P2PWNC Wireless Community Network CMSC 711: Computer Networks Yee Lin Tan Adam Phillippy.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Guide to Network Defense and Countermeasures Second Edition
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Authentication & Kerberos
Elias C. Efstathiou Mobile Multimedia Lab Computer Science Department Athens University of Economics and Business Athens 10434, Greece
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Διπλωματική Εργασία The Peer-to-Peer Wireless Network Confederation Protocol: Design Specification and Performance Analysis Παρουσίαση: Παντελής Φραγκούδης.
FIT3105 Smart card based authentication and identity management Lecture 4.
Designing a Peer-to-Peer Wireless Network Confederation Elias C. Efstathiou and George C. Polyzos Department of Computer Science Athens University of Economics.
1 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Building Secure Media Applications over Wireless Community.
A Peer-to-Peer Approach to Wireless LAN Roaming George C. Polyzos Mobile Multimedia Laboratory Department of Informatics Athens University of Economics.
Stimulating Participation in Wireless Community Networks Elias C. Efstathiou, Pantelis A. Frangoudis, George C. Polyzos Mobile Multimedia.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Self-Organized Aggregation of Wi-Fi Networks Elias C. Efstathiou, Advisor: George C. Polyzos Mobile Multimedia Laboratory, Department of Computer Science.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
Peer WLAN Consortium: A P2P Case Study Mobile Multimedia Laboratory Department of Informatics Athens University of Economics & Business Athens MMAPPS Meeting,
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Computer Networks IGCSE ICT Section 4.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Networking Components Chad Benedict – LTEC
Chapter 10: Authentication Guide to Computer Network Security.
Network Components 101 Travis Hill.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Exploiting super peers for large- scale peer-to-peer Wi-Fi roaming Efstratios G. Dimopoulos, Pantelis A. Frangoudis and George.C.Polyzos.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Common Devices Used In Computer Networks
IEEE R lmap 23 Feb 2015.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
The Intranet.
Configuring Network Access Protection
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Components of wireless LAN & Its connection to the Internet
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Networking Components Assignment 3 Corbin Watkins.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
A Peer-to-Peer Approach to Wireless LAN Roaming
Cryptography and Network Security
Peer-to-peer networking
Network Services.
Goals Introduce the Windows Server 2003 family of operating systems
Chapter 3 VLANs Chaffee County Academy
Introduction to Network Security
Presentation transcript:

P2PWNC Wireless Community Network CMSC 711: Computer Networks Yee Lin Tan Adam Phillippy

Introduction ♦ Ubiquitous Internet access is a necessity ♦ , web, VoIP, messaging, remote network access ♦ Current state ♦ Internet access far from ubiquitous ♦ Required infrastructure not yet in place ♦ Wireless Internet Service Providers (WISPs) ♦ Coverage limited to selected hotspots ♦ Wireless LAN (WLAN) ♦ Deployed in homes, schools, airports, etc. ♦ Idea ♦ Why not unite all WLANs to provide ubiquitous access to the Internet?

Peer-to-Peer Wireless Network Confederation (P2PWNC) ♦ Framework for uniting WLAN hotspots ♦ Community of administrative domains that offer wireless internet access to each other’s users ♦ P2P network of domain agents (DA)

Peer-to-Peer Wireless Network Confederation (P2PWNC) ♦ Administrative Domain ♦ Examples: ♦ Residential hotspot with 1 access point ♦ WISP with access points in many locations ♦ Domain Agent (DA) ♦ Each administrative domain maintains 1 DA ♦ Physical node that represents the WLAN ♦ Responsibilities: ♦ Regulates wireless service provision and consumption ♦ Eliminates need for roaming agreements

Peer-to-Peer Wireless Network Confederation (P2PWNC) ♦ Simple accounting mechanism based on token-exchange ♦ When roaming in another P2PWNC domain ♦ To compensate for resources consumed, home DA transfers tokens to visited DA

P2PWNC Design ♦ Based on reciprocity ♦ Domains must provide resources to visitors ♦ So that their own users can consume resources of other P2PWNC domains when roaming

Distinctive Characteristics ♦ Open to all ♦ No registration or central authority ♦ Joining P2PWNC is similar to joining a file-sharing network ♦ Free to use ♦ No barrier to entry ♦ Reciprocity drives the system ♦ Autonomous domains ♦ Each domain decides how much resources it wants to provide to visitors ♦ Protects privacy ♦ Identity and location privacy

P2P Systems ♦ Communities of economic agents cooperating for mutual benefit without centralized control ♦ Characteristics: ♦ Makes use of otherwise underused resources ♦ Agent autonomy ♦ Scalability, fault-tolerance, reliability

