Organization  Introduction to Network Coding  Practical Network Coding  Secure Network Coding  Structured File Sharing  Conclusion.

Slides:



Advertisements
Similar presentations
Signatures for Network Coding Denis Charles Kamal Jain Kristin Lauter Microsoft Research.
Advertisements

1 The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel Xiaojun Hei Keith W. Ross Nitesh Saxena Polytechnic.
New Opportunities for Load Balancing in Network-Wide Intrusion Detection Systems Victor Heorhiadi, Michael K. Reiter, Vyas Sekar UNC Chapel Hill UNC Chapel.
On-the-fly Verification of Erasure-Encoded File Transfers Mike Freedman & Max Krohn NYU Dept of Computer Science.
CodeTorrent: Content Distribution using Network Coding in VANET Uichin Lee, JoonSang Park, Joseph Yeh, Giovanni Pau, