ABSTRACT
The existing Internet architecture lacks support for naming locations and resolving them to the myriad addressing mechanisms we use beyond IP. We propose the Spatial Name System (SNS) that allows for the assignment of hierarchical location-based names and for resolution schemes that are both global and local. Since we extend the DNS, our scheme allows for the integration of spatial names into existing applications and opens up new possibilities for sensor networks and augmented reality.
- 1987. Domain Names - Implementation and Specification. Request for Comments RFC 1035. Internet Engineering Task Force. https://doi.org/10.17487/RFC1035Google ScholarDigital Library
- 2014. Matrix. (2014). https://matrix.org/Google Scholar
- 2016. ActivityPub. (2016). https://www.w3.org/TR/activitypub/Google Scholar
- William Adjie-Winoto, Elliot Schwartz, Hari Balakrishnan, and Jeremy Lilley. 1999. The Design and Implementation of an Intentional Naming System. In Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles (SOSP '99). Association for Computing Machinery, New York, NY, USA, 186--201. https://doi.org/10.1145/319151.319164Google ScholarDigital Library
- Roy Arends, Geoffrey Sisson, David Blacka, and Ben Laurie. 2008. DNS Security (DNSSEC) Hashed Authenticated Denial of Existence. Request for Comments RFC 5155. Internet Engineering Task Force. https://doi.org/10.17487/RFC5155Google ScholarDigital Library
- Ran Atkinson and S. N. Bhatti. 2012. Identifier-Locator Network Protocol (ILNP) Architectural Description. Request for Comments RFC 6740. Internet Engineering Task Force. https://doi.org/10.17487/RFC6740Google ScholarDigital Library
- Richard Barnes, Jacob Hoffman-Andrews, Daniel McCarney, and James Kasten. 2019. Automatic Certificate Management Environment (ACME). Request for Comments RFC 8555. Internet Engineering Task Force. https://doi.org/10.17487/RFC8555Google ScholarDigital Library
- Norbert Beckmann, Hans-Peter Kriegel, Ralf Schneider, and Bernhard Seeger. 1990. The R-Tree: An Efficient and Robust Access Method for Points and Rectangles. In Proceedings of the 1990 ACM SIGMOD International Conference on Management of Data (SIGMOD '90). Association for Computing Machinery, New York, NY, USA, 322--331. https://doi.org/10.1145/93597.98741Google ScholarDigital Library
- Jon Louis Bentley. 1975. Multidimensional Binary Search Trees Used for Associative Searching. Commun. ACM 18, 9 (Sept. 1975), 509--517. https://doi.org/10.1145/361002.361007Google ScholarDigital Library
- Stuart Cheshire and Marc Krochmal. 2013. DNS-Based Service Discovery. Request for Comments RFC 6763. Internet Engineering Task Force. https://doi.org/10.17487/RFC6763Google ScholarDigital Library
- Stuart Cheshire and Marc Krochmal. 2013. Multicast DNS. Request for Comments RFC 6762. Internet Engineering Task Force. https://doi.org/10.17487/RFC6762Google ScholarDigital Library
- S. Cheshire and M. Krochmal. 2013. RFC 6763: DNS-Based Service Discovery. (2013).Google Scholar
- Ovidiu Dan, Vaibhav Parikh, and Brian D. Davison. 2022. IP Geolocation through Reverse DNS. ACM Transactions on Internet Technology 22, 1 (Feb. 2022), 1--29. https://doi.org/10.1145/3457611Google ScholarDigital Library
- Ian Dickinson, Paul A. Vixie, Christopher Davis, and Tim Goodwin. 1996. A Means for Expressing Location Information in the Domain Name System. Request for Comments RFC 1876. Internet Engineering Task Force. https://doi.org/10.17487/RFC1876Google ScholarDigital Library
- Donald E. Eastlake 3rd, Ólafur Guðmundsson, Paul A. Vixie, and Brian Wellington. 2000. Secret Key Transaction Authentication for DNS (TSIG). Request for Comments RFC 2845. Internet Engineering Task Force. https://doi.org/10.17487/RFC2845Google ScholarDigital Library
- Ryan Thomas Gibb. 2022. Spatial Name System. (Nov. 2022). https://doi.org/10.48550/arXiv.2210.05036 arXiv:cs/2210.05036Google ScholarCross Ref
- Phillipa Gill, Yashar Ganjali, and Bernard Wong. 2010. Dude, Where's That {IP}? Circumventing Measurement-based {IP} Geolocation. In 19th USENIX Security Symposium (USENIX Security 10). https://www.usenix.org/conference/usenixsecurity10/dude-wheres-ip-circumventing-measurement-based-ip-geolocationGoogle Scholar
