ABSTRACT
Unfettered access to the Internet is unfortunately not universal —- studies show that more than half of the world’s population is subject to at least some censorship. Even in regions without censorship, Internet outages (e.g., during natural disasters) hinder the ability to communicate online. Avoiding censorship and communicating during Internet outages have inspired a number of proposals for communicating via a class of decentralized routing protocols based on sneakernets. In a sneakernet, messages are passed between human-carried devices (usually smartphones), completely avoiding the Internet. Importantly, the movement of messages in a sneakernet is dictated by the movements of the (human) device owners; these networks tend to be opportunistic in the sense that messages are exchanged between parties only when those parties encounter one another through happenstance.
Understanding the security, performance, and privacy properties of various sneakernet protocols remains an open problem, with individual proposals inventing their own metrics and evaluation methodology, and is further challenged by a lack of unified evaluation and simulation frameworks. This paper presents Cadence, a simulator for decentralized human movement-based communication protocols that provides a unifying environment for evaluating sneakernet protocols under a variety of conditions. We describe the architecture of Cadence and argue its benefits to network and security researchers. Cadence is free open-source software.
- Adam J Aviv, Matt Blaze, Micah Sherr, and Jonathan M Smith. 2014. Privacy-aware message exchanges for HumaNets. Computer communications 48 (2014), 30–43.Google Scholar
- Adam J. Aviv, Micah Sherr, Matt Blaze, and Jonathan M. Smith. 2012. Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. In European Symposium on Research in Computer Security (ESORICS).Google Scholar
- Hugo Barbosa, Marc Barthelemy, Gourab Ghoshal, Charlotte R James, Maxime Lenormand, Thomas Louail, Ronaldo Menezes, José J Ramasco, Filippo Simini, and Marcello Tomasini. 2018. Human mobility: Models and applications. Physics Reports 734 (2018), 1–74.Google ScholarCross Ref
- Archie Bland. 2014. FireChat–the messaging app that’s powering the Hong Kong protests. The Guardian 29 (2014).Google Scholar
- Briar Project. 2023. Briar: Secure messaging, anywhere. https://briarproject.org/.Google Scholar
- Caroline O Buckee, Satchit Balsari, Jennifer Chan, Mercè Crosas, Francesca Dominici, Urs Gasser, Yonatan H Grad, Bryan Grenfell, M Elizabeth Halloran, Moritz UG Kraemer, 2020. Aggregated mobility data could help fight COVID-19. Science 368, 6487 (2020), 145–146.Google Scholar
- Brendan Burns, Oliver Brock, and Brian Neil Levine. 2008. MORA routing and capacity building in disruption-tolerant networks. Ad Hoc Networks 6, 4 (June 2008), 600–620. https://doi.org/10.1016/j.adhoc.2007.05.002Google ScholarDigital Library
- Jens Dede, Anna Förster, Enrique Hernández-Orallo, Jorge Herrera-Tapia, Koojana Kuladinithi, Vishnupriya Kuppusamy, Pietro Manzoni, Anas bin Muslim, Asanga Udugama, and Zeynep Vatandas. 2018. Simulating Opportunistic Networks: Survey and Future Directions. IEEE Communications Surveys & Tutorials 20, 2 (2018), 1547–1573. https://doi.org/10.1109/COMST.2017.2782182 Conference Name: IEEE Communications Surveys & Tutorials.Google ScholarCross Ref
- Phillip J Durst, Christopher Goodin, Chris Cummins, Burhman Gates, Burney Mckinley, Taylor George, Mitchell M Rohde, Matthew A Toschlog, and Justin Crawford. 2012. A real-time, interactive simulation environment for unmanned ground vehicles: The autonomous navigation virtual environment laboratory (ANVEL). In 2012 Fifth international conference on information and computing science. IEEE, 7–10.Google ScholarDigital Library
- José Luis Guzmán, Manuel Berenguel, Francisco Rodriguez, and Sebastián Dormido. 2008. An interactive tool for mobile robot motion planning. Robotics and Autonomous Systems 56, 5 (2008), 396–409.Google ScholarDigital Library
- Daniel B Hayes and Michael J Monfils. 2015. Occupancy modeling of bird point counts: implications of mobile animals. The Journal of Wildlife Management 79, 8 (2015), 1361–1368.Google ScholarCross Ref
- Tao Hu, Siqin Wang, Bing She, Mengxi Zhang, Xiao Huang, Yunhe Cui, Jacob Khuri, Yaxin Hu, Xiaokang Fu, Xiaoyue Wang, 2021. Human mobility data in the COVID-19 pandemic: characteristics, applications, and challenges. International Journal of Digital Earth 14, 9 (2021), 1126–1147.Google ScholarCross Ref
- Chung-Ming Huang, Kun-chan Lan, and Chang-Zhou Tsai. 2008. A Survey of Opportunistic Networks. In 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008). 1672–1677. https://doi.org/10.1109/WAINA.2008.292Google ScholarDigital Library
- Sanja Kelly, Mai Truong, Adrian Shahbaz, and Madeline Earp. 2016. Silencing the Messenger: Communication Apps Under Pressure. Freedom on the Net. Freedom House. Available at https://freedomhouse.org/report/freedom-net/2016/silencing-messenger-communication-apps-under-pressure.Google Scholar
