariya University
Multan, Punjab, 60,000
Pakistan
Email: nasir.bhutta@bzu.edu.pk
www.bzu.edu.pk
Introduction to Secure
Delay/Disruption Tolerant
Networks
21 January 2015
Dr. M N M Bhutta www.bzu.edu.pk2
 Introduction to Delay/Disruption Tolerant
Networking (DTN).
 Overview of Security Architecture in DTN:
• Hop-by-Hop Authentication and Integrity.
• End-to-End Authentication and Integrity.
• End-to-End Confidentiality.
 Requirements of Key Management in DTN.
Objectives
Dr. M N M Bhutta www.bzu.edu.pk3
Introduction to DTN
 Wired, TCP/IP based internet is no doubt
a success.
 Some design assumptions and
characteristics of TCP/IP based internet
are:
• Devices are always connected.
• Data loss rate is comparatively low.
• Small round trip times. etc
Dr. M N M Bhutta www.bzu.edu.pk4
Wireless Networks Applications
 With advancement in wireless technology new
kinds of networks have grown/growing. For
example,
• Satellite Networks
• Sensor Networks
• Ad-hoc networks
• Mobile Phone Networks
• Vehicular Networks etc.
 In wired internet, some new applications are
also developing which are different from
traditional internet. For example, Peer-to-Peer
networks etc.
Dr. M N M Bhutta www.bzu.edu.pk5
Future Internetworking
Dr. M N M Bhutta www.bzu.edu.pk6
Future Networking Issues
 Characteristics of these wireless networks
are different from wired networks and also
vary within different domains as well.
Some characteristics are as follows:
• High Loss rate
• Large and/or variable delays.
• Links are not always connected,
Disconnectivity”.
Dr. M N M Bhutta www.bzu.edu.pk7
Future Networking Issues
(continued)
 Heterogeneity
• Sensor networks are very low powered
devices and usually delays tolerant (e.g.
monitoring applications).
• Satellite are long delayed networks (e.g. inter
planet networks).
• Mobile phone networks have their own
characteristics (mobility).
• Adhoc have variable disconnectivity.
Dr. M N M Bhutta www.bzu.edu.pk8
Solutions
 TCP/IP without modification
• Maximum RTT = 2 mins (high delays ?)
• Lossy links (Congestion Control ?)
• Sensor Networks (Low Powered devices ?)
• Mobile Phone networks (Better Performance &
Handoffs ?)
 TCP with Modifications
• Have to solve each individual problem (e.g. Long
delays, applications on top of TCP, IPSec etc).
Dr. M N M Bhutta www.bzu.edu.pk9
Solutions (continued..)
 Overlay networking approach
• Different protocols have been developed for
different networks (Heterogeneity will be
solved).
• Long and variable delays, high loss rate, and
disconnectivity need to be handled on upper
layer than TCP to give better performance.
• Here DTN comes..
Dr. M N M Bhutta www.bzu.edu.pk10
Overview of DTN
• DTN is an overlay
network which runs
on top of existing
different networks to
better handle high &
variable delays,
disruptions.
• It introduces new
layer called bundle
layer on top of TCP
layer in TCP/IP stack.
Node Router Gateway
Persistent storage Optional Application Layer
Physical A
Link A
Network A
Transport A
Bundle
Application
Physical A
Link A
Network A
Transport A
Physical A
Link A
Network A
Transport A
Bundle
Application
Physical B
Link B
Network B
Transport B
Physical A
Link A
Network A
Transport A
Bundle
Application
Dr. M N M Bhutta www.bzu.edu.pk11
High Delays/Disruptions and DTN
• High delays/disruptions are handled using
custodian transfer on bundle layer.
Dr. M N M Bhutta www.bzu.edu.pk12
Heterogeneous Networks and DTN
• Different protocols family runs in
different region.
Dr. M N M Bhutta www.bzu.edu.pk13
Security Architecture in DTN
 Security Architecture for Internet (IPSec)
can not be used with DTN for provision of
security services.
 Some highlighted issues for using with
DTN are as follows:
• Very chatty in nature.
• Intermediate devices will have conflict with
IPSec.
• Cross-Layer Optimization will not work for
IPSec. etc.
Dr. M N M Bhutta www.bzu.edu.pk14
Security Architecture in DTN
(continued..)
 DTN security architecture use its own idea
compliant with DTN networking
architecture for security services.
 The security goals are given below:
• Hop-by-Hop integrity.
• Hop-by-Hop Authentication.
• End-to-End Integrity.
• End-to-End Authentication.
• End-to-End Confidentiality.
Dr. M N M Bhutta www.bzu.edu.pk15
Hop-by-Hop Integrity and
Authentication.
Dr. M N M Bhutta www.bzu.edu.pk16
End-to-End Integrity
Dr. M N M Bhutta www.bzu.edu.pk17
End-to-End Confidentiality
Dr. M N M Bhutta www.bzu.edu.pk18
Key Management in DTN
 For secure and efficient key management for
DTN, following are some of the requirements.
• Key management should be communication efficient
and computational efficiency should also be taken
into consideration. Key Transport will be more
suitable
• Should support the DTN security architecture
functionality and components. Public Key
Cryptography should be supported.
Dr. M N M Bhutta www.bzu.edu.pk19
Thanks for listening !
»Questions ?

