NASA’s Disruption Tolerant Networking Challenge Series

Welcome to the NASA Disruption Tolerant Networking (DTN) project. DTN is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise.

Project Background

NASA is developing Disruption Tolerant Networking techniques in collaboration with industry and academia.  DTN is designed to provide reliable end-to-end delivery of information between nodes and to do so in an environment that experiences frequent connectivity disruptions and topology changes. Such a capability will directly support human and robotic space exploration, as well as have wide applicability to land-mobile and airborne terrestrial communications.

 

Click the image above to see an example scenario

Part of the reality of modern networks is the need to provide robust security capabilities through the use of an architecture that does not overly constrain user operability.  A major factor in such security architectures is the mechanism by which cryptographic keys are initialized, distributed and validated among members of a network in order to provide trusted and secure communications supporting confidentiality, authentication and integrity. Most key management approaches in use today rely on either pre-shared secrets (pre-shared public keys or pre-loaded private key pairs), or rely on knowledge of the network connectivity and topology to enable a trusted third party (certificate authority) to authenticate and mediate a “handshake” between two previously unknown nodes.


 

Click the image above to see an additional example scenario

 

In a connection disrupted network made up of nodes that come and go at random, it is very hard to base a key management approach on previous knowledge of trusted entities, communication paths, or pre-shared secrets.  Trusted network paths come and go (or disappear entirely).  Nodes enter and leave the network at random.  Pre-shared secrets may be distributed and “expire” before connections are reliably established to verify the credential is valid.  These problems drive the need for a new approach to key management and key exchange.

 

 


High Level Requirements

This project will need to devise a method by which cryptographic keys can be exchanged among peers in a DTN network suffering from network connectivity disruptions and random topology changes.  The method must function in the absence of previous knowledge of network members or pre-shared secrets.

The following requirements must be met:

  • Provide a method (logical / mathematical algorithm) for distribution of symmetric key pairs among previously unknown and un-validated network nodes in a disrupted network environment.
  • Provide a method (logical / mathematical algorithm) for generation, validation, distribution and authentication of asymmetric keys (public/private key pairs) in a disrupted network environment.
  • Provide a method (logical / mathematical algorithm) for detecting and protecting against invalid or malicious manipulation, intrusion, and / or interception of keys during the exchange and validation process.
  • Keys and processes must be of sufficient complexity and cryptographic strength to meet the U.S. Federal Information Processing Standards (NIST/FIPS).
  • Provide a method by which multiple, federated, key exchange and management domains can co-exist in the same network.
  • Provide a method by which keys and cryptographic messages of multiple classifications (low, medium, high) or multiple compartments (A, B, C) can co-exist in the same network.

For full details, please see the resource section. Specifically:

 

Atomized Project Plan

Contest Contest Type Start End
DTN Security – DTN Elements Documentation Content Creation 10/25/2013 11/20/2013
DTN Security – Network Elements Classification Architecture 11/14/2013 11/27/2013
DTN Security – Logic Puzzle Idea Conceptualization 11/22/2013 12/18/2013
DTN Security – Logic Puzzle Idea Part 2 Conceptualization 01/02/2014 01/19/2014
DTN Security – Logic Puzzle Solution Content Creation 01/17/2014 02/02/2014
Proof of Concept – DTN Security Puzzle Solution Simulator Assembly Competition 02/03/2014 02/19/2014
Proof of Concept – DTN Security Puzzle Solution Visualizer Assembly Competition 02/19/2014 03/07/2014
DTN Security Puzzle Solution Data Depth and Preparedness Bug Hunt Bug Hunt 03/07/2014 03/13/2014
DTN Security Puzzle Solution Challenge Quality Control Test Bug Hunt Bug Hunt 03/13/2014 03/19/2014
DTN Security Logic Puzzle Solution Marathon Match Marathon Match 03/28/2014 04/13/2014
DTN Security – Logic Puzzle Solution Specification Specification 04/18/2014 05/04/2014
DTN Security Key Architecture Architecture 05/04/2014 05/20/2014
System Assembly – DTN Security Environment Setup Assembly Competition 05/04/2014 05/20/2014
DTN Security Key Assembly Assembly Competition 05/20/2014 06/05/2014
DTN Security Key Test Scenarios Test Scenarios 05/20/2014 06/05/2014
DTN Security Key Bug Hunt Bug Hunt 05/31/2014 06/04/2014
DTN Security Key Test Suites Test Suites 06/05/2014 06/21/2014
Release Assembly – DTN Security Key Update Assembly Competition 06/21/2014 07/07/2014

Resources

Top