Cashmere: Resilient Anonymous Routing CS290F March 7, 2005.

Slides:



Advertisements
Similar presentations
IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
Advertisements

Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
TAP: A Novel Tunneling Approach for Anonymity in Structured P2P Systems Yingwu Zhu and Yiming Hu University of Cincinnati.
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
SplitStream: High- Bandwidth Multicast in Cooperative Environments Monica Tudora.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
1/32 Internet Architecture Lukas Banach Tutors: Holger Karl Christian Dannewitz Monday C. Today I³SI³HIPHI³.
Slicing the Onion: Anonymous Routing without PKI Saurabh Shrivastava CS 259
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Analysis of Onion Routing Presented in by Jayanthkumar Kannan On 10/8/03.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Tarzan: A Peer-to-Peer Anonymizing Network Layer Michael J. Freedman, NYU Robert Morris, MIT ACM CCS 2002
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Towards an Analysis of Onion Routing Security Syverson, Tsudik, Reed, and Landwehr PET 2000 Presented by: Adam Lee 1/26/2006 Syverson, Tsudik, Reed, and.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
IPDPS 2007 Making Peer-to-Peer Anonymous Routing Resilient to Failures Yingwu Zhu Seattle University
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Resilient P2P Anonymous Routing by Using Redundancy Yingwu Zhu.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Secure Group Communication: Key Management by Robert Chirwa.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 7 Confidentiality Using Symmetric Encryption.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
An Introduction to Mobile IPv4
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CPSC 335 Data Communication.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
What's the buzz about HORNET?
New York Institute of Technology- Amman Campus
Anonymous Communication
Presentation transcript:

Cashmere: Resilient Anonymous Routing CS290F March 7, 2005

Anonymous Communication Source anonymity  protect identity of communication source Unlinkability  avoid association between endpoints

Anonymous Routing as Mechanism Large decentralized networks  lack of mutual trust, distributed domains Use as mechanism for secure communication  “test” other nodes without revealing your identity  e.g. are you pointing to me in your routing table?

Chaum-Mix Approaches Idea: forward message through static path of relay nodes downside: path is fragile and hard to maintain  once any node/link is broken, must rebuild entire path (expensive)  nodes in middle don’t know where to send error messages downside: computationally expensive  each message must be encrypted with layers of asymmetric encryption

Outline Motivation Cashmere Design Evaluation Summary

Flexible and Resilient Anonymity Use relay groups for routing resiliency  instead of single nodes to relay traffic, use groups of nodes  relay survives if at least 1 member of relay group is reachable P2P and prefix keys  leverage structured p2p routing  define relay group by all nodes sharing a prefix in their nodeID  encryption via prefix keys (public/private pairs) i.e would have keys for 1XXX, 12XX, 123X 302X013X 233X

Routing Overview Cannot simply route through groups to destination Sender A forwards traffic thru a number of relay groups  Receiver B is a member of one of the relay groups Per relay, the first member to receive the msg is the “root”  root node decrypts using its prefix private key, forwards payload to other members, then routes msg to next relay A (P1,M) (P2,M) (P3,M) (P4,M) M M M B M M M M Relay group for prefix 123 M M M M B (P2=123,M) (P3=230,M)

Enhancements for Performance Decouple path encryption and payload  encrypt path layer separately  include “keys” at each layer to match payload onion Remove asymmetric encryption from critical path  use session key (symmetric) to encrypt each msg  encrypt session key with destination pub key include inside path encryption layer  only true destination knows it’s the recepient

The Big Picture Path =P L-1 R L-2 K L-2 P L+1 R L K L P L R L-1 K L-1 PubKey(P) Payload = SymKey_B XOR: R L-1 XOR: R L-2 from last relay group to relay group P L-1 SymKey_B XOR: R L-1 Payload’ = Root of Relay Group P P L+1 R L K L P L R L-1 K L-1 Path’ = Path, PayloadPath’, Payload’ PrivKey(P) XOR(R L-2 ) Each node decrypts K L-2 with its own private key. Only the destination node will get SymKey_B and a flag indicating success. Member of P P L-1 R L-2 K L-2 Member of P Member of P Member of P

Selecting GroupID and Path Length Tradeoff between anonymity, resilience and messaging overhead Leverage random distribution of nodeIDs  predict expected size of relay group Can dynamically select prefix length to control relay group size (per session)

Cashmere Evaluation Measure anonymity using entropy metric  source anonymity identical to Chaum-mixes  destination anon. identical if  10% nodes are attackers Resilience  expected lifetimes of relay groups: 1 or 2 orders of magnitude > single relay nodes (avg |group| = 3-5) Performance  source encryption cost is 10% of CM, (if avg |group| = 3)  decryption cost at relays < 50% of CM, (|group| = 3) Result? Goals accomplished! Fully implemented: Tput  27Mb/s for 4K msgs

Entropy-based Anonymity Entropy of a system Entropy-based anonymity of the system

Source Anonymity

Unlinkability Anonymity

Expected Path Lifetimes exponentially distributed session times  median session time = 60 mins balanced node leave/joins

Path Duration w/ Intermittent Failures

Relative Computation Cost

Summary Resilience through relay groups Decouple path encryption from payload Questions?