More Related Content

What's hot

Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...Papitha Velumani
 
Multilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet ProtocolsMultilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet ProtocolsNasir Bhutta
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...eSAT Journals
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manetMeena S Pandi
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEEMEMTECHSTUDENTPROJECTS
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Dr. Mazlan Abbas
 

What's hot (20)

Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...
 
DTN
DTNDTN
DTN
 
Multilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet ProtocolsMultilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet Protocols
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
 

Viewers also liked

Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant NetworksAnubhav Mahajan
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Dr. Mazlan Abbas
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - PresentationLaili Aidi
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic NetworkingNoorin Fatima
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Waldir Moreira
 
Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks Nagendra Posani
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksIGEEKS TECHNOLOGIES
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classificationShivi Shukla
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
 
Social-aware Opportunistic Routing
Social-aware Opportunistic RoutingSocial-aware Opportunistic Routing
Social-aware Opportunistic RoutingWaldir Moreira
 
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...acignoni
 
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...Waldir Moreira
 
Crowd Assisted Approach for Pervasive Opportunistic Sensing
Crowd Assisted Approach for Pervasive Opportunistic SensingCrowd Assisted Approach for Pervasive Opportunistic Sensing
Crowd Assisted Approach for Pervasive Opportunistic SensingWaldir Moreira
 
How Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN RoutingHow Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN RoutingWaldir Moreira
 
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionDTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionWaldir Moreira
 
SocialDTN: a DTN Implementation for Digital and Social Inclusion
SocialDTN: a DTN Implementation for Digital and Social InclusionSocialDTN: a DTN Implementation for Digital and Social Inclusion
SocialDTN: a DTN Implementation for Digital and Social InclusionWaldir Moreira
 

Viewers also liked (20)

Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant Networks
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
 
Delay telerant network
Delay telerant networkDelay telerant network
Delay telerant network
 
Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networks
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
 
Social-aware Opportunistic Routing
Social-aware Opportunistic RoutingSocial-aware Opportunistic Routing
Social-aware Opportunistic Routing
 
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
 
DTN ProphetX® - At a Glance
DTN ProphetX® - At a GlanceDTN ProphetX® - At a Glance
DTN ProphetX® - At a Glance
 
Alien Far Side 3 Moon
Alien Far Side 3 MoonAlien Far Side 3 Moon
Alien Far Side 3 Moon
 
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
 
Crowd Assisted Approach for Pervasive Opportunistic Sensing
Crowd Assisted Approach for Pervasive Opportunistic SensingCrowd Assisted Approach for Pervasive Opportunistic Sensing
Crowd Assisted Approach for Pervasive Opportunistic Sensing
 
How Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN RoutingHow Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN Routing
 
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionDTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
 
SocialDTN: a DTN Implementation for Digital and Social Inclusion
SocialDTN: a DTN Implementation for Digital and Social InclusionSocialDTN: a DTN Implementation for Digital and Social Inclusion
SocialDTN: a DTN Implementation for Digital and Social Inclusion
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 

