A Peer-to-Peer Approach to Wireless LAN Roaming George C. Polyzos Mobile Multimedia Laboratory Department of Informatics Athens University of Economics.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
1 On Death, Taxes, & the Convergence of Peer-to-Peer & Grid Computing Adriana Iamnitchi Duke University “Our Constitution is in actual operation; everything.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Elias C. Efstathiou Mobile Multimedia Lab Computer Science Department Athens University of Economics and Business Athens 10434, Greece
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Hotspot Express $ One of the Pioneers of complete WiFi solutions in India $ Hardware to create HOTSPOTs  Software to secure HOTSPOTs & Manage the users.
CPSC Topics in Multimedia Networking A Mechanism for Equitable Bandwidth Allocation under QoS and Budget Constraints D. Sivakumar IBM Almaden Research.
Designing a Peer-to-Peer Wireless Network Confederation Elias C. Efstathiou and George C. Polyzos Department of Computer Science Athens University of Economics.
P2PWNC Wireless Community Network CMSC 711: Computer Networks Yee Lin Tan Adam Phillippy.
An Architectural Framework for Providing WLAN Roaming D.Vassis G.Kormentzas Dept. of Information and Communication Systems Engineering University of the.
1 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Building Secure Media Applications over Wireless Community.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Self-Organized Aggregation of Wi-Fi Networks Elias C. Efstathiou, Advisor: George C. Polyzos Mobile Multimedia Laboratory, Department of Computer Science.
Efficient agent-based selection of DiffServ SLAs over MPLS networks Thanasis G. Papaioannou a,b, Stelios Sartzetakis a, and George D. Stamoulis a,b presented.
Peer WLAN Consortium: A P2P Case Study Mobile Multimedia Laboratory Department of Informatics Athens University of Economics & Business Athens MMAPPS Meeting,
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Plan Introduction What is Cloud Computing?
Clinic Security and Policy Enforcement in Windows Server 2008.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
AIMS Workshop Heidelberg, 9-11 March 1998 P717 & P805: SIRTE Study for Internet Roaming Throughout Europe Franco Guadagni - Telecom Italia / CSELT
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
1 CS 456 Software Engineering. 2 Contents 3 Chapter 1: Introduction.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Mobile Agent Technology for the Management of Distributed Systems - a Case Study Claudia Raibulet& Claudio Demartini Politecnico di Torino, Dipartimento.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
| E. Marocco, G. Canal Lucent, 2006, 26 th October P2PSIP: Interworking Enrico Marocco Research Engineer
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Cracow Grid Workshop, October 27 – 29, 2003 Institute of Computer Science AGH Design of Distributed Grid Workflow Composition System Marian Bubak, Tomasz.
A semi autonomic infrastructure to manage non functional properties of a service Pierre de Leusse Panos Periorellis Paul Watson Theo Dimitrakos UK e-Science.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
WLAN-GPRS INTEGRATION FOR NEXT-GENERATION MOBILE DATA NETWORKS 通訊工程所 蔡名岳
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
INFSO-RI Enabling Grids for E-sciencE EGEE is a project funded by the European Union under contract INFSO-RI Grid Accounting.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
New Developments in Access Management: Setting the Scene Alan Robiette JISC Development Group JISC-CNI Conference, June 2002.
1. Nortel Confidential Information BUSINESS MADE SIMPLE 2 The Future of Telecommunications John A. Phillips Nortel, ETSI General Assembly Chairman 2007.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Supporting NCCU’s Educational Mission – with “Real-Time” Energy Measurement & Reporting.
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Michał Jankowski, Paweł Wolniewicz, Jiří Denemark, Norbert Meyer,
Network Servers Chapter 13 Release 16/7/2009. Chapter Objectives Describe Client-server and Peer to Peer network model Explain server Explain Domain.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Motivation - The Edge Lab Motivation Communication as a co-operative multi-party act: But interests diverge … Core question: how can we distribute control.
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
IP Telephony (VoIP).
Integration of and Third-Generation Wireless Data Networks
A Peer-to-Peer Approach to Wireless LAN Roaming
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Configuring and Troubleshooting Routing and Remote Access
EA C451 Vishal Gupta.
THE STEPS TO MANAGE THE GRID
Network Services.
Goals Introduce the Windows Server 2003 family of operating systems
Mobile Agents M. L. Liu.
Presentation transcript:

A Peer-to-Peer Approach to Wireless LAN Roaming George C. Polyzos Mobile Multimedia Laboratory Department of Informatics Athens University of Economics and Business Athens , Greece Tel.: Fax:

2 Introduction Ubiquitous Internet access is a necessity  Useful services: , web, VoIP, messaging, remote network access u However, WISPs are facing difficulties u Also, WISP roaming is practically non-existent l The Peer-to-Peer Wireless Network Confederation (P2PWNC) u A framework for uniting WLAN hotspots in a global group u A community of administrative domains that offer wireless Internet access to each other’s registered users u A P2P network of Domain Agents (DAs) n Each DA represents one WLAN administrative domain n DA purpose is eliminate the overhead of roaming agreements

3 Terminology Home Domain  Consuming Peer Registered Users: Unique P2PWNC ID ( ) Peers  Administrative Domains ucsd.edu aueb.gr Consuming Peer Providing Peer Visited Domain  Providing Peer

4 Background WLAN roaming today  Administrative overhead and complexity u Insufficient autonomy for the roaming partners u Insufficient privacy for the roaming users u (Hotspot aggregation - e.g. the Boingo model - is not WLAN roaming!) l P2PWNC distinctive characteristics u Simplicity n No cost of entry for domains n No central entity controls the P2PWNC or the interactions of the peers n Joining the P2PWNC is similar to joining a file-sharing network u Domains make autonomous decisions n Concerning the amount of resources they provide to visitors u User anonymity and untraceability is a design feature

5 P2PWNC High-Level View WLAN view P2P view AP : WLAN Access Point : User DA : P2PWNC Domain Agent APAP APAP APAP APAP APAP APAP APAP APAP APAP DA ‘White’ DA ‘Green’ DA ‘Blue’

6 Domain Agent Modules Name service  Maps logical domain names to DA IP addresses u Uses a distributed hash table (DHT) l Authentication u Maintains a database of registered users… u …along with their security credentials l Traffic policing u Logs and shapes egress and ingress Internet traffic u Allocates specific amounts of bandwidth to visitors l WLAN infrastructure u Firewall, DHCP, DNS, access point control l Distributed accounting u Secure storage of P2PWNC accounting data u Also uses a DHT l Privacy u Enhances user anonymity and untraceability u Based on traffic mixes

7 Security Issues P2PWNC security issues are a superset of WLAN security issues u Usual confidentiality, integrity, and availability problems are still here u However, two additional problems are P2PWNC-specific: 1.Traffic logging by untrustworthy providers u User traffic completely visible to the visited domain agent u Encryption does not hide useful metadata (e.g. remote party address) u SOLUTION: Always tunnel through the home domain 2.Identity and location privacy u Username and home domain visible to the visited domain agent u Home domain is usually required for proper accounting of actions u Current location (the visited peer) is visible to the home domain u SOLUTION: P2PWNC privacy architecture

8 Privacy Architecture Peer ‘P’ Peer ‘A’ (mix 1) Peer ‘B’ (mix 2) Peer ‘C’ “My P2PWNC ID is (Credentials include real ID and a mix chain encrypted using nested public-key encryptions) { MIX, B, { MIX, C, { STOP, X } C } B } A { MIX, C, { STOP, X } C } B { STOP, X } C

9 EU MMAPPS Project l EU-funded research project: Market MAnagement of Peer-to-Peer Services (April ’02 – September ’04) l Research on how to use techniques from economics and social science to tackle some of the fundamental difficulties in creating well-founded, sustainable, P2P applications l Project partners: u BT Research, UK u Athens University of Economics and Business, EL u Eidgenossische Technische Hochschule, Zurich, CH u Darmstadt University of Technology, D u Mysterian, UK u Telekom Austria, A u University of Lancaster, UK

10 AUEB in MMAPPS l Mathematical modeling: Rules and incentives for participation n We explore the space between the very simple rules that are used in existing P2P systems and price based approaches, proposing suitable system rules that are enforceable and restrict the behavior of peers while achieving an acceptable degree of system efficiency n Rules constrain what peers are able to do; nevertheless, peers are free to choose aspects of their behavior (e.g., the network resources they allocate to visitors) n In a rule-based system, peers choose their resource contribution and consumption subject to the rules: the set of feasible contribution and consumption choices defined by the rules l Engineering: Designing and implementing the P2PWNC system n With an appropriate set of participation rules derived from the more theoretical work

11 Relevant publications l P. Antoniadis, C. Courcoubetis, E. Efstathiou, G. Polyzos, and B. Strulo, Peer-to-Peer Wireless LAN Consortia: Modelling and Architecture - Third IEEE International Conference on Peer-to-Peer Computing (P2P 2003), Linkoping, Sweden, 1-3 September l E. Efstathiou and G. Polyzos, Designing a Peer-to-Peer Wireless Network Confederation, Third International Workshop on Wireless Local Networks (WLN2003), Bonn, Germany, October, 2003.

12 Some Additional Issues Design and build a distributed accounting subsystem that is: u Secure u Fault-tolerant  Scalable The ‘offline domains’ issue  A user’s home domain may be offline u No consumer peer available to speak for the user’s behalf u Could the user device act as a peer? u Could another peer act as the user’s home? l Lightweight client devices u Maybe special software is required on the client device in order to verify received service authoritatively u Who else can independently observe the provider?

13 Deploying the P2PWNC DA administrative interface must hide complexity from administrators  Requires only a minimum number of input parameters u Some of these parameters will be ‘best-guesses’ n Visitor request rates n Request rates of the domain’s registered users when roaming l P2PWNC profit opportunities u Vendors of domain agents u Domain aggregators u “Pay-as-you-go” domains

14 Prototype (1 of 4) l Prototype Domain Agent has been built u Running on Linux (with the kernel) u Uses MMAPPS Negotiation and Accounting modules u Uses standard and custom-made Linux TCP/IP daemons l Modules are still missing u Secure distributed hash table n For distributed accounting and the P2PWNC name-service u Privacy module

15 Prototype (2 of 4)

16 Prototype (3 of 4)

17 Prototype (4 of 4) Visitor Negotiation MMAPPS Negotiation Visitor Session WLAN Visitor Negotiation MMAPPS Negotiation Listener WLAN Visited domain - Provider Home domain - Consumer 1. Visitor credentials check 2. Negotiate 3. Request service 4a. MMAPPS negotiation 4b. Balance check 5. Start 6. Balance OK: Proceed

18 Summary l The P2PWNC is a (simpler) alternative to existing roaming schemes l It is governed by rules on reciprocity that are flexible l It is designed around organic growth l Its privacy architecture can make it more socially acceptable l Free-riding represents a problem. n E.g., when peers deny access to visitors l Incentives to share a domain’s resources are needed

Thanks! George C. Polyzos Tel.: , Fax: Mobile Multimedia Laboratory Department of Informatics Athens University of Economics and Business Athens , Greece