Network Working Group P. Mendes, Ed. Internet-Draft Airbus Intended status: Experimental R. Sofia Expires: March 19, 2021 fortiss GmbH V. Tsaoussidis Democritus University of Thrace C. Borrego Autonomous University of Barcelona September 15, 2020 Information-centric Routing for Opportunistic Wireless Networks draft-mendes-icnrg-dabber-05 Abstract This draft describes the Data reAchaBility BasEd Routing (DABBER) protocol. DABBER aims to provide a name-based routing solution to support the operation of Information-centric Networking frameworks in opportunistic wireless networks. By "opportunistic wireless networks" it is meant multi-hop wireless networks where finding an end-to-end path between any pair of nodes at any moment in time may be a challenge. The goal is to assist in better defining opportunities for the transmission of Interest packets in a store- carry-and-forward manner, based on a proactive approach. The document describes how to integrate DABBER in a networking node that implements some ICN approach, such as Named-Data Networking (NDN) or Content Centric Networking (CCN), along with the specification of the proactive approach based on the dissemination of name-prefix information. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on March 19, 2021. Mendes, et al. Expires March 19, 2021 [Page 1] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 Copyright Notice Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Assumptions and Design Choices . . . . . . . . . . . . . 4 1.2. Conventions . . . . . . . . . . . . . . . . . . . . . . . 4 2. Applicability Examples . . . . . . . . . . . . . . . . . . . 4 3. DABBER Architecture . . . . . . . . . . . . . . . . . . . . . 5 3.1. Extensions to NFD . . . . . . . . . . . . . . . . . . . . 6 3.2. Routing Engine . . . . . . . . . . . . . . . . . . . . . 7 4. DABBER Protocol Design . . . . . . . . . . . . . . . . . . . 8 4.1. Name Prefix Dissemination . . . . . . . . . . . . . . . . 10 4.2. Name Prefix Cost Computation . . . . . . . . . . . . . . 13 4.3. Update of Internal Structures . . . . . . . . . . . . . . 15 4.4. Update of NFD Structures . . . . . . . . . . . . . . . . 15 4.5. Packet Format . . . . . . . . . . . . . . . . . . . . . . 16 5. DABBER Operational Example . . . . . . . . . . . . . . . . . 16 6. DABBER Operational Considerations . . . . . . . . . . . . . . 17 6.1. Context Awareness . . . . . . . . . . . . . . . . . . . . 18 6.2. Integration with Wi-Fi Direct . . . . . . . . . . . . . . 19 6.3. Integration with DTN . . . . . . . . . . . . . . . . . . 20 6.4. Producer Mobility . . . . . . . . . . . . . . . . . . . . 20 7. Security Considerations . . . . . . . . . . . . . . . . . . . 21 7.1. Authenticity . . . . . . . . . . . . . . . . . . . . . . 22 7.2. Confidentiality . . . . . . . . . . . . . . . . . . . . . 22 7.3. Privacy . . . . . . . . . . . . . . . . . . . . . . . . . 23 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 24 9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 24 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 24 10.1. Normative References . . . . . . . . . . . . . . . . . . 24 10.2. Informative References . . . . . . . . . . . . . . . . . 24 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 26 Mendes, et al. Expires March 19, 2021 [Page 2] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 1. Introduction This document provides a specification for DABBER, an opportunistic wireless routing protocol that provides a name-based routing solution for the operation of Information-Centric Networking (ICN) [RFC7476] in wireless networks, including opportunistic wireless environments. The term opportunistic wireless networks primarily refers to multi- hop wireless networks, where finding an end-to-end path between any pair of nodes at any moment in time may be a challenge, given that networking nodes availability depends upon different mobility patterns and wireless links are intermittently available due to changes in the environment or changes in the position of the nodes terminating the link. Examples of such wireless environments encompass mobile crowd sensing and Internet of Things, where things are mobile devices, or sensors, including those operating in terrestrial or non-terrestrial networks that integrate smart satellite constellations. The deployment of information centric wireless networks by applying NDN or CCN alone, inevitably leads to network flooding, due to the lack of knowledge about the best set of paths to reach data holders. As a basic NDN/CCN approach the first set of Interest packets are broadcasted in order to identify the interfaces that lead to a data holder. DABBER aims to prevent such flooding by allowing data holders to announce the name prefix of the data sets they hold. This allows networking nodes to know which are the appropriate interfaces to reach a certain data set prior to the arrival of the corresponding Interest packets. The expected result is the reduction of both network overhead and latency of Interest packets. It is our understanding that routing in such wireless environments needs to be done based on strategies that take into consideration, at a network level, the context of wireless nodes (e.g., availability, centrality), and not just the history of contacts among wireless nodes, as it is often the case in opportunistic routing [Dlife] [Dlife-draft] [Scorp]. The goal is to better determine windows of opportunity to transmit Interest and Data packets, while opportunity reflects both time and space. DABBER is devised to be easily integrated with the data plane of CCN/ NDN [NFD], since these are well established distributed ICN frameworks. A DABBER [DABBER18] proof-of concept implementation is available via GitHub [DABBER18-1] and via Google Play [DABBER18-2]. DABBER has been tested in emergency scenarios with intermittent connectivity based on a novel NDN instant messenger, the Oi! Application for Android [OI]. Mendes, et al. Expires March 19, 2021 [Page 3] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 1.1. Assumptions and Design Choices DABBER relies on the following assumptions with regard to opportunistic wireless environments: o Nodes are mobile. o Nodes overhear each other. o Nodes can be data sources, data destinations, or forwarders. o Nodes may decide to be the custodians of data transmissions based on a set of criteria, such as local available resources. o Nodes do not have a complete topology view. DABBER relies on the following major design choices to develop a name-based routing protocol for opportunistic wireless network: o DABBER must avoid the network being flooded by Interest packets. o DABBER is based on the distribution of name prefix (data reachability) only, since adjacency information may present high variability. o DABBER is based on local information about the context of a node, in order to support the selection of the most suitable neighbours to forward Interest packets. o DABBER avoids the definition of new messages by making usage of synchronization mechanisms already developed for NDN, such as ChronoSync [ChronoSync][PartialSync]. 