| rfc8884xml2.original.xml | rfc8884.xml | |||
|---|---|---|---|---|
| <?xml version='1.0' encoding='utf-8'?> | ||||
| <!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent"> | ||||
| <rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="info" | ||||
| docName="draft-irtf-icnrg-disaster-10" ipr="trust200902" obsoletes="" | ||||
| updates="" submissionType="IRTF" xml:lang="en" tocInclude="true" | ||||
| symRefs="true" sortRefs="true" version="3" number="8884" consensus="true"> | ||||
| <front> | ||||
| <title abbrev="ICN in Disaster Scenarios">Research Directions for Using | ||||
| Information-Centric Networking (ICN) in Disaster Scenarios</title> | ||||
| <seriesInfo name="RFC" value="8884"/> | ||||
| <author fullname="Jan Seedorf" initials="J." surname="Seedorf"> | ||||
| <organization abbrev="HFT Stuttgart - Univ. of Applied Sciences">HFT | ||||
| Stuttgart - Univ. of Applied Sciences</organization> | ||||
| <address> | ||||
| <postal> | ||||
| <street>Schellingstrasse 24</street> | ||||
| <code>70174</code> | ||||
| <city>Stuttgart</city> | ||||
| <country>Germany</country> | ||||
| </postal> | ||||
| <phone>+49 711 8926 2801</phone> | ||||
| <email>jan.seedorf@hft-stuttgart.de</email> | ||||
| </address> | ||||
| </author> | ||||
| <author fullname="Mayutan Arumaithurai" initials="M." surname="Arumaithurai" | ||||
| > | ||||
| <organization>University of Göttingen | ||||
| </organization> | ||||
| <address> | ||||
| <postal> | ||||
| <street>Goldschmidt Str. 7</street> | ||||
| <code>37077</code> | ||||
| <city>Göttingen | ||||
| </city> | ||||
| <country>Germany</country> | ||||
| </postal> | ||||
| <phone>+49 551 39 172046</phone> | ||||
| <email>arumaithurai@informatik.uni-goettingen.de</email> | ||||
| </address> | ||||
| </author> | ||||
| <author initials="A." surname="Tagami" fullname="Atsushi Tagami"> | ||||
| <organization>KDDI Research Inc.</organization> | ||||
| <address> | ||||
| <postal> | ||||
| <street>2-1-15 Ohara, Fujimino</street> | ||||
| <code>356-85025</code> | ||||
| <region>Saitama</region> | ||||
| <country>Japan</country> | ||||
| </postal> | ||||
| <phone>+81 49 278 73651</phone> | ||||
| <email>tagami@kddi-research.jp</email> | ||||
| </address> | ||||
| </author> | ||||
| <author initials="K." surname="Ramakrishnan" fullname="K. K. Ramakrishnan"> | ||||
| <organization>University of California</organization> | ||||
| <address> | ||||
| <postal> | ||||
| <street/> | ||||
| <city>Riverside</city> | ||||
| <code>CA</code> | ||||
| <country>United States of America</country> | ||||
| </postal> | ||||
| <email>kkrama@ucr.edu</email> | ||||
| </address> | ||||
| </author> | ||||
| <author initials="N." surname="Blefari Melazzi" fullname="Nicola Blefari Mel | ||||
| azzi"> | ||||
| <organization>University Tor Vergata</organization> | ||||
| <address> | ||||
| <postal> | ||||
| <street>Via del Politecnico, 1</street> | ||||
| <city>Roma</city> | ||||
| <code>00133</code> | ||||
| <country>Italy</country> | ||||
| </postal> | ||||
| <phone>+39 06 7259 7501</phone> | ||||
| <email>blefari@uniroma2.it</email> | ||||
| </address> | ||||
| </author> | ||||
| <date month="October" year="2020"/> | ||||
| <area>IRTF</area> | ||||
| <workgroup>Information-Centric Networking</workgroup> | ||||
| <keyword>ICN</keyword> | ||||
| <abstract> | ||||
| <t>Information-Centric Networking (ICN) is a new paradigm where the | ||||
| network provides users with named content instead of communication | ||||
| channels between hosts. This document outlines some research directions | ||||
| for ICN with respect to applying ICN | ||||
| approaches for coping with natural or human-generated, large-scale | ||||
| disasters. This document is a product of the Information-Centric | ||||
| Networking Research Group (ICNRG). | ||||
| </t> | ||||
| </abstract> | ||||
| </front> | ||||
| <middle> | ||||
| <section numbered="true" toc="default"> | ||||
| <name>Introduction</name> | ||||
| <t>This document summarizes some research challenges for coping with | ||||
| natural or human-generated, large-scale disasters. In particular, the | ||||
| document discusses potential research directions for applying | ||||
| Information-Centric Networking (ICN) to address these challenges. | ||||
| </t> | ||||
| <t> | ||||
| Research and standardization approaches exist (for instance, see the work | ||||
| and discussions in the concluded IRTF DTN Research Group <xref | ||||
| target="dtnrg" format="default"/> and in the IETF DTN Working Group <xref | ||||
| target="dtnwg" format="default"/>). In addition, a published Experimental | ||||
| RFC in the IRTF Stream <xref target="RFC5050" format="default"/> discusses | ||||
| Delay-Tolerant Networking (DTN), which is a key necessity for communicating | ||||
| in the disaster scenarios we are considering in this | ||||
| document. 'Disconnection tolerance' can thus be achieved with these | ||||
| existing DTN approaches. | ||||
| However, while these approaches can provide independence from an existing | ||||
| communication infrastructure (which indeed may not work anymore after a | ||||
| disaster has happened), ICN offers key concepts, such as new naming schemes | ||||
| and innovative multicast communication, which together enable many essential | ||||
| (publish/subscribe-based) use cases for communication after a disaster (e.g., | ||||
| message prioritization, one-to-many delivery of messages, group communication | ||||
| among rescue teams, and the use cases discussed in <xref target="usecases" | ||||
| format="default"/>). One could add such features to existing DTN protocols and | ||||
| solutions; however, in this document, we explore the use of ICN as a starting | ||||
| point for building a communication architecture that supports (somewhat | ||||
| limited) communication capabilities after a disaster. We discuss the | ||||
| relationship between the ICN approaches (for enabling communication after a | ||||
| disaster) discussed in this document with existing work from the DTN community | ||||
| in more depth in <xref target="researchgap" format="default"/>.</t> | ||||
| <t>'Emergency Support and Disaster Recovery' is also listed among the | ||||
| ICN Baseline Scenarios in <xref target="RFC7476" format="default"/> as a | ||||
| potential scenario that 'can be used as a base for the evaluation of | ||||
| different ICN approaches so that they | ||||
| can be tested and compared against each other while showcasing their own | ||||
| advantages' <xref target="RFC7476" format="default"/> . In this regard, | ||||
| this document complements <xref target="RFC7476" format="default"/> by | ||||
| investigating the use of ICN approaches for 'Emergency Support and | ||||
| Disaster Recovery' in depth and discussing the relationship to existing | ||||
| work in the DTN community. | ||||
| </t> | ||||
| <t>This document focuses on ICN-based approaches that can enable | ||||
| communication after a disaster. These approaches reside mostly on the | ||||
| network layer. Other solutions for 'Emergency Support and Disaster | ||||
| Recovery' (e.g., on the application layer) may complement the ICN-based | ||||
| networking approaches discussed in this document and expand the solution | ||||
| space for enabling communications among users after a disaster. In fact, | ||||
| addressing the use cases explored in this document would require | ||||
| corresponding applications that would exploit the discussed ICN benefits | ||||
| on the network layer for users. However, the discussion of | ||||
| applications or solutions outside of the network layer are outside | ||||
| the scope of this document. | ||||
| </t> | ||||
| <t>This document represents the consensus of the Information-Centric | ||||
| Networking Research Group (ICNRG); it is not an IETF product and it does | ||||
| not define a standard. It has been reviewed extensively by the ICN | ||||
