A Secure Socially-Aware Content Retrieval Framework for Delay Tolerant Networks

Delay Tolerant Networks (DTNs) are sparse mobile ad-hoc networks in which there is typically no complete path between the source and destination. Content retrieval is an important service in DTNs. It allows peer-to-peer data sharing and access among mobile users in areas that lack a fixed communication infrastructure such as rural areas, inter-vehicle communication, and military environments. There are many applications for content retrieval in DTNs. For example, mobile users can find interesting digital content such as music and images from other network peers for entertainment purposes. Vehicles can access live traffic information to avoid traffic delay. Soldiers with wireless devices can retrieve relevant information such as terrain descriptions, weather, and intelligence information from other nodes in a battlefield.In this dissertation, we propose the design of a secure and scalable architecture for content retrieval in DTNs. Our design consists of five key components: (1) a distributed content discovery service, (2) a routing protocol for message delivery, (3) a buffer management policy to schedule and drop messages in resource-constrained environments, (4) a caching framework to enhance the performance of data access, and (5) a mechanism to detect malicious and selfish behaviors in the network. To cope with the unstable network topology due to the highly volatile movement of nodes in DTNs, we exploit the underlying stable social relationships among nodes for message routing, caching, and placement of the content-lookup service. Specifically, we rely on three key social concepts: social tie, centrality, and social level. Centrality is used to form the distributed content discovery service and the caching framework. Social level guides the forwarding of content requests to a content discovery service node. Once the content provider ID is discovered, social tie is exploited to deliver content requests to the content provider, and content data to the requester node. Furthermore, to reduce the transmission cost, we investigate and propose routing strategies for three dominant communication models in DTNs: unicast (a content is sent to a single node), multicast (a content is sent to multiple nodes), and anycast (a content is sent to any one member in a group of nodes).We also address several security issues for content retrieval in DTNs. In the presence of malicious and selfish nodes, the content retrieval performance can be deteriorated significantly. To address this problem, we use Public Key Cryptography to secure social-tie records and content delivery records during a contact between two nodes. The unforgeable social-tie records prevent malicious nodes from falsifying the social-tie information, which corrupts the content lookup service placement and disrupts the social-tie routing protocol. The delivery records from which the packet forwarding ratio of a node is computed, helps detect selfish behavior. Furthermore, we propose a blacklist distribution scheme that allows nodes to filter out misbehaving nodes from their social contact graph, effectively preventing network traffic from flowing to misbehaving nodes.Through extensive simulation studies using real-world mobility traces, we show that our content retrieval scheme can achieve a high content delivery ratio, low delay, and low transmission cost. In addition, our proposed misbehavior detection method can detect insider attacks efficiently with a high detection ratio and a low false positive rate, thus improving the content retrieval performance.

[1]  Guohong Cao,et al.  Supporting Cooperative Caching in Disruption Tolerant Networks , 2011, 2011 31st International Conference on Distributed Computing Systems.

[2]  Minglu Li,et al.  Recognizing Exponential Inter-Contact Time in VANETs , 2010, 2010 Proceedings IEEE INFOCOM.

[3]  Mooi Choo Chuah,et al.  An encounter-based multicast scheme for disruption tolerant networks , 2009, Comput. Commun..

[4]  Bo Zong,et al.  Efficient multicasting for delay tolerant networks using graph indexing , 2012, 2012 Proceedings IEEE INFOCOM.

[5]  Anders Lindgren,et al.  Probabilistic routing in intermittently connected networks , 2003, MOCO.

[6]  Georgios Karagiannis,et al.  Exploring the solution space of beaconing in VANETs , 2009, 2009 IEEE Vehicular Networking Conference (VNC).

[7]  Jie Wu,et al.  On Multicopy Opportunistic Forwarding Protocols in Nondeterministic Delay Tolerant Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[8]  Brian D. Davison,et al.  OS-multicast: On-demand Situation-aware Multicasting in Disruption Tolerant Networks , 2006, 2006 IEEE 63rd Vehicular Technology Conference.

[9]  Matthias Grossglauser,et al.  CRAWDAD dataset epfl/mobility (v.2009-02-24) , 2009 .

[10]  Wenzhong Li,et al.  SMART: A Social- and Mobile-Aware Routing Strategy for Disruption-Tolerant Networks , 2014, IEEE Transactions on Vehicular Technology.

[11]  Qinghua Li,et al.  Contact duration aware data replication in Delay Tolerant Networks , 2011, 2011 19th IEEE International Conference on Network Protocols.

[12]  Liusheng Huang,et al.  Anycast Routing in Probabilistically Contacted Delay Tolerant Networks , 2010, 2010 International Conference on Communications and Mobile Computing.

[13]  Christophe Diot,et al.  Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007, IEEE Transactions on Mobile Computing.

[14]  P.R. Guardieiro,et al.  Anycast routing in Delay Tolerant Networks using genetic algorithms for route decision , 2008, 2008 11th International Conference on Computer and Information Technology.

[15]  Jianhua Fan,et al.  Delay/Disruption Tolerant Network and its application in military communications , 2010, 2010 International Conference On Computer Design and Applications.

[16]  A. Vasilakos,et al.  Socially Aware Networking: A Survey , 2013, IEEE Systems Journal.

[17]  Fabian Oehlmann,et al.  Content-Centric Networking , 2013 .

[18]  Andrew W. Moore,et al.  X-means: Extending K-means with Efficient Estimation of the Number of Clusters , 2000, ICML.

[19]  Mario Gerla,et al.  Content Centric Networking in tactical and emergency MANETs , 2010, 2010 IFIP Wireless Days.

[20]  Lars C. Wolf,et al.  Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[21]  Alexander Afanasyev,et al.  Rapid traffic information dissemination using named data , 2012, NoM '12.

[22]  Injong Rhee,et al.  Max-Contribution: On Optimal Resource Allocation in Delay Tolerant Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[23]  Qinghua Li,et al.  Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[24]  Jörg Ott,et al.  A disconnection-tolerant transport for drive-thru Internet environments , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[25]  Li Li,et al.  Practical Routing in Delay-Tolerant Networks , 2007, IEEE Trans. Mob. Comput..

[26]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[27]  Kang-Won Lee,et al.  RelayCast: Scalable multicast routing in Delay Tolerant Networks , 2008, 2008 IEEE International Conference on Network Protocols.

[28]  Ellen W. Zegura,et al.  A message ferrying approach for data delivery in sparse mobile ad hoc networks , 2004, MobiHoc '04.

[29]  Jean-Yves Le Boudec,et al.  Power Law and Exponential Decay of Intercontact Times between Mobile Devices , 2007, IEEE Transactions on Mobile Computing.

[30]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..

[31]  Timur Friedman,et al.  Evaluating Mobility Pattern Space Routing for DTNs , 2005, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[32]  Jie Wu,et al.  Hierarchical cooperative caching in mobile opportunistic social networks , 2014, 2014 IEEE Global Communications Conference.

[33]  Mostafa H. Ammar,et al.  PeopleRank: Social Opportunistic Forwarding , 2010, 2010 Proceedings IEEE INFOCOM.

[34]  Timur Friedman,et al.  DTN routing in a mobility pattern space , 2005, WDTN '05.

[35]  Stratis Ioannidis,et al.  Distributed caching over heterogeneous mobile networks , 2010, SIGMETRICS '10.

[36]  Arun Venkataramani,et al.  DTN routing as a resource allocation problem , 2007, SIGCOMM '07.

[37]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[38]  Kyunghan Lee,et al.  On the Levy-Walk Nature of Human Mobility , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[39]  Rabin K. Patra,et al.  Routing in a delay tolerant network , 2004, SIGCOMM '04.

[40]  Mostafa Ammar,et al.  Multicasting in delay tolerant networks: semantic models and routing algorithms , 2005, WDTN '05.

[41]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[42]  Jie Wu,et al.  A Knapsack-Based Message Scheduling and Drop Strategy for Delay-Tolerant Networks , 2015, EWSN.

[43]  Jie Wu,et al.  A Knapsack-based buffer management strategy for delay-tolerant networks , 2015, J. Parallel Distributed Comput..

[44]  Vijay Erramilli,et al.  Forwarding in opportunistic networks with resource constraints , 2008, CHANTS '08.

[45]  Sang Lyul Min,et al.  LRFU: A Spectrum of Policies that Subsumes the Least Recently Used and Least Frequently Used Policies , 2001, IEEE Trans. Computers.

[46]  Sanjeev R. Kulkarni,et al.  Cooperative Caching based on File Popularity Ranking in Delay Tolerant Networks , 2014, ArXiv.

[47]  Dorit S. Hochbaum,et al.  Approximation Algorithms for NP-Hard Problems , 1996 .

[48]  Marcelo Dias de Amorim,et al.  The Accordion Phenomenon: Analysis, Characterization, and Impact on DTN Routing , 2009, IEEE INFOCOM 2009.

[49]  Anders Lindgren,et al.  Evaluation of Queueing Policies and Forwarding Strategies for Routing in Intermittently Connected Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[50]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.

[51]  Vijay Erramilli,et al.  Delegation forwarding , 2008, MobiHoc '08.

[52]  Lieguang Zeng,et al.  Adaptive Optimal Buffer Management Policies for Realistic DTN , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[53]  Yong Wang,et al.  Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.

[54]  Qinghua Li,et al.  Multicasting in delay tolerant networks: a social network perspective , 2009, MobiHoc '09.

[55]  Marco Conti,et al.  Performance modelling of opportunistic forwarding under heterogenous mobility , 2014, Comput. Commun..

[56]  Peng Yang,et al.  A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[57]  Rashmi Ranjan Rout,et al.  An Adaptive Caching Technique Using Learning Automata in Disruption Tolerant Networks , 2014, 2014 Eighth International Conference on Next Generation Mobile Apps, Services and Technologies.

[58]  D. Rajan Probability, Random Variables, and Stochastic Processes , 2017 .

[59]  Jim Kurose,et al.  A survey of practical issues in underwater networks , 2007 .

[60]  Brian Gallagher,et al.  MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[61]  Michael Mitzenmacher,et al.  Less Hashing, Same Performance: Building a Better Bloom Filter , 2006, ESA.

[62]  Zhiwei Xu,et al.  WSN12-3: Anycast Routing in Delay Tolerant Networks , 2006, IEEE Globecom 2006.

[63]  Cauligi S. Raghavendra,et al.  Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.

[64]  Mads Haahr,et al.  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.

[65]  Albert-László Barabási,et al.  Limits of Predictability in Human Mobility , 2010, Science.

[66]  Jasmine Novak,et al.  Geographic routing in social networks , 2005, Proc. Natl. Acad. Sci. USA.

[67]  Thrasyvoulos Spyropoulos,et al.  Optimal Buffer Management Policies for Delay Tolerant Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[68]  Philip Ginzboorg,et al.  ns-3 Module for routing and congestion control studies in mobile opportunistic DTNs , 2013, 2013 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS).

[69]  J. D. Thornton,et al.  Named Data Networking ( NDN ) Project NDN-0001 October 31 , 2010 , 2010 .

[70]  Raj Jain,et al.  A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.

[71]  Jie Yang,et al.  Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[72]  Anne-Marie d'Hauteserre Urban Rythms and Travel Behaviour: Spatial and Temporal Phenomena of Daily Travel , 2011 .

[73]  Donald F. Towsley,et al.  Performance Modeling of Epidemic Routing , 2006, Networking.

[74]  Tamás F. Móri,et al.  SHARP INTEGRAL INEQUALITIES FOR PRODUCTS OF CONVEX FUNCTIONS , 2007 .

[75]  I. Yeom,et al.  Minimizing the Impact of Buffer Overflow in DTN , 2008 .

[76]  Xiaodong Lin,et al.  Public key distribution scheme for delay tolerant networks based on two-channel cryptography , 2012, J. Netw. Comput. Appl..

[77]  Pan Hui,et al.  CRAWDAD dataset cambridge/haggle (v.2006-09-15) , 2006 .

[78]  Anders Lindgren,et al.  Opportunistic content distribution in an urban setting , 2006, CHANTS '06.

[79]  William H. Press,et al.  Numerical Recipes: The Art of Scientific Computing , 1987 .

[80]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[81]  Atefeh Mashatan,et al.  Practical unconditionally secure two-channel message authentication , 2010, Des. Codes Cryptogr..

[82]  Qinghua Li,et al.  Mitigating Routing Misbehavior in Disruption Tolerant Networks , 2012, IEEE Transactions on Information Forensics and Security.

[83]  Chen-Nee Chuah,et al.  Knowledge-based opportunistic forwarding in vehicular wireless ad hoc networks , 2005, 2005 IEEE 61st Vehicular Technology Conference.