1.2. Conventions The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119. 2. Applicability Examples Mobile Crowd Sensing: This scenario encompasses the implementation of NDN/CCN in personal mobile nodes (e.g., smartphones) allowing users to share data and messaging services by exploiting existing intermittent wireless connections (e.g., Wi-Fi, Wi-Fi Direct) in an environment without/or limited Internet access. These scenarios are also relevant in dense and remote areas. Mendes, et al. Expires March 19, 2021 [Page 4] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 Smart Satellite Constellation Communication: Delay Tolerant Networking (DTN) [RFC4838] is acknowledged as a relevant technology also for future smart satellite constellations. ICN adds in the support for intermittent connectivity, and relevant properties to support mobility and integrated security. People-to-people Communication in Emergency Scenarios: A routing solution such as DABBER assists in supporting local data exchange across entities in a way that is agnostic to devices capabilities and identity [Umobile]. Internet of Things: The Pub/Sub receiver-driven nature of ICN brings in recognizable advantages to the Internet of Things, in particular involving mobile nodes, such as fleets of AGVs, UAVs. 3. DABBER Architecture R relies on the same data structures made available by the Named Data Networking Forwarding Daemon [NFD], namely the Routing Information Base (RIB), the Forwarding Information Base (FIB), and the Pending Intent Table (PIT), as illustrated in figure 1. DABBER brings no changes to the operation of NFD. However, augmenting NFD with a routing engine for wireless networks requires the inclusion of three new components to NFD. This extended NFD is called NDN-OPP (NDN for Opportunistic networks) [NDN-OPP], as shown in figure 1. This section provides a description of the extensions included in NFD as well as the new components of the DABBER routing engine. Mendes, et al. Expires March 19, 2021 [Page 5] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 +--------------+ +--------------------------- + +----------+ |NDN-OPP | | DABBER | |Contextual| | +---------+ | | +---------------+ |-------| Manager | | |Add_Route|<--| |--->|Neighbor Mng |<-| | +----------+ | +---------+ | | | | +---------------+ | | | +------+ | | | | | | | | | |NFD | | | | | | | | | | | +---+| | | | | v v | | |-->|RIB|| | | | | +----------+ +--------+ | | | +---+| | |------|RIB-Update|<-|CompCost|<|| | | +---+| | | | +----------+ +--------+ || | | |FIB|| | | | | || | | +---+| | | | v +--------+ || | | +---+| | | | +------+ |Name_Mng|---|| | | |PIT|| | | | | LSDB |<--->+--------+ | | | +---+|<|| | | +------+<------| | | +------+ || | | v | | +-------+-|| | | +-------+ | | |Pkt_Mng|<-----| | | PSync | | | |>+-------+ | | +-------+ | | | | +----------------------------+ |+--------+ | ||OppFace | | +--------------+ Figure 1: DABBER Architecture. 3.1. Extensions to NFD In order to augment NFD with a routing engine to allow for the deployment of NDN/CNN in wireless networks three new elements were included in NFD: a method to add routes to the RIB (Add_route in figure 1); a method to gather information (carried names) and status (time of reception) of Interest and Data messages (Pkt_Mng in figure 1); a new face able to handle the intermittent nature of wireless links, called Opportunistic Face (OPPFace) (c.f figure 1). An OPPFace is a virtual face based on a system of packet queues to hide intermittent connectivity. An OPPFace is created for each neighbor node, where a neighbor node is any node that the current node has ever contacted to directly (i.e. over one radio hop). OPPFaces are kept in the Face Table and their state reflects the wireless connectivity status towards the respective neighbor: they can be in an Up or Down state, depending upon the wireless reachability the corresponding neighbor node. Mendes, et al. Expires March 19, 2021 [Page 6] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 When packets are dispatched based on the information stored in the FIB, an OPPFace is able to delay packet transmission until there is wireless connectivity to the correspondent neighbor: the OPPFace simply queue packets, when OPPFace is Down, or flush the queue, when OPPFace is Up. Since packet queuing is concealed inside OPPFaces, existing forwarding strategies do not need to be changed. OPPFaces can be implemented by using any direct wireless communication mode (Infrastructured, Ad-Hoc, and Direct mode). The current implementation of NDN-OPP for Android devices [NDN-OPP-Android] makes usage of group communications provided by Wi- Fi Direct [NDN-emergency][NDN-opportunisticnets]. More information about the integration of NDN-OPP with Wi-Fi Direct is provided in section 6.2. 3.2. Routing Engine DABBER is a name-based routing protocol that allows nodes to exchange information about name reachability in order to select the most suitable neighbours to forward Interest messages. The operation of the DABBER routing engine is performed based on the following components, illustrated in figure 1: o Neighbor_Management: Keep updated information about neighbours in a Neighbor Table. A neighbor entry in that table has information about the neighbor availability, centrality and similarity, as well as about the delay that Interest packets suffer when forwarded via a certain neighbour. The information about neighbours is used to compute the cost of each name prefix announced by them, while the information about the delay of Interest packets is used to update the weights of the neighbors entries in the RIB. The delay of Interest packets is a measure of the time difference between sending an Interest packet and receiving the corresponding Data packet, based on information collected from the Pkt_Mng module of NDN-OPP. The information about neighbor availability, centrality and similarity is collected by an external entity, as described in section 6.1. o Compute_Name_Cost: This module computes the cost associated with each name prefix as a function of the node similarity of the neighbor announcing the name prefix, and the cost received in the announcement. That cost is used to update the entry of that name prefix / Neighbor in the DABBER internal Routing Table. o Name_Prefix_Management: This module is responsible to remove and add Link State Announcement (LSA) into the Link State DataBase (LSDB) used by PSync. New LSAs present in the LSDB (announced by a neighbor) are removed in order to pass the following tuples to the Mendes, et al. Expires March 19, 2021 [Page 7] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 