Information-Centric Networking & the Ψ Architecture

51
Information-Centric Networking & the Ψ Architecture George C. Polyzos Mobile Multimedia Laboratory Department of Informatics Athens University of Economics & Business Athens, Greece [email protected] Dept. of Computer Science & Engineering University of California, San Diego [email protected]

description

Information-Centric Networking & the Ψ Architecture. George C. Polyzos. ICN talk Outline. Introduction, motivation, overview The Pub/Sub Internet ( Ψ ) Architecture pub-sub, rendezvous i dentifiers forwarding/ LIPSIN p rototypes, testbeds , and evaluation S ecurity aspects - PowerPoint PPT Presentation

Transcript of Information-Centric Networking & the Ψ Architecture

Page 1: Information-Centric Networking & the  Ψ  Architecture

Information-Centric Networking& the Ψ Architecture

George C. Polyzos

Mobile Multimedia LaboratoryDepartment of Informatics

Athens University of Economics & BusinessAthens, Greece

[email protected]://mm.aueb.gr/

Dept. of Computer Science & EngineeringUniversity of California, San Diego

[email protected]://cs.ucsd.edu/~polyzos/

Page 2: Information-Centric Networking & the  Ψ  Architecture

[email protected] 2

ICN talk Outline

Introduction, motivation, overview The Pub/Sub Internet (Ψ) Architecture

pub-sub, rendezvous identifiers forwarding/LIPSIN prototypes, testbeds, and evaluation

Security aspects Mobility support Continuous Media/Multimedia The role of Satellites Discussion & Conclusion

Page 3: Information-Centric Networking & the  Ψ  Architecture

Connecting Wires the past…

Interconnecting Computers the current Internet evolutionary development … started decades earlier

Interconnecting Information the Future Internet revolutionary research

10-15 years in the future tussle resolution at or near run-time Trust-to-Trust principle

InternetHistory and Outlook

At the beginning… cooperation; no competition… no commercial traffic! endpoint-centric services/E2E

Now… Content distribution…

>50% of traffic today is video↑ Overlays… DPI by ISPs… Trust? Endpoint trust?

viruses, phishing, DoS attacks… E2E?

NAT, firewalls, middleboxes, CDNs The sender has the power… Tussles…

e.g.: privacy vs. accountability

towards…Information-Centric Networking

[email protected] 3

Page 4: Information-Centric Networking & the  Ψ  Architecture

[email protected] 4

Publish-Subscribe Internet Vision information centrism

everything is information & information is everything Recursive & and generalized use of publish-subscribe

enables dynamic change of roles between actors Network cache

publishes info (cached) subscribes to get info to cache

Access Points publish ID mobiles subscribe

Objectives Specify, implement, & test

an internetworked pub/sub architecture follow a clean-slate design approach

Perform qualitative and quantitative evaluation Security and socio-economics important! Migration and incentive scenarios important (e.g., overlay)!

Page 5: Information-Centric Networking & the  Ψ  Architecture

[email protected] 5

Our ICN-related Research Projects PSIRP: Publish Subscribe Internet Routing Paradigm

FP7 ICT STREP, 2008-2010 the basis focus on (inter)-networking

PURSUIT: Publish Subscribe Internet Technologies FP7 ICT STREP, 2010-2013

extending, above & below the Internet layer optical, wireless, mobility, transport…

Euro-NF: Anticipating the Network of the Future—From Theory to Design FP7 ICT Network of Excellence, 2008-2012

ASPECTS, GOVPIMIT, E-key-nets EIFFEL: Evolved Internet Future For European Leadership

FP7 ICT SSA, 2008-2010; Think-Tank continued June 2011 TT @ MIT: Information-Centric Networking

φSAT: The Role of Satellites in Future Internet Services European Space Agency funded 2011-2013