| Research Group (RG) members active in the specific areas of work covered | ||||
| by the document. | ||||
| </t> | ||||
| <t><xref target="disaster" format="default"/> gives some examples of | ||||
| what can be considered a large-scale disaster and what the effects of | ||||
| such disasters on communication networks are. <xref target="whyicn" | ||||
| format="default"/> outlines why ICN can be beneficial in such scenarios | ||||
| and provides a high-level overview on corresponding research | ||||
| challenges. <xref target="usecases" format="default"/> describes some | ||||
| concrete use cases and requirements for disaster scenarios. In <xref | ||||
| target="solutions" format="default"/>, some concrete ICN-based solutions | ||||
| approaches are outlined. | ||||
| </t> | ||||
| </section> | ||||
| <section anchor="disaster" numbered="true" toc="default"> | ||||
| <name>Disaster Scenarios</name> | ||||
| <t>An enormous earthquake hit Northeastern Japan (Tohoku areas) on March | ||||
| 11, 2011 and caused extensive damages, including blackouts, fires, | ||||
| tsunamis, and a nuclear crisis. The lack of information and means of | ||||
| communication caused the isolation of several Japanese cities. This | ||||
| impacted the safety and well-being of residents and affected rescue | ||||
| work, evacuation activities, and the supply chain for food and other | ||||
| essential items. Even in the Tokyo area, which is 300 km away from the | ||||
| Tohoku area, more than 100,000 people became 'returner refugees' who | ||||
| could not reach their homes because they had no means of public | ||||
| transportation (the Japanese government has estimated that more than 6.5 | ||||
| million people would become returner refugees if such a catastrophic | ||||
| disaster were to hit the Tokyo area). | ||||
| </t> | ||||
| <t>That earthquake in Japan also showed that the current network is | ||||
| vulnerable to disasters. Mobile phones have become the lifelines for | ||||
| communication, including safety confirmation. Besides (emergency) phone | ||||
| calls, services in mobile networks commonly being used after a disaster | ||||
| include network disaster SMS notifications (or SMS 'Cell Broadcast' | ||||
| <xref target="cellbroadcast" format="default"/>), available in most | ||||
| cellular networks. The aftermath of a disaster puts a high strain on | ||||
| available resources due to the need for communication by | ||||
| everyone. Authorities, such as the president or prime minister, local | ||||
| authorities, police, fire brigades, and rescue and medical personnel, | ||||
| would like to inform the citizens of possible shelters, food, or even of | ||||
| impending danger. Relatives would like to communicate with each other | ||||
| and be informed about their well-being. Affected citizens would like to | ||||
| make inquiries about food distribution centers and shelters or report trap | ||||
| ped | ||||
| and missing people to the authorities. Moreover, damage to communication | ||||
| equipment, in addition to the already existing heavy demand for | ||||
| communication, highlights the issue of fault tolerance and energy | ||||
| efficiency. | ||||
| </t> | ||||
| <t>Additionally, disasters caused by humans (i.e., disasters that are caus | ||||
| ed deliberately | ||||
| and willfully and have the element of human intent such as a terrorist att | ||||
| ack) | ||||
| may need to be considered. In such cases, the | ||||
| perpetrators could be actively harming the network by launching a | ||||
| denial-of-service attack or by monitoring the network passively to | ||||
| obtain information exchanged, even after the main disaster itself has | ||||
| taken place. Unlike some natural disasters that are | ||||
| predictable to a small extent using weather forecasting technologies, may | ||||
| have a slower | ||||
| onset, and occur in known geographical regions and seasons, terrorist | ||||
| attacks almost always occur suddenly without any advance | ||||
| warning. Nevertheless, there exist many commonalities between natural | ||||
| and human-induced disasters, particularly relating to response and | ||||
| recovery, communication, search and rescue, and coordination of | ||||
| volunteers. | ||||
| </t> | ||||
| <t> The timely dissemination of information generated and requested by | ||||
| all the affected parties during and in the immediate aftermath of a | ||||
| disaster is difficult to provide within the current context of global | ||||
| information aggregators (such as Google, Yahoo, Bing, etc.) that need to | ||||
| index the vast amounts of specialized information related to the | ||||
| disaster. Specialized coverage of the situation and timely dissemination | ||||
| are key to successfully managing disaster situations. We believe that | ||||
| network infrastructure capabilities provided by Information-Centric | ||||
| Networks can be suitable, in conjunction with application and middleware | ||||
| assistance. | ||||
| </t> | ||||
| </section> | ||||
| <section anchor="whyicn" numbered="true" toc="default"> | ||||
| <name>Research Challenges and Benefits of ICN</name> | ||||
| <section anchor="challenges" numbered="true" toc="default"> | ||||
| <name>High-Level Research Challenges</name> | ||||
| <t>Given a disaster scenario as described in <xref target="disaster" | ||||
| format="default"/>, on a high level, one can derive the following | ||||
| (incomplete) list of corresponding technical challenges: | ||||
| </t> | ||||
| <dl newline="true" spacing="normal"> | ||||
| <dt>Enabling usage of functional parts of the infrastructure, even | ||||
| when these are disconnected from the rest of the network:</dt> | ||||
| <dd>Assuming | ||||
| that parts of the network infrastructure (i.e., cables/links, | ||||
| routers, mobile bases stations, etc.) are functional after a disaster | ||||
| has taken place, it is desirable to be able to continue using such | ||||
| components for communication as much as possible. This is | ||||
| challenging when these components are disconnected from the | ||||
| backhaul, thus forming fragmented networks. This is especially true | ||||
| for today's mobile networks, which are comprised of a centralized | ||||
| architecture, mandating connectivity to central entities (which are | ||||
| located in the core of the mobile network) for communication. But | ||||
| also in fixed networks, access to a name resolution service is often | ||||
| necessary to access some given content.</dd> | ||||
| <dt>Decentralized authentication, content integrity, and trust:</dt> | ||||
| <dd>In | ||||
| mobile networks, users are authenticated via central entities. While | ||||
| special services important in a disaster scenario exist and may work | ||||
| without authentication (such as SMS 'Cell Broadcast' <xref | ||||
| target="cellbroadcast" format="default"/> or emergency calls), | ||||
| user-to-user (or user-to-authorities) communication is normally not | ||||
| possible without being authenticated via a central entity in the | ||||
| network. In order to communicate in fragmented or disconnected parts | ||||
| of a mobile network, the challenge of decentralizing user | ||||
| authentication arises. Independently of the network being fixed or | ||||
| mobile, data origin authentication and verifying the correctness of | ||||
| content retrieved from the network may be challenging when being | ||||
| 'offline' (e.g., potentially disconnected from content publishers as | ||||
| well as from servers of a security infrastructure, which can provide | ||||
| missing certificates in a certificate chain or up-to-date | ||||
| information on revoked keys/certificates). As the network suddenly | ||||
| becomes fragmented or partitioned, trust models may shift | ||||
| accordingly to the change in authentication infrastructure being | ||||
