Download Black Hole

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cracking of wireless networks wikipedia , lookup

Computer network wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Network tap wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

IEEE 1355 wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Airborne Networking wikipedia , lookup

Peer-to-peer wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
An Evaluation of Routing
Reliability in Non-Collaborative
Opportunistic Networks
Ling-Jyh Chen, Che-Liang Chiou, and Yi-Chao Chen
Institute of Information Science, Academia Sinica
{cclljj, clchiou, yichao}@iis.sinica.edu.tw
2
Motivation 1/2
• Opportunistic Networks:
– Network contacts are intermittent
– There is rarely an e2e path between the source and
the destination
– Disconnection and reconnection are common
– Link performance is highly variable or extreme
• Potential Applications
– Interconnect mobile search and rescue nodes in
disaster areas
– Allow message exchange in underdeveloped areas
– Permit scientific monitoring of wilderness areas
3
Motivation 2/2
• An implicit assumption is usually made in
opportunistic networks: all participating peers
are collaborative.
• Many schemes proposed for data dissemination
are based on the assumption.
• However, there may be uncooperative or
malicious peers in the network, and these
schemes may be vulnerable.
4
Our Contribution
• We identify five types of non-cooperative
behaviors: Free Rider, Black Hole,
Supernova, Hypernova, and Wormhole
• We evaluate the impacts of non-cooperative
behaviors on data transmission
performance of three popular opportunistic
network routing schemes.
5
Type 1: Free Rider
• A type of selfish behavior
• Use the network to forward data, but
refuse to serve as a relay for others
• Effects:
– Free riders require less memory and energy
than others
– Data transmission performance of the
system degrades due to the reduced
level of collaboration.
6
Type 2: Black Hole
• Drop all relayed data without forwarding to other
peers
• Dropping may be:
– Intentional
– Due to a lack of capability, e.g. limited battery power
or buffer size
• Black holes cause data loss
and may significantly degrade
the transmission performance
7
Type 3: Supernova
• A type of malicious attack that propagates random
messages destined to other network peers
• Similar to
– Email spamming
– Network worms
– Denial of service attacks
• The malicious traffic
– consume network resources
– interfere with the transmission
of regular messages
8
Type 4: Hypernova
• A type of malicious behavior that propagates
random messages intended for virtual peers
that may or may not exist
• The network keeps random messages until
– destination nodes are found or
– they are dropped due to buffer
overflow
• Random messages initiated by
hypernova peers may exist longer
than those by supernova peers.
9
Type 5: Wormhole
• Composed of one black hole and one
white hole
– Black holes ‘absorb’ data from others
– White hole ‘radiate’ data as much as they can
• Effects:
– likely to be overloaded
– single-point-of-failure
– security and privacy
issues
10
Evaluation Settings
• Evaluate reliability of three opportunistic
network routing schemes:
– Epidemic
– PRoPHET
– HEC-BI
• Simulator: DTNSIM
– A Java-based opportunistic simulator
11
Evaluation Settings (cont.)
• Messages:
– generated in the first 10% of the simulation time
– with a Poisson rate of 1,800 seconds/message
– are 1M Bytes
• Data rate: 2Mbps
• Buffer size:
– 1G Bytes for evaluations of free riders and black
holes
– 100 Bytes for evaluations of supernova,
hypernova, and wormholes
12
Evaluation Scenarios
• Use two realistic wireless network traces:
– iMote: collected from 2005 Infocom
conference
– UCSD: collected from UCSD campus
Trace Name
iMote
UCSD
Device
iMote
PDA
Network Type
Bluetooth
WiFi
Duration(days)
3
77
Devices participating
274
273
Number of contacts
28,217
195,364
Avg # Contacts/pair/day
0.25148
0.06834
13
Evaluation I: Free Riders
- The results indicates that free riders are very harmful to
data transmission in opportunistic networks.
14
Evaluation II: Black Hole Peers
- Similar to free riders, the results indicates that black
holes are very harmful to data transmission in
opportunistic networks.
15
Evaluation III: Supernova Peers
- The degradation rates in the supernova scenario are much
slower than those in the free rider and black hole scenarios.
- The three schemes are more robust against supernova
behavior than free rider and black hole behavior.
16
Evaluation IV: Hypernova Peers
- The effects of supernova and hypernova are similar.
- Hypernova, similar to supernova, has less impact on the
data transmission performance than free riders and black
holes.
17
Evaluation V: Wormhole Peers
- Surprisingly, the delivery performance does not degrade as the
percentage of wormholes increases.
- The results indicate that the three schemes are robust against
wormholes, and they can even benefit substantially from wormholes
when the network connectivity is poor.
18
Conclusion
• We identify five types of non-cooperative behaviors,
namely free rider, black hole, supernova,
hypernova, and wormhole.
• We evaluate their impacts on Epidemic, ProPHET,
and HEC-BI.
• Data transmission performance degrades
significantly as free rider, black hole, supernova, or
hypernova behavior increases.
• All three routing schemes are robust against
wormhole behavior, and can even benefit from it –
especially when the network connectivity is poor.
19
Thanks!
http://www.iis.sinica.edu.tw/~cclljj/
http://nrl.iis.sinica.edu.tw/