module responsible to compute the costs of name prefixes: Name prefix; Cost; Neighbor. o RIB_Update: This module keeps updated information about the cost of the name prefixes that will be used to populate the NFD RIB. The information about each name prefix is kept in a local Routing Table based on the tuple: Name prefix; Cost; Neighbor. The cost variable is a function of the cost provided by the Compute_Name_Cost module, plus the information about the availability and centrality of the neighbor, provided by the Neighbor_Management module. In defined periods of time the RIB_Update modules will use the content of the local Routing Table to populate the NFD RIB as well as to insert new LSA into the LSDB. o LSDB: The Link State DataBase is the structure used by the PSync to keep all the information to be synchronized among neighbor nodes. By placing LSAs into the LSDB, DABBER ensures that such information is passed to all neighbours without the need to define a new set of messages for the exchange of routing information. Between PSync and ChronoSync, DABBER makes use of the former since it is designed to support partial dataset synchronization. This means that PSync allows a node to subscribe to a subset of data streams, where a data stream is a sequence of data items under a common name prefix. Hence, by avoiding full sync operations of a LSDB in which only a few entries may be new, PSync helps to improve DABBER performance over networks in which wireless links are intermittently available. 4. DABBER Protocol Design Being developed for wireless networks, DABBER does not rely on the dissemination of Adjacency Link State Advertisements that reflect the status of the links towards neighbor nodes; DABBER only requires the dissemination of Prefix LSAs. DABBER does not require the computation of shortest paths taking into account adjacency information. Instead DABBER replaces the path cost (sum of the weights of all the involved links) used in fixed networks with the computation of data reachability cost based on local available information, reducing the impact that topological changes would have on the stability of routing information. The assumption behind this rational is that the position and validity of the data announced by a data holder changes less than the conditions in all the links making all potential paths. By exchanging Prefix LSAs each device becomes aware of potential next-hops via which a name prefix N can be reached with a certain cost k. This cost k represents the probability of reaching a data Mendes, et al. Expires March 19, 2021 [Page 8] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 object identified by N via a Face F, and is related to the time validity of the name prefix (v). The rationale for this approach is that the selection of faces that have a lower cost k (higher validity v) will improve data reachability. The validity of a name prefix is set by the data source as an integer that represents the expiration date of the data. Since different devices can announce the same name prefix, a certain name prefix may be associated with different values of k (as v shall differ) over different faces, depending upon the nodes announcing such name prefix: this lead to the identification of multiple next hops, each one with a different cost. The computation of multiple next hops is performed every time DABBER has a new Name Prefix LSA (or a new version of an existing Name Prefix LSA) in its LSDB. The computation of multiple next hops is performed every time DABBER has a new Name Prefix LSA (or a new version of an existing Name Prefix LSA) in its LSDB. With this in mind, DABBER was designed with the following sequence of operations, as described in the following subsections: 1. Name prefix dissemination. 2. Name prefix cost computation. 3. Update of internal structures (DABBER routing table and LSDB) with the data reachability information of the current node towards the new Name Prefix. 4. Update of NFD structure (RIB) based on the DABBER internal routing table. Periodically DABBER updates the validity values of all Name Prefixes in its internal routing table, performing the consequent updates of the local LSDB and RIB, and needed. The updated RIB information is used by NFD to update its FIB, which is used to forward Interest packets, based on the normal operation of NFD. However, independently of the used forwarding strategy, the ranking of faces done by DABBER on the RIB should be respected. For instance an unicast forwarding strategy should use the most important face (lower cost), while a multicast forwarding strategy will use all the faces indicated for the name prefix. After selecting the best set of faces, a copy of the Interest packet is sent to the OPPFaces of the selected faces. The state of an OPPFace reflects the fact Mendes, et al. Expires March 19, 2021 [Page 9] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 that the corresponding neighbor device is currently reachable or not. Based on this information, the OPPFace decides whether to simply queue the packet or attempt a transmission over the associated Opportunistic Channel. In what concerns Data packets, they are forwarded following the normal operation of NFD, that is, following the information stored in the PIT. 4.1. Name Prefix Dissemination DABBER was designed to exploit the synchronization mechanisms made available by NDN, such as PSync to control the dissemination of name prefixes without the need to define neither new messages nor new message passing mechanisms. This means that while IP-based routing protocols push updates to other routers, DABBER devices pull updates. DABBER can use any underlay communication channels (e.g., TCP/UDP tunnels, Link layer TXT records) to exchange LSA information via an existing mechanism, such as PSync. By using Interest/Data packets (exchanged by PSync), DABBER benefits from CCN/NDN built-in data authenticity to exchange routing information: since a routing update is carried in an Data packet and every Data packet carries a signature, a DABBER device can verify the signature of each LSA to ensure that it was generated by the claimed origin node and was not tampered during dissemination. Prefix LSA +----------------------------------------------------+ |LSA |Number of|Prefix 1|Cost|...|Prefix N|Cost|Sign.