A Peer-to-Peer Approach to Wireless LAN Roaming

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Elias C. Efstathiou Mobile Multimedia Lab Computer Science Department Athens University of Economics and Business Athens 10434, Greece
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Hotspot Express $ One of the Pioneers of complete WiFi solutions in India $ Hardware to create HOTSPOTs  Software to secure HOTSPOTs & Manage the users.
Quality of Service Issues in Multi-Service Wireless Internet Links George Xylomenos and George C. Polyzos Department of Informatics Athens University of.
Designing a Peer-to-Peer Wireless Network Confederation Elias C. Efstathiou and George C. Polyzos Department of Computer Science Athens University of Economics.
P2PWNC Wireless Community Network CMSC 711: Computer Networks Yee Lin Tan Adam Phillippy.
An Architectural Framework for Providing WLAN Roaming D.Vassis G.Kormentzas Dept. of Information and Communication Systems Engineering University of the.
1 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Building Secure Media Applications over Wireless Community.
A Peer-to-Peer Approach to Wireless LAN Roaming George C. Polyzos Mobile Multimedia Laboratory Department of Informatics Athens University of Economics.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Self-Organized Aggregation of Wi-Fi Networks Elias C. Efstathiou, Advisor: George C. Polyzos Mobile Multimedia Laboratory, Department of Computer Science.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Peer WLAN Consortium: A P2P Case Study Mobile Multimedia Laboratory Department of Informatics Athens University of Economics & Business Athens MMAPPS Meeting,
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Internet Engineering Course Network Design. Internet Engineering Course; Sharif University of Technology Contents Define and analyse an organization network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Cracow Grid Workshop, October 27 – 29, 2003 Institute of Computer Science AGH Design of Distributed Grid Workflow Composition System Marian Bubak, Tomasz.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
WLAN-GPRS INTEGRATION FOR NEXT-GENERATION MOBILE DATA NETWORKS 通訊工程所 蔡名岳
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September.
INFSO-RI Enabling Grids for E-sciencE EGEE is a project funded by the European Union under contract INFSO-RI Grid Accounting.
Motivation - The Edge Lab Motivation Communication as a co-operative multi-party act: But interests diverge … Core question: how can we distribute control.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
Distributed Systems Architectures. Topics covered l Client-server architectures l Distributed object architectures l Inter-organisational computing.
1.4 wired and wireless networks lesson 1
Security fundamentals
COMPSCI 110 Operating Systems
IP Telephony (VoIP).
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLOUD COMPUTING
Integration of and Third-Generation Wireless Data Networks
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Configuring and Troubleshooting Routing and Remote Access
Principles of Network Applications
XMPP messaging in a peer to peer manner Instructed by:
EA C451 Vishal Gupta.
CSC 480 Software Engineering
Wireless Technology.
THE STEPS TO MANAGE THE GRID
CHAPTER 3 Architectures for Distributed Systems
Algorithms for Big Data Delivery over the Internet of Things
Physical Architecture Layer Design
Cloud Computing By P.Mahesh
Network Services.
Cloud Testing Shilpi Chugh.
Secure Authentication System for Public WLAN Roaming
Software Defined Networking (SDN)
Demand of Being Woken Up While Moving Follow-up
Goals Introduce the Windows Server 2003 family of operating systems
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
Mobile Agents M. L. Liu.
Cloud computing mechanisms
Application Layer Mobility Management Scheme for Wireless Internet
AAA: A Survey and a Policy- Based Architecture and Framework
Introduction to Network Security
Cengage Learning: Computer Networking from LANs to WANs
PLANNING A SECURE BASELINE INSTALLATION
LO3 – Understand Business IT Systems
Presentation transcript:

A Peer-to-Peer Approach to Wireless LAN Roaming George C. Polyzos Mobile Multimedia Laboratory Department of Informatics Athens University of Economics and Business Athens 104 34, Greece polyzos@aueb.gr http://mm.aueb.gr/ Tel.: +30 10 8203 650 Fax: +30 10 8203 686

Introduction Ubiquitous Internet access is a necessity Useful services: email, web, VoIP, messaging, remote network access However, WISPs are facing difficulties Also, WISP roaming is practically non-existent The Peer-to-Peer Wireless Network Confederation (P2PWNC) A framework for uniting WLAN hotspots in a global group A community of administrative domains that offer wireless Internet access to each other’s registered users A P2P network of Domain Agents (DAs) Each DA represents one WLAN administrative domain DA purpose is eliminate the overhead of roaming agreements polyzos@aueb.gr

Terminology ucsd.edu Consuming Peer Providing Peer aueb.gr Providing Peer ucsd.edu polyzos@aueb.gr Peers  Administrative Domains Home Domain  Consuming Peer Visited Domain  Providing Peer Registered Users: Unique P2PWNC ID ( username@home_domain_name ) polyzos@aueb.gr

Background WLAN roaming today P2PWNC distinctive characteristics Administrative overhead and complexity Insufficient autonomy for the roaming partners Insufficient privacy for the roaming users (Hotspot aggregation - e.g. the Boingo model - is not WLAN roaming!) P2PWNC distinctive characteristics Simplicity No cost of entry for domains No central entity controls the P2PWNC or the interactions of the peers Joining the P2PWNC is similar to joining a file-sharing network Domains make autonomous decisions Concerning the amount of resources they provide to visitors User anonymity and untraceability is a design feature polyzos@aueb.gr

P2PWNC High-Level View DA : P2PWNC Domain Agent AP : WLAN Access Point ‘Blue’ AP AP AP DA ‘White’ DA ‘Green’ AP AP AP DA : P2PWNC Domain Agent AP : WLAN Access Point : User WLAN view P2P view polyzos@aueb.gr