| used (e.g., one may switch from a PKI to a web-of-trust model, such | ||||
| as Pretty Good Privacy (PGP)). Note that blockchain-based approaches ar | ||||
| e, in most cases, | ||||
| likely not suitable for the disaster scenarios considered in this | ||||
| document, as the communication capabilities needed to find consensus | ||||
| for a new block as well as for retrieving blocks at nodes | ||||
| will presumably not be available (or too excessive for the remaining | ||||
| infrastructure) after a disaster.</dd > | ||||
| <dt>Delivering/obtaining information and traffic prioritization in | ||||
| congested networks: </dt> | ||||
| <dd>Due to broken cables, failed routers, etc., it | ||||
| is likely that the communication network has | ||||
| much less overall capacity for handling traffic in a disaster scenario. | ||||
| Thus, significant | ||||
| congestion can be expected in parts of the infrastructure. It is | ||||
| therefore a challenge to guarantee message delivery in such a | ||||
| scenario. This is even more important because, in the case of a disaste | ||||
| r | ||||
| aftermath, it may be crucial to deliver certain information to | ||||
| recipients (e.g., warnings to citizens) with higher priority than | ||||
| other content.</dd> | ||||
| <dt>Delay/disruption-tolerant approach:</dt> | ||||
| <dd>Fragmented networks make it | ||||
| difficult to support direct end-to-end communication with small or | ||||
| no delay. However, communication in general and especially during a | ||||
| disaster can often tolerate some form of delay. For example, in order t | ||||
| o | ||||
| know if someone's relatives are safe or not, a corresponding | ||||
| emergency message need not necessarily be supported in an end-to-end | ||||
| manner but would also be helpful to the human recipient if it can | ||||
| be transported in a hop-by-hop fashion with some delay. For these | ||||
| kinds of use cases, it is sufficient to improve communication | ||||
| resilience in order to deliver such important messages. </dd> | ||||
| <dt>Energy efficiency:</dt> | ||||
| <dd>Long-lasting power outages may lead to | ||||
| batteries of communication devices running out, so designing | ||||
| energy-efficient solutions is very important in order to maintain a | ||||
| usable communication infrastructure.</dd> | ||||
| <dt>Contextuality:</dt> | ||||
| <dd>Like any communication in general, disaster | ||||
| scenarios are inherently contextual. Aspects of geography, the | ||||
| people affected, the rescue communities involved, the languages | ||||
| being used, and many other contextual aspects are highly relevant for | ||||
| an efficient realization of any rescue effort and, with it, the | ||||
| realization of the required communication.</dd> | ||||
| </dl> | ||||
| </section> | ||||
| <section anchor="howicncanhelp" numbered="true" toc="default"> | ||||
| <name>How ICN Can be Beneficial</name> | ||||
| <t>Several aspects of ICN make related approaches attractive | ||||
| candidates for addressing the challenges described in <xref | ||||
| target="challenges" format="default"/>. Below is an (incomplete) list | ||||
| of considerations why ICN approaches can be beneficial to address | ||||
| these challenges:</t> | ||||
| <dl newline="true" spacing="normal"> | ||||
| <dt>Routing-by-name:</dt> | ||||
| <dd>ICN protocols natively route by named data | ||||
| objects and can identify objects by names, effectively moving the | ||||
| process of name resolution from the application layer to the network | ||||
| layer. This functionality is very handy in a fragmented network | ||||
| where reference to location-based, fixed addresses may not work as a | ||||
| consequence of disruptions. For instance, name resolution with ICN | ||||
| does not necessarily rely on the reachability of application-layer | ||||
| servers (e.g., DNS resolvers). In highly decentralized scenarios | ||||
| (e.g., in infrastructureless, opportunistic environments), the ICN | ||||
| routing-by-name paradigm effectively may lead to a | ||||
| 'replication-by-name' approach, where content is replicated | ||||
| depending on its name.</dd> | ||||
| <dt>Integrity and authentication of named data objects:</dt> | ||||
| <dd>ICN is built | ||||
| around the concept of named data objects. Several proposals exist | ||||
| for integrating the concept of 'self-certifying data' into a naming | ||||
| scheme (e.g., see <xref target="RFC6920" format="default"/>). With | ||||
| such approaches, object integrity of data retrieved from the network | ||||
| can be verified without relying on a trusted third party or PKI. | ||||
| In addition, given that the correct object name is known, such schemes can | ||||
| also provide data origin authentication (for instance, see the usage example | ||||
| in <xref target="RFC6920" sectionFormat="of" section="8.3"/>). | ||||
| </dd> | ||||
| <dt>Content-based access control:</dt> | ||||
| <dd> | ||||
| ICN promotes a data-centric communication model that naturally | ||||
| supports content-based security (e.g., allowing access to content | ||||
| only to a specific user or class of users). In fact, in ICN, it is | ||||
| the content itself that is secured (encrypted), if desired, rather tha | ||||
| n the | ||||
| communication channel. This functionality could facilitate trusted | ||||
| communications among peer users in isolated areas of the network | ||||
| where a direct communication channel may not always or continuously | ||||
| exist.</dd> | ||||
| <dt>Caching:</dt> | ||||
| <dd>Caching content along a delivery path is an inherent | ||||
| concept in ICN. Caching helps in handling huge amounts of traffic | ||||
| and can help to avoid congestion in the network (e.g., congestion in | ||||
| backhaul links can be avoided by delivering content from caches at | ||||
| access nodes).</dd> | ||||
| <dt>Sessionless:</dt> | ||||
| <dd>ICN does not require full end-to-end | ||||
| connectivity. This feature facilitates a seamless aggregation | ||||
| between a normal network and a fragmented network, which needs | ||||
| DTN-like message forwarding.</dd> | ||||
| <dt>Potential to run traditional IP-based services (IP-over-ICN):</dt> | ||||
| <dd>While ICN and DTN promote the development of novel applications tha | ||||
| t | ||||
| fully utilize the new capabilities of the ICN/DTN network, work in | ||||
| <xref target="Trossen2015" format="default"/> has shown that an | ||||
| ICN-enabled network can transport IP-based services, either directly | ||||
| at IP or even at HTTP level. With this, IP- and ICN/DTN-based | ||||
| services can coexist, providing the necessary support of legacy | ||||
| applications to affected users while reaping any benefits from the | ||||
| native support for ICN in future applications.</dd> | ||||
| <dt>Opportunities for traffic engineering and traffic | ||||
| prioritization:</dt> | ||||
| <dd>ICN provides the possibility to perform traffic | ||||
| engineering based on the name of desired content. This enables | ||||
| priority-based replication depending on the scope of a given message | ||||
| <xref target="Psaras2014" format="default"/>. In addition, as <xref | ||||
| target="Trossen2015" format="default"/>, among others, have pointed | ||||
| out, the realization of ICN services and particularly of IP-based | ||||
| services on top of ICN provide further traffic engineering | ||||
| opportunities. The latter not only relate to the utilization of | ||||
| cached content, as outlined before, but to the ability to flexibly | ||||
| adapt to route changes (important in unreliable infrastructure, such | ||||
| as in disaster scenarios), mobility support without anchor points | ||||
| (again, important when parts of the infrastructure are likely to | ||||
| fail), and the inherent support for multicast and multihoming | ||||
| delivery.</dd> | ||||
| </dl> | ||||