Page 6: Information-Centric Networking & the  Ψ  Architecture

[email protected] 6

ICNtimeline

Van Jacobson

papers/talks projects

“A Survey of Information-Centric Networking Research,” forthcoming

CCN

Page 7: Information-Centric Networking & the  Ψ  Architecture

[email protected] 7

ICN Research Community workshops…

with ACM SIGCOMM ICN 2011 (Toronto) ICN 2012 (Helsinki) ICN 2013 (Hong Kong):

3rd ACM SIGCOMM ICN workshop– Abstract: March 10– Paper: March 17

with IEEE INFOCOM NOMEN 2012 NOMEN 2013

ICNRG@IERTF Journal & Magazines Special Issues

Page 8: Information-Centric Networking & the  Ψ  Architecture

[email protected] 8

The PSI (Ψ) Architecture

Pub/Sub Internet Architecture

Clean-Slate Native

Two different prototype implementations exist Blackhawk (PSIRP) Blackadder (PURSUIT)

Page 9: Information-Centric Networking & the  Ψ  Architecture

[email protected] 9

Basic PSI Functions Publications

information/content metadata

Subscriptions (interests) asynchronous

& in any order Rendezvous: Matches

publications with subscriptions & initializes the forwarding process

Topology: Monitors the network and it creates information delivery paths

Forwarding: Implements information forwarding

Page 10: Information-Centric Networking & the  Ψ  Architecture

[email protected] 10

Identifiers

Page 11: Information-Centric Networking & the  Ψ  Architecture

[email protected] 11

Ψ Publication

N. Fotiou, D. Trossen, G.C. Polyzos, “Illustrating a Publish-Subscribe Internet Architecture,” Telecommunication Systems, Springer, vol. 52, no. 3, pp. 233-245, 2012 (Special Issue on ‘Future Internet Services and Architectures: Trends and Visions).

Page 12: Information-Centric Networking & the  Ψ  Architecture

[email protected] 12

Ψ Subscription

Page 13: Information-Centric Networking & the  Ψ  Architecture

[email protected] 13

‘Caching’ or Multiple Information Providers & Multiple Paths

G. Xylomenos, et al., “Caching and Mobility Support in a Publish-Subscribe Internet Architecture,” IEEE Communications Magazine, feature topic on ‘Information-Centric Networking,’ vol. 50, no. 7, pp. 52-58, July 2012.

Page 14: Information-Centric Networking & the  Ψ  Architecture

[email protected] 14

Resource Sharing / Multicast

Page 15: Information-Centric Networking & the  Ψ  Architecture

[email protected] 15

Building Blocks in Ψ: Bubbles Needed to implement the

3 basic functions:Rendezvous, Topology & Forwarding (RTF)

The bubble concept is akin to the current layering model

The basic building block of functionality at all levels

from OS through LAN to Global Internetwork

Bubbles offer availability and extensibility through the recursive execution of basic functions

Page 16: Information-Centric Networking & the  Ψ  Architecture

[email protected] 16

Secure Forwarding Mechanism Forwarding based on Bloom filter (called zFilter) that

contains all the link IDs through which a packet has to travel Supports multicast Hashing

False positives Limitations in size

Hierarchical / inter-networks Link identifiers are unique per information flow zFilter creation involves an encryption mechanism

DoS attack resistant Almost impossible to

redirect an information flow send arbitrary packets to a destination

Page 17: Information-Centric Networking & the  Ψ  Architecture

[email protected] 17

zFilters Based Forwarding

P. Jokela, et al., “LIPSIN: Line Speed Publish/ Subscribe Inter-networking,” Proc. ACM SIGCOMM 2009.

Page 18: Information-Centric Networking & the  Ψ  Architecture

[email protected] 18

Prototype Implementations & Testbeds

PSIRP Testbed (w/ Blackhawk)• 6 countries: UK, FI, GR, D, BU, US

• In addition: Belgium during ICT demos• Tunneled over the public Internet

• +dedicated fiber where available

PURSUIT Testbed (w/ Blackadder)• 25 nodes• 5 countries: UK, FI, GR, D, US• Tunneled (VPN)

