Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Scalable Content-Addressable Network Lintao Liu
On the Economics of P2P Systems Speaker Coby Fernandess.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Technion –Israel Institute of Technology Computer Networks Laboratory A Comparison of Peer-to-Peer systems by Gomon Dmitri and Kritsmer Ilya under Roi.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Experience with an Object Reputation System for Peer-to-Peer File Sharing NSDI’06(3th USENIX Symposium on Networked Systems Design & Implementation) Kevin.
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Application Presented by Tony Sung On Loy, MC Lab, CUHK IE 1 A Distributed Search.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Cache Updates in a Peer-to-Peer Network of Mobile Agents Elias Leontiadis Vassilios V. Dimakopoulos Evaggelia Pitoura Department of Computer Science University.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Peer-to-Peer Services Lintao Liu 5/26/03. Papers YAPPERS: A Peer-to-Peer Lookup Service over Arbitrary Topology Stanford University Associative Search.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
By Swetha Namburi.  Trust  Trust Model ◦ Reputation-based Systems ◦ Architectural Approach to Decentralized Trust Management.
Practical Byzantine Fault Tolerance
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Trust Management in P2P systems Presenter: Lintao Liu April 21th, 2003.
BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.
The EigenTrust Algorithm for Reputation Management in P2P Networks
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
School of Electrical Engineering &Telecommunications UNSW Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks Marius Portmann & Aruna.
03/19/02Scalab Seminar Series1 Finding Good Peers in Peer-to-Peer Networks Ramaswamy N.Vadivelu Scalab, ASU.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
The Biologically Inspired Distributed File System: An Emergent Thinker Instantiation Presented by Dr. Ying Lu.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Presentation transcript:

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University of California, Riverside

Thomas Repantis2/28 Ad-Hoc Peer-to-Peer Networks Personal mobile devices can form ad-hoc networks to autonomously share data and services Work-related projects Multi-player games Social networks Auctions Nodes are both clients and servers No central coordinator

Thomas Repantis3/28 Advantages of Peer-to-Peer Scalability: No central coordinator Reliability: No single point of failure Self-organization: Autonomous decisions to adapt to different loads Resource aggregation: Take advantage of existing resources Successfully deployed for: Distributed Computing (e.g. File Sharing (e.g. Gnutella, DHTs) Online Gaming (e.g. Playstation) Spam Detection (e.g. SpamNet)

Thomas Repantis4/28 Our Research Question How to enable a peer to decide whether to trust another peer in the absence of a central trust managing authority A puts a level of trust into B means that A estimates the probability of B acting in a way that will allow A to achieve a desired level of satisfaction A can estimate the level of trust to put into B based on B's reputation, built from B's previous interactions Challenges: Information about peer interactions is spread across the network Malicious peers might tamper with reputation information while stored or transmitted

Thomas Repantis5/28 Reputation-Based Trust Management Middleware Requirements Enable peers to identify trustworthy peers for the particular resource and level of trust they require Light-weight, so that the protocol overhead is not hindering peers' interaction Resistant to reputation tampering Resistant to collusions

Thomas Repantis6/28 Our Approach Decentralized trust management middleware for unstructured, ad-hoc, peer-to-peer networks, based on reputation Storing the reputation information of a peer in a group of peers not easily identifiable, i.e., its neighbors Reputation piggy-backed on a peer's replies Taking advantage of the lack of network structure to resist collusions and blackmailing

Thomas Repantis7/28 Roadmap 1. Motivation and Background 2. System Model 3. Operation 4. Attacks 5. Algorithms 6. Experimental Evaluation 7. Related Work 8. Conclusions and Future Work

Thomas Repantis8/28 System Model Peers identified by public/private key pairs Provide objects (data or services) Form unstructured, self-organizing network Peer offering an object receives a rating r Reputation R is the sum of ratings Consumer trusts provider if its reputation is higher than the minimum trust level it requires for this particular type of object

Thomas Repantis9/28 Object Discovery Peers search for objects by sending queries to their immediate neighbors Queries are propagated until their TTL expires Matches generate query-hits Every query is identified by a transaction globally unique identifier, TID TID is a random number together with the public key of the peer that produced the query TID is the same for the query, all query-hits, and all ratings produced as a result of the query By caching TIDs, query-hits follow the reverse path of the corresponding queries

