Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2348616.2348626acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

A secure content network in space

Published: 22 August 2012 Publication History

Abstract

We present a content network architecture for a cluster of satellites flying in low Earth orbit. The cluster uses a dynamic wireless network to interconnect the satellites and has an intermittent link to the ground. Even though a cluster of satellites fly in formation, their relative positions can vary widely, and occasionally the cluster can disperse and regroup in order to avoid obstacles or to affect a better arrangement. The network, therefore, is a MANET with elements of a disruption tolerant network. Further, data security is a fundamental concern. Our approach is to layer a content network over the wireless network, supporting multiple qualities of service and multiple independent levels of security.

References

[1]
J. Alves-Foss, W. S. Harrison, P. Oman, and C. Taylor. MILS architecture for high-assurance embedded systems. Intl. Jour. Embedded Systems, 2:239--247, 2006.
[2]
A. Anand, A. Gupta, A. Akella, S. Seshan, and S. Shenker. Packet caches on routers: the implications of universal redundant traffic elimination. SIGCOMM Comput. Commun. Rev., 38:219--230, August 2008.
[3]
C. Boettcher, R. DeLong, J. Rushby, and W. Sifre. The MILS component integration approach to secure information sharing. In Digital Avionics Systems Conference, 2008. DASC 2008. IEEE/AIAA 27th, pages 1.C.2-1-1.C.2-14, oct. 2008.
[4]
O. C. Brown and P. Eremenko. Fractionated space architectures: A vision for responsive space. In 4th Responsive Space Conference. AIAA, Apr 2006.
[5]
O. C. Brown, P. Eremenko, and P. D. Collopy. Value-centric design methodologies for fractionated spacecraft: Progress summary from phase 1 of the DARPA System F6 program. In AIAA SPACE 2009 Conf. & Exposition. AIAA, Sep 2009.
[6]
D. Cousins, C. Partridge, K. Bongiovani, A. Jackson, R. Krishnan, T. Saxena, and W. Strayer. Understanding encrypted networks through signal and systems analysis of traffic timing. In Proc. 2003 IEEE Aerospace Conf., March 2003.
[7]
Inmarsat. BGAN and IP data connections. http://www.inmarsat.com/bgan, Aug. 2006.
[8]
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard. Networking named content. In Proc. ACM CoNext '09, pages 1--12. ACM, 2009.
[9]
Object Management Group. Data Distribution Service for Real-time Systems version 1.2, Jan. 2007. http://www.omg.org/spec/DDS/1.2/.
[10]
J. Ott, D. Kutscher, and C. Dwertmann. Integrating DTN and MANET routing. In Proceedings of ACM SIGCOMM Workshop on Challenged Networks: CHANTS, 2006.
[11]
J. Padhye, V. Firoiu, D. Towsley, and J. Kurose. Modeling TCP throughput: a simple model and its empirical validation. In Proc. ACM SIGCOMM '98, pages 303--314. ACM, 1998.
[12]
J. Stanik. A conversation with Van Jacobson. ACM Queue, 7:8--16, January 2009.
[13]
J. Whitbeck and V. Conan. Hymad: Hybrid dtn-manet routing for dense and highly dynamic wireless networks. Computer Communications, 33(13):1483 -- 1492, 2010.

Cited By

View all
  • (2024)A Zero-Trust Satellite Services Marketplace Enabling Space Infrastructure as a ServiceIEEE Access10.1109/ACCESS.2024.340348312(71066-71075)Online publication date: 2024
  • (2017)On broadcast-based self-learning in named data networking2017 IFIP Networking Conference (IFIP Networking) and Workshops10.23919/IFIPNetworking.2017.8264832(1-9)Online publication date: Jun-2017
  • (2015)Consumer / Producer Communication with Application Level Framing in Named Data NetworkingProceedings of the 2nd ACM Conference on Information-Centric Networking10.1145/2810156.2810160(99-108)Online publication date: 30-Sep-2015
  • Show More Cited By

Index Terms

  1. A secure content network in space

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHANTS '12: Proceedings of the seventh ACM international workshop on Challenged networks
    August 2012
    98 pages
    ISBN:9781450312844
    DOI:10.1145/2348616
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 August 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. content networks
    2. microguards
    3. security

    Qualifiers

    • Research-article

    Conference

    Mobicom'12
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 61 of 159 submissions, 38%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Zero-Trust Satellite Services Marketplace Enabling Space Infrastructure as a ServiceIEEE Access10.1109/ACCESS.2024.340348312(71066-71075)Online publication date: 2024
    • (2017)On broadcast-based self-learning in named data networking2017 IFIP Networking Conference (IFIP Networking) and Workshops10.23919/IFIPNetworking.2017.8264832(1-9)Online publication date: Jun-2017
    • (2015)Consumer / Producer Communication with Application Level Framing in Named Data NetworkingProceedings of the 2nd ACM Conference on Information-Centric Networking10.1145/2810156.2810160(99-108)Online publication date: 30-Sep-2015
    • (2014)Establishing Secure Interactions across Distributed Applications in Satellite ClustersProceedings of the 2014 IEEE International Conference on Space Mission Challenges for Information Technology10.1109/SMC-IT.2014.17(67-74)Online publication date: 24-Sep-2014
    • (2013)In Guards We TrustProceedings of the 2013 International Conference on Social Computing10.1109/SocialCom.2013.87(578-585)Online publication date: 8-Sep-2013

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media