- John Graham-Cumming. 2014. The Weird and Wonderful World of DNS LOC Records. (April 2014). http://blog.cloudflare.com/the-weird-and-wonderful-world-of-dns-loc-records/Google Scholar
- Wesley Griffin and Jakob Schlyter. 2006. Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints. Request for Comments RFC 4255. Internet Engineering Task Force. https://doi.org/10.17487/RFC4255Google ScholarDigital Library
- Bamba Gueye, Artur Ziviani, Mark Crovella, and Serge Fdida. 2004. Constraint-Based Geolocation of Internet Hosts. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC '04). Association for Computing Machinery, New York, NY, USA, 288--293. https://doi.org/10.1145/1028788.1028828Google ScholarDigital Library
- Antonin Guttman. 1984. R-Trees: A Dynamic Index Structure for Spatial Searching. ACM SIGMOD Record 14, 2 (June 1984), 47--57. https://doi.org/10.1145/971697.602266Google ScholarDigital Library
- Andy Harter, Andy Hopper, Pete Steggles, Andy Ward, and Paul Webster. 2002. The Anatomy of a Context-Aware Application. Wireless Networks 8, 2 (March 2002), 187--197. https://doi.org/10.1023/A:1013767926256Google ScholarDigital Library
- David Hilbert. 1891. Ueber die stetige Abbildung einer Line auf ein Flächenstück. Math. Ann. 38, 3 (Sept. 1891), 459--460. https://doi.org/10.1007/BF01199431Google ScholarCross Ref
- Bob Hinden. 1995. IP Version 6 Addressing Architecture. Request for Comments RFC 1884. Internet Engineering Task Force. https://doi.org/10.17487/RFC1884Google ScholarDigital Library
- Paul E. Hoffman. 2023. DNS Security Extensions (DNSSEC). Request for Comments RFC 9364. Internet Engineering Task Force. https://doi.org/10.17487/RFC9364Google ScholarDigital Library
- Paul E. Hoffman and Patrick McManus. 2018. DNS Queries over HTTPS (DoH). Request for Comments RFC 8484. Internet Engineering Task Force. https://doi.org/10.17487/RFC8484Google ScholarDigital Library
- Xueheng Hu, Lixing Song, Dirk Van Bruggen, and Aaron Striegel. 2015. Is There WiFi yet? How Aggressive Probe Requests Deteriorate Energy and Throughput. In Proceedings of the 2015 Internet Measurement Conference (IMC '15). Association for Computing Machinery, New York, NY, USA, 317--323. https://doi.org/10.1145/2815675.2815709Google ScholarDigital Library
- Zi Hu, Liang Zhu, John Heidemann, Allison Mankin, Duane Wessels, and Paul E. Hoffman. 2016. Specification for DNS over Transport Layer Security (TLS). Request for Comments RFC 7858. Internet Engineering Task Force. https://doi.org/10.17487/RFC7858Google ScholarDigital Library
- Bradley Huffaker, Marina Fomenkov, and kc claffy. 2014. DRoP: DNS-based Router Positioning. ACM SIGCOMM Computer Communication Review 44, 3 (July 2014), 5--13. https://doi.org/10.1145/2656877.2656879Google ScholarDigital Library
- Brad Karp and H. T. Kung. 2000. GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom '00). Association for Computing Machinery, New York, NY, USA, 243--254. https://doi.org/10.1145/345910.345953Google ScholarDigital Library
- Ethan Katz-Bassett, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas Anderson, and Yatin Chawathe. 2006. Towards IP Geolocation Using Delay and Topology Measurements. In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement. ACM, Rio de Janeriro Brazil, 71--84. https://doi.org/10.1145/1177080.1177090Google ScholarDigital Library
- John C. Klensin. 2010. Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework. Request for Comments RFC 5890. Internet Engineering Task Force. https://doi.org/10.17487/RFC5890Google ScholarDigital Library
- Monica Kowalczyk, Johanna T. Gunawan, David Choffnes, Daniel J Dubois, Woodrow Hartzog, and Christo Wilson. 2023. Understanding Dark Patterns in Home IoT Devices. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (CHI '23). Association for Computing Machinery, New York, NY, USA, Article 179, 27 pages. https://doi.org/10.1145/3544548.3581432Google ScholarDigital Library
