18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

When the gateway receives the access carrier from the no<strong>de</strong> N 7 , it begins by <strong>de</strong>crypting<br />

each secret information, from E G (k 1 ) to E G (k 6 ). By doing this, it discovers the<br />

route that the carrier took and it can start <strong>de</strong>crypting each layer of the onioned request.<br />

In the example above, the gateway peels off all onion’s layers using the obtained shared<br />

keys and finds two plain requests: req 3 and req 6 .<br />

3. Downlink Phase<br />

The downlink phase takes place as soon as the gateway receives an access request.<br />

When the gateway discovers a plain request, it obtains the <strong>de</strong>sired Internet data on behalf<br />

of the requester. After receiving the data, the gateway encapsulates it into a downlink<br />

packet. This packet may contain data requested by different no<strong>de</strong>s. In or<strong>de</strong>r to <strong>de</strong>livery<br />

the data requested, the gateway sends the downlink packet through an anonymous route.<br />

This route is carefully chosen by the gateway to inclu<strong>de</strong>, not only the requesters, but some<br />

dummy no<strong>de</strong>s.<br />

The downlink packet’s content is structured as an onion, similar to the<br />

data carrier. Each onion’s layer may contain downlink data and the address<br />

of the next hop in the route. The downlink packet has the following format:<br />

E k1 (E k2 (E k3 (...E kl (G, down l , E G (nonce)), ...N 4 , down 3 ), N 3 , down 2 ), N 2 , down 1 ),<br />

where down i is the downlink data <strong>de</strong>stined to the requester N i and E G (nonce) is an<br />

unique value inclu<strong>de</strong>d by the gateway for <strong>de</strong>livery confirmation purpose. Besi<strong>de</strong>s the<br />

downlink data, down i also contains the reqId. It is inten<strong>de</strong>d to link the downlink traffic<br />

with a given access request. Additionally, similar as in the data carrier, the gateway<br />

pads down i with dummy bits in those layers where no data need to be inclu<strong>de</strong>d. In the<br />

innermost layer of onion, we have the information <strong>de</strong>stined to last no<strong>de</strong> of the route N l ,<br />

which should forward the packet to the gateway’s address (G).<br />

The downlink protocol begins when the gateway sends the onion to the first no<strong>de</strong><br />

in the route. Each mesh no<strong>de</strong> <strong>de</strong>crypts one layer, checks for any downlink data, verifies<br />

the next hop’s address and then forward the packet to it. Note that before forwarding, a<br />

no<strong>de</strong> N i removes both down i and N i+1 from its corresponding layer. Every mesh no<strong>de</strong><br />

performs the same operation along the route, even if the down i is not a real downlink traffic.<br />

This protocol continues until the packet reaches the last no<strong>de</strong> in the route. This no<strong>de</strong><br />

performs the operations <strong>de</strong>scribed before and then forwards the packet to the gateway.<br />

The packet’s content at this point is only E G (nonce). The gateway receives this data and<br />

verifies that the packet visited every no<strong>de</strong> of the route. Hence, this information works as<br />

a <strong>de</strong>livery confirmation mechanism.<br />

From the example presented in the access phase, suppose the gateway constructs<br />

a downlink packet to <strong>de</strong>livery data to the requester no<strong>de</strong>s N 3 and N 6 . The dummy no<strong>de</strong>s<br />

inclu<strong>de</strong>d in downlink route will be N 8 , N 9 , N 10 , and N 11 . The gateway makes an onion<br />

to target the six no<strong>de</strong>s of the route in the following or<strong>de</strong>r: N 8 → N 9 → N 3 → N 10 →<br />

N 6 → N 11 . The message flow, from the gateway until the no<strong>de</strong> last no<strong>de</strong> N 11 , is as<br />

follows:<br />

345

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!