| </section> | ||||
| <section anchor="researchgap" numbered="true" toc="default"> | ||||
| <name>ICN as Starting Point vs. Existing DTN Solutions</name> | ||||
| <t>There has been quite some work in the DTN (Delay-Tolerant | ||||
| Networking) community on disaster communication (for instance, see | ||||
| the work and discussions in the concluded IRTF DTN Research | ||||
| Group <xref target="dtnrg" format="default"/> and in the IETF DTN | ||||
| Working Group <xref target="dtnwg" format="default"/>). However, most | ||||
| DTN work lacks important features, such as publish/subscribe (pub/sub) | ||||
| capabilities, caching, multicast delivery, and message prioritization | ||||
| based on content types, which are needed in the disaster scenarios we | ||||
| consider. One could add such features to existing DTN protocols and | ||||
| solutions, and indeed individual proposals for adding such features to | ||||
| DTN protocols have been made (e.g., <xref target="Greifenberg2008" | ||||
| format="default"/> and <xref target="Yoneki2007" format="default"/> | ||||
| propose the use of a pub/sub-based multicast distribution | ||||
| infrastructure for DTN-based opportunistic networking | ||||
| environments).</t> | ||||
| <t>However, arguably ICN -- having these intrinsic properties (as also | ||||
| outlined above) -- makes a better starting point for building a | ||||
| communication architecture that works well before and after a | ||||
| disaster. For a disaster-enhanced ICN system, this would imply the | ||||
| following advantages: a) ICN data mules would have built-in caches and | ||||
| can thus return content for interests straight on, b) requests do not | ||||
| necessarily need to be routed to a source (as with existing DTN | ||||
| protocols), instead any data mule or end user can in principle respond | ||||
| to an interest, c) built-in multicast delivery implies | ||||
| energy-efficient, large-scale spreading of important information that | ||||
| is crucial in disaster scenarios, and d) pub/sub extension for popular | ||||
| ICN implementations exist <xref target="COPSS2011" format="default"/>, | ||||
| which are very suitable for efficient group communication in disasters | ||||
| and provide better reliability, timeliness, and scalability, as compared | ||||
| to existing pub/sub approaches in DTN <xref target="Greifenberg2008" | ||||
| format="default"/> <xref target="Yoneki2007" format="default"/> .</t> | ||||
| <t>Finally, most DTN routing algorithms have been solely designed for | ||||
| particular DTN scenarios. By extending ICN approaches for DTN-like | ||||
| scenarios, one ensures that a solution works in regular | ||||
| (i.e., well-connected) settings just as well (which can be important in | ||||
| reality, where a routing algorithm should work before and after a | ||||
| disaster). It is thus reasonable to start with existing ICN approaches | ||||
| and extend them with the necessary features needed in disaster | ||||
| scenarios. In any case, solutions for disaster scenarios need a | ||||
| combination of ICN-features and DTN-capabilities.</t> | ||||
| </section> | ||||
| </section> | ||||
| <section anchor="usecases" numbered="true" toc="default"> | ||||
| <name>Use Cases and Requirements</name> | ||||
| <t>This section describes some use cases for the aforementioned disaster | ||||
| scenario (as outlined in <xref target="disaster" format="default"/>) and | ||||
| discusses the corresponding technical requirements for enabling these | ||||
| use cases.</t> | ||||
| <dl newline="true" spacing="normal"> | ||||
| <dt>Delivering Messages to Relatives/Friends:</dt> | ||||
| <dd><t>After a disaster | ||||
| strikes, citizens want to confirm to each other that they are | ||||
| safe. For instance, shortly after a large disaster (e.g., an earthquake | ||||
| or a tornado), people have moved to different refugee shelters. The mobi | ||||
| le | ||||
| network is not fully recovered and is fragmented, but some base | ||||
| stations are functional. This use case imposes the following | ||||
| high-level requirements: a) people must be able to communicate with | ||||
| others in the same network fragment and b) people must be able to | ||||
| communicate with others that are located in different fragmented parts | ||||
| of the overall network. More concretely, the following requirements | ||||
| are needed to enable the use case: a) a mechanism for a scalable | ||||
| message forwarding scheme that dynamically adapts to changing | ||||
| conditions in disconnected networks, b) DTN-like mechanisms for | ||||
| getting information from one disconnected island to another disconnected | ||||
| island, c) source authentication and content integrity so that users | ||||
| can confirm that the messages they receive are indeed from their | ||||
| relatives or friends and have not been tampered with, and d) the | ||||
| support for contextual caching in order to provide the right | ||||
| information to the right set of affected people in the most efficient | ||||
| manner.</t></dd> | ||||
| <dt>Spreading Crucial Information to Citizens:</dt> | ||||
| <dd>State authorities want | ||||
| to be able to convey important information (e.g., warnings or | ||||
| information on where to go or how to behave) to citizens. These kinds | ||||
| of information shall reach as many citizens as possible, i.e., crucial | ||||
| content from legal authorities shall potentially reach all users in | ||||
| time. The technical requirements that can be derived from this use | ||||
| case are a) source authentication and content integrity, such that | ||||
| citizens can confirm the correctness and authenticity of messages sent | ||||
| by authorities, b) mechanisms that guarantee the timeliness and | ||||
| loss-free delivery of such information, which may include techniques | ||||
| for prioritizing certain messages in the network depending on who sent | ||||
| them, and c) DTN-like mechanisms for getting information from | ||||
| disconnected island to another disconnected island.</dd> | ||||
| </dl> | ||||
| <t>It can be observed that different key use cases for disaster | ||||
| scenarios imply overlapping and similar technical requirements for | ||||
| fulfilling them. As discussed in <xref target="howicncanhelp" | ||||
| format="default"/>, ICN approaches are envisioned to be very suitable | ||||
| for addressing these requirements with actual technical solutions. In | ||||
| <xref target="Robitzsch2015" format="default"/>, a more elaborate set of | ||||
| requirements is provided that addresses, among disaster scenarios, a | ||||
| communication infrastructure for communities facing several geographic, | ||||
| economic, and political challenges.</t> | ||||
| </section> | ||||
| <section anchor="solutions" numbered="true" toc="default"> | ||||
| <name>ICN-Based Research Approaches and Open Research Challenges</name> | ||||
| <t>This section outlines some ICN-based research approaches that aim at | ||||
| fulfilling the previously mentioned use cases and requirements (<xref | ||||
| target="suggested" format="default"/>). Most of these works provide | ||||
| proof-of-concept type solutions, addressing singular challenges. Thus, | ||||
| several open issues remain, which are summarized in <xref target="open" | ||||
| format="default"/>.</t> | ||||
| <section anchor="suggested" numbered="true" toc="default"> | ||||
| <name>Suggested ICN-Based Research Approaches</name> | ||||
| <t>The research community has investigated ICN-based solutions to | ||||
| address the aforementioned challenges in disaster scenarios. Overall, | ||||
| the focus is on delivery of messages and not real-time | ||||
| communication. | ||||
| While most users would probably like to conduct real-time voice/video | ||||
| calls after a disaster, in the extreme scenario we consider (with | ||||