Domain Agent Modules Name service Authentication Traffic policing Maps logical domain names to DA IP addresses Uses a distributed hash table (DHT) Authentication Maintains a database of registered users… …along with their security credentials Traffic policing Logs and shapes egress and ingress Internet traffic Allocates specific amounts of bandwidth to visitors WLAN infrastructure Firewall, DHCP, DNS, access point control Distributed accounting Secure storage of P2PWNC accounting data Also uses a DHT Privacy Enhances user anonymity and untraceability Based on traffic mixes polyzos@aueb.gr

Security Issues P2PWNC security issues are a superset of WLAN security issues Usual confidentiality, integrity, and availability problems are still here However, two additional problems are P2PWNC-specific: 1. Traffic logging by untrustworthy providers User traffic completely visible to the visited domain agent Encryption does not hide useful metadata (e.g. remote party address) SOLUTION: Always tunnel through the home domain 2. Identity and location privacy Username and home domain visible to the visited domain agent Home domain is usually required for proper accounting of actions Current location (the visited peer) is visible to the home domain SOLUTION: P2PWNC privacy architecture polyzos@aueb.gr

Privacy Architecture X@C Peer ‘A’ (mix 1) Peer ‘B’ (mix 2) Peer ‘P’ Alias_X@B { MIX, C, { STOP, X }C }B Alias_X@A { MIX, B, { MIX, C, { STOP, X }C }B }A Alias_X@C { STOP, X }C Peer ‘P’ Peer ‘C’ “My P2PWNC ID is Alias_X@A” (Credentials include real ID and a mix chain encrypted using nested public-key encryptions) X@C polyzos@aueb.gr

EU MMAPPS Project EU-funded research project: Market MAnagement of Peer-to-Peer Services (April ’02 – September ’04) Research on how to use techniques from economics and social science to tackle some of the fundamental difficulties in creating well-founded, sustainable, P2P applications Project partners: BT Research, UK Athens University of Economics and Business, EL Eidgenossische Technische Hochschule, Zurich, CH Darmstadt University of Technology, D Mysterian, UK Telekom Austria, A University of Lancaster, UK polyzos@aueb.gr

AUEB in MMAPPS Mathematical modeling: Rules and incentives for participation We explore the space between the very simple rules that are used in existing P2P systems and price based approaches, proposing suitable system rules that are enforceable and restrict the behavior of peers while achieving an acceptable degree of system efficiency Rules constrain what peers are able to do; nevertheless, peers are free to choose aspects of their behavior (e.g., the network resources they allocate to visitors) In a rule-based system, peers choose their resource contribution and consumption subject to the rules: the set of feasible contribution and consumption choices defined by the rules Engineering: Designing and implementing the P2PWNC system With an appropriate set of participation rules derived from the more theoretical work polyzos@aueb.gr

Relevant publications P. Antoniadis, C. Courcoubetis, E. Efstathiou, G. Polyzos, and B. Strulo, Peer-to-Peer Wireless LAN Consortia: Modelling and Architecture - Third IEEE International Conference on Peer-to-Peer Computing (P2P 2003), Linkoping, Sweden, 1-3 September 2003. E. Efstathiou and G. Polyzos, Designing a Peer-to-Peer Wireless Network Confederation, Third International Workshop on Wireless Local Networks (WLN2003), Bonn, Germany, October, 2003. polyzos@aueb.gr

Some Additional Issues Design and build a distributed accounting subsystem that is: Secure Fault-tolerant Scalable The ‘offline domains’ issue A user’s home domain may be offline No consumer peer available to speak for the user’s behalf Could the user device act as a peer? Could another peer act as the user’s home? Lightweight client devices Maybe special software is required on the client device in order to verify received service authoritatively Who else can independently observe the provider? polyzos@aueb.gr

Deploying the P2PWNC DA administrative interface must hide complexity from administrators Requires only a minimum number of input parameters Some of these parameters will be ‘best-guesses’ Visitor request rates Request rates of the domain’s registered users when roaming P2PWNC profit opportunities Vendors of domain agents Domain aggregators “Pay-as-you-go” domains polyzos@aueb.gr

Prototype (1 of 4) Prototype Domain Agent has been built Running on Linux (with the 2.4.21 kernel) Uses MMAPPS Negotiation and Accounting modules Uses standard and custom-made Linux TCP/IP daemons Modules are still missing Secure distributed hash table For distributed accounting and the P2PWNC name-service Privacy module polyzos@aueb.gr

Prototype (2 of 4) polyzos@aueb.gr

Prototype (3 of 4) polyzos@aueb.gr

Prototype (4 of 4) WLAN WLAN Visitor Negotiation Visitor Session 1. Visitor credentials check WLAN 6. Balance OK: Proceed 2. Negotiate Visitor Negotiation Visitor Session Visitor Negotiation Negotiation Listener 5. Start 3. Request service MMAPPS Negotiation 4a. MMAPPS negotiation MMAPPS Negotiation 4b. Balance check Visited domain - Provider Home domain - Consumer polyzos@aueb.gr

Summary The P2PWNC is a (simpler) alternative to existing roaming schemes It is governed by rules on reciprocity that are flexible It is designed around organic growth Its privacy architecture can make it more socially acceptable Free-riding represents a problem. E.g., when peers deny access to visitors Incentives to share a domain’s resources are needed polyzos@aueb.gr

Mobile Multimedia Laboratory Thanks! George C. Polyzos polyzos@aueb.gr Tel.: +30 10 8203 650, Fax: +30 10 8203 686 Mobile Multimedia Laboratory http://mm.aueb.gr/ Department of Informatics Athens University of Economics and Business Athens 104 34, Greece