• over the public Internet

PURSUIT

PSIRP

D. Trossen and G. Parisis, “Designing and realizing an information-centric internet,” IEEE Communications Magazine, vol. 50, July 2012. - https://github.com/fp7-pursuit/blackadder

Page 19: Information-Centric Networking & the  Ψ  Architecture

Caching and replication

All content sources are equivalent in PSI Origin, cache, or replication point Chunks can be retrieved from different sources Sources are visible to the network Network-level caching

Caching vs. replication Similar to the user, different to the network Replication is planned (as in CDNs) Caching is opportunistic (as in P2Ps) PSI handles both in a unified manner

[email protected] 19

Page 20: Information-Centric Networking & the  Ψ  Architecture

On-path caching

Very lightweight bypasses

rendezvous network

Good for multicast error

control

[email protected] 20

Local RENEu

Local RENER

Sub

Internet

Global RENE

Sub

RP

1b

2

3

Sub2

Pub

4

FN

Sub1

5

1a

Page 21: Information-Centric Networking & the  Ψ  Architecture

Off-path caching

Uses the rendezvous network

to serve more users

Good for local

(access network) caching

[email protected] 21

u

RSub

Internet

Sub

RP

1

2

3

Sub

Pub

Cache

4a 4b

Local RENE

Local RENE

Global RENE

Page 22: Information-Centric Networking & the  Ψ  Architecture

Content replication

The rendezvous network chooses the best source

Good for CDN-like proactive replication

[email protected] 22

RPSub

Internet CDN

1

2

3a

4b

3b

Sub

Pub

4a

Local RENE

Local RENE

Global RENE

Page 23: Information-Centric Networking & the  Ψ  Architecture

[email protected] 23

Security Requirements

Publications confidentiality publications should not be revealed to unauthorized subscribers

Subscription confidentiality user subscriptions should be kept secret

Integrity, Availability Authentication, Anonymity Accountability Information Scoping

Page 24: Information-Centric Networking & the  Ψ  Architecture

[email protected] 24

Scopes: Ψ’s Information Firewalls

Scopes allow for information location as well as for control of information dissemination

Can be physical…. e.g., a sub-network

… or logical e.g., my friends in Facebook

In scopes, access control and accounting mechanisms are/will be implemented

Page 25: Information-Centric Networking & the  Ψ  Architecture

[email protected] 25

Access Control Enforcement Delegation Motivation

Kazaa: 50% of versions and copies polluted [INFOCOM’05, Liang et al.] Kazaa: 15% infected by 52 different viruses [SIGCOMM06, Shin et al.] Limewire: 68% of executables, archives is malware [SIGCOMM’06, Kalafut et al.]

Observations users can change behavior,

information cannot! Information identification is easier

Hash function vs. Certificates Design

only positive, implicit votes only 1 vote /item /publisher no communication overhead

weight of a vote: 1/(Σ votes of pub in this set )α

N. Fotiou, G. Marias, G.C. Polyzos, “Access Control Enforcement Delegation for Information-Centric Networking Architectures,” Proc. ACM SIGCOMM ICN, August 2012.

Page 26: Information-Centric Networking & the  Ψ  Architecture

[email protected] 26

Information Identification

facebook.com/nikos/pics/ IMG32010234

May give a location hint, denote the principal/owner

Associated with an access control policy

Handled by a (set of ) dedicated network node(s)

Identifies uniquely the information object (globally or within the prefix)

Prefix Suffix

• Users can create prefix, advertise prefix/suffix pairs, request prefix/suffix pairs

Page 27: Information-Centric Networking & the  Ψ  Architecture

[email protected] 27

PSI Implementation Prefix: Scope Identifier (SId) Suffix: Rendezvous Identifier (RId) SIds are managed by the Rendezvous node

Users can advertise data and subscribe to data Information flow:

Define access control policy: who can advertise, who can subscribe

Provide Credentials

A subscriber has properly authenticated himself and requests item X

Page 28: Information-Centric Networking & the  Ψ  Architecture

[email protected] 28

Benefits

Consumer credentials protected Minimum user intervention RP has no access to consumer’s personal information RP does not have to implement any access control policy Access control policies can be re-used

Even by users who do not know their content “Access Control Store”

Access control policies can be easily modified

Page 29: Information-Centric Networking & the  Ψ  Architecture

[email protected] 29

Mobility and Privacysupport Bubbles support mobility as well as location privacy

N. Fotiou, K.V. Katsaros G.C. Polyzos, M. Särelä, D. Trossen, G. Xylomenos,“Handling Mobility in Future Publish-Subscribe Information-Centric Networks,” Telecommunication Systems, Springer,Special Issue on ‘Mobility Management in the Future Internet,’ to appear.

Page 30: Information-Centric Networking & the  Ψ  Architecture

[email protected] 30

Packet Level Authentication (PLA)

Per packet public key cryptographic operations are possible

at wire speed The network carries only authentic data

Requires third-party certificates Need not be implemented at all nodes

Selected key nodes PLA offers significant energy efficiency Implemented in NetFPGAs

Page 31: Information-Centric Networking & the  Ψ  Architecture

[email protected] 31

Security Characteristics of Ψ Pub/Sub restores the imbalance of power between sender

and receiver(s) No information flow until explicit signal for

Interest for specific piece of information Anti-Spam mechanism

Availability of a specific piece of information Anti-DoS mechanism

Pub/Sub facilitates Anonymity Mobility Multihoming

Message aggregation Resource sharing (e.g., with multicast)

Page 32: Information-Centric Networking & the  Ψ  Architecture

[email protected] 32

InfoRanking: lightweight mechanism to distinguish and isolate polluted information Motivation

Kazaa: 50% of versions and copies polluted [INFOCOM’05, Liang et al.] Kazaa: 15% infected by 52 different viruses [SIGCOMM06, Shin et al.] Limewire: 68% of executables, archives is malware [SIGCOMM’06, Kalafut et al.]

Observations users can change behavior, information cannot! Information identification is easier

Hash function vs. Certificates Design

only positive, implicit votes only 1 vote /item /publisher no communication overhead

weight of a vote: 1/(Σ votes of pub in this set )α

N. Fotiou, G. Marias, G.C. Polyzos, “Information Ranking in Content-Centric Networks,” Proc. Future Network & Mobile Summit, Florence, Italy, June 2010.

Page 33: Information-Centric Networking & the  Ψ  Architecture

Security & Privacy E2E direct trust not applicable

– Current Internet does not support it either– Socioeconomic trust through mediators (e.g., Rendezvous Providers) D. Lagutin, K. Visala, A. Zahemszky, T. Burbridge, G.F. Marias, “Roles and Security in a

Publish/Subscribe Network Architecture,” Proc. IEEE ISCC 2010, Bologna, Italy, June 2010. Users change behavior, content does not

– Rely on new methods to evaluate content integrity and authenticity– Reputable Content N. Fotiou, G.F. Marias, G.C. Polyzos, "Fighting Spam in Publish/Subscribe Networks Using

Information Ranking," Proc. 6th Conf. on Next Generation Internet, Paris, France, June 2010. End-user privacy can be effectively supported in ICN (@ internetwork level)

– Who asks for what content hidden from content provider, caches– Pub/Sub matching through trusted mediator service (e.g., Rendezvous providers)

– BUT privacy from Rendezvous providers becomes more of an issue Spam & malicious content distribution is blocked

– There is no unsolicited traffic in the network!• Content is delivered after explicit request

– New adversary models P. Nikander, G.F. Marias, “Towards Understanding Pure Publish/Subscribe Cryptographic

Protocols,” Cambridge Security Protocols Workshop, June 2008 .