| users being scattered over different fragmented networks as can be the | ||||
| case in the scenarios described in <xref target="disaster" | ||||
| format="default"/>), somewhat delayed message delivery appears to be | ||||
| inevitable, and full-duplex real-time communication seems infeasible | ||||
| to achieve (unless users are in close proximity). | ||||
| Thus, the assumption is that -- for a certain amount of time at least | ||||
| (i.e., the initial period until the regular communication | ||||
| infrastructure has been repaired) -- users would need to live with | ||||
| message delivery and publish/subscribe services but without real-time | ||||
| communication. Note, however, that a) in principle, ICN can support | ||||
| Voice over IP (VoIP) calls; thus, if users are in close proximity, | ||||
| (duplex) voice communication via ICN is possible <xref | ||||
| target="Gusev2015" format="default"/>, and b) delayed message delivery | ||||
| can very well include (recorded) voice messages.</t> | ||||
| <dl newline="true" spacing="normal"> | ||||
| <dt>ICN 'data mules':</dt> | ||||
| <dd>To facilitate the exchange of messages between | ||||
| different network fragments, mobile entities can act as ICN 'data | ||||
| mules', which are equipped with storage space and move around the | ||||
| disaster-stricken area gathering information to be disseminated. As | ||||
| the mules move around, they deliver messages to other individuals or | ||||
| points of attachment to different fragments of the network. These | ||||
| 'data mules' could have a predetermined path (an ambulance going to | ||||
| and from a hospital), a fixed path (drone/robot assigned | ||||
| specifically to do so), or a completely random path (doctors moving | ||||
| from one camp to another). An example of a many-to-many | ||||
| communication service for fragmented networks based on ICN data | ||||
| mules has been proposed in <xref target="Tagami2016" | ||||
| format="default"/>.</dd> | ||||
| <dt>Priority-dependent or popularity-dependent, name-based | ||||
| replication:</dt> | ||||
| <dd>By allowing spatial and temporal scoping of named | ||||
| messages, priority-based replication depending on the scope of a | ||||
| given message is possible. Clearly, spreading information in | ||||
| disaster cases involves space and time factors that have to be taken | ||||
| into account as messages spread. A concrete approach for such | ||||
| scope-based prioritization of ICN messages in disasters, called | ||||
| 'NREP', has been proposed <xref target="Psaras2014" | ||||
| format="default"/>, where ICN messages have attributes, such as | ||||
| user-defined priority, space, and temporal validity. These | ||||
| attributes are then taken into account when prioritizing | ||||
| messages. In <xref target="Psaras2014" format="default"/>, | ||||
| evaluations show how this approach can be applied to the use case | ||||
| 'Delivering Messages to Relatives/Friends' described in <xref | ||||
| target="usecases" format="default"/>. In <xref target="Seedorf2016" | ||||
| format="default"/>, a scheme is presented that enables estimating | ||||
| the popularity of ICN interest messages in a completely | ||||
| decentralized manner among data mules in a scenario with random, | ||||
| unpredictable movements of ICN data mules. The approach exploits the | ||||
| use of nonces associated with end user requests, common in most ICN | ||||
| architectures. It enables for a given ICN data mule to estimate the | ||||
| overall popularity (among end users) of a given ICN interest | ||||
| message. This enables data mules to optimize content dissemination | ||||
| with limited caching capabilities by prioritizing interests based on | ||||
| their popularity.</dd> | ||||
| <dt>Information resilience through decentralized forwarding:</dt> | ||||
| <dd>In a | ||||
| dynamic or disruptive environment, such as the aftermath of a | ||||
| disaster, both users and content servers may dynamically join and | ||||
| leave the network (due to mobility or network fragmentation). Thus, | ||||
| users might attach to the network and request content when the | ||||
| network is fragmented and the corresponding content origin is not | ||||
| reachable. In order to increase information resilience, content | ||||
| cached both in in-network caches and in end-user devices should be | ||||
| exploited. A concrete approach for the exploitation of content | ||||
| cached in user devices is presented in <xref target="Sourlas2015" | ||||
| format="default"/> . The proposal in <xref target="Sourlas2015" | ||||
| format="default"/> includes enhancements to the Named Data | ||||
| Networking (NDN) router design, | ||||
| as well as an alternative Interest-forwarding scheme that enables | ||||
| users to retrieve cached content when the network is fragmented and | ||||
| the content origin is not reachable. Evaluations show that this | ||||
| approach is a valid tool for the retrieval of cached content in | ||||
| disruptive cases and can be applied to tackle the challenges | ||||
| presented in <xref target="challenges" format="default"/> .</dd> | ||||
| <dt>Energy efficiency:</dt> | ||||
| <dd> | ||||
| A large-scale disaster can cause a large-scale blackout; thus, a | ||||
| number of base stations (BSs) will be operated by their batteries. | ||||
| Capacities of such batteries are not large enough to provide | ||||
| cellular communication for several days after the disaster. In order | ||||
| to prolong the batteries' life from one day to several days, | ||||
| different techniques need to be explored, including priority | ||||
| control, cell zooming, and collaborative upload. Cell zooming | ||||
| switches off some of the BSs because switching off is the only way | ||||
| to reduce power consumed at the idle time. In cell zooming, areas | ||||
| covered by such inactive BSs are covered by the active | ||||
| BSs. Collaborative communication is complementary to cell zooming | ||||
| and reduces power proportional to a load of a BS. The load | ||||
| represents cellular frequency resources. In collaborative | ||||
| communication, end devices delegate sending and receiving messages | ||||
| to and from a BS to a representative end device of which radio | ||||
| propagation quality is better. The design of an ICN-based | ||||
| publish/subscribe protocol that incorporates collaborative upload is | ||||
| ongoing work. In particular, the integration of collaborative upload | ||||
| techniques into the COPSS (Content Oriented Publish/Subscribe | ||||
| System) framework is envisioned <xref target="COPSS2011" | ||||
| format="default"/>.</dd> | ||||
| <dt>Data-centric confidentiality and access control:</dt> | ||||
| <dd>In ICN, the | ||||
| requested content is no longer associated to a trusted server or | ||||
| an endpoint location, but it can be retrieved from any network cache | ||||
| or a replica server. This calls for 'data-centric' security, where | ||||
| security relies on information exclusively contained in the message | ||||
| itself, or if extra information provided by trusted entities is | ||||
| needed, this should be gathered through offline, asynchronous, and | ||||
| noninteractive communication, rather than from an explicit online | ||||
| interactive handshake with trusted servers. The ability to guarantee | ||||
| security without any online entities is particularly important in | ||||
| disaster scenarios with fragmented networks. One concrete | ||||
| cryptographic technique is 'Ciphertext-Policy Attribute Based | ||||
| Encryption (CP-ABE)', allowing a party to encrypt a content | ||||
| specifying a policy that consists in a Boolean expression over | ||||
| attributes that must be satisfied by those who want to decrypt such | ||||
| content. Such encryption schemes tie confidentiality and | ||||
| access control to the transferred data, which can also be transmitted | ||||
