skip to main content
10.1145/3607505.3607507acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsetConference Proceedingsconference-collections
research-article

Cadence: A Simulator for Human Movement-based Communication Protocols

Published:21 August 2023Publication History

ABSTRACT

Unfettered access to the Internet is unfortunately not universal —- studies show that more than half of the world’s population is subject to at least some censorship. Even in regions without censorship, Internet outages (e.g., during natural disasters) hinder the ability to communicate online. Avoiding censorship and communicating during Internet outages have inspired a number of proposals for communicating via a class of decentralized routing protocols based on sneakernets. In a sneakernet, messages are passed between human-carried devices (usually smartphones), completely avoiding the Internet. Importantly, the movement of messages in a sneakernet is dictated by the movements of the (human) device owners; these networks tend to be opportunistic in the sense that messages are exchanged between parties only when those parties encounter one another through happenstance.

Understanding the security, performance, and privacy properties of various sneakernet protocols remains an open problem, with individual proposals inventing their own metrics and evaluation methodology, and is further challenged by a lack of unified evaluation and simulation frameworks. This paper presents Cadence, a simulator for decentralized human movement-based communication protocols that provides a unifying environment for evaluating sneakernet protocols under a variety of conditions. We describe the architecture of Cadence and argue its benefits to network and security researchers. Cadence is free open-source software.

