Internet DRAFT - draft-li-dtn-hybrid-integrity

draft-li-dtn-hybrid-integrity



Delay-Tolerant Networking                                   Taixin Li
Internet Draft                                             Guanwen Li
Intended status: Informational                           Huachun Zhou
Expires: September 30, 2018                Beijing Jiaotong University
                                                        March 30, 2018




         A Hybrid Integrity Assurance Strategy for Bundle Protocol
                     draft-li-dtn-hybrid-integrity-05.txt




Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November 10,
   2008. The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on September 30, 2018.



Li                   Expires September 30, 2018               [Page 1]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018


Copyright Notice

   Copyright (c) 2018 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents carefully,
   as they describe your rights and restrictions with respect to this
   document. Code Components extracted from this document must include
   Simplified BSD License text as described in Section 4.e of the Trust
   Legal Provisions and are provided without warranty as described in
   the Simplified BSD License.

Abstract

   Delay/Disruption Tolerant Networking (DTN) is designed for a severe
   environment where communication quality is not guaranteed. It works
   as an overlay network associated with Bundle Protocol (BP) and some
   convergence layer protocols like Licklider Transmission Protocol
   (LTP). However, there is no mechanism in both BP and LTP Protocol to
   ensure integrity of a packet with the granularity of bit. Since the
   integrity is crucial for packet transmission and necessary metadata
   consumes extra costs, there should be a strategy to decide which
   packets and how the packets are required to conduct integrity
   assurance based on network resources and user requirements. Hence, in
   this document, a hybrid integrity assurance strategy is proposed to
   ensure the different levels of integrity of bundles based on the
   status of network resources and the need of users.



Table of Contents


   1. Introduction  ................................................ 3
   2. Conventions used in this document ............................ 3
   3. Checksum Block Format ........................................ 4
   4. Processing Rules of Integrity Detection ...................... 5
      4.1. Processing Rules in Source Nodes ........................ 6
      4.2. Processing Rules in Intermediate Nodes .................. 8
      4.3. Processing Rules in Destination Nodes ................... 9
   5. Error correcting code-based detecting mechanism ............. 10
   6. Security Considerations ..................................... 11
   7. IANA Considerations  ........................................ 11
   8. Conclusions  ................................................ 11


Li                   Expires September 30, 2018               [Page 2]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018


   9. References ................................................. 12
      9.1. Normative Reference ................................... 12
      9.2. Informative Reference ................................. 12
   10. Acknowledgments ........................................... 13


1. Introduction

   Delay/Disruption Tolerant Networking (DTN) [RFC4838] is designed for
   a severe environment where connectivity of network is intermittent
   and communication quality is not guaranteed. It works as an overlay
   network associated with Bundle Protocol (BP) [RFC5050] and
   convergence layer protocols like Licklider Transmission Protocol (LTP)
   [RFC5325] [RFC5326]. BP, which is an application layer protocol, is
   based on a custody transfer mechanism and defines how to forward
   bundles in DTN, while LTP ensures the reliability of bundle
   transmission with the granularity of packet. However, there is no
   mechanism in both BP and LTP Protocol to ensure integrity of a packet
   with the granularity of bit. Integrity is crucial for packet
   transmission since errors in the header leads to some unexpected
   results while errors in the payload results in end-to-end
   retransmission and waste of limited storing and link resources.

   BPSEC [I-D.ietf-dtn-bpsec-06] defines a security protocol providing
   end to end data integrity and confidentiality services for the Bundle
   Protocol. However, necessary checksum metadata consumes costs, so
   there should be a strategy to decide which packets and how the
   packets are required to conduct integrity assurance based on the
   network resources, such as buffer utilization rate, bandwidth, and
   packet loss rate.

   In this document, we define a new type of extension block to carry
   the checksum field. Furthermore, we propose a hybrid integrity
   assurance strategy to ensure the different levels of integrity of
   bundles based on the status of network resources and the need of
   users. The intermediate nodes make a hop-by-hop integrity detection
   strategy according to network status while the end user makes an end-
   to-end integrity detection strategy.



2. Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].



Li                   Expires September 30, 2018               [Page 3]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018




3. Checksum Block Format

   There are three parts in the bundle packet, primary block, payload
   block, and extension block. Extension Block is designed to carry
   additional information that DTN nodes can use to make processing
   decisions that are related to bundles.

   We define a new type of extension block and use it to carry the
   checksum information in this document, and the basic format is based
   on [RFC6258], which defines DTN metadata extension block.

   The format of checksum block is as follows:

   Checksum Block Format:

       +------+-------+--------------------------------------------+
       | Type | Flags | Length |Class of Detection|Type of Checksum|
       |      | (SDNV)| (SDNV) |     (SDNV)       |    (SDNV)      |
       +------+----------------+------------------+----------------+
       |                        Checksum                           |
       |                                                           |
       +-----------------------------------------------------------+

                      Figure 1 Checksum Block Format

   o Block type code (1 byte) - defined in all bundle protocol blocks
      except the primary bundle block (as described in the Bundle
      Protocol). The block-type code for checksum is 0x20.

   o Block processing control flags (SDNV) - defined in all bundle
      protocol blocks except the primary bundle block. SDNV encoding is
      described in the Bundle Protocol. The following block processing
      control flag MUST be set "4 - Discard block if it can't be
      processed", which means that if a bundle node receives a bundle
      with a checksum block and it is not capable of supporting the
      checksum block, it just discards this block without processing it.

   o Block data length (SDNV) - defined in all bundle protocol blocks
      except the primary bundle block. SDNV encoding is described in the
      Bundle Protocol.







Li                   Expires September 30, 2018               [Page 4]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018


   o Class of detection (SDNV) - (CoD) indicates the bundle's class of
      detection, which decides whether a bundle packet should conduct an
      integrity assurance and which part should be detected. CoD is
      decided by two factors, network resources status and user
      requirements. For now, it contains three types: 00 = inadequate
      resources, 01 = adequate resources, 10 = mandatory detection. Here,
      00 and 01 are determined by the network status, and 10 is decided
      by the user. The users have a higher priority, which means that if
      CoD = 10, the bundle packets should be detected no matter what the
      network status is.

   o Type of Checksum (SDNV) - (ToC) indicates the type of checksum
      data. For now, it contains four types: 00 = checksum of primary
      block, 01 = checksum of payload block, 10 = checksum of primary
      block and payload block, 11 = no checksum of either primary block
      or payload block.

   o Checksum data - contains the raw checksum data itself, which is
      generated by some algorithms.



4. Processing Rules of Integrity Detection

   As is discussed in [WOOD09] and [I-D.templin-dtnhiaps-00], integrity
   detection is required on intermediate nodes in addition to
   destination nodes. In order to make full use of the limited resources
   in the severe environments, both the source nodes and the
   intermediate nodes should monitor the usage rate of their resources
   such as the storage and link. Then different integrity assurance
   strategies will be made according to network resources status and
   user requirements. The integrity detection is called if the network
   resources are inadequate, the custody is needed, or it is demanded by
   end users. Besides, intermediate nodes detect the header/primary
   block or the payload block according to the Type of Checksum field
   carried in the checksum block. If there are errors in the packet data,
   forwarding process is stopped and retransmission is called. When the
   destination nodes receive packets, they detect the checksum block and
   if there are errors in the packet data, retransmission will be called.









Li                   Expires September 30, 2018               [Page 5]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018