- Ari Keranen. 2008. Opportunistic network environment simulator. Special Assignment report, Helsinki University of Technology, Department of Communications and Networking (2008).Google Scholar
- Ari Keränen, Jörg Ott, and Teemu Kärkkäinen. 2009. The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques(Simutools ’09). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels, BEL, 1–10. https://doi.org/10.4108/ICST.SIMUTOOLS2009.5674Google ScholarDigital Library
- Xiangjie Kong, Feng Xia, Zhaolong Ning, Azizur Rahim, Yinqiong Cai, Zhiqiang Gao, and Jianhua Ma. 2018. Mobility dataset generation for vehicular social networks based on floating car data. IEEE Transactions on Vehicular Technology 67, 5 (2018), 3874–3886.Google ScholarCross Ref
- Moritz UG Kraemer, Chia-Hung Yang, Bernardo Gutierrez, Chieh-Hsi Wu, Brennan Klein, David M Pigott, Open COVID-19 Data Working Group†, Louis Du Plessis, Nuno R Faria, Ruoran Li, 2020. The effect of human mobility and control measures on the COVID-19 epidemic in China. Science 368, 6490 (2020), 493–497.Google Scholar
- Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, and Phillipa Gill. 2020. ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. In IEEE Symposium on Security and Privacy (SP).Google Scholar
- Pierre Nouvellet, Sangeeta Bhatia, Anne Cori, Kylie EC Ainslie, Marc Baguelin, Samir Bhatt, Adhiratha Boonyasiri, Nicholas F Brazeau, Lorenzo Cattarino, Laura V Cooper, 2021. Reduction in mobility and COVID-19 transmission. Nature communications 12, 1 (2021), 1090.Google Scholar
- Office of Geomatics. 2014. World Geodetic System 1984 (WGS 84). Standard NGA.STND.0036_1.0.0_WGS84. National Geospatial-Intelligence Agency. Available at https://earth-info.nga.mil/?dir=wgs84&action=wgs84.Google Scholar
- Michal Piorkowski, Natasa Sarafijanovic-Djukic, and Matthias Grossglauser. 2022. CRAWDAD epfl/mobility. https://dx.doi.org/10.15783/C7J010Google ScholarCross Ref
- Chiara Renso, Stefano Spaccapietra, and Esteban Zim’anyi. 2013. Mobility data. Cambridge University Press.Google Scholar
- Rahul Sachdeva and Amita Dev. 2021. Review of opportunistic network: Assessing past, present, and future. International Journal of Communication Systems 34, 11 (2021), e4860.Google ScholarCross Ref
- Aleksandr Saprykin, Ndaona Chokani, and Reza S Abhari. 2019. GEMSim: A GPU-accelerated multi-modal mobility simulator for large-scale scenarios. Simulation Modelling Practice and Theory 94 (2019), 199–214.Google ScholarCross Ref
- Ahren Studer and Adrian Perrig. 2009. The coremelt attack. In Computer Security–ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings 14. Springer, 37–52.Google ScholarCross Ref
- Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, and Roya Ensafi. 2020. Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM, Virtual Event USA, 49–66. https://doi.org/10.1145/3372297.3417883Google ScholarDigital Library
- Sandesh Uppoor, Oscar Trullols-Cruces, Marco Fiore, and Jose M Barcelo-Ordinas. 2013. Generation and analysis of a large-scale urban vehicular mobility dataset. IEEE Transactions on Mobile Computing 13, 5 (2013), 1061–1075.Google ScholarDigital Library
- Kai Zhao, Sasu Tarkoma, Siyuan Liu, and Huy Vo. 2016. Urban human mobility data mining: An overview. In 2016 IEEE International Conference on Big Data (Big Data). IEEE, 1911–1920.Google ScholarCross Ref
- Yu Zheng, Hao Fu, Xing Xie, Wei-Ying Ma, and Quannan Li. 2011. Geolife GPS trajectory dataset - User Guide (geolife gps trajectories 1.1 ed.). https://www.microsoft.com/en-us/research/publication/geolife-gps-trajectory-dataset-user-guide/Google Scholar
Index Terms
- Cadence: A Simulator for Human Movement-based Communication Protocols
Recommendations
Trustworthiness-Based Group Communication Protocols
NBIS '14: Proceedings of the 2014 17th International Conference on Network-Based Information SystemsIn distributed applications, a group of multiple process are cooperating with each other by exchanging messages in underlying networks. A message sent by each process has to be delivered to every process in a group. In this paper, we discuss a protocol ...
Analysis and evaluation of communication Protocols for IoT Applications
SITA'20: Proceedings of the 13th International Conference on Intelligent Systems: Theories and ApplicationsThe communication protocols are an essential part for the data communication of Internet of Things (IoT) applications. However, the selection of a communication protocol is challenging because it depends on the nature of the IoT system and its data ...
Survey on secure communication protocols for the Internet of Things
The Internet of Things or "IoT" defines a highly interconnected network of heterogeneous devices where all kinds of communications seem to be possible, even unauthorized ones. As a result, the security requirement for such network becomes critical ...
Comments