| in an unsecured channel. These schemes enable the source to | ||||
| specify the set of nodes allowed to later on decrypt the content | ||||
| during the encryption process.</dd> | ||||
| <dt>Decentralized authentication of messages:</dt> | ||||
| <dd>Self-certifying names | ||||
| provide the property that any entity in a distributed system can | ||||
| verify the binding between a corresponding public key and the | ||||
| self-certifying name without relying on a trusted third | ||||
| party. Self-certifying names thus provide a decentralized form of | ||||
| data origin authentication. However, self-certifying names lack a | ||||
| binding with a corresponding real-world identity. Given the | ||||
| decentralized nature of a disaster scenario, a PKI-based approach | ||||
| for binding self-certifying names with real-world identities is not | ||||
| feasible. Instead, a Web of Trust can be used to provide this | ||||
| binding. Not only are the cryptographic signatures used within a | ||||
| Web of Trust independent of any central authority, but there are also | ||||
| technical means for making the inherent trust relationships of a | ||||
| Web of Trust available to network entities in a decentralized, | ||||
| 'offline' fashion, such that information received can be assessed | ||||
| based on these trust relationships. A concrete scheme for such an | ||||
| approach has been published in <xref target="Seedorf2014" | ||||
| format="default"/>, in which concrete examples for fulfilling the | ||||
| use case 'Delivering Messages to Relatives/Friends' with this | ||||
| approach are also given.</dd> | ||||
| </dl> | ||||
| </section> | ||||
| <section anchor="open" numbered="true" toc="default"> | ||||
| <name>Open Research Challenges</name> | ||||
| <t>The proposed solutions in <xref target="suggested" | ||||
| format="default"/> investigate how ICN approaches can, in principle, | ||||
| address some of the outlined challenges. However, several research | ||||
| challenges remain open and still need to be addressed. The following | ||||
| (incomplete) list summarizes some unanswered research questions and | ||||
| items that are being investigated by researchers:</t> | ||||
| <ul spacing="normal"> | ||||
| <li>Evaluating the proposed mechanisms (and their scalability) in | ||||
| realistic, large-scale testbeds with actual, mature implementations | ||||
| (compared to simulations or emulations).</li> | ||||
| <li> | ||||
| To specify, for each mechanism suggested, what would be the user | ||||
| equipment required or necessary before and after a disaster and to | ||||
| what extent ICN should be deployed in the network. | ||||
| </li> | ||||
| <li>How can DTN and ICN approaches be best used for an optimal overall | ||||
| combination of techniques?</li> | ||||
| <li>How do data-centric encryption schemes scale and perform in | ||||
| large-scale, realistic evaluations?</li> | ||||
| <li>Building and testing real (i.e., not early-stage prototypes) ICN d | ||||
| ata | ||||
| mules by means of implementation and integration with lower-layer | ||||
| hardware; conducting evaluations of decentralized forwarding schemes in | ||||
| real environments with these actual ICN data mules.</li> | ||||
| <li>How to derive concrete, name-based policies allowing prioritized | ||||
| spreading of information. | ||||
| </li> | ||||
| <li>Further investigating, developing, and verifying of mechanisms tha | ||||
| t address | ||||
| energy efficiency requirements for communication after a | ||||
| disaster.</li> | ||||
| <li>How to properly disseminate authenticated object names to nodes | ||||
| (for decentralized integrity verification and authentication) before | ||||
| a disaster or how to retrieve new authenticated object names by | ||||
| nodes during a disaster.</li> | ||||
| </ul> | ||||
| </section> | ||||
| </section> | ||||
| <section anchor="security" numbered="true" toc="default"> | ||||
| <name>Security Considerations</name> | ||||
| <t>This document does not define a new protocol (or protocol extension) | ||||
| or a particular mechanism; therefore, it introduces no specific new | ||||
| security considerations. General security considerations for | ||||
| ICN, which also apply when using ICN | ||||
| techniques to communicate after a disaster, are discussed | ||||
| in <xref target="RFC7945" format="default"/>.</t> | ||||
| <t>The after-disaster communication scenario, which is the focus of this | ||||
| document, raises particular attention to decentralized authentication, | ||||
| content integrity, and trust as key research challenges (as outlined in | ||||
| <xref target="challenges" format="default"/>). The corresponding use | ||||
| cases and ICN-based research approaches discussed in this document thus | ||||
| imply certain security requirements. In particular, data origin | ||||
| authentication, data integrity, and access control are key requirements | ||||
| for many use cases in the aftermath of a disaster (see <xref | ||||
| target="usecases" format="default"/>).</t> | ||||
| <t>In principle, the kinds of disasters discussed in this document can | ||||
| happen as a result of a natural disaster, accident, or | ||||
| human error. However, intentional actions can also cause such a disaster | ||||
| (e.g., a terrorist attack, as mentioned in <xref target="disaster" | ||||
| format="default"/>). In this case (i.e., intentionally caused disasters | ||||
| by attackers), special attention needs to be paid when re-enabling | ||||
| communications as temporary, somewhat unreliable communications with | ||||
| potential limited security features may be anticipated and abused by | ||||
| attackers (e.g., to circulate false messages to cause further | ||||
| intentional chaos among the human population, to leverage this less | ||||
| secure infrastructure to refine targeting, or to track the responses of | ||||
| security/police forces). Potential solutions on how to cope with | ||||
| intentionally caused disasters by attackers and on how to enable a | ||||
| secure communications infrastructure after an intentionally caused | ||||
| disaster are out of scope of this document.</t> | ||||
| <t>The use of data-centric security schemes, such as 'Ciphertext-Policy | ||||
| Attribute Based Encryption' (as mentioned in <xref target="suggested" | ||||
| format="default"/>), which encrypt the data itself (and not the | ||||
| communication channel), in principle, allows for the transmission of such | ||||
| encrypted data over an unsecured channel. However, metadata about | ||||
| the encrypted data being retrieved still arises. Such metadata may disclos | ||||
| e | ||||
| sensitive information to a network-based attacker, even if such an | ||||
| attacker cannot decrypt the content itself.</t> | ||||
| <t>This document has summarized research directions for addressing these | ||||
| challenges and requirements, such as efforts in data-centric | ||||
| confidentiality and access control, as well as recent works for | ||||
| decentralized authentication of messages in a disaster-struck networking | ||||
| infrastructure with nonfunctional routing links and limited | ||||
| communication capabilities (see <xref target="solutions" | ||||
| format="default"/>).</t> | ||||
| </section> | ||||
| <section anchor="conclusion" numbered="true" toc="default"> | ||||
| <name>Conclusion</name> | ||||
| <t>This document has outlined some research directions for | ||||
| ICN with respect to applying ICN | ||||
| approaches for | ||||
| coping with natural or human-generated, large-scale disasters. The | ||||
| document has described high-level research challenges for enabling | ||||
| communication after a disaster has happened, as well as a general | ||||
| rationale why ICN approaches could be beneficial to address these | ||||