References

  1. Adam J Aviv, Matt Blaze, Micah Sherr, and Jonathan M Smith. 2014. Privacy-aware message exchanges for HumaNets. Computer communications 48 (2014), 30–43.Google ScholarGoogle Scholar
  2. Adam J. Aviv, Micah Sherr, Matt Blaze, and Jonathan M. Smith. 2012. Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. In European Symposium on Research in Computer Security (ESORICS).Google ScholarGoogle Scholar
  3. Hugo Barbosa, Marc Barthelemy, Gourab Ghoshal, Charlotte R James, Maxime Lenormand, Thomas Louail, Ronaldo Menezes, José J Ramasco, Filippo Simini, and Marcello Tomasini. 2018. Human mobility: Models and applications. Physics Reports 734 (2018), 1–74.Google ScholarGoogle ScholarCross RefCross Ref
  4. Archie Bland. 2014. FireChat–the messaging app that’s powering the Hong Kong protests. The Guardian 29 (2014).Google ScholarGoogle Scholar
  5. Briar Project. 2023. Briar: Secure messaging, anywhere. https://briarproject.org/.Google ScholarGoogle Scholar
  6. Caroline O Buckee, Satchit Balsari, Jennifer Chan, Mercè Crosas, Francesca Dominici, Urs Gasser, Yonatan H Grad, Bryan Grenfell, M Elizabeth Halloran, Moritz UG Kraemer, 2020. Aggregated mobility data could help fight COVID-19. Science 368, 6487 (2020), 145–146.Google ScholarGoogle Scholar
  7. Brendan Burns, Oliver Brock, and Brian Neil Levine. 2008. MORA routing and capacity building in disruption-tolerant networks. Ad Hoc Networks 6, 4 (June 2008), 600–620. https://doi.org/10.1016/j.adhoc.2007.05.002Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jens Dede, Anna Förster, Enrique Hernández-Orallo, Jorge Herrera-Tapia, Koojana Kuladinithi, Vishnupriya Kuppusamy, Pietro Manzoni, Anas bin Muslim, Asanga Udugama, and Zeynep Vatandas. 2018. Simulating Opportunistic Networks: Survey and Future Directions. IEEE Communications Surveys & Tutorials 20, 2 (2018), 1547–1573. https://doi.org/10.1109/COMST.2017.2782182 Conference Name: IEEE Communications Surveys & Tutorials.Google ScholarGoogle ScholarCross RefCross Ref
  9. Phillip J Durst, Christopher Goodin, Chris Cummins, Burhman Gates, Burney Mckinley, Taylor George, Mitchell M Rohde, Matthew A Toschlog, and Justin Crawford. 2012. A real-time, interactive simulation environment for unmanned ground vehicles: The autonomous navigation virtual environment laboratory (ANVEL). In 2012 Fifth international conference on information and computing science. IEEE, 7–10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. José Luis Guzmán, Manuel Berenguel, Francisco Rodriguez, and Sebastián Dormido. 2008. An interactive tool for mobile robot motion planning. Robotics and Autonomous Systems 56, 5 (2008), 396–409.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Daniel B Hayes and Michael J Monfils. 2015. Occupancy modeling of bird point counts: implications of mobile animals. The Journal of Wildlife Management 79, 8 (2015), 1361–1368.Google ScholarGoogle ScholarCross RefCross Ref
  12. Tao Hu, Siqin Wang, Bing She, Mengxi Zhang, Xiao Huang, Yunhe Cui, Jacob Khuri, Yaxin Hu, Xiaokang Fu, Xiaoyue Wang, 2021. Human mobility data in the COVID-19 pandemic: characteristics, applications, and challenges. International Journal of Digital Earth 14, 9 (2021), 1126–1147.Google ScholarGoogle ScholarCross RefCross Ref
  13. Chung-Ming Huang, Kun-chan Lan, and Chang-Zhou Tsai. 2008. A Survey of Opportunistic Networks. In 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008). 1672–1677. https://doi.org/10.1109/WAINA.2008.292Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sanja Kelly, Mai Truong, Adrian Shahbaz, and Madeline Earp. 2016. Silencing the Messenger: Communication Apps Under Pressure. Freedom on the Net. Freedom House. Available at https://freedomhouse.org/report/freedom-net/2016/silencing-messenger-communication-apps-under-pressure.Google ScholarGoogle Scholar
  15. Ari Keranen. 2008. Opportunistic network environment simulator. Special Assignment report, Helsinki University of Technology, Department of Communications and Networking (2008).Google ScholarGoogle Scholar
  16. Ari Keränen, Jörg Ott, and Teemu Kärkkäinen. 2009. The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques(Simutools ’09). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels, BEL, 1–10. https://doi.org/10.4108/ICST.SIMUTOOLS2009.5674Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Xiangjie Kong, Feng Xia, Zhaolong Ning, Azizur Rahim, Yinqiong Cai, Zhiqiang Gao, and Jianhua Ma. 2018. Mobility dataset generation for vehicular social networks based on floating car data. IEEE Transactions on Vehicular Technology 67, 5 (2018), 3874–3886.Google ScholarGoogle ScholarCross RefCross Ref
  18. Moritz UG Kraemer, Chia-Hung Yang, Bernardo Gutierrez, Chieh-Hsi Wu, Brennan Klein, David M Pigott, Open COVID-19 Data Working Group†, Louis Du Plessis, Nuno R Faria, Ruoran Li, 2020. The effect of human mobility and control measures on the COVID-19 epidemic in China. Science 368, 6490 (2020), 493–497.Google ScholarGoogle Scholar
  19. Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, and Phillipa Gill. 2020. ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. In IEEE Symposium on Security and Privacy (SP).Google ScholarGoogle Scholar
  20. Pierre Nouvellet, Sangeeta Bhatia, Anne Cori, Kylie EC Ainslie, Marc Baguelin, Samir Bhatt, Adhiratha Boonyasiri, Nicholas F Brazeau, Lorenzo Cattarino, Laura V Cooper, 2021. Reduction in mobility and COVID-19 transmission. Nature communications 12, 1 (2021), 1090.Google ScholarGoogle Scholar
  21. Office of Geomatics. 2014. World Geodetic System 1984 (WGS 84). Standard NGA.STND.0036_1.0.0_WGS84. National Geospatial-Intelligence Agency. Available at https://earth-info.nga.mil/?dir=wgs84&action=wgs84.Google ScholarGoogle Scholar
  22. Michal Piorkowski, Natasa Sarafijanovic-Djukic, and Matthias Grossglauser. 2022. CRAWDAD epfl/mobility. https://dx.doi.org/10.15783/C7J010Google ScholarGoogle ScholarCross RefCross Ref
  23. Chiara Renso, Stefano Spaccapietra, and Esteban Zim’anyi. 2013. Mobility data. Cambridge University Press.Google ScholarGoogle Scholar
  24. Rahul Sachdeva and Amita Dev. 2021. Review of opportunistic network: Assessing past, present, and future. International Journal of Communication Systems 34, 11 (2021), e4860.Google ScholarGoogle ScholarCross RefCross Ref
  25. Aleksandr Saprykin, Ndaona Chokani, and Reza S Abhari. 2019. GEMSim: A GPU-accelerated multi-modal mobility simulator for large-scale scenarios. Simulation Modelling Practice and Theory 94 (2019), 199–214.Google ScholarGoogle ScholarCross RefCross Ref
  26. Ahren Studer and Adrian Perrig. 2009. The coremelt attack. In Computer Security–ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings 14. Springer, 37–52.Google ScholarGoogle ScholarCross RefCross Ref
  27. Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, and Roya Ensafi. 2020. Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM, Virtual Event USA, 49–66. https://doi.org/10.1145/3372297.3417883Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Sandesh Uppoor, Oscar Trullols-Cruces, Marco Fiore, and Jose M Barcelo-Ordinas. 2013. Generation and analysis of a large-scale urban vehicular mobility dataset. IEEE Transactions on Mobile Computing 13, 5 (2013), 1061–1075.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Kai Zhao, Sasu Tarkoma, Siyuan Liu, and Huy Vo. 2016. Urban human mobility data mining: An overview. In 2016 IEEE International Conference on Big Data (Big Data). IEEE, 1911–1920.Google ScholarGoogle ScholarCross RefCross Ref
  30. Yu Zheng, Hao Fu, Xing Xie, Wei-Ying Ma, and Quannan Li. 2011. Geolife GPS trajectory dataset - User Guide (geolife gps trajectories 1.1 ed.). https://www.microsoft.com/en-us/research/publication/geolife-gps-trajectory-dataset-user-guide/Google ScholarGoogle Scholar

Index Terms

  1. Cadence: A Simulator for Human Movement-based Communication Protocols
                Index terms have been assigned to the content through auto-classification.

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Other conferences
                  CSET '23: Proceedings of the 16th Cyber Security Experimentation and Test Workshop
                  August 2023
                  87 pages
                  ISBN:9798400707889
                  DOI:10.1145/3607505

                  Copyright © 2023 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 21 August 2023

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article
                  • Research
                  • Refereed limited
                • Article Metrics

                  • Downloads (Last 12 months)46
                  • Downloads (Last 6 weeks)8

                  Other Metrics

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader

                HTML Format

                View this article in HTML Format .

                View HTML Format