CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

Akshat Sharma Samarth Shah
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
A Survey of Key Management for Secure Group Communications Celia Li.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5 Group Key Management.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Authentication in Mobile Ad-hoc Network (MANET) Student Ståle Jonny Berget Superviser Chik How Tan.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Applied Cryptography for Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Chapter 10: Authentication Guide to Computer Network Security.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Chapter 21 Distributed System Security Copyright © 2008.
Denial-of-Service Flooding Detection in Anonymity Networks Computer Networks & Communications Group Institute for IT-Security and Security Law University.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Cryptography and Network Security (CS435) Part One (Introduction)
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Presented by: Sanketh Beerabbi University of Central Florida.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Introduction to Network Systems Security Mort Anvari.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Cryptography and Network Security
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Location Cloaking for Location Safety Protection of Ad Hoc Networks
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
Presentation transcript:

CSCE 715 Ankur Jain 11/16/2010

Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion

Peer-to-Peer systems Distributed application architecture Partitions task between peers equivalently. E.g. – Skype, Cloud Computing, P2PTV and many more. Fundamental Challenge Trust relationship between peers. Several research studies. To build trust and reputation between peers.

Reliability Computing true trust value. Presence of malicious user. Anonymity Non Identification of peers Accountability Identification of malicious peers. Previous research focused on reliability.

Overall Goal Extend P2P trust management systems To provide Witness Anonymity To provide anonymity to person reporting malicious behavior. To preserve privacy of peers. To hide trust topology from malicious parties.

Identity Anonymity Backward Anonymity Traceability Non-slanderability. Additional Goals Efficiency Decentralization.

System Model No Trusted Third Party. 2 types of user Offline Group Manager (OGM) User # of adversaries less than threshold t. Adversary Model 2 types of adversaries Malicious user Selfish user Will collude together to maximize the attack.

Network Model Mixnet based anonymous system Consist of series of servers called MIXes. Associated with public keys. Receives encrypted messages. Decrypts, batches, permutes, forwards messages. Strips off sender’s name and identifying information. Mechanism for monitoring claims sent Irrespective of claims being generated or forwarded.

SDT – Secure Deep Throat Provide anonymity and accountability together. Include tracing mechanism to identify user. 4 step procedure Setup Registration Claim Broadcasting Public Tracing Modes of Operation Active: Real Time requirements. Passive: Not strict Real Time requirements.

OGM generates public and secret keys. Identification list (LIST) initially empty. Define tag bases Used in claim broadcasting To create anonymous claims. Only one per type of misbehavior per user.

User contacts OGM. User selects identity. Check its availability. User obtains a member public/secret key pair. OGM adds a new entry to LIST. OGM select s items from LIST and sends it to user. User sends confirmation for key pair and LIST items received.

User maintain two databases. Maintains claim sent by herself. Maintains claim received from other user. On detecting malicious behavior Checks database for previous entries for same type of behavior. If not found generates new claim using tag base. Broadcast through anonymous communication system. Also stores claim in database.

On receiving claim Checks whether entry for that claim is present or not. If yes, then drops the claim. If not check its validity and stores the claim. Also forwards it in the system. Initializing Public Tracing User finds t claims. Checks distinctness of all t claims. Generates a message including t claims and broadcast it to network

Check for entries in databases. If found broadcast two entries as proof to disclose the identity of malicious user. If no entries found broadcast message NO-ONE. After receiving NO-ONE message other repeat the steps in their local LIST.

Used when real time requirement is not critical. Achieve better efficiency. Changes in claims broadcasting Claims regarding malicious behavior not sent immediately. Sent these claims only when queried about the behavior of user. Public tracing will performed on all claims to prevent multiple claims from an adversary.

Peer forwards claim with a probability. Instead of flooding entire network. Lower the probability, lower is the number of peers storing the claim. Lower is the probability that one peer stores every t distinct claims. Require more number of witnesses in this case. Also non zero probability that adversary may escape disclosure.

Identity Anonymity May be broken using Traffic Analysis or Protocol Analysis Traffic Analysis is prevented by Mixnet based communication system. Protocol Analysis is also hard to perform No public key in claim broadcasted All parameter are calculated using discrete algorithm so very robust against brute force attack.

Backward Anonymity Adversaries can compromise multiple peers. Claim does not provide information regarding identity. No way to differentiate the user on basis of claims. Also ensured when OGM and adversaries are in contact User’s secret key is only known to user. No way to extract secret key from OGM.

Traceability Good peers need to find a valid record of adversary from LIST. LIST items are distributed among different peers. Probability of all copies controlled by adversary group is very small.

Non-Slanderability Max number of claims sent by adversaries against a user Total number of adversaries which is less than t. Adversaries cannot collect enough claims to remove good user from the system.

Distributed storage of LIST OGM maintains LIST offline. LIST is stored in distributed form. Peers do not have knowledge of LIST items with other peers. Helps in detecting a adversary even if adversary is controlling the majority of LIST.

Communication Costs Major cost is forwarding claims. Implemented using elliptic curve or hyper elliptic curve over a finite field. Claim size not more than 409 bytes. LIST distribution another cost. Smaller the LIST, higher probability of message broadcast while tracing.

Storage Requirements For cryptographic keys, LIST and local databases. Storing personal keys and public key of OGM. Only small part of the entire LIST. Very small database requirement in passive mode. A probabilistic forwarding approach may reduce database space in active mode.

SDT provide witness anonymity to users reporting malicious behavior. Two modes of operation: Active and Passive. Overhead is acceptable in peer-to-peer systems.