[email protected] 33

Page 34: Information-Centric Networking & the  Ψ  Architecture

[email protected] 34

Advantages of PSI in Mobility Support Decoupling IDs from location Publish/Subscribe is asynchronous and multicast

Adapts better to frequent mobility Publishers & Subscribers can seamlessly & simultaneously move

Data (packets) are identified independently from source or destination Information (cached? content) is still transparently available

Routing and Forwarding decoupling IDs from location is a major advantage

locations are ephemeral no need for triangular routing ingress filtering problem anycast choice of the best source of content

Mobility & user behavior prediction together with proactive caching/prefetching can be used to enhance mobility support

G. Xylomenos et al., “Caching and Mobility Support in a Publish-Subscribe Internet Architecture,” IEEE Communications Magazine, July 2012.

Page 35: Information-Centric Networking & the  Ψ  Architecture

[email protected] 35

Proactive Selective Neighbor Cachingfor enhancing Mobility Support in ICNMobility Delay can be reduced by using proxies to pre-fetch and cache data

approaches Reactive Durable subscriptions Proactive

Proactive Selective Neighbor Caching mobile initially connected to proxy i select an optimum subset of neighbor proxies

i will send the mobile’s subscriptions, and which will proactively cache

information items matching these subscriptions if the mobile connects to one of these proxies then it can immediately receive information items it did not receive due to its disconnection

Cost Function:

X. Vasilakos et al. “Proactive Selective Neighbor Caching for enhancing Mobility Support in Information-Centric Networks,” Proc. ACM SIGCOMM ICN, August 2012.

Page 36: Information-Centric Networking & the  Ψ  Architecture

[email protected] 36

Multimedia over Ψ Motive: Multimedia over Ψ

“YouTube” a la Ψ …

Streaming videos without RTP/TCP/IP only native Ψ

Basic Components of the application:

Publisher: the owner of the video Subscriber: the user that seeks to

view the video

Technologies Involved

We tried different applications

Video Audio/voice (VoPSI) ...

Java- JMF player

JPSIRP

JNI

PSI

Page 37: Information-Centric Networking & the  Ψ  Architecture

[email protected] 37

Publish Videos Publish a video or a directory

with multiple videos Define the scope for the video

she uploads to the network Currently done via local

exchange of video knowledge

Subscribe to a Video Search for the desirable video

using the name of the video Currently done via local exchange

of information Subscribe to its PSI-level identifiers Play the video while downloading

Stream Source(e.g. VLC)

Stream Publisher

Local UDP Socket

Publication

Stream Sink(e.g. VLC)

Stream Subscriber

Local UDP Socket

Publication

Publish new versionswith same RId

Subscribe to RId andlisten to updates

Receive datagramsinto a publication buffer

Send updated dataas datagrams

NOTE: The publisher knows the subscriber set for this RId, sends the metadata directly to the subscribers; no rendezvous. Subscriber with metadata for a new version, subscribes to the corresponding data chunks.

Page 38: Information-Centric Networking & the  Ψ  Architecture

[email protected]

Optimization of Real-Time Media DistributionExploit1. Functional organization

Item resolution decoupled from forwarding (path establishment)2. In-network resources

TM nodes → (logically) centralized path/tree formation 3. Stateless multicast forwardingCompute minimum cost (Steiner) trees for multicast delivery Cost of optimization:

Signaling cost: resolve the subscription → analogous to a DNS or DHT resolution

Computation delay at TM Evaluation: Emulation of AS 224 (Norwegian Univ. & Research Network)

233 routers, 75 access routers → 75 PSI access networks… For 90% of subscriptions, delay (Steiner - Shortest-path) < 2ms; For 99.6%, < 60ms Steiner-tree byte footprint compared to Shortest-path trees: - 30%, multiple unicasts: -

48%

C. Tsilopoulos et al. “Efficient Real-time Information Delivery in Future Internet Publish-Subscribe Networks,” Proc. IEEE ICNC, San Diego, CA, January 2013.