4.1. Processing Rules in Source Nodes

                               +--------------+
                         +-----+Create new CoD+-----+
                         |     +-------+------+     |
                         |             |            |
                    +----v----+  +-----v----+  +----v----+
                    |  CoD=00 |  |  CoD=10  |  |  CoD=01 |
                    +----+----+  +--+-------+  +----+----+
                         |          |               |
                    +----v----+     |          +----v----+
                 +--+ Custody +--+  |       +--+ Custody +--+
                 |  +---------+  |  |       |  +---------+  |
                 v               v  |       v               v
                YES             NO  |       YES             NO
                 +               +  |       +               +
                 |               |  |       |               |
            +----v-----+  +------+--v+  +---v------+  +-----v----+
            |SET ToC=00|  |SET ToC=10|  |SET ToC=01|  |SET ToC=11|
            +----+-----+  +------+---+  +---+------+  +-----+----+
                 |               |          |               |
          +------v----+ +--------v-----+ +--v--------+      |
          |Compute    | |Compute header| |Compute    |      |
          |header     | |and payload   | |payload    |      |
          |checksum   | |checksum      | |checksum   |      |
          +------+----+ +--------+-----+ +--+--------+      |
                 |               |          |               |
                 |     +---------v----------v----------+    |
                 +----->   Queuing to be forwarded     <----+
                       +-------------------------------+

                 Figure 2 Processing Rules in Source Nodes

   The processing rules in source nodes are shown in Figure 2. The
   source nodes collect the network link status, such as bandwidth and
   packet loss rate, and create Class of Resource (CoD). The algorithm
   of creating CoD is not discussed here.

   If CoD=00 (inadequate resources), it means the network environment is
   severe and error prone. The source nodes read Bundle Processing
   Control Flags (defined in RFC5050). If custody is needed, Type of
   Checksum (ToC) will be set 10 (checksum of primary block and payload
   block), and the checksum of primary block and payload block will be
   computed by a designated algorithm. The algorithm is not discussed
   here. Then the Checksum data field will be filled. If custody is not
   needed, ToC will be set 00 (checksum of primary block), and the



Li                   Expires September 30, 2018               [Page 6]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018


   checksum of primary block will be computed. Then the Checksum data
   field will be filled.

   If CoD=01 (adequate resources), it means the network resources are
   relatively adequate. If custody is needed, ToC will be set 01
   (checksum of payload block), and the checksum of payload block will
   be computed. Then the Checksum data field will be filled. If custody
   is not needed, ToC will be set 11 (no checksum of either primary
   block or payload block), no checksum calculation actions will be
   triggered. At last, the processed packets will queue and wait to be
   forwarded.

   If CoD=10 (mandatory detection), it means that end users at the
   source node want their packets to be detected no matter what the
   network status is. So ToC is set 10 (checksum of primary block and
   payload block), and the checksum of primary block and payload block
   will be computed. Then the checksum data field will be filled. At
   last, the processed packets will queue and wait to be forwarded.






























Li                   Expires September 30, 2018               [Page 7]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018


4.2. Processing Rules in Intermediate Nodes

                              +---------------+
          +------------------->Receive packets|
          |                   +-------+-------+
          |                           |
          |                 +---------v---------+
          |          +------+Read Checksum Block+------+
          |          |      +---+-----------+---+      |
          |          |          |           |          |
          |       +--v---+  +---v--+     +--v---+  +---v--+
          |       |ToC=00|  |ToC=10|     |ToC=01|  |ToC=11|
          |       +--+---+  +---+--+     +--+---+  +---+--+
          |          |          |           |          |
          |          | +--------v----+ +----v--------+ |
          |          | |Check storage| |Check storage| |
          |          | +--------+----+ +----+--------+ |
          |          |          |           |          |
          |          |    +-----v--+     +--v-----+    |
          |          | +--+Free>50%|     |Free>50%+--+ |
          |          | |  +-----+--+     +--+-----+  | |
          +          | v        v           v        v |
          YES        | YES     NO           NO     YES |
          ^          | +        +           +        + |
          |          | |  +-----+----+  +---+-----+  | |
          |          | |  |Header and|  |payload  |  | |
          |          | |  |payload   |  |detection|  | |
          |          | |  |detection |  |         |  | |
          |          | |  +-----+----+  +---+-----+  | |
          | +--------v-v-----+  |           |        | |
          | |header detection|  |           |        | |
          | +----------+-----+  |           |        | |
          |            |        |           |        | |
          |          +-v--------v-----------v-+      | |
          +----------+    Retransmission      +---+  | |
                     +------------------------+   v  | |
                                                 NO  | |
                                                  +  | |
                                  +---------------v--v-v-------+
                                  |repeat the steps in Figure 2|
                                  +----------------------------+

              Figure 3 Processing Rules in intermediate nodes

   The processing rules in intermediate nodes are shown in Figure 3.
   When intermediate nodes receive packets, they first read Checksum
   Block.