- Christian Kreibich, Nicholas Weaver, Boris Nechaev, and Vern Paxson. 2010. Netalyzr: Illuminating the Edge Network. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (IMC '10). Association for Computing Machinery, New York, NY, USA, 246--259. https://doi.org/10.1145/1879141.1879173Google ScholarDigital Library
- J. K. Lawder and P. J. H. King. 2000. Using Space-Filling Curves for Multi-dimensional Indexing. In Advances in Databases, Gerhard Goos, Juris Hartmanis, Jan Van Leeuwen, Brian Lings, and Keith Jeffery (Eds.). Vol. 1832. Springer Berlin Heidelberg, Berlin, Heidelberg, 20--35. https://doi.org/10.1007/3-540-45033-5_3Google ScholarCross Ref
- Patrick Lazik, Niranjini Rajagopal, Oliver Shih, Bruno Sinopoli, and Anthony Rowe. 2015. ALPS: A Bluetooth and Ultrasound Platform for Mapping and Localization. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems (SenSys '15). Association for Computing Machinery, New York, NY, USA, 73--84. https://doi.org/10.1145/2809695.2809727Google ScholarDigital Library
- Minzhao Lyu, Hassan Habibi Gharakheili, and Vijay Sivaraman. 2022. A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques. Comput. Surveys 55, 8, Article 162 (Dec. 2022). https://doi.org/10.1145/3547331Google ScholarDigital Library
- Anil Madhavapeddy, David Scott, and Richard Sharp. 2003. Context-Aware Computing with Sound. In UbiComp 2003: Ubiquitous Computing, Anind K. Dey, Albrecht Schmidt, and Joseph F. McCarthy (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 315--332.Google Scholar
- Paul Mockapetris and Kevin Dunlap. 1986. Implementation of the Domain Name System. In Proceedings of the 2nd Workshop on Making Distributed Systems Work (EW 2). Association for Computing Machinery, New York, NY, USA, 1--2. https://doi.org/10.1145/503956.503991Google ScholarDigital Library
- Robert Moskowitz, Petri Jokela, Tom Henderson, and Pekka Nikander. 2008. Host Identity Protocol. Request for Comments RFC 5201. Internet Engineering Task Force. https://doi.org/10.17487/RFC5201Google ScholarDigital Library
- Julio C. Navas and Tomasz Imielinski. 1997. GeoCast---Geographic Addressing and Routing. In Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '97). Association for Computing Machinery, New York, NY, USA, 66--76. https://doi.org/10.1145/262116.262132Google ScholarDigital Library
- Venkata N. Padmanabhan and Lakshminarayanan Subramanian. 2001. An Investigation of Geographic Mapping Techniques for Internet Hosts. ACM SIGCOMM Computer Communication Review 31, 4 (Oct. 2001), 173--185. https://doi.org/10.1145/964723.383073Google ScholarDigital Library
- Charles E. Perkins. 2002. IP Mobility Support for IPv4. Request for Comments RFC 3344. Internet Engineering Task Force. https://doi.org/10.17487/RFC3344Google ScholarDigital Library
- Jingjing Ren, Daniel J. Dubois, David Choffnes, Anna Maria Mandalari, Roman Kolcun, and Hamed Haddadi. 2019. Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach. In Proceedings of the Internet Measurement Conference (IMC '19). Association for Computing Machinery, New York, NY, USA, 267--279. https://doi.org/10.1145/3355369.3355577Google ScholarDigital Library
- Hanan Samet. 1984. The Quadtree and Related Hierarchical Data Structures. Comput. Surveys 16, 2 (June 1984), 187--260. https://doi.org/10.1145/356924.356930Google ScholarDigital Library
- Paul Schmitt, Anne Edmundson, Allison Mankin, and Nick Feamster. 2019. Oblivious DNS: Practical Privacy for DNS Queries. Proceedings on Privacy Enhancing Technologies 2019, 2 (April 2019), 228--244. https://doi.org/10.2478/popets-2019-0028Google ScholarCross Ref
- Henning Schulzrinne. 2006. Dynamic Host Configuration Protocol (DHCPv4 and DHCPv6) Option for Civic Addresses Configuration Information. Request for Comments RFC 4776. Internet Engineering Task Force. https://doi.org/10.17487/RFC4776Google ScholarDigital Library
- David Scott, Richard Sharp, Anil Madhavapeddy, and Eben Upton. 2005. Using Visual Tags to Bypass Bluetooth Device Discovery. SIGMOBILE Mob. Comput. Commun. Rev. 9, 1 (jan 2005), 41--53. https://doi.org/10.1145/1055959.1055965Google ScholarDigital Library