38

Page 39: Information-Centric Networking & the  Ψ  Architecture

[email protected] 39

An Information-Centric Overlay Network Architecture for Content Distribution and Mobility Support

Ph.D. Dissertation by Konstantinos Katsaros Multicast

Router Assisted Overlay Multicast (RAOM) Deploying multicast functionality in an overlay fashion

Multicast & Caching MultiCache

Enabling caching of data delivered by multicast trees Adapting to the inter-network structure

H-Pastry Canonical version of Pastry

Mobility Support Overlay Multicast Assisted Mobility (OMAM)

Revisiting multicast assisted mobility

K.V. Katsaros, G. Xylomenos, G.C. Polyzos, “MultiCache: an Overlay Architecture for Information-Centric Networking,” Computer Networks, vol. 55, no. 4, pp. 936-947, Special Issue on ‘Architectures and Protocols for the Future Internet,’March 2011.

Page 40: Information-Centric Networking & the  Ψ  Architecture

[email protected] 40

0 5 10 15 20 25 30 35 40 45 50 55 600

100

200

300

400

Initial deployment

Fast ICN adoption

Saturation

time

# of ICN adopters

φSAT: The role of Satellites in FI Services Aim:

To investigate the technicalfeasibility & business viabilityof the integration of SatComwith terrestrial ICN architectures

Results Methodology to identify application/service scenarios where the

capabilities of SatCom and ICN bring highest techno-economic gains Key SatCom capabilities: Broadcast/Multicast, Wide Coverage Key ICN capabilities: Data aggregation, Multipath

Routing, Mobility Support, In-network Caching Candidate scenarios identified

Hybrid Broadcast netTV M2M Communications 4G Backhauling

Socio-economic evaluation Market evolution for each scenario

Data Transport

Name Resolution

Publisher

Subscriber

Name Server

Forwarding Node

Page 41: Information-Centric Networking & the  Ψ  Architecture

[email protected] 41

Conclusions ICN is well positioned to address

caching, mobility, multihoming, traffic management/QoS, security... evolution: tussles resolved at or near run-time

PSI chose specific name/ID resolvers (for each scope: RP), rather than flooding separation or functions

separate forwarding from resolution (no reverse path) centralized aspects, optimizations, policies well matched to SDN/OpenFlow—all optical forwarding

The PSI architecture inherits the advantages of ICN & the publish/subscribe paradigm

in particular the security ones, but…. PSI selected and added specific security mechanisms

Secure Forwarding (zFilters), Scopes, Bubbles, Packet Level Authentication, Information Ranking

Page 42: Information-Centric Networking & the  Ψ  Architecture

[email protected] 42

PSI: Key Observations and Issues

RIDs: hash of content vs. not... Implications of uniquely indentifying content

Caching (enabled/facilitated) SIDs as special case of RIDs pub/sub “recursively”

at many levels of the hierarchy/network from wire-level to the global Internet perhaps used to realize reliable transport

Granularity of items (to publish/subscribe to): objects, chunks, packets… pub/sub model: documents vs. channels

versions (& IDs) of publications? Algorithmic Identifiers (RIDs)

nice for intra-channel IDs... asynchronous (subscribe before publish) search engines probably still important (at different level?) Wireless?

Page 43: Information-Centric Networking & the  Ψ  Architecture

[email protected] 43

More Observations, Questions & Issues

Information- vs. Content-centric vs. Named Data vs. pub/sub vs. ... overlay vs. clean-slate vs. hybrid/integrated…

special-purpose nets only? Not global? Rendezvous

powerful trusted

has lots of information... target of DOS attacks networks of RPs = RN belongs to different entities than network provider? competing RNs RP functionality needed at multiple & different levels

Intranet, global... on a wire...

Page 44: Information-Centric Networking & the  Ψ  Architecture

Thank you!