| challenges. Further, concrete use cases have been described and how | ||||
| these can be addressed with ICN-based approaches has been discussed.</t> | ||||
| <t>Finally, this document provides an overview of examples of existing | ||||
| ICN-based solutions that address the previously outlined research | ||||
| challenges. These concrete solutions demonstrate that indeed the | ||||
| communication challenges in the aftermath of a disaster can be addressed | ||||
| with techniques that have ICN paradigms at their base, validating our | ||||
| overall reasoning. However, further, more-detailed challenges exist, and | ||||
| more research is necessary in all areas discussed: efficient content | ||||
| distribution and routing in fragmented networks, traffic prioritization, | ||||
| security, and energy efficiency. An incomplete, high-level list of such | ||||
| open research challenges has concluded the document.</t> | ||||
| <t>In order to deploy ICN-based solutions for disaster-aftermath | ||||
| communication in actual mobile networks, standardized ICN baseline | ||||
| protocols are a must. It is unlikely to expect all user equipment in a | ||||
| large-scale mobile network to be from the same vendor. In this respect, | ||||
| the work being done in the IRTF ICNRG is very useful as it works toward | ||||
| standards for concrete ICN protocols that enable interoperability among | ||||
| solutions from different vendors. | ||||
| These protocols -- currently being developed in the IRTF ICNRG as | ||||
| Experimental specifications in the IRTF Stream -- provide a good | ||||
| foundation for deploying ICN-based, disaster-aftermath communication and | ||||
| thereby address key use cases that arise in such situations (as outlined | ||||
| in this document).</t> | ||||
| </section> | ||||
| <section anchor="iana" numbered="true" toc="default"> | ||||
| <name>IANA Considerations</name> | ||||
| <t>This document has no IANA actions.</t> | ||||
| </section> | ||||
| </middle> | ||||
| <back> | ||||
| <references> | ||||
| <name>References</name> | ||||
| <references> | ||||
| <name>Normative References</name> | ||||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.6920.xml"/> | ||||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.5050.xml"/> | ||||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.7476.xml"/> | ||||
| <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
| FC.7945.xml"/> | ||||
| </references> | ||||
| <references> | ||||
| <name>Informative References</name> | ||||
| <reference anchor="Psaras2014"> | ||||
| <front> | ||||
| <title>Name-based replication priorities in disaster cases | ||||
| </title> | ||||
| <author fullname="Ioannis Psaras" initials="I." surname="Psaras"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Lorenzo Saino" initials="L." surname="Saino"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Mayutan Arumaithurai" initials="M." surname="Aruma | ||||
| ithurai"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="K.K. Ramakrishnan" initials="K." surname="Ramakris | ||||
| hnan"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="George Pavlou" initials="G." surname="Pavlou"> | ||||
| <organization/> | ||||
| </author> | ||||
| <date month="April" year="2014"/> | ||||
| </front> | ||||
| <seriesInfo name="DOI" value="10.1109/INFCOMW.2014.6849271"/> | ||||
| <refcontent>IEEE Conference on Computer Communications Workshops</re | ||||
| fcontent> | ||||
| </reference> | ||||
| <reference anchor="cellbroadcast" target="https://en.wikipedia.org/w/ind | ||||
| ex.php?title=Cell_Broadcast&oldid=972614007"> | ||||
| <front> | ||||
| <title>Cell Broadcast</title> | ||||
| <author> | ||||
| <organization>Wikipedia</organization> | ||||
| </author> | ||||
| <date month="August" year="2020"></date> | ||||
| </front> | ||||
| </reference> | ||||
| <reference anchor="Seedorf2014"> | ||||
| <front> | ||||
| <title>Decentralised binding of self-certifying names to | ||||
| real-world identities for assessment of third-party messages in | ||||
| fragmented mobile networks</title> | ||||
| <author fullname="Jan Seedorf" initials="J." surname="Seedorf"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Dirk Kutscher" initials="D." surname="Kutscher"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Fabian Schneider" initials="F." surname="Schneider | ||||
| "> | ||||
| <organization/> | ||||
| </author> | ||||
| <date month="April" year="2014"/> | ||||
| </front> | ||||
| <seriesInfo name="DOI" value="10.1109/INFCOMW.2014.6849268"/> | ||||
| <refcontent>IEEE Conference on Computer Communications Workshops</refc | ||||
| ontent> | ||||
| </reference> | ||||
| <reference anchor="Seedorf2016"> | ||||
| <front> | ||||
| <title>Decentralised Interest Counter Aggregation for ICN in Disaste | ||||
| r Scenarios | ||||
| </title> | ||||
| <author fullname="Jan Seedorf" initials="J." surname="Seedorf"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Dirk Kutscher" initials="D." surname="Kutscher"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Bilal Gill" initials="B." surname="Gill"> | ||||
| <organization/> | ||||
| </author> | ||||
| <date month="December" year="2016"/> | ||||
| </front> | ||||
| <seriesInfo name="DOI" value="10.1109/GLOCOMW.2016.7848869"/> | ||||
| <refcontent>IEEE Globecom Workshops</refcontent> | ||||
| </reference> | ||||
| <reference anchor="COPSS2011"> | ||||
| <front> | ||||
| <title>COPSS: An Efficient Content Oriented Publish/Subscribe System | ||||
| </title> | ||||
| <author fullname="Jiachen Chen" initials="J." surname="Chen"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Mayutan Arumaithurai" initials="M." surname="Aruma | ||||
| ithurai"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Lei Jiao" initials="L." surname="Jiao"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Xiaoming Fu" initials="X." surname="Fu"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="K.K. Ramakrishnan" initials="K." surname="Ramakris | ||||
| hnan"> | ||||
| <organization/> | ||||
| </author> | ||||
| <date month="October" year="2011"/> | ||||
| </front> | ||||
| <seriesInfo name="DOI" value="10.1109/ANCS.2011.27"/> | ||||
| <refcontent>Seventh ACM/IEEE Symposium on Architectures for | ||||
| Networking and Communications Systems (ANCS)</refcontent> | ||||
| </reference> | ||||
| <reference anchor="dtnwg" target="https://datatracker.ietf.org/wg/dtn/ab | ||||
| out/"> | ||||
| <front> | ||||
| <title>Delay/Disruption Tolerant Networking (dtn) | ||||
| </title> | ||||
| <author> | ||||
| <organization>IETF</organization> | ||||
| </author> | ||||
| </front> | ||||
| </reference> | ||||
| <reference anchor="dtnrg" target="https://irtf.org/dtnrg"> | ||||
| <front> | ||||
| <title>Delay-Tolerant Networking Research Group (DTNRG) | ||||
| </title> | ||||
| <author> | ||||
| <organization>IRTF</organization> | ||||
| </author> | ||||
| </front> | ||||
| </reference> | ||||
| <reference anchor="Robitzsch2015"> | ||||
| <front> | ||||
| <title>D2.1: Usage Scenarios and Requirements</title> | ||||
| <author fullname="S Robitzsch" initials="S." surname="Robitzsch"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Dirk Trossen" initials="D." surname="Trossen"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Charalambos Theodorou" initials="C." surname="Theo | ||||
| dorou"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Trevor Barker" initials="T." surname="Barker"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Arjuna Sathiaseel" initials="A." surname="Sathiase | ||||
| el"> | ||||
| <organization/> | ||||
| </author> | ||||
| <date/> | ||||
| </front> | ||||
| <refcontent>H2020 project RIFE, public deliverable</refcontent> | ||||
| </reference> | ||||
| <reference anchor="Tagami2016"> | ||||
| <front> | ||||
| <title>Name-based push/pull message dissemination for disaster messa | ||||
| ge board | ||||
| </title> | ||||