Similar to Introduction to Secure Delay/Disruption Tolerant Networks

OSI reference model
OSI reference modelOSI reference model
OSI reference modelshanthishyam
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdfSherefHesham
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksIJNSA Journal
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsEmily Jones
 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Susan Cox
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1TnNguyn57021
 
Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptxIntroduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptxtaruian
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boostHowest_ENM
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 
Fiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptxFiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptxVERSITRONINC
 
Unit 1 1 introduction
Unit 1   1 introductionUnit 1   1 introduction
Unit 1 1 introductionCHINTAN Patel
 
Fiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptxFiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptxVERSITRONINC
 

Similar to Introduction to Secure Delay/Disruption Tolerant Networks (20)

OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Project report
Project reportProject report
Project report
 
Project report
Project reportProject report
Project report
 
networking
networking networking
networking
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 
Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptxIntroduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boost
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Fiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptxFiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptx
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Unit 1 1 introduction
Unit 1   1 introductionUnit 1   1 introduction
Unit 1 1 introduction
 
Fiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptxFiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptx
 

More from Nasir Bhutta

Blockchain for Interdisciplinary Research
Blockchain for Interdisciplinary ResearchBlockchain for Interdisciplinary Research
Blockchain for Interdisciplinary ResearchNasir Bhutta
 
Basics of Blockchain Technology
Basics of Blockchain TechnologyBasics of Blockchain Technology
Basics of Blockchain TechnologyNasir Bhutta
 
secure smart cities
 secure smart cities secure smart cities
secure smart citiesNasir Bhutta
 
Ccsit cyberlympics 2017 workshop 3 - presentation
Ccsit cyberlympics 2017  workshop 3 - presentationCcsit cyberlympics 2017  workshop 3 - presentation
Ccsit cyberlympics 2017 workshop 3 - presentationNasir Bhutta
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking Nasir Bhutta
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases Nasir Bhutta
 
Different types of networks
Different types of networksDifferent types of networks
Different types of networksNasir Bhutta
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarNasir Bhutta
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsIntroduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsNasir Bhutta
 
Cloud computing overview & current research
Cloud computing  overview & current researchCloud computing  overview & current research
Cloud computing overview & current researchNasir Bhutta
 

More from Nasir Bhutta (12)

Blockchain for Interdisciplinary Research
Blockchain for Interdisciplinary ResearchBlockchain for Interdisciplinary Research
Blockchain for Interdisciplinary Research
 
Basics of Blockchain Technology
Basics of Blockchain TechnologyBasics of Blockchain Technology
Basics of Blockchain Technology
 
secure smart cities
 secure smart cities secure smart cities
secure smart cities
 
Ccsit cyberlympics 2017 workshop 3 - presentation
Ccsit cyberlympics 2017  workshop 3 - presentationCcsit cyberlympics 2017  workshop 3 - presentation
Ccsit cyberlympics 2017 workshop 3 - presentation
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
Different types of networks
Different types of networksDifferent types of networks
Different types of networks
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsIntroduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and Applications
 
Cloud computing overview & current research
Cloud computing  overview & current researchCloud computing  overview & current research
Cloud computing overview & current research
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Introduction to Secure Delay/Disruption Tolerant Networks

