49 research outputs found

    To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking

    Full text link
    Information-Centric Networking (ICN) is an internetworking paradigm that offers an alternative to the current IP\nobreakdash-based Internet architecture. ICN's most distinguishing feature is its emphasis on information (content) instead of communication endpoints. One important open issue in ICN is whether negative acknowledgments (NACKs) at the network layer are useful for notifying downstream nodes about forwarding failures, or requests for incorrect or non-existent information. In benign settings, NACKs are beneficial for ICN architectures, such as CCNx and NDN, since they flush state in routers and notify consumers. In terms of security, NACKs seem useful as they can help mitigating so-called Interest Flooding attacks. However, as we show in this paper, network-layer NACKs also have some unpleasant security implications. We consider several types of NACKs and discuss their security design requirements and implications. We also demonstrate that providing secure NACKs triggers the threat of producer-bound flooding attacks. Although we discuss some potential countermeasures to these attacks, the main conclusion of this paper is that network-layer NACKs are best avoided, at least for security reasons.Comment: 10 pages, 7 figure

    A Light-Weight Forwarding Plane for Content-Centric Networks

    Full text link
    We present CCN-DART, a more efficient forwarding approach for content-centric networking (CCN) than named data networking (NDN) that substitutes Pending Interest Tables (PIT) with Data Answer Routing Tables (DART) and uses a novel approach to eliminate forwarding loops. The forwarding state required at each router using CCN-DART consists of segments of the routes between consumers and content providers that traverse a content router, rather than the Interests that the router forwards towards content providers. Accordingly, the size of a DART is proportional to the number of routes used by Interests traversing a router, rather than the number of Interests traversing a router. We show that CCN-DART avoids forwarding loops by comparing distances to name prefixes reported by neighbors, even when routing loops exist. Results of simulation experiments comparing CCN-DART with NDN using the ndnSIM simulation tool show that CCN-DART incurs 10 to 20 times less storage overhead

    ADN: An Information-Centric Networking Architecture for the Internet of Things

    Full text link
    Forwarding data by name has been assumed to be a necessary aspect of an information-centric redesign of the current Internet architecture that makes content access, dissemination, and storage more efficient. The Named Data Networking (NDN) and Content-Centric Networking (CCNx) architectures are the leading examples of such an approach. However, forwarding data by name incurs storage and communication complexities that are orders of magnitude larger than solutions based on forwarding data using addresses. Furthermore, the specific algorithms used in NDN and CCNx have been shown to have a number of limitations. The Addressable Data Networking (ADN) architecture is introduced as an alternative to NDN and CCNx. ADN is particularly attractive for large-scale deployments of the Internet of Things (IoT), because it requires far less storage and processing in relaying nodes than NDN. ADN allows things and data to be denoted by names, just like NDN and CCNx do. However, instead of replacing the waist of the Internet with named-data forwarding, ADN uses an address-based forwarding plane and introduces an information plane that seamlessly maps names to addresses without the involvement of end-user applications. Simulation results illustrate the order of magnitude savings in complexity that can be attained with ADN compared to NDN.Comment: 10 page

    In-Network Retransmissions in Named Data Networking

    Get PDF
    The strategy layer is an important architectural component in both Content-Centric Networking (CCN) and Named Data Networking (NDN). This component introduces a new forwarding model that allows an application to configure its namespace with a forwarding strategy. A core mechanism in every forwarding strategy is the decision of whether to retransmit an unsatisfied Interest or to wait for an application retransmission. While some applications request control of all retransmissions, others rely on the assumption that the strategy will retransmit an Interest when it is not satisfied. Although an application can select the forwarding strategy used in the local host, it cannot guarantee the selection of the same strategy in other nodes in the network, especially in shared resource environments. In some scenarios, a developer must bind the implementation of the application to the details of the deployed forwarding strategy to guarantee the correctness of his application. In this paper we discuss the core mechanisms of a forwarding strategy in NDN, and we explore the importance and impact of in-network retransmissions on the application\u27s performance and correctness. We propose and implement a simple forwarding strategy abstraction that allows the application to decide whether a network retransmission is required, and differentiate application retransmissions from network retransmissions. We show that in some scenarios, such as multiple producers application or multipath consumer-producer service, the proposed abstraction can significantly reduce the percentage of unsatisfied Interests

    Study of Reliable Data Communication in Wireless Sensor Networks

    Get PDF
    A distributed wireless sensor network consists of numerous tiny autonomous sensing nodes deployed across a wide geographical area. These sensor nodes self organize and establish radio communication links with the neighboring nodes to form multi-hop routing paths to the central base station. The dynamic and lossy nature of wireless communication poses several challenges in reliable transfer of data from the sensor nodes to the sink. There are several applications of sensor networks wherein the data collected by the sensors in the network are critical and hence have to be reliably transported to the sink. An example of such an application is sensors with RFID readers mounted on them to read tag information from the objects in a factory warehouse. Here, the tag information recorded by the RFID reader is a critical piece of information which may not be available at a later point of time and hence has to be reliably transported to the sink. We study the various issues and analyze the design choices proposed in literature in addressing the challenge of sensors-to-sink reliable data communication in such applications. A cross-layer based protocol with MAC layer retransmissions and NACK (Negative Acknowledgment) based rerouting of data packets is developed to overcome link failures and provide reliability. The protocol is implemented on TinyOS and the performance of NACK based rerouting protocol in terms of percentage successful message reception is compared with NACK based retransmission protocol by running simulations on TOSSIM. The NACK based rerouting protocol provides greater reliability under different metrics like varying network size, network traffic and percentage of failed links in the network

    Application-specific reliable data transfer in wireless sensor networks

    Get PDF
    A wireless sensor network (WSN) is a collection of sensor nodes and base stations connected via wireless medium. It sends data collected from the nodes to the base stations for generating information. The size and low cost of the sensor nodes as well as the WSN\u27s ability to connect without wired links are its key advantages which enable it to be deployed in hostile or inaccessible environments at low cost. However, WSNs suffer from high data loss due to the inherent weaknesses in a wireless transmission medium, transmission problems in hostile environments due to human interference, etc. and node failures due to limited energy of sensor nodes. Hence ensuring data transfer with minimum loss i.e. reliable data transfer is very important in WSNs. The amount of loss tolerated is application dependent. We present a reliable protocol for data transfer from a base station to sensor nodes for time-critical applications in WSNs with zero tolerance for data loss. The protocol is based on hop-by-hop detection and recovery of lost data packets, out-of-sequence forwarding of packets and delayed request for missing packets at each node with non-acknowledgement of packets at each receiving node. We present a detailed analysis of the advantages of the key features of our protocol over other alternatives. The superiority of our protocol over an established protocol PSFQ is demonstrated via extensive simulations, in terms of both the delivery time of the entire data (sent from the base station to the sensor nodes) and the number of messages exchanged in the network during this process. In addition, we present two methods, one, for ensuring that at least one packet is delivered to a node in non-acknowledgement based systems and another, for sending reports from destination nodes to the base station respectively. We explore different methods for further improvement of protocol performance: (1) use of effective degree of a node in determining the optimum delay for requesting data packets missing at nodes, (2) variation of the priority order for sending different types of messages at nodes and, (3) selective response to requests for packets at nodes
    corecore