| |Name|Prefixes | | | | | | | +----------------------------------------------------+ Figure 2: Prefix LSA format. DABBER advertises Prefix LSAs every time a new name prefix is added or deleted to the LSA DataBase (LSDB). Name prefixes are advertised with a cost metric related to the validity of the associated data, as shown in Figure 2. Each LSA used by DABBER has the name DID/DABBER/LSA/Prefix/version. The DID is described by a scheme based on URIs. It can be for instance network/operator/home/node/. The version field is increased by 1 whenever a device creates a new version of the LSA. DABBER disseminates LSAs via a data synchronization mechanism (e.g. PSync) of the local LSDB. This peer synchronization approach is Mendes, et al. Expires March 19, 2021 [Page 10] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 receiver-driven, meaning that a device requests LSAs only when it has CPU cycles. Thus it is less likely a device will be overwhelmed by a flurry of updates. In order to reduce the amount of transferred data, DABBER removes obsolete LSAs from the LSDB by periodically refreshing each of its own LSAs by generating a newer version. Every LSA has a lifetime associated with it and will be removed from the LSDB when the lifetime expires. DABBER performs the dissemination of LSAs based on a process able to synchronize the content of LSDBs. In this sense, all LSAs are kept in the LSDB as a name set, and DABBER uses a hash of the LSA name set as a compact expression of the set. Neighbor nodes use the hashes of their LSA name sets to detect inconsistencies in their sets. For this reason, neighbor nodes exchange hashes of the LSDB as soon as OPPFaces are up. Current version of DABBER makes use of PSync as a synchronization mechanism. PSync allows DABBER to define a collection of named data in a local repo as a slice. LSA information is synchronized among neighbor nodes, since PSync keeps the repo slice containing the LSA information in sync with identically defined slices in neighboring repositories. If a new LSA name is detected in a repo, PSync notifies DABBER to retrieve the corresponding LSA in order to update the local LSDB. DABBER can also request new LSAs from PSync when resources (e.g. CPU cycles) are available. Mendes, et al. Expires March 19, 2021 [Page 11] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 Node A Node B +------------------------+ +---------------------------+ | +-------------+ | |+-------------+ | | DABBER | Psync | | || Psync | DABBER | | +-------------+ | |+-------------+ | +------------------------+ +---------------------------+ | | Sync Interest (1) | | | |------------------->| | | |<-------------------| | | New LSA (2)| | | |----------->| | | | | Sync Reply (3) | | | |------------------->| | | | | Notify (4) | | | |----------->| | | LSA Interest (5) | | |<-----------|--------------------|------------| | | LSA Data (6) | | |------------|--------------------|----------->| | | | | | | Sync Interest (7) | | | |------------------->| | | |<-------------------| | Figure 3: LSA exchange process. Figure 3 shows how an LSA is disseminated between two neighbor nodes A and B, when the OPPFace is up. To synchronize the slice representing the LSDB information in the repo, PSync, on each node, periodically sends Sync Interests with the hash of its LSA name set / slice (step 1). When Node A has a new Prefix LSA in its LSDB, DABBER writes it in the Chronosync slice (step 2). At this moment, the hash value of the LSA slide of node A becomes different from that of node B. As a consequence, the PSync in node A replies to the Sync Interest of node B with a Sync Reply with the new hash value of its local LSA slice (step 3). The PSync in node B identifies the LSA that needs to be synchronized and notifies DABBER about the missing LSA, and updates its LSA name set (step 4). Since DABBER on node B has been notified of the missing LSA, DABBER sends an LSA Interest message to retrieve the missing LSA (step 5). DABBER on node A sends the missing data in a LSA Data message (step 6). When DABBER on node B receives the LSA data, it inserts the LSA into its LSDB. PSync on nodes A and B compute a new hash for updating the set and send a new Sync Interest with the new hash (step 7). When more than one LSA needs to be synchronized, the issued LSA Interest packet will contain information about as many LSAs as Mendes, et al. Expires March 19, 2021 [Page 12] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 allowed by the Link maximum transmission unit. In the same sense one LSA Data packet may also be used to transport information about more than one LSA. 4.2. Name Prefix Cost Computation When DABBER is notified that a new Prefix LSA was registered in the LSDB or an existing Prefix LSA has a new version, it computes a new cost for each name prefix in such Prefix LSA. The cost of a name prefix is given by its validity. DABBER starts by computing a new validity v for a prefix N depending upon the validity announced by the neighbor, and the relevancy of the association between the two neighbor nodes (e.g., node A and node B). The cost of the Name Prefix, passed to NFD, will then be computed as an inversely proportional value to its validity. The relevance of the association between two neighbor nodes can be, e.g., a measure of similarity, where similarity is seen as a link measure, i.e., it provides a correlation cost between a node and its neighbors. Or such relation can be weighted based on metrics derived from average contact duration thus allowing a node to adjust the Name Prefix validity based on the probability of meeting the respective neighbor again. The "relation" between two neighbor nodes is computed based on the three metrics (A, C, and S) provided by the local contextual manager, plus a metric computed by DABBER itself: the time reachability. The variable considered by DABBER for the computation of the validity/cost of a Name prefix passed by a neighbor Na are: o Validity (V) - Represents the expiration date of the data associated with the Name Prefix. Currently it is the UNIX Timestamp (10 digit integer). o Similarity metric (S) towards the neighbor Na, as passed by the contextual manager (S >= 0), aiming to select neighbors with whom the current node has a good communication link. o Availability metric (A) towards the neighbor Na, as passed by the contextual manager ( 0 < A < 1), aiming to select neighbors able to process Interest packets with high probability. o Centrality metric (C) towards the neighbor Na, as passed by an external context-aware agent (rf. to section 6.1, C >= 0), aiming to select neighbors with high probability of successfully forwarding Interest packets. Mendes, et al. Expires March 19, 2021 [Page 13] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 o Time reachability (T) which corresponds to the RTT between sending an Interest packet towards the source of such Name Prefix and receiving a data packet. (0 < T < 1). Currently the value of T is computed as (current time when data packet is received - time when Interest packet was sent) / Validity of Name Prefix. Time reachability allows DABBER to select next hops that lead to closer sources. Neighbor table +------------------------------------------------------+ | Face | Status | Metric C | Metric A | Metric S | +------------------------------------------------------+ | 1 | UP | 6 | 0.3 | 12 | | 2 | DOWN | 4 | 0.8 | 8 | | 3 | UP | 1 | 0.8 | 