George C. PolyzosFaculty: V.A. Siris, G. Xylomenos, G. MariasPostDocs: C.N. Ververidis, K.V. Katsaros, P. FrangoudisDoctoral cand.: N. Fotiou, C. Tsilopoulos, X. Vasilakos, C. Stais, I. Thomas

Mobile Multimedia LaboratoryDepartment of Informatics

Athens University of Economics and BusinessAthens, Greece

http://mm.aueb.gr/[email protected]

Visiting ProfessorDept. of Computer Science & Engineering

Jacobs School of EngineeringUniversity of California, San Diego

[email protected]

Information-Centric Networking & the Ψ Architecture

Page 45: Information-Centric Networking & the  Ψ  Architecture

[email protected] 45

Related Publications K.V. Katsaros, G. Xylomenos, G.C. Polyzos, “MultiCache: an Overlay Architecture for Information-

Centric Networking,” Computer Networks, vol. 55, no. 4, pp. 936-947, Elsevier, Special Issue on ‘Architectures and Protocols for the Future Internet,’ Guest Editors: T. Wolf & L. Eggert, March 2011.

N. Fotiou, D. Trossen, G.C. Polyzos, “Illustrating a Publish-Subscribe Internet Architecture,” Telecommunication Systems, Springer, vol. 51, no. 4, Special Issue on ‘Future Internet Services and Architectures: Trends and Visions,’ pp. 233 245, December 2012.

G. Xylomenos, X. Vasilakos, C. Tsilopoulos, V.A. Siris, G.C. Polyzos, “Caching and Mobility Support in a Publish-Subscribe Internet Architecture,” IEEE Communications Magazine, Special Issue on ‘Information-Centric Networking,’ vol. 50, no. 7, pp. 52-58, July 2012.

N. Fotiou, K. Katsaros, G.C. Polyzos, M. Sarela, D. Trossen, G. Xylomenos, “Handling Mobility in Future Publish-Subscribe Information-Centric Networks,” Telecommunication Systems, Springer, Special Issue on ‘Mobility Management in the Future Internet’ (to appear).

P. Zhang, N. Fotiou, B.E. Helvik, G.F. Marias, G.C. Polyzos, “Analysis of the effect of InfoRanking on content pollution in P2P systems,” Security and Communication Networks, John Wiley & Sons, Ltd. (to appear).

C. Doukas, N. Fotiou, G.C. Polyzos, I. Maglogiannis, “Cognitive and Context Aware Assistive Environments Using Future Internet Technologies,” Special Issue on ‘Cognitive Systems for Assistive Environments,’ Universal Access in the Information Society, Springer (to appear).

N. Fotiou, G.F. Marias, G.C. Polyzos, “Publish-Subscribe Internetworking Security Aspects,” in Trustworthy Internet, N. Blefari-Melazzi, G. Bianchi, L. Salgarelli, eds., Springer, May 2011 (pp. 3-15, http://www.springerlink.com/content/g0l4283hq1206128/fulltext.pdf).

Page 46: Information-Centric Networking & the  Ψ  Architecture

[email protected] 46

more … Related Publications K.V. Katsaros, C. Stais, G. Xylomenos, G.C. Polyzos, “On the Incremental Deployment of Overlay

Information Centric Networks,” Proc. Future Network & Mobile Summit, Florence, Italy, June 2010. N. Fotiou, G. Marias, G.C. Polyzos, “Information Ranking in Content-Centric Networks,” Proc.

Future Network & Mobile Summit, Florence, Italy, June 2010. N. Fotiou, G. Marias, G.C. Polyzos, “Towards a Secure Rendezvous Network for Future

Publish/Subscribe Architectures,” Proc. 3rd Future Internet Symposium, September 2010. N. Fotiou, G.F. Marias, G.C. Polyzos, “Fighting Phishing the Information-Centric way,” Proc. 5th

IFIP NTMS, Security Track, Istanbul, Turkey, May 2012. K.V. Katsaros, G. Xylomenos, G.C. Polyzos, “GlobeTraff: a traffic workload generator for the

performance evaluation of future Internet architectures,” Proc. 5th IFIP NTMS, May 2012. K.V. Katsaros, et al., “On Inter-domain Name Resolution for Information-Centric Networks,” Proc.

