Bundle protocols In efforts to provide a shared framework for algorithm and application development in DTNs, were published in 2007 to define a common abstraction to software running on disrupted networks. Commonly known as the Bundle Protocol, this protocol defines a series of contiguous data blocks as a bundle—where each bundle contains enough semantic information to allow the application to make progress where an individual block may not. Bundles are
routed in a
store and forward manner between participating
nodes over varied network transport technologies (including both
IP and non-
IP based transports). The transport layers carrying the bundles across their local networks are called
bundle convergence layers. The bundle architecture therefore operates as an
overlay network, providing a new naming architecture based on
Endpoint Identifiers (EIDs) and coarse-grained
class of service offerings. Protocols using bundling must leverage application-level preferences for sending bundles across a network. Due to the
store and forward nature of delay-tolerant protocols, routing solutions for delay-tolerant networks can benefit from exposure to application-layer information. For example, network scheduling can be influenced if application data must be received in its entirety, quickly, or without variation in packet delay. Bundle protocols collect application data into bundles that can be sent across heterogeneous network configurations with high-level service guarantees. The service guarantees are generally set by the application level, and the Bundle Protocol specification includes "bulk", "normal", and "expedited" markings. In October 2014 the Internet Engineering Task Force (IETF) instantiated a Delay Tolerant Networking working group to review and revise the protocol specified in . The Bundle Protocol for CCSDS is a profile of RFC 5050 specifically addressing the Bundle Protocol's utility for data communication in space missions. As of January 2022, the IETF published the following RFCs related to BPv7: . In January 2025, was published, which updates RFC 9171.
Security issues Addressing security issues has been a major focus of the bundle protocol. Possible attacks take the form of nodes behaving as a "black hole" or a "flooder". Security concerns for delay-tolerant networks vary depending on the environment and application, though
authentication and
privacy are often critical. These security guarantees are difficult to establish in a network without continuous bi-directional end-to-end paths between devices because the network hinders complicated cryptographic protocols, hinders key exchange, and each device must identify other intermittently visible devices. Solutions have typically been modified from
mobile ad hoc network and distributed security research, such as the use of distributed certificate authorities and
PKI schemes. Original solutions from the delay-tolerant research community include: 1) the use of
identity-based encryption, which allows nodes to receive information encrypted with their public identifier; and 2) the use of tamper-evident tables with a
gossiping protocol; ==Implementations==