- Yuval Shavitt and Noa Zilberman. 2011. A Geolocation Databases Study. IEEE Journal on Selected Areas in Communications - JSAC 29 (Dec. 2011), 2044--2056. https://doi.org/10.1109/JSAC.2011.111214Google ScholarCross Ref
- Sudheesh Singanamalla, Suphanat Chunhapanya, Jonathan Hoyland, Marek Vavruša, Tanya Verma, Peter Wu, Marwan Fayed, Kurtis Heimerl, Nick Sullivan, and Christopher Wood. 2021. Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS. Proceedings on Privacy Enhancing Technologies 2021, 4 (Oct. 2021), 575--592. https://doi.org/10.2478/popets-2021-0085Google ScholarCross Ref
- N. Spring, R. Mahajan, D. Wetherall, and T. Anderson. 2004. Measuring ISP Topologies with Rocketfuel. IEEE/ACM Transactions on Networking 12, 1 (Feb. 2004), 2--16. https://doi.org/10.1109/TNET.2003.822655Google ScholarDigital Library
- Jing Su, James Scott, Pan Hui, Jon Crowcroft, Eyal De Lara, Christophe Diot, Ashvin Goel, Meng How Lim, and Eben Upton. 2007. Haggle: Seamless Networking for Mobile Applications. In Proceedings of the 9th International Conference on Ubiquitous Computing (UbiComp '07). Springer-Verlag, Berlin, Heidelberg, 391--408.Google ScholarCross Ref
- Jing Su, James Scott, Pan Hui, Jon Crowcroft, Eyal de Lara, Christophe Diot, Ashvin Goel, Meng How Lim, and Eben Upton. 2007. Haggle: Seamless Networking for Mobile Applications. In UbiComp 2007: Ubiquitous Computing. Vol. 4717. Springer Berlin Heidelberg, Berlin, Heidelberg, 391--408. https://doi.org/10.1007/978-3-540-74853-3_23Google ScholarCross Ref
- Zain Bin Tariq, Dost Muhammad Cheema, Muhammad Zahir Kamran, and Ijaz Haider Naqvi. 2017. Non-GPS Positioning Systems: A Survey. Comput. Surveys 50, 4 (Nov. 2017), 1--34. https://doi.org/10.1145/3098207Google ScholarDigital Library
- Martin Thomson, James Winterbottom, and Hannes Tschofenig. 2009. GEOPRIV Presence Information Data Format Location Object (PIDF-LO) Usage Clarification, Considerations, and Recommendations. Request for Comments RFC 5491. Internet Engineering Task Force. https://doi.org/10.17487/RFC5491Google ScholarDigital Library
- Robert L. Ullmann, Paul V. Mockapetris, Craig Everhart, and Louis A. Mamakos. 1990. New DNS RR Definitions. Request for Comments RFC 1183. Internet Engineering Task Force. https://doi.org/10.17487/RFC1183Google ScholarDigital Library
- Kenton Varda. 2014. Cap'n Proto. (2014). https://capnproto.org/Google Scholar
- Paul A. Vixie, Susan Thomson, Yakov Rekhter, and Jim Bound. 1997. Dynamic Updates in the Domain Name System (DNS UPDATE). Request for Comments RFC 2136. Internet Engineering Task Force. https://doi.org/10.17487/RFC2136Google ScholarDigital Library
- Dan Wing, Stuart Cheshire, Mohamed Boucadair, Reinaldo Penno, and Paul Selkirk. 2013. Port Control Protocol (PCP). Request for Comments RFC 6887. Internet Engineering Task Force. https://doi.org/10.17487/RFC6887Google ScholarDigital Library
Index Terms
- Where on Earth is the Spatial Name System?
Recommendations
Domain Name to IP Address Resolution System with Multiple Name Servers Adaptable to MANETs
TRUSTCOM '12: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and CommunicationsMobile Ad hoc networks (MANETs) may be split into independent islands and parts of the network may be lost for a while. The dynamic nature of MANETs makes it much more challenging for the issues of IP address assignments and name to IP address ...
Hierarchical name system based on hybrid P2P for multimedia networks
Multimedia networks distribute multimedia resources to end users who can enjoy movie, music or photo via this platform. The name system is one of the most important elements in multimedia networks, for it defines how to name a resource and how to find ...
Names, addresses and identities in ambient networks
DIN '05: Proceedings of the 1st ACM workshop on Dynamic interconnection of networksAmbient Networks interconnect independent realms that may use different local network technologies and may belong to different administrative or legal entities. At the core of these advanced internetworking concepts is a flexible naming architecture ...
Comments