  • 1. Dr. M Nasir Mumtaz Bhutta Institute of Computing Bahauddin Zakariya University Multan, Punjab, 60,000 Pakistan Email: nasir.bhutta@bzu.edu.pk www.bzu.edu.pk Introduction to Secure Delay/Disruption Tolerant Networks 21 January 2015
  • 2. Dr. M N M Bhutta www.bzu.edu.pk2  Introduction to Delay/Disruption Tolerant Networking (DTN).  Overview of Security Architecture in DTN: • Hop-by-Hop Authentication and Integrity. • End-to-End Authentication and Integrity. • End-to-End Confidentiality.  Requirements of Key Management in DTN. Objectives
  • 3. Dr. M N M Bhutta www.bzu.edu.pk3 Introduction to DTN  Wired, TCP/IP based internet is no doubt a success.  Some design assumptions and characteristics of TCP/IP based internet are: • Devices are always connected. • Data loss rate is comparatively low. • Small round trip times. etc
  • 4. Dr. M N M Bhutta www.bzu.edu.pk4 Wireless Networks Applications  With advancement in wireless technology new kinds of networks have grown/growing. For example, • Satellite Networks • Sensor Networks • Ad-hoc networks • Mobile Phone Networks • Vehicular Networks etc.  In wired internet, some new applications are also developing which are different from traditional internet. For example, Peer-to-Peer networks etc.
  • 5. Dr. M N M Bhutta www.bzu.edu.pk5 Future Internetworking
  • 6. Dr. M N M Bhutta www.bzu.edu.pk6 Future Networking Issues  Characteristics of these wireless networks are different from wired networks and also vary within different domains as well. Some characteristics are as follows: • High Loss rate • Large and/or variable delays. • Links are not always connected, Disconnectivity”.
  • 7. Dr. M N M Bhutta www.bzu.edu.pk7 Future Networking Issues (continued)  Heterogeneity • Sensor networks are very low powered devices and usually delays tolerant (e.g. monitoring applications). • Satellite are long delayed networks (e.g. inter planet networks). • Mobile phone networks have their own characteristics (mobility). • Adhoc have variable disconnectivity.
  • 8. Dr. M N M Bhutta www.bzu.edu.pk8 Solutions  TCP/IP without modification • Maximum RTT = 2 mins (high delays ?) • Lossy links (Congestion Control ?) • Sensor Networks (Low Powered devices ?) • Mobile Phone networks (Better Performance & Handoffs ?)  TCP with Modifications • Have to solve each individual problem (e.g. Long delays, applications on top of TCP, IPSec etc).
  • 9. Dr. M N M Bhutta www.bzu.edu.pk9 Solutions (continued..)  Overlay networking approach • Different protocols have been developed for different networks (Heterogeneity will be solved). • Long and variable delays, high loss rate, and disconnectivity need to be handled on upper layer than TCP to give better performance. • Here DTN comes..
  • 10. Dr. M N M Bhutta www.bzu.edu.pk10 Overview of DTN • DTN is an overlay network which runs on top of existing different networks to better handle high & variable delays, disruptions. • It introduces new layer called bundle layer on top of TCP layer in TCP/IP stack. Node Router Gateway Persistent storage Optional Application Layer Physical A Link A Network A Transport A Bundle Application Physical A Link A Network A Transport A Physical A Link A Network A Transport A Bundle Application Physical B Link B Network B Transport B Physical A Link A Network A Transport A Bundle Application
  • 11. Dr. M N M Bhutta www.bzu.edu.pk11 High Delays/Disruptions and DTN • High delays/disruptions are handled using custodian transfer on bundle layer.
  • 12. Dr. M N M Bhutta www.bzu.edu.pk12 Heterogeneous Networks and DTN • Different protocols family runs in different region.
  • 13. Dr. M N M Bhutta www.bzu.edu.pk13 Security Architecture in DTN  Security Architecture for Internet (IPSec) can not be used with DTN for provision of security services.  Some highlighted issues for using with DTN are as follows: • Very chatty in nature. • Intermediate devices will have conflict with IPSec. • Cross-Layer Optimization will not work for IPSec. etc.
  • 14. Dr. M N M Bhutta www.bzu.edu.pk14 Security Architecture in DTN (continued..)  DTN security architecture use its own idea compliant with DTN networking architecture for security services.  The security goals are given below: • Hop-by-Hop integrity. • Hop-by-Hop Authentication. • End-to-End Integrity. • End-to-End Authentication. • End-to-End Confidentiality.
  • 15. Dr. M N M Bhutta www.bzu.edu.pk15 Hop-by-Hop Integrity and Authentication.
  • 16. Dr. M N M Bhutta www.bzu.edu.pk16 End-to-End Integrity
  • 17. Dr. M N M Bhutta www.bzu.edu.pk17 End-to-End Confidentiality
  • 18. Dr. M N M Bhutta www.bzu.edu.pk18 Key Management in DTN  For secure and efficient key management for DTN, following are some of the requirements. • Key management should be communication efficient and computational efficiency should also be taken into consideration. Key Transport will be more suitable • Should support the DTN security architecture functionality and components. Public Key Cryptography should be supported.
  • 19. Dr. M N M Bhutta www.bzu.edu.pk19 Thanks for listening ! »Questions ?