P2PWNC as a P2P System ♦ Underused resources ♦ Residential hotspots typically operate only at a small percentage of maximum throughput ♦ Cost-sharing ♦ Distribute cost among participating administrative domains ♦ High cost for a single provider to cover large areas ♦ Hardware ♦ Administration, operations, maintenance ♦ Decentralized control ♦ Distributed accounting to track who owes who and how much ♦ Agent autonomy ♦ Can dynamically adjust provisioning rates

Architectural Overview ♦ Unique logical name for each DA ♦ Can reuse DNS name ♦ Registered users ♦ Local users of a particular domain ♦ Examples: ♦ Residential hotspot: all household members ♦ WISP: all subscribers ♦ Roaming users ♦ Visiting users from another domain

DA Modules ♦ Name service ♦ Maps logical P2PWNC domain names to IP addresses of DAs ♦ Authentication ♦ Maintains a database of registered users along with security credentials ♦ Traffic-policing ♦ Logs and shapes internet traffic ♦ Allocates specific amounts of bandwidth to visitors ♦ WLAN ♦ Firewall, DHCP, DNS, access point control ♦ Distributed accounting ♦ Secure storage of accounting data

DA Modules (2) ♦ Consumer-strategy ♦ Home DA’s consumer-strategy is contacted when roaming user wants service ♦ Decides if transaction should continue ♦ Pays required tokens to visited DA’s provider-strategy module ♦ Provider-strategy ♦ Decides whether to provide service to visitor ♦ Decides current service prices

DA Modules (3) ♦ Privacy-enhancement ♦ Protects identity privacy ♦ Hides user name and home DA of roaming user from visited DA ♦ Protects location privacy ♦ Hides visited DA from home DA ♦ Distributed Hash Table ♦ Low-level module used by name service and distributed accounting

Security and Privacy Issues ♦ Abuse by untrustworthy visitors ♦ Illegal activities ♦ Traffic logging by untrustworthy providers ♦ Possible solution: tunneling through trusted gateway (e.g. home DA) ♦ Identity privacy ♦ Possible solution: create a new alias for every new connection? ♦ Identity and location privacy ♦ Possible solution: Mix network

Mix network Peer ‘P’ (provider) Peer ‘A’ (mix 1) Peer ‘B’ (mix 2) Peer ‘C’ (home) “My P2PWNC ID is Credentials include real ID and a mix chain encrypted using nested public-key encryptions { MIX, B, { MIX, C, { STOP, X } C } B } A { MIX, C, { STOP, X } C } B { STOP, X } C Idea credit: David Chaum Slide credit: George Polyzos

Economic Considerations ♦ Optimal system parameters ♦ Consumer/Provider strategies, token prices ♦ Secure distributed accounting subsystem ♦ Monitors peer contribution and consumption ♦ Uses cryptographically secure tokens (cannot be forged) ♦ Domain strategies ♦ How to charge usage: ♦ KBytes or hour, current congestions levels, identity of consumer ♦ How to balance conflicting requirements: ♦ Want best possible service for its own roaming users ♦ Must provide service to visitors to earn tokens for use by roaming users ♦ May affect service provided to its own local users

Economic Considerations (2) ♦ Offline DAs ♦ Problem ♦ Roaming user requests service from visited DA ♦ Visited DA unable to contact home DA ♦ Possible Solution (decentralized version) ♦ Home DA distributes token allowances to users ♦ User pays without intervention of home DA ♦ Token generation ♦ How DAs first acquire tokens ♦ Distributed banks generate tokens and distribute to new entrants

Economic Considerations (3) ♦ Domain heterogeneity ♦ Different in terms of: ♦ Coverage size ♦ Coverage location ♦ Number of registered users ♦ Problem: ♦ Domains with few visitors, difficult to earn tokens ♦ Possible solution: set high token prices ♦ More general problem: ♦ How to make sure a few domains don’t monopolize all tokens?

Summary of DA Responsibilities ♦ Regulate prices for service ♦ Make sure visitor traffic does not adversely affect traffic from registered users ♦ Ensure best possible treatment for own (registered) users that are roaming

Business Models - Who can make a profit ♦ Upstream ISPs that allow P2PWNC may be preferred by customers ♦ “Pay-as-you-go” domains ♦ Vendors can sell pre-paid cards containing P2PWNC user id and credentials ♦ Virtual P2PWNC ♦ Virtual DA obtains tokens from P2PWNC domains outside normal interaction model ♦ Sells tokens in the form of pre-paid cards

Business Models – Who can make a profit (2) ♦ P2PWNC domain aggregators ♦ Host DA for multiple small WLANs ♦ Similar to web hosting ♦ Vendors of DA modules ♦ Provide consumer-strategy and provider- strategy modules ♦ Hotspot indexing engines ♦ Tune DA parameters ♦ Security and privacy enhancements

