MuON: Epidemic Based Mutual Anonymity Neelesh Bansod, Ashish Malgi, Byung Choi and Jean Mayo.

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

Keiji Maekawa Graduate School of Informatics, Kyoto University Yasuo Okabe Academic Center for Computing and Media Studies, Kyoto University.
A Survey of Key Management for Secure Group Communications Celia Li.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Rumor Riding, IEEE ICNP2006, Jinsong Han & Yunhao Liu, HKUST, Nov 12 1 Rumor Riding Anonymizing Unstructured Peer- to-Peer System Jinsong Han and Yunhao.
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Multicasting in Mobile Ad-Hoc Networks (MANET)
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
Cashmere: Resilient Anonymous Routing CS290F March 7, 2005.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols Li Lu, Lei Hu State Key Lab of Information Security, Graduate School.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Anonymous Communication Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
Project Mimir A Distributed Filesystem Uses Rateless Erasure Codes for Reliability Uses Pastry’s Multicast System Scribe for Resource discovery and Utilization.
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
An Active Reliable Multicast Framework for the Grids M. Maimour & C. Pham ICCS 2002, Amsterdam Network Support and Services for Computational Grids Sunday,
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
IPDPS 2007 Making Peer-to-Peer Anonymous Routing Resilient to Failures Yingwu Zhu Seattle University
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
Traffic Analysis Prevention Chris Conger CIS6935 – Cryptographic Protocols 11/16/2004.
Communication (II) Chapter 4
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Resilient P2P Anonymous Routing by Using Redundancy Yingwu Zhu.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Secure Group Communication: Key Management by Robert Chirwa.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Real Time Protocol (RTP) 김 준
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Multicast Security: A Taxonomy and Some Efficient Constructions By Cannetti et al, appeared in INFOCOMM 99. Presenter: Ankur Gupta.
Mangai Vetrivelan Snigdha Joshi Avani Atre. Sensor Network Vulnerabilities o Unshielded Sensor Network Nodes vulnerable to be compromised. o Attacks on.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Security Kim Soo Jin. 2 Contents Background Introduction Secure multicast using clustering Spatial Clustering Simulation Experiment Conclusions.
School of Electrical Engineering &Telecommunications UNSW Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks Marius Portmann & Aruna.
Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Cryptography CSS 329 Lecture 13:SSL.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Network Processing Systems Design
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
MZR: A Multicast Protocol based on Zone Routing
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
RTP: A Transport Protocol for Real-Time Applications
OneSwarm: Privacy Preserving P2P
DIMPLE: DynamIc Membership ProtocoL for Epidemic protocols
Overlay Networking Overview.
Anonymity in Structured Peer-to-Peer Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Motion-Aware Routing in Vehicular Ad-hoc Networks
Mobi-Herald: Alert Propagation for MANETs*
SPINE: Surveillance protection in the network Elements
Presentation transcript:

MuON: Epidemic Based Mutual Anonymity Neelesh Bansod, Ashish Malgi, Byung Choi and Jean Mayo

Introduction: P2P Networks Peer to peer networks Peers cooperate to achieve each others goals Peers contribute and share resources Focus on unstructured P2P networks Completely distributed

Introduction: P2P Networks Characteristics of P2P networks Large sizes Untrusted participants End-hosts cannot be trusted Churn Continual changes in system membership/topology Rate of change (churn) varies with applications Challenges for anonymous communication Latency, reliability, resource consumption and anonymity need to scale with increasing churn and size.

Anonymity Identities on Internet are not hidden Hide the participant identities and communication Type of anonymity guarantees Initiator anonymity Responder anonymity Mutual anonymity

Anonymity Approaches Anonymity by random path forwarding I C A D B R Message loss Current node leaves the network Increasing churn causes increasing losses

Anonymity Approaches Anonymity by creating routes I C A D B R Creates anonymous routing to forward messages Node on path leaves the network Anonymous path breaks Path needs to be detected and reconstructed Increasing churn causes increasing losses

Anonymity Approaches Anonymity by group communication I C A D B R Suitable for networks with churn Needs multicasting primitive Scalable, reliable and bounded latency Large groups high overhead high anonymity

MuON: Basic idea Public key is used to identify recipient Small header created for each message Header is encrypted using public key of recipient Message and header have suitable encryption, checksums and nonce for confidentiality and integrity. Non-encrypted field in header called owner IP of node (or owner) with message

MuON: Basic idea Header is multicast to all members Use an epidemic protocol for multicasting Reliable delivery to all members Bounded latency in large groups Larger message sent to subgroup Dynamically created subgroups For a given header, a peer pulls the corresponding message from the owner with probability P inter intermediate probability  Node becomes the new owner If a node can decrypt the header, it pulls the message  Reliable delivery at recipient

MuON: Basic idea X B A C R HDR_X

MuON: Basic idea X B C R HDR_X A

MuON: Basic idea X B C R HDR_X HDR_A HDR_X A

MuON: Basic idea X B A C R HDR_A HDR_C HDR_A HDR_X HDR_C

MuON: Basic idea X B A C R HDR_X HDR_B HDR_X HDR_B HDR_C HDR_B

MuON: Basic idea X B A C R HDR_C HDR_B HDR_A

MuON: Reliability

MuON: Latency

MuON: Bandwidth consumption

MuON: Anonymity P inter = 0.1 P inter = 0.3 P inter = 0.5P inter = 0.8

Conclusion Churn in P2P provides interesting challenges Epidemic protocols provide a solution MuON provides reliable anonymous communication with interesting properties Future work Further improve anonymity of MuON Cannot withstand global adversary Investigate use in different applications like service availability

MuON: Message format Sending message from I to S MSG={r 1, id, data}k session Data encrypted with k session for confidentiality Contains nonce r 1 and identifier for integrity Profile (hdr)={r 1, k session, k I +,{H(D)} k I - } k S + D={r 1, k session, k I +,MSG} Message identifier is H(hdr)

Anonymity Guarantees Local eavesdropperWithstands attack Collusion attackWithstands unless all nodes are malicious Timing attackWithstands unless global adversary Traceback attackWithstands unless global adversary Predecessor attackWithstands attack Intersection attackWithstands unless global adversary Message volume attackWithstands unless global adversary

Simulation Model of P2P r: Single run of protocol (150 above) d: Network churn Average session time: (1-d) (r -1)

Reliability

Latency

Header overhead

Data overhead