| <author fullname="Atsushi Tagami" initials="A." surname="Tagami"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Tomohiko Yagyu" initials="T." surname="Yagyu"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Kohei Sugiyama" initials="K." surname="Sugiyama"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Mayutan Arumaithurai" initials="M." surname="Aruma | ||||
| ithurai"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Kenichi Nakamura" initials="K." surname="Nakamura" | ||||
| > | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Toru Hasegawa" initials="T." surname="Hasegawa"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Tohru Asami" initials="T." surname="Asami"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="K. K. Ramakrishnan" initials="K." surname="Ramakri | ||||
| shnan"> | ||||
| <organization/> | ||||
| </author> | ||||
| <date month="June" year="2016"/> | ||||
| </front> | ||||
| <seriesInfo name="DOI" value="10.1109/LANMAN.2016.7548855"/> | ||||
| <refcontent>IEEE International Symposium on Local and | ||||
| Metropolitan Area Networks (LANMAN)</refcontent> | ||||
| </reference> | ||||
| <reference anchor="Yoneki2007"> | ||||
| <front> | ||||
| <title>A socio-aware overlay for publish/subscribe communication | ||||
| in delay tolerant networks</title> | ||||
| <author fullname="Eiko Yoneki" initials="E." surname="Yoneki"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Pan Hui" initials="P." surname="Hui"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="ShuYan Chan" initials="S." surname="Chan"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Jon Crowcroft" initials="J." surname="Crowcroft"> | ||||
| <organization/> | ||||
| </author> | ||||
| <date month="October" year="2007"/> | ||||
| </front> | ||||
| <seriesInfo name="DOI" value="10.1145/1298126.1298166"/> | ||||
| <refcontent>Proceedings of the 10th ACM Symposium on Modeling, | ||||
| Analysis, and Simulation of Wireless and Mobile | ||||
| Systems</refcontent> | ||||
| </reference> | ||||
| <reference anchor="Greifenberg2008"> | ||||
| <front> | ||||
| <title>Efficient Publish/Subscribe-Based Multicast for | ||||
| Opportunistic Networking with Self-Organized Resource Utilization | ||||
| </title> | ||||
| <author fullname="J Greifenberg" initials="J." surname="Greifenberg" | ||||
| > | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Dirk Kutscher" initials="D." surname="Kutscher"> | ||||
| <organization/> | ||||
| </author> | ||||
| <date month="March" year="2008"/> | ||||
| </front> | ||||
| <seriesInfo name="DOI" value="10.1109/WAINA.2008.255"/> | ||||
| <refcontent>Advanced Information Networking and Applications - Worksho | ||||
| ps</refcontent> | ||||
| </reference> | ||||
| <reference anchor="Gusev2015"> | ||||
| <front> | ||||
| <title>NDN-RTC: Real-Time Videoconferencing over Named Data Networki | ||||
| ng | ||||
| </title> | ||||
| <author fullname="Peter Gusev" initials="P." surname="Gusev"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Jeff Burke" initials="J." surname="Burke"> | ||||
| <organization/> | ||||
| </author> | ||||
| <date month="September" year="2015"/> | ||||
| </front> | ||||
| <seriesInfo name="DOI" value="10.1145/2810156.2810176"/> | ||||
| <refcontent>2nd ACM Conference on Information-Centric Networking | ||||
| (ICN)</refcontent> | ||||
| </reference> | ||||
| <reference anchor="Sourlas2015"> | ||||
| <front> | ||||
| <title>Information resilience through user-assisted caching in | ||||
| disruptive Content-Centric Networks</title> | ||||
| <author fullname="Vasilis Sourlas" initials="V." surname="Sourlas"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Leandros Tassiulas" initials="L." surname="Tassiul | ||||
| as"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Ioannis Psaras" initials="I." surname="Psaras"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="George Pavlou" initials="G." surname="Pavlou"> | ||||
| <organization/> | ||||
| </author> | ||||
| <date month="May" year="2015"/> | ||||
| </front> | ||||
| <seriesInfo name="DOI" value="10.1109/IFIPNetworking.2015.7145301"/> | ||||
| <refcontent>IFIP Networking Conference</refcontent> | ||||
| </reference> | ||||
| <reference anchor="Trossen2015"> | ||||
| <front> | ||||
| <title>IP over ICN - The better IP?</title> | ||||
| <author fullname="Dirk Trossen" initials="D." surname="Trossen"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Martin J. Reed " initials="M." surname="Reed"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Janne Riihijärvi " initials="J." surname="Riihijär | ||||
| vi"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Michael Georgiades" initials="M." surname="Georgia | ||||
| des"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="Nikos Fotiou" initials="N." surname="Fotiou"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author fullname="George Xylomenos" initials="G." surname="Xylomenos | ||||
| "> | ||||
| <organization/> | ||||
| </author> | ||||
| <date month="June" year="2015"/> | ||||
| </front> | ||||
| <seriesInfo name="DOI" value="10.1109/EuCNC.2015.7194109"/> | ||||
| <refcontent>2European Conference on Networks and Communications | ||||
| (EuCNC)</refcontent> | ||||
| </reference> | ||||
| </references> | ||||
| </references> | ||||
| <section numbered="false" toc="default"> | ||||
| <name>Acknowledgment</name> | ||||
| <t>The authors would like to thank <contact fullname="Ioannis Psaras"/> | ||||
| for useful comments. Also, the authors are grateful to <contact | ||||
| fullname="Christopher Wood"/> and <contact fullname="Daniel Corujo"/> | ||||
| for valuable feedback and suggestions on concrete text for | ||||
| improving the document. Further, the authors would like to thank | ||||
| <contact fullname="Joerg Ott"/> and <contact fullname="Dirk Trossen"/> | ||||
| for valuable comments and input, in particular, | ||||
| regarding existing work from the DTN community that is highly related | ||||
| to the ICN approaches suggested in this document. Also, <contact | ||||
| fullname="Akbar Rahman"/> | ||||
| provided useful comments and suggestions, in particular, regarding | ||||
| existing disaster warning mechanisms in today's mobile phone | ||||
| networks.</t> | ||||
| <t>This document has been supported by the GreenICN project (GreenICN: | ||||
| Architecture and Applications of Green Information-Centric Networking), | ||||
| a research project supported jointly by the European Commission under | ||||
| its 7th Framework Program (contract no. 608518) and the National | ||||
| Institute of Information and Communications Technology (NICT) in Japan | ||||
| (contract no. 167). The views and conclusions contained herein are those | ||||
| of the authors and should not be interpreted as necessarily representing | ||||
| the official policies or endorsements, either expressed or implied, of | ||||
| the GreenICN project, the European Commission, or the NICT. More informati | ||||
| on | ||||
| is available at the project website: <eref | ||||
| target="http://www.greenicn.org/"/>. </t> | ||||
| <t>This document has also been supported by the Coordination Support | ||||
| Action entitled 'Supporting European Experts Presence in International | ||||
| Standardisation Activities in ICT' (<eref | ||||
| target="https://standict.eu/">StandICT.eu</eref>) funded by the European C | ||||
| ommission under | ||||
| the Horizon 2020 Programme with Grant Agreement no. 780439. The views | ||||
| and conclusions contained herein are those of the authors and should not | ||||
| be interpreted as necessarily representing the official policies or | ||||
| endorsements, either expressed or implied, of the European | ||||
| Commission.</t> | ||||
| </section> | ||||
| </back> | ||||
| </rfc> | ||||
| End of changes. 1 change blocks. | ||||
| lines changed or deleted | lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||