Li                   Expires September 30, 2018               [Page 8]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018


   If ToC = 00 (checksum of primary block), the primary block (header)
   will be checked. If ToC = 10(checksum of primary block and payload
   block), storage space will be detected and if free storage is more
   than 50%, the primary block will be checked. If free storage is less
   than 50%, both the primary block and the payload block will be
   checked. If ToC = 01 (checksum of payload block), storage space will
   be detected and if free storage is less than 50%, the payload block
   will be checked. If errors are detected, retransmission will be
   called. If no errors are detected, or ToC = 11 (no checksum of either
   primary block or payload block), or free storage is more than 50%
   when ToC = 01, the following processing steps will be the same as the
   source nodes in Figure 2. However, if the CoD of received packets is
   10, there is no need to collect the network status and calculate new
   CoD. In other words, the decision of mandatory detection at the
   source node by the end users should not be modified by the
   intermediate nodes.



4.3. Processing Rules in Destination Nodes

                          +---------------+
          ^--------------->Receive packets|
          |               +-------+-------+
          |                       |
          |             +---------+---------+
          |      +------+Read Checksum Block+-+
          |      |      +--+---------+------+ |
          |      |         |         |        |
          |   +--v---+ +---v--+  +---v--+ +---v--+
          |   |ToC=00| |ToC=01|  |ToC=10| |ToC=11|
          |   +----+-+ +---+--+  +--+---+ +---+--+
          |        |       |        |         |
          |      +-v-------v--------v-+       |
          |      | Checksum detection |       |
          |      +----------+---------+       |
          |                 |                 |
          |         +-------v------+          |
          +-+Yes<---+Retransmission|          |
                    +-------+------+          |
                            |                 |
                            |      +----------v------+
                            +>No+-->Cache in the node|
                                   +-----------------+

              Figure 4 Processing Rules in Destination Nodes



Li                   Expires September 30, 2018               [Page 9]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018


   The processing rules in destination nodes are shown in Figure 4. When
   destination nodes receive packets, they will read the checksum block.
   If ToC is 00 (checksum of primary block), or 01 (checksum of payload
   block), or 10 (checksum of primary block and payload block), the
   related blocks will be checked by a designated algorithm. If errors
   are detected, retransmission will be called. If no errors are
   detected, or ToC is 11, the received packets will be regarded as
   acceptable and be cached and stored in local.



5. Error correcting code-based detecting mechanism

   In this section, we introduce a detecting mechanism that based on the
   idea of error correcting code. This mechanism is designed to reduce
   the checksum computing times.

            hash +--+                         hash +---+
   x1+x2+x4+---->+h1|             x1'+x2'+x4'+---->+h1'|
                 |  |                              |   |
            hash |  +------------>            hash |   |
   x1+x3+x4+---->+h2|transmission x1'+x3'+x4'+---->+h2'|
                 |  +------------>                 |   |
            hash |  |                         hash |   |
   x2+x3+x4+---->+h3|             x2'+x3'+x4'+---->+h3'|
                 +-++                              +-+-+
                   |                                 |
                   +---------------------------------+
                                compare

          Figure 5 Error Correcting Code-based Detecting Mechanism

   We introduce the mechanism taking hamming code as an example. As is
   shown in Figure 5, we suppose that a file is transmitted in the form
   of four packets, x1, x2, x3, and x4. The source node and the
   destination node will compute the checksum for each of the four
   packet in the traditional way. But in our design, the source node
   conducts the hash operation for data (x1+x2+x4) and get h1. Then the
   source node conducts the same operation for data (x1+x3+x4) and
   (x2+x3+x4), and get h2 and h3. h1, h2 and h3 are carried along with
   the packets. The destination node just need to conducts hash
   operation three times, for (x1+x2+x4), (x1+x3+x4) and (x2+x3+x4), and
   get h1', h2', and h3'. Then the destination node should compare h1,
   h2 and h3 with h1', h2', and h3'. If h1, h2 and h3 are the same as
   h1', h2', and h3', then, there are no wrong data in the four packets.
   If one or several of h1, h2 and h3 is different from h1', h2', and



Li                   Expires September 30, 2018              [Page 10]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018


   h3', then the packet that carries wrong data can be located and
   retransmission will be called to retransmit the wrong packet.

   In this way, the checksum computing times can be reduced.



6. Security Considerations

   The Multi-strategy Based Payload Integrity Assurance method provides
   data integrity service for the Bundle Protocol, which is a necessary
   aspect of security problems.

   The proposed method can suit with the Payload Integrity Block (PIB)
   and Bundle Authentication Block (BAB) in Bundle Security Protocol
   [RFC6257].



7. IANA Considerations

   This specification allocates a codepoint from the "Bundle Block
   Types" registry defined in [RFC6255].

   Additional Entry for the Bundle Block Type Codes Registry:

               +-------+---------------+--------------+
               | Value | Description   |  Reference   |
               +--------------------------------------+
               |   20  |Checksum Block | This document|
               +-----------------------+--------------+

     Figure 6 Additional Entry for the Bundle Block Type Codes Registry



8. Conclusions

   The hybrid integrity assurance strategy proposed in this document
   describes how to ensure the different levels of integrity of bundles
   based on different environments.








Li                   Expires September 30, 2018              [Page 11]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018


9. References

9.1. Normative References

   [RFC4838]Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R.,
             Scott, K., Fall, K., and Weiss, H., "Delay-Tolerant
             Networking Architecture", RFC 4838, April 2007.

   [RFC5050] Scott, K., and Burleigh, S., "Bundle Protocol
             Specification", RFC 5050, RFC5050, November 2007.

   [RFC5325] Burleigh, S., Ramadas, M., and Farrell, S., "Licklider
             Transmission Protocol - Motivation", RFC 5325, September
             2008.

   [RFC5326] Ramadas, M., Burleigh, S., and Farrell, S., "Licklider
             Transmission Protocol - Specification", RFC 5326, September
             2008.

   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
             Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC6258] Symington, S., "Delay-Tolerant Networking Metadata
             Extension Block", RFC 6258, May 2011.

   [RFC6255] Blanchet, M., "Delay-Tolerant Networking (DTN) Bundle
             Protocol IANA Registries", RFC 6255, May 2011.

   [RFC6257] Symington, S., Farrell, S., Weiss, H., Lovell, P., "Bundle
             Security Protocol Specification ", RFC 6257, May 2011.



9.2. Informative References

   [WOOD09] Wood, L., Eddy, W., and Holliday, P., "A Bundle of Problems",
             Proc. Aerospace conference 2009 pp. 1-17.

   [I-D.templin-dtnhiaps-00] Templin, F., "Delay Tolerant Networking
             Header Integrity Assurance-Problem Statement", draft-
             templin-dtnhiaps-00 (Expires), March 2014.

   [I-D.ietf-dtn-bpsec-06] Birrane, E., "Bundle Protocol Security
             Specification", draft-ietf-dtn-bpsec-06, October 2017.





Li                   Expires September 30, 2018              [Page 12]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018


10. Acknowledgments

   The work in this document was supported by National High Technology
   of China ("863 program") under Grant No.2015AA015702.












































Li                   Expires September 30, 2018              [Page 13]

Internet-Draft   Hybrid Integrity Assurance Strategy        March 2018


   Authors' Addresses

   Taixin Li
   Beijing Jiaotong University
   Beijing, 100044, P.R. China

   Email: 14111040@bjtu.edu.cn


   Guanwen Li
   Beijing Jiaotong University
   Beijing 100044, P.R. China

   Email: 14120079@bjtu.edu.cn


   Huachun Zhou
   Beijing Jiaotong University
   Beijing 100044, P.R. China

   Email: hchzhou@bjtu.edu.cn



























Li                   Expires September 30, 2018              [Page 14]