9 | +------------------------------------------------------+ Figure 4: Neighbor table. The values C, A and S provided by the contextual manager are stored in a Neighbor Table (c.f. Figure 4) indexed by the number of faces. The higher the values of C, A and S, the most preferential a neighbor is. T is measured by observing the flow of Interest and Data packets. Thus, the lowest the T, the most preferential a Face is. Although different nodes may have a different implementation of a face ranking logic, the relevancy of T in comparison to C and A should be higher, since T reflects the measured delay to reach a data source, while C and A are indicators of the neighbors potential as relays. Based on the above mentioned metrics the Validity of a new Name Prefix (V) is updated based on two operations: o V' = f (V, S') = trunc (V * S'), where: S' = (S - Smin) / (Smax - Smin); Smin = 0 and Smax = max (Smax, C) o V'' = f (V', C', A, T) = 0.3* trunc (V' * (C'+A)) + 0.7 * trunc (V' * T), where: C' = (C - Cmin) / (Cmax - Cmin); Where Cmin = 0 and Cmax = max (Cmax, C) The computation of V' is done by the Compute_Name_Cost module, while the execution of V'' is done by the RIB_Update module (c.f. figure 1). The value of V'' may be updated more often than V', since it is assumed that the properties of the neighbours (C,A) as well as the Mendes, et al. Expires March 19, 2021 [Page 14] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 delay to a data holder (T) may vary more than the new announcement from neighbours with an updated value of V. 4.3. Update of Internal Structures After the computation of the cost of the Name Prefix taking into account the relation of the current node with the neighbor announcing it, DABBER updates its internal routing table (operation done by the RIB_Update module) and its LSDB. The information on the routing table will be used to update the RIB of the local NFD and the information of the LSDB will be announced to all neighbors by PSync. To update the Internal routing table, DABBER adds an entry (Na, V'') for the Name Prefix received from Na, where V'' is the computed cost of the name prefix. The routing table is then ordered by name prefix in decreased order of validity. Since the current node will also disseminate the received Name Prefix, DABBER updates the cost of the Name Prefix in the LSA stored in its local LSDB in order to consider the computed value V''. For this, DABBER can use two methods: o Maximal method: Cost of Name Prefix = max (V'', current cost on LSA). o Average method: Cost of Name Prefix = max (average (cost of Name Prefix entries on local routing table), current cost on LSA). 4.4. Update of NFD Structures After computing the new value of the cost of a name prefix, DABBER updates the RIB entry of that name prefix with the face over which the Name Prefix LSA was received and the new computed cost. The cost (k) of the Name Prefix to be stored in the RIB is computed based on its validity V'' as k = trunc (100/V''). DABBER updates the RIB on NFD with the cost k based on three possible logics: o Increase diversity - The new Face is included in the RIB entry, if the computed cost k helps to increase diversity of the name prefix. For instance the new cost k is higher than the average costs already stored for that name prefix, affected by a configured diversity constant. This logic includes all neighbors with cost = trunc (100/ V''), such that 1/V'' - Avr (Costs in RIB for N) > X (predefined value). Mendes, et al. Expires March 19, 2021 [Page 15] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 o Downward Path Criterion - It is a non-equal cost multi-path logic that is guaranteed to be loop-free. Based on the Downward Path Criterion, the X faces (the maximum number X of desirable faces can be defined by configuration) to be considered for a name prefix include the one with the lowest cost k plus X-1 faces that have a cost k lower than the cost that the current node has itself to the name prefix. This logic includes X neighbors with cost = trunc(100/ V''), such that cost is the lowest value of 1/V'' or cost < 1/ V. o Downward Path Criterion extension - Also considers any face over which the name prefix can be reached with a cost k equal to the cost that the current node has itself to the name prefix. To avoid packets from looping back, there is the need to add a tiebreaker, which assures that traffic only crosses one direction of equal-cost links. This logic includes X neighbors with cost = trunc (100/V''), such that cost is the lowest value of 1/V'' or cost <=1/ V. In any case the deployment of a DABBER network relies on having all nodes implemented with the same logic. 4.5. Packet Format DABBER nodes exchange Prefix LSAs by means of a synchronization mechanism such as PSync, without the need to create new packets for the exchange of routing information. 5. DABBER Operational Example In order to illustrate the proactive routing method defined by DABBER, let's consider Figure 5, where nodes A, B, and C reside in an wireless node running DABBER, while nodes E and F are wireless edge routers running another ICN routing protocol; G is a wireless node running DABBER. +--------------------+ | +---+ | | | B | . | | +---+ .2+---+ | +---+ +---+ +---+ |+---+ | C |3 ... | E |....| F |....| G | || A |.......1+---+ | +---+ +---+ +---+ |+---+ | +--------------------+ Figure 5: End-to-end operational example. In our example, Node A starts producing some content derived, for instance, from the use of an application (such as a data sharing application). The produced content is stored in its local Content Mendes, et al. Expires March 19, 2021 [Page 16] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 Store with the name /NDN/video/Lisbon/nighview.mpg. Node B stores in its Content Store a data object with name /NDN/video/Lisbon/ river.mpg, which node B received from a neighbor (meaning that B has already synchronized its LSDB with such a neighbor). Due to the update of the Content Store, the name prefix /NDN/video/ Lisbon/ is stored in the LSDB of node A and B with a validity of 864000 and 518400 in the case of node A and B respectively. In the case of node A, the cost k of the name prefix equals the validity v of the data object, e.g., v=864000 seconds (10 days) stipulated by the application. In the case of node B the validity is the result of the computation of the cost of the name prefix. From a routing perspective, storing a name prefix in the local LSDB allows the node to share the respective Prefix LSA on all its Faces, excepting on the Face over which the LSA was previously received. This LSA exchange is done when the OPPFaces are up. This means that Node C, which got a new Prefix LSA from nodes A and B, will: o Update its LSDB with the Prefix LSAs received from node A and node B. o Update its internal routing table with two new entries for the name prefix /NDN/video/Lisbon/, associated with the face towards A (face1) and with the face towards B (face2), after computing the values of V' and V'' for the received validity values: o The validity of the name prefix is updated based on the metric configured for node C: average inter-contact time. o Let's assume that A and C encounter each other frequently, while B and C do not meet frequently. This means that the two entries on the routing table of node C for prefix /NDN/video/Lisbon/ will have a validity/cost for A higher than the one for B. o Update its LSDB with the validity of the current node towards the Name Prefix following the maximal or average methods. o Update the RIB with one new entry for the name prefix /NDN/video/ Lisbon/ with two faces (face 1 and face 2) with a cost inversely proportional to the validity of the Name Prefix. 6. DABBER Operational Considerations Mendes, et al. Expires March 19, 2021 [Page 17] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 6.1. Context Awareness DABBER defines routing and forwarding strategies that take into consideration, at a network level, the context of wireless nodes, and not just the history of contacts among wireless nodes. Contextual information is obtained in a self-learning approach, by software- based agents running in each networked device, and not based on network wide orchestration. Contextual agents are in charge of computing nodes and link related costs concerning availability and centrality metrics. Contextual agents interact with DABBER via a well-defined interface: the contextual self-learning process is not an integrating part of the DABBER routing framework. The contextual agent (named Contextual Manager [UmobileD45]) installed in each device can therefore be seen as an end-user background service that seamlessly captures wireless data to characterize the affinity network (roaming patterns and peers' context over time and space) and the usage habits and data interests (internal node information) of a node. Data is captured directly via the regular MAC Layer (e.g., Wi-Fi, Bluetooth, LTE) as well as via native applications for which the user configures interests or other type of personal preferences. For instance, an application can request a one-time configuration of categories of data interests (e.g., music, food). Based on the defined interface, DABBER is able of querying the local Contextual Manager about the characteristics of neighbor nodes, based on three types of information: i) Node availability (metric A); ii) Node centrality (metric C); iii) Node similarity (metric S): o Node Availability (A) gives an estimate of the node availability based on the usage of internal resources over time and space, as well as the usage of physical resources (battery status; CPU status, etc.). o Node Centrality (C) provides awareness about the node's affinity network neighborhood context. This means that a list is kept with the following information about each neighbor: neighbour's node degree (number of nodes contacted in a predefined time window); Frequency of contacts between the neighbor and other nodes; Duration of each contact between the neighbor and other nodes; Importance of encountered nodes. The Contextual Manager keeps values for the mentioned metrics for different periods of time. Encountered nodes can be of different types, such as other mobile devices or wireless access points, for instance. Mendes, et al. Expires March 19, 2021 [Page 18] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 6.2. Integration with Wi-Fi Direct When Wi-Fi Direct is used on the MAC layer, there is a one-to-one correspondence between an OPPFace and a neighbor node (for each node detected in a Wi-Fi Direct Group, a new instance of an OPPFace is created). In this peer-to-peer scenario, OPPFaces can be used in two transmission modes: connection-oriented, in which packets are sent to a neighbor node via a reliable TCP connection over the group owner; connection-less, in which packets are sent directly to a neighbor node during the Wi-Fi direct service discovery phase. In the latter case data transmission is limited to the size of the TXT record (900 bytes for Android 5.1 and above). This type of communication is used to exchange small packets that require fast transmission (e.g. emergency apps, Chronosync status messages). The connection-less solution allows peers to exchange a short number of bytes without the establishment of a TCP socket. In the peer-to-peer scenario of Wi-Fi direct, DABBER operates as follows: routing information is shared among all members of a Wi-Fi direct group, while Interest Packets are forwarded to specific neighbors. With Dabber it is the carrier of an Interest packet that decides which of the neighbors will get a copy of the Interest packet. Hence, with the current implementation of NDN-OPP, DABBER places a copy of the Interest packet in the OPPFaces of selected neighbors. In what concerns the dissemination of routing information, it is ensured by: i) node mobility, meaning that nodes carry such information between Wi-Fi direct groups; ii) information is passed between neighbor groups via nodes that belong to more than one group. Based on the reception of notifications of Wi-Fi Direct regarding changes in the peers detected in the neighborhood, DABBER is able to update its internal peer list (Neighbor Table). If it is not currently connected to a Wi-Fi Direct Group, it performs a selection heuristic to determine which node to connect to. The motivation behind this selection process is to attempt to minimize the number of Wi-Fi Direct Groups in a certain area given that nodes can only transmit packets within the Group they are currently connected to. By defining OPPFaces implemented based on a broadcast link layer such as ad-hoc Wi-Fi, DABBER will need to create only one OPPFace in each networked device. Such OPPFace would be used to exchange packets with any neighbor node, making use of the overhearing property of the wireless medium. Since with DABBER, it is the carrier that decides which of the neighbors are entitled to get a certain Interest packet, DABBER would need to encode in the Interest packet information about the ID of the neighbors that should process the overheard Interest packet. Mendes, et al. Expires March 19, 2021 [Page 19] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 6.3. Integration with DTN By defining a new DTNFace implemented based on the bundle layer, DABBER could make use of the end-to-end protocol, block formats, and abstract service description for the exchange of messages (bundles) described in the DTN architecture. A DTNFace could provide a robust communications platform for the transmission of Data packets towards the consumer node, making usage of any available custodian nodes. The bundle protocol [RFC5050] introduces the concept of a "bundle agent" that manages