Operational Issues ♦ Need more economic analysis and simulations ♦ How P2PWNC and token-based incentive operate in real-world environment ♦ Regulatory obstacles ♦ Some ISPs prohibit sharing of broadband connections

P2PWNC Implementation ♦ ♦ GPL Licensed ♦ AP: Linksys WRT54GS ♦ Firmware ♦ Client: QTEK 9100 ♦ C and Java

Implementation Assumptions ♦ Good ♦ No central authority ♦ Users may use unlimited, free IDs ♦ User consumption is not homogeneous ♦ Software can be modified/hacked ♦ Teams (domains) will try and cheat ♦ Teams will collude ♦ Not so good ♦ Team consumption is homogeneous ♦ Team members trust each other ♦ ISPs allow connection sharing

Teams, users, and receipts (IOUs) Team AP Team member

Receipt accounting CONN C P CACK RCPT RREQ RCPT RREQ RCPT R t 0 w 2 t 0 w 1 ? provider, team timestamp, weight

Centralized R

Decentralized R R R

♦ One receipt server per team ♦ Gossiping protocol ♦ Devices carry a sample of receipts ♦ Consumers share receipts with providers ♦ Adds overhead for verifying receipts ♦ Incomplete view of the “receipt graph”

Receipt graph A B C G H F E D I C D B G H Does C owe H?

Maxflow decision ♦ Probability of me granting you service What IOU What you owe me

Maxflow (bottle neck flow) A F E I CH Min C-H cut D B G

Abuse ♦ Uncooperative teams ♦ Evident from receipt graph ♦ Other teams will stop providing service ♦ DOS attacks ♦ Centralized server is vulnerable ♦ Decentralized servers have secret IPs ♦ Teams do not communicate via Internet ♦ Colluding teams…

Naive collusion B G H F I X2X2 X0X0 X1X1 C

Sophisticated collusion B G H F I X2X2 X0X0 X1X1 X3X3 C

Generalized Maxflow ♦ Look for collusion hub X 0 ♦ Discount suspicious paths ♦ Discount flow passing through vertices with a high sum of outgoing edge weights ♦ Discount flow passing through many vertices ♦ Assumes homogeneous team usage

Security ♦ Team leader ♦ Public/private keys for team identity ♦ Signs member certificates ♦ Team members ♦ Public/private keys for member identity ♦ All receipts are signed ♦ Elliptic Curve Digital Signature Algorithm (ECDSA) ♦ Signing faster than verification ♦ Mobile devices have limited computing power ♦ No central authority (decentralized)

Security

Simulation ♦ Providers and consumers make decisions based on benefit-to-cost ratio ♦ Evolutionary learning ♦ Providing +cost, consuming +benefit ♦ Simulate interaction across 500 rounds ♦ 1 new team added per round ♦ 300 total teams

Strategies ♦ Switch to best strategy after each round ♦ Most teams adopt cooperative strategies ♦ After 500 rounds ♦ 175 Reciprocative teams ♦ 100 Unconditional cooperator teams ♦ 20 Random cooperator teams ♦ 5 Unconditional defector teams

Strategy

Questions ♦ Will it work in the real world? ♦ Sporadic usage ♦ Receipt history flushing ♦ Is it scalable? ♦ Maxflow could get expensive ♦ What about heterogeneous team usage? ♦ Variable cost of bandwidth ♦ Who is responsible for the AP’s traffic? ♦ Will the RIAA believe it wasn’t you?

P2PWNC Publications ♦ Initial idea ♦ A Peer-to-Peer Approach to Wireless LAN Roaming. Efstathiou EC, Polyzos GC. ACM WMASH, ♦ Implementation details ♦ Stimulating Participation in Wireless Community Networks. Efstathiou EC, Frangoudis PA, Polyzos GC. IEEE INFOCOM, 2006.

Receipt repository

Collusion

Maxflow overhead

Cryptographic overhead

Real-World Example - FON ♦ Largest WiFi community in the world ♦ Idea ♦ Members (aka Foneros) share wireless Internet access at home ♦ In return, get free WiFi wherever there is a Fonero Access Point ♦ Use Fonero login ♦ How to become a member: ♦ Buy a WiFi router (aka La Fonera) from FON

More about FON ♦ 3 types of Foneros (members) ♦ Linuses ♦ People who share home WiFi to get free WiFi wherever there is a FON Access Point ♦ Aliens ♦ People who do not share their WiFi but want access to a FON Access Point ♦ Charged $3 per day ♦ Bills ♦ Businesses who want to make money off their WiFi ♦ Don’t want free roaming ♦ Get 50% of money Aliens pay ♦ Can advertise on their own personalized FON Access Point homepage