Thomas Repantis10/28 Reputation Propagation Every immediate neighbor of a peer, through which a query-hit of the peer travels, is responsible for piggy-backing the reputation of the peer to the query-hit All immediate neighbors are responsible for maintaining and piggy-backing its reputation The reputation reported for a peer is associated with a confidence value, determined by the number of neighbors reporting it After an interaction the consumer sends a signed rating to all producer's neighbors TTL of rating is larger than TTL of query by 1 Rating is verified using the public key contained in query's TID

Thomas Repantis11/28 Query and Query-Hit G F H I J C D B A E Q Q Q Q Q Q R QH QHQH R R R K

Thomas Repantis12/28 Rating G F H I J K C D B A E r r r r r r r r r

Thomas Repantis13/28 Roadmap 1. Motivation and Background 2. System Model 3. Operation 4. Attacks 5. Algorithms 6. Experimental Evaluation 7. Related Work 8. Conclusions and Future Work

Thomas Repantis14/28 Against Tampering Attack: Alter neighbor's reputation Countermeasure: Since multiple peers might report a peer's reputation, tampering can be detected. A makes sure reputation of F reported by C and D is the same G F H I J C D B A E Q Q Q Q Q Q R QH QHQH R R R K

Thomas Repantis15/28 Against Tampering Attack: Alter own reputation Countermeasure: A peer does not store its own reputation Attack: Alter rating during transmission Countermeasure: Ratings signed by their creator G F H I J K C D B A E r r r r r r r r r

Thomas Repantis16/28 Against Blackmailing Attack: Peer blackmailing a neighbor to boost its reputation Countermeasure: Peers store their neighbors' reputation and their neighbors store theirs. Single neighbor reporting bogus reputation runs the risk of identification G F H I J C D B A E Q Q Q Q Q R QH QHQH R R R K

Thomas Repantis17/28 Against Multiple Ratings Attack: Submitting multiple positive or negative ratings Countermeasure: No effect, because no corresponding TID stored at the neighbors by a previous query-hit G F H I J K C D B A E r r r r r r r r r

Thomas Repantis18/28 Against Collusions Attack: T wo neighbors boosting each other's reputation Countermeasure: W ould have to cooperate with all their neighbors and they consequently with all their neighbors etc. G F H I J C D B A E Q Q Q Q Q Q R QH R R R K

Thomas Repantis19/28 Against Collusions Attack: Peer bribing some of its neighbors to boost its reputation and only propagating query-hits through them Countermeasure: Detected by the rest of the neighbors when receiving unexpired ratings for their neighbor, with TIDs of query- hits they had not propagated G F H I J K C D B A E r r r r r r r r r

Thomas Repantis20/28 Against Collusions Attack: Peer bribing all of its neighbors to boost its reputation Countermeasure: A high confidence value requires a high number of bribed neighbors G F H I J C D B A E Q Q Q Q Q Q R QH R R R K

Thomas Repantis21/28 System Algorithms Selection Algorithm: Per object trust and confidence levels Rating Algorithm: Binary rating scheme, -1 dissatisfied, +1 satisfied Enable objective interpretation and automatic assignment Initialization Algorithm: Protocols against sybil attacks can be integrated in our middleware to prevent identity changes

Thomas Repantis22/28 Roadmap 1. Motivation and Background 2. System Model 3. Operation 4. Attacks 5. Algorithms 6. Experimental Evaluation 7. Related Work 8. Conclusions and Future Work

Thomas Repantis23/28 Experimental Evaluation Simulated Gnutella unstructured, peer-to- peer networks of thousands of peers using NeuroGrid simulator 3000 types of objects, 30 objects per peer 100 random searches per experiment and average results from 5 measurements Malicious peers claim they have every object they are asked for but they can only cheat undetected once

Thomas Repantis24/28 Variable Percentage of Honest Peers If 1 out of 10 peers is dishonest, 9 out of 10 query-hits are bogus

Thomas Repantis25/28 Variable Number of Peers Dishonest peers can flood even networks of thousands of peers

Thomas Repantis26/28 Related Work Peers polling for opinion of others: P2PRep Reputation certificates signed by raters: RcertPX Reputation stored in anonymous random peers: TrustMe Reputation replicated in a group of peers: EigenTrust Voting on the reputation of objects instead of peers: Credence Identify ratings not corresponding to actual transactions: TrustGuard

Thomas Repantis27/28 Conclusions and Future Work Decentralized trust management middleware for ad-hoc, peer-to-peer networks, based on reputation Takes advantage of unstructured topology to make malicious behavior risky Peers are equal and self-organizing Fully distributed, non-intrusive protocol Future work: Investigate the effects of mobility, elaborate on peer selection and rating algorithms

Thomas Repantis28/28 Thank You!

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University of California, Riverside