the interface between applications and the "convergence layers" that provide the transport of bundles between nodes during communication opportunities. A DTNFace would extends the bundle agent aiming to control the actions of the bundle agent during communication opportunities. A new DTNFace would aim to control the reception and delivery of bundles, which are placed in a queue during the forwarding of Data packets. A DTNFace would allows the routing process to be aware of the bundles placed at the node, and allows it to inform the bundle agent about the bundles to be sent to a neighbor node. Therefore, the bundle agent implemented in a DTNFace would need to provide the following interface/functionality to the forwarding process: o Get Bundle List: Returns a list of the stored bundles and their attributes to the routing agent. o Send Bundle: Notifies the bundle agent to send a specified bundle. o Drop Bundle Advice: Advises the bundle agent that a specified bundle may be dropped by the bundle agent if appropriate. o Acked Bundle Notification: Bundle agent informs routing agent whether a bundle has been delivered to its final destination and time of delivery. 6.4. Producer Mobility As NDN uses a publish/subscribe communication model, where request resolution and data transfer are decoupled, it is especially relevant to solve the problem of data producer mobility. Supporting producer mobility requires, first of all, finding the new location of the source each time data sources move, and, second, updating the name resolution system according to the new location, in order to maintain the consistency of NDN forwarding. Mendes, et al. Expires March 19, 2021 [Page 20] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 This could be achieved by using a dissemination method to efficiently discover data sources by replicating Interest messages in an efficient way that avoids network flooding [Optimal-stopping]. With this new feature the prospective forwarders for a given Interest message are limited in number and carefully selected in terms of three criteria: o Centrality: how well connected a node is in the network. The more central a node is, the bigger the chances are to find a data source. o Reliability: the likeliness of a node does not drop messages. The more reliable a node is, the least probable is that the Interest message will be discarded. o Similarity: how alike the contacted candidate node is in terms of shared acquaintances. The less similar, the more likely is that it will find different nodes in the future. In the current version of DABBER, the degree of diffusion of Interest packets depends on the logic used to update the RIB on NFD (Increase diversity, Downward Path Criterion, Downward Path Criterion extension). It may happen that the diffusion degree could still lead to some overhead. In this case DABBER could be extended to allow nodes to select the most suitable node among all of the neighbors to forward the Interest message based on an optimal stopping approach. This strategy relies on the existence of an optimal set of stopping values such that the nth discoverer node for a certain Interest message is the first contacted node which is the best of all the previously explored nodes, if the node has contacted the first stopping value. If this node is not found, then it will be the first node which is the second best of all the previous nodes, if the node has contacted the second stopping value, and so on. Otherwise, if these nodes are not found, then, the nth discoverer node will be the last nth node before reaching the last contacted node. This makes the dissemination of the Interest messages in Mobile NDNs efficient, even, and pervasive all over the network, increasing the delivery ratio while decreasing the network overhead. 7. Security Considerations DABBER follows the CCN/NDN security framework built on public-key cryptography, allows it to secure the exchange of routing messages, by being able of verifying the authenticity of routing messages. Moreover, DABBER ensures the right level of privacy of the involved entities, who provide local information to support routing decisions. Mendes, et al. Expires March 19, 2021 [Page 21] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 Routing security can be achieved not only by signing routing messages, but also by allowing the usage of multiple paths, as done by DABBER: when an anomaly is detected routers can retrieve the data through alternative paths. Besides the presented security and privacy considerations, the issue of Denial of Service (DoS) needs to be properly addressed. An example is when a malicious user sends a high rate of broadcast messages aiming to exhaust available forwarding resources. The remainder of this section provides initial insights about the methods used by DABBER to ensure the authenticity, confidentiality of the routing message exchange as well as the privacy of the involved entities. 7.1. Authenticity DABBER routing messages are carried in Data packets containing a signature. Hence, a DABBER device can verify the signature of each routing message to ensure that it was generated by the claimed origin node and was not tampered with during dissemination. For this purpose, DABBER makes use of a hierarchical trust model for routing to verify the keys used to sign the routing messages. DABBER can model a trust management as a five-level hierarchy, although reflecting a different administrative structure: represents the authority responsible by the international transit network allowing roaming services; represents the operator providing the mobile service; represents the network site of the mobile operator where the node is registered; represents the mobile equipment. Each node can create a DABBER process that produces LSAs. Since keys must be retrieved in order to verify routing updates, DABBER allows each node to retrieve keys from its neighbors. This means that a DABBER node will use the Interest/Data exchange process to gather keys from all its direct neighbors. Upon the reception of an Interest of the type //broadcast/KEYS each neighbor looks up the requested keys in their local key storage and returns the key if it is found. In case a neighbor does not have the requested key, the neighbor can further query its neighbors for such key. The used key retrieval process makes use of a broadcast forwarding strategy, stopping at nodes who either own or cache the requested keys. 7.2. Confidentiality Although being deployed under the control of an operator, DABBER allows its network to be extended beyond the reach of its infrastructure network, into scenarios where wireless communications Mendes, et al. Expires March 19, 2021 [Page 22] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 between involved DABBER devices/router may be spoofed. Hence, DABBER requires routing data confidentiality to ensure the setup of a secure communication topology. DABBER basic approach relies on the usage of encryption to protect the confidentiality of routing messages. By taking advantage of the semantically meaningful names DABBER relies on approaches such as Named-based Access Control (NAC) [NAC]. NAC provides content confidentiality and access control based on a combination of symmetric and asymmetric cryptography algorithms, while using NDN's data-centric security and naming convention to automate data access control. Being implemented in wireless devices that may energy constraint, it will be important to verify the efficiency of the cryptographic solution, namely since the generation of asymmetric key pairs as well as the symmetric and asymmetric encryption/decryption operations may be expensive in terms of the usage of resources. 