IFIP/TC6 Networking), Prague, Czech Republic, May 2012. G.F. Marias, N. Fotiou, G.C. Polyzos, “Efficient Information Lookup for the Internet of Things,”

Proc. First IEEE WoWMoM IoT-SoS, San Francisco, CA, June 2012. X. Vasilakos, et al., “Proactive Selective Neighbor Caching for enhancing Mobility Support in

Information-Centric Networks,” Proc. ACM SIGCOMM ICN'12, Helsinki, Finland, August 2012. N. Fotiou, G.F. Marias, G.C. Polyzos, “Access Control Enforcement Delegation for Information-

Centric Networking Architectures,” Proc. ACM SIGCOMM ICN'12, Helsinki, Finland, August 2012. K.P. Liolis, et al., “Satellite-Terrestrial Integration Scenarios for Future Information-Centric

Networks,” Proc. ICSSC, September 2012. V.A. Siris, C.N. Ververidis, G.C. Polyzos, K. Liolis, “Information-Centric Networking Architectures

for Integration of Satellites Into the Future Internet,” Proc. ESTEL, Rome, Italy, October 2012. C. Tsilopoulos, I. Gasparis, G. Xylomenos, G.C. Polyzos, “Efficient Real-time Information Delivery

in Future Internet Publish-Subscribe Networks,” Proc. IEEE ICNC, San Diego, CA, January 2013.

Page 47: Information-Centric Networking & the  Ψ  Architecture

47

φSAT Scenario #1: Hybrid broadcast netTV

Key drivers for this scenario identificationDTH Broadcasting: 1st market for telecom satellitesUnlimited potential for hybrid access

To bring a boost of the link capacity To increase availability of service and QoETo add a return link capability for interactive/added-value servicesTo enlarge service offer (e.g. number of programs for linear / on-demand TV) with several service providersTo favor partnerships and competitiveness and to lower costs

In this context, IP/TV over MPEG-based broadcast brings ease and flexibility for service integration

Common standards to any access networkE.g. service management, native e2e IP transport…New usages and trends of TV consumption

Page 48: Information-Centric Networking & the  Ψ  Architecture

48

Scenario #1: Hybrid broadcast netTV

Transit Networks

GEO Satcom Network

Content Provider Network

Media Servers

Security -AAA

GW

Fixed Access Network (xDSL, Cable,..)

RVS

RVS

RVS

RVS

RVS

RVS: RendezVous Servers

SD

RVS

RVS

Page 49: Information-Centric Networking & the  Ψ  Architecture

49

Smart Transport M2M use caseKey Challenges• Mobility support

ICN Specific Advantages• Information collection and

dissemination to/frommultiple sources/sinks

• Information aggregation• Traffic Prioritization• Mobility support• Delay tolerant communications • Reliable real-time SW upgrading

φSAT Scenario #2: Smart M2M Transport

Page 50: Information-Centric Networking & the  Ψ  Architecture

50

Key driver for this scenario Provides advantages in SatCom integration within the 4G/mobile Internet context given the aggressive video traffic growth levels in terrestrial mobile networks.Integrating satellite in a terrestrial 4G infrastructure allows Service Providers to extend their services towards isolated areas and enhance network capabilities for more efficient video content delivery, such as Evolved Multimedia Broadcast Multicast (eMBMS).

Satellite Network ConfigurationGEO or MEO topology In some areas terrestrial repeaters (such as in systems based on DVB-SH and –NGH) could also be used to boost the satellite signal, e.g. for reception in urban areas (Hybrid satellite –LTE system).

ICN potentialQoS based inter-component handover managementOpportunistic/proactive caching for satellite backhauled BSTraffic Aggregation & Caching for operator managed VAS

φSAT Scenario #3: Extended 4G Backhauling

Page 51: Information-Centric Networking & the  Ψ  Architecture

51

φSAT Scenario #3: Extended 4G Backhauling