1 / 22

Part II : Connectivity Chapter 9: Opportunistic Networks

Part II : Connectivity Chapter 9: Opportunistic Networks. Andreas Heinemann. Motivation. Short/medium range wireless communication technologies capture the mass-market, e.g. Bluetooth enabled mobile phones WiFi enabled PDAs WiFi enabled mobile phones.

rusk
Télécharger la présentation

Part II : Connectivity Chapter 9: Opportunistic Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Part II : ConnectivityChapter 9: Opportunistic Networks Andreas Heinemann

  2. Motivation Short/medium range wireless communication technologies capture the mass-market, e.g. • Bluetooth enabled mobile phones • WiFi enabled PDAs • WiFi enabled mobile phones • new network type called Opportunistic Networks emerges • based on spontaneous interaction and collaboration among devices and users Opportunistic Networks:

  3. Application Example At a computer science conference site, researchers from all around the world stay together for 2 – 3 days to discuss recent advances in their fields. Due to the limited time, each attendee tries to make his stay as beneficial as possible, for example, by talking to colleagues during coffee breaks. For novices in research there might be the question “Who should I talk to?” or “Which other attendees are working on similar research problems?”By carrying a Bluetooth enabled mobile phone, the device is able to communicate with nearby devices carried by others in order to look for interesting conversational partners. Once the devices have discovered a match in research interests, the devices notify their owners and the owners are able to switch to a face-to-face communication due to the short communication range. The devices might also exchange information, for example, paper reading lists, without user notification. By this, each attendee would learn about what other researchers are currently working on. After the conference is over, this information is carried back home and the attendee might share this information with colleagues at his research institute, again, by using his mobile phone and without notice. • Opportunistic Networks help to make people aware of each other • Support data dissemination similar to word-of-mouth communication Opportunistic Networks:

  4. Underlying Ideas and Concepts • User vicinity exploitation • Profile based user interest expression • Data dissemination • Open and unrelated user group • Unpredictable communication pattern Opportunistic Networks:

  5. A Definition for Opportunistic Networks Definition (Opportunistic Network) An opportunistic network is a network of wireless connected nodes. Nodes may be either mobile or fixed. Communication range between two connected nodes is within walking distance, i.e., 100–300 meters. The network topology may change due to node mobility or node activation and node deactivation. The nodes provide the following functionality: • Node Discovery: A network node is able to discover other network nodes in direct communication range. • One-hop Message Exchange: A node is able to send and receive arbitrary data in form of a message to or from any other node in direct communication range. Definition (Opportunistic Network Node)An opportunistic network node consists of a device with short-range wireless communication capabilities. The device operates an opportunistic network application that uses a data sharing protocol for data dissemination. The data sharing protocol uses i) node discovery and ii) one-hop message exchange. Definition (Mobile Node)A mobile node (or node for short) consists of a user carrying a mobile device that acts as an opportunistic network node. Definition (Information Sprinkler)An Information Sprinkler (abbreviated IS) is a fixed opportunistic network node within the network. It is a device placed at a dedicated location, thus it is not mobile and not under direct user control. The Information Sprinkler uses the same data sharing protocol as other opportunistic network nodes. Opp. Net.Node MobileNode Infor.Sprinkler Opportunistic Networks:

  6. Vertical Architecture Opportunistic Networks:

  7. MANETs for anonymous groups of humans? ? C A B • What is an incentive for B to route messages between A and C? • Why should A and C trust and rely on node B for their communication? • MANET = multi-hop ad-hoc network • Sample application domains: Military, sensor networks, rescue scenarios • Key characteristic: Common goal, strong relationship Opportunistic Networks: • One-hop communication to share information • augmented with constrained propagation based on user profiles • mimics word-of-mouth communication between humans Opportunistic Networks:

  8. P2P vs. MANET vs. Opp. Networks Opportunistic Networks:

  9. Opportunistic Networks Applications – Two Types Active Collaboration • exploits physical proximity of users in order to support a face-to-face conversation • device act as a link to the user • Examples: Lovegety (Iwatani, 1998), SpotMe (Shockfish SA Switzerland, 2003), Nokia Sensor (Nokia, 2005) Passive Collaboration • disseminate data among nearby users without any user interaction • digital form of word-of-mouth communiation • Examples: Datta, Quarteroni, and Aberer (2004), Görgen et al. (2005), Khelil, Becker, Tian, and Rothermel (2002) Opportunistic Networks:

  10. Opportunistic Network Example: iClouds • Spontaneous one-hop network of humans • Combines publish/subscribe with localized P2P networking • Communication in user's vicinity • no infrastructure needed • spontaneous face-to-face meeting possible • Digital items to share • by interest • using incentives • no a-priori need for user's attention • more info: http://iClouds.tk.informatik.tu-darmstadt.de Opportunistic Networks:

  11. Profile based data dissemination – Idea (iClouds) Offer… Looking for … Offer… Looking for … Two basic data structures • Information wish list (iWish) • Information have list(iHave) Opportunistic Networks:

  12. Multi-Hop Information Dissemination (iClouds) User A User B User C iWish iHave iWish iHave iWish iHave user profile most cases: to , L0 ≠ t1 , L1 Opportunistic Networks:

  13. Human Factors Recall: Opportunistic Networks are formed by humans carrying a personal device and potentially pass sensitive information without notice. Privacy Issues • Q: How to protect a a user's privacy? Incentive Issues • Q: Why should a user contribute with a personal device to a network? What is his benefit? Opportunistic Networks:

  14. Privacy – Degrees of User Identifiability • Identity: A user that communicates with others and reveals any piece of information that can be used to clearly identify him, is said to work under his identity. • Pseudonymity: This is the ability to prove a consistent identity without revealing a user’s real identity, instead using a pseudonym. (The harder it is to reveal the pseudonym of a user, the closer we are to the state of not being identifiable at all, thus acting anonymously) • Anonymity: Anonymity is the ability to remain unidentifiable within a set. A user acts anonymously if it is impossible to reveal his identity. Opportunistic Networks:

  15. Privacy Preservation in iClouds • Make use of dynamtic IDs during communication • Idea • Attention: All network layers need to be taken into account A D B C my ID is B my ID is D Typical network stack Opportunistic Networks:

  16. An Incentive Scheme Example Basic Idea • The incentive scheme rewards users (bearers) who partly help to carry a piece of information from an information producer to an information consumer. Roles • Information Producer • Information Bearer • Information Consumer Opportunistic Networks:

  17. Incentive Scheme Implementation: AdPASS(Straub & Heinemann, 2004) • AdPASS is a concrete Opportunistic Network application based on iClouds • Disseminates digital advertisements according to user preferences (iWish/iHave) • Bonus point reward for all peoplecarrying the ad to a buyer Opportunistic Networks:

  18. AdPASS: Participants & Communication Model C B A A C B  vendors disseminate digital ads via radio to customers customers pass on the ad when meeting in the street customer returns to store and buys the product vendor informs mediator about bonus points customers sync their bonus points via internet      Opportunistic Networks:

  19. Security Goals in AdPASS Authentication • assure that the information was issued by the claimed information producer and not forged Non-repudiation • prevent an information producer from denying that he has issued a certain piece of information Integrity • information integrity • integrity of the bearer chain Anonymity • of information bearers in order to prevent an attacker from creating user profiles Opportunistic Networks:

  20. Security Solutions in AdPASS (Overview) Opportunistic Networks:

  21. AdPASS: Integrity Protection of the Bearer Chain • Make use of public key pairs (X+,X-) • X+ user alias • X- for signature operation signed by A- signed by P- Information Sender.: P+ Receiver.: A+ P A B Sender.: A+ Receiver.: B+ 10p 8p 2p B's Attack: Remove A from chain signed by P- Information P B Sender.: P+ Receiver.: B+ 10p 10p can't be forged by C without knowledge of P- Opportunistic Networks:

  22. Literature • Iwatani, Y. (1998). Love: Japanese Style. Retrieved February 2, 2007 from http://www.wired.com/news/culture/0,1284,12899,00.html • Shockfish SA Switzerland. (2003). The SpotMe Homepage. Retrieved February 2, 2007 from http://www.spotme.ch Nokia. (2005). Nokia Sensor. Retrieved February 2, 2007 from http://www.nokia.com/sensor • Datta, A., Quarteroni, S., & Aberer, K. (2004). Autonomous Gossiping: A Self-Organizing Epidemic Algorithm for Selective Information Dissemination in Wireless Mobile Ad-Hoc Networks. Lecture Notes in Computer Science, 3226, 126–143. • Görgen, D., Frey, H., & Hutter, C. (2005). Information Dissemination Based on the En-Passent Communication Pattern. In Kommunikation in verteilten systemen (kivs 2005) (pp. 129–141). • Khelil, A., Becker, C., Tian, J., & Rothermel, K. (2002). An Epidemic Model for Information Diffusion in MANETs. In Mswim ’02: Proceedings of the 5th acm international workshop on modeling, analysis, and simulation of wireless and mobile systems (pp. 54–60). New York, NY, USA: ACM Press. • Straub, T., & Heinemann, A. (2004). An Anonymous Bonus Point System For Mobile Commerce Based On Word-Of-Mouth Recommendation. In L. M. Liebrock (Ed.), Applied computing 2004. proceedings of the 2004 acm symposium on applied computing (pp. 766–773). New York, NY, USA: ACM Press. • Heinemann. A (2007) Collaboration in Opportunistic Networks Ph.D. Thesis, University of Technology, Darmstadt, 2007. http://elib.tu-darmstadt.de/diss/000834 Opportunistic Networks:

More Related