7.3. Privacy In DABBER, forwarding decisions are taken into account using different metrics such as centrality and similarity. While these metrics may be efficient in terms of node selection, they can breach privacy of network users carrying networked devices by inferring social related information such as position inside groups, as well as information about the devices themselves. If exchanged as clear text, the information carried in routing metrics may potentially compromise the privacy of users. A way of preserving the privacy of the users in DABBER could pass by using homomorphic encryption for information-centric wireless Ad Hoc Networks. With homomorphic encryption forwarding decisions are made by performing calculations on encrypted forwarding metric values without decrypting them first, while maintaining low overhead and delays. As a result, forwarding decisions can be taken preserving the user's privacy. For these purposes, homomorphic encryption is extremely useful. This cryptographic scheme allows computations on ciphertexts and generates encrypted results that, when decrypted, match the results of the operations as if they had been performed on plaintexts. Mendes, et al. Expires March 19, 2021 [Page 23] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 8. IANA Considerations This document has no actions for IANA. 9. Acknowledgments The research leading to these results received funding from the European Union (EU) Horizon 2020 research and innovation programmer under grant agreement No 645124(Action full title: Universal, mobile- centric and opportunistic communications architecture, Action Acronym: UMOBILE). 10. References 10.1. Normative References [DABBER18] Mendes, P., Sofia, R., Soares, J., Tsaoussidis, V., and S. Diamantopoulos, "Information-centric Routing for Opportunistic Wireless Networks", in Proc. of ACM Information Centric Networking , September 2018. [DABBER18-1] DABBER Development Team, "DABBER Source Code", https://github.com/COPELABS-SITI/ndn-opp/tree/dabber , September 2020. [DABBER18-2] DABBER Development Team, "DABBER Android", https://play.google.com/store/apps/ details?id=pt.ulusofona.copelabs.ndn , September 2020. [NDN-OPP] Tavares, M. and P. Mendes, "NDN-Opp: Named-Data Networking in Opportunistic Networks", Technical Report COPE-SITI-TR- 18-01 , January 2018. [NFD] A. Afanasyev, et al, "NFD Developer's Guide", NDN Technical Report NDN-001 , October 2010. 10.2. Informative References [ChronoSync] Zhu, Z. and A. Afanasyev, "Lets ChronoSync:Decentralized Dataset State Synchronization in Named Data Networking", in Proc. IEEE ICNP , October 2013. Mendes, et al. Expires March 19, 2021 [Page 24] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 [Dlife] Moreira, W., Mendes, P., and S. Sargento, "Opportunistic Routing based on daily routines", in Proc. of IEEE WoWMoM workshop on autonomic and opportunistic communications, San Francisco, USA , June 2012. [Dlife-draft] Moreira, W., Mendes, P., and E. Cerqueira, "Opportunistic Routing based on Users Daily Life Routine", IETF Internet Draft (draft-moreira-dlife-04) , May 2014. [NAC] Z. Zhang, et al, "NAC: Automating Access Control via Named Data", in IEEE MILCOM , October 2018. [NDN-emergency] Tavares, M., Aponte, O., and P. Mendes, "Named-data Emergency Network Services", in ACM MOBISYS, Munich, Germany , June 2018. [NDN-OPP-Android] NDN-OPP Development Team, "NDN-OPP Android", https://github.com/COPELABS-SITI/ndn-opp , September 2020. [NDN-opportunisticnets] Dynerowicz, S. and P. Mendes, "Named-Data Networking in Opportunistic Networks", ACM ICN, Berlin, Germany , September 2017. [OI] Lopes, L., C. Sofia, R., Mendes, P., and W. Moreira, "Oi! Opportunistic Data Transmission Based on Wi-Fi Direct", in Proc. of IEEE INFOCOM , April 2016. [Optimal-stopping] Borrego, C., Amado, M., Molinaro, A., Mendes, P., C. Sofia, R., Magaia, N., and J. Borrel, "Forwarding in Opportunistic Information-Centric Networks: An Optimal Stopping Approach", IEEE Communications Magazine, 58(5), 56-61 , 2020. [PartialSync] Zhang, M., Lehman, V., and L. Wang, "PartialSync:Efficient Synchronization of a Partial Namespace in NDN", NDN Technical Report NDN-0039 , June 2016. [RFC4838] Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R., Scott, K., Fall, K., and H. Weiss, "Delay-Tolerant Networking Architecture", RFC 4838, DOI 10.17487/RFC4838, April 2007, . Mendes, et al. Expires March 19, 2021 [Page 25] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 [RFC5050] Scott, K. and S. Burleigh, "Bundle Protocol Specification", RFC 5050, DOI 10.17487/RFC5050, November 2007, . [RFC7476] Pentikousis, K., Ed., Ohlman, B., Corujo, D., Boggia, G., Tyson, G., Davies, E., Molinaro, A., and S. Eum, "Information-Centric Networking: Baseline Scenarios", RFC 7476, DOI 10.17487/RFC7476, March 2015, . [Scorp] Moreira, W., Mendes, P., and S. Sargento, "Social-aware Opportunistic Routing Protocol based on User's Interactions and Interests", in Proc. of AdhocNets, Barcelona, Spain , October 2013. [Umobile] C. Sarros, et al, "Connecting the Edges: A Universal, Mobile centric and Opportunistic Communications Architecture", IEEE Communication Magazine , February 2018. [UmobileD45] R. Sofia, et al, "UMOBILE D45 - Report on Data Collection and Inference Models", Umobile Technical Report , September 2018. Authors' Addresses Paulo Mendes (editor) Airbus Willy-Messerschmitt Strasse 1 Munich 81663 Germany Email: paulo.mendes@airbus.com URI: http://www.paulomilheiromendes.com Rute C. Sofia fortiss GmbH Guerickestrasse 25 Munich 80805 Germany Email: sofia@fortiss.org URI: http://www.rutesofia.com Mendes, et al. Expires March 19, 2021 [Page 26] Internet-Draft draft-mendes-icnrg-dabber-05 September 2020 Vassilis Tsaoussidis Democritus University of Thrace University Campus Komotini 69100 Greece Email: vtsaousi@ee.duth.gr Carlos Borrego Autonomous University of Barcelona Department of Information and Communications Engineering Bellaterra 08193 Spain Email: carlos.borrego@uab.cat Mendes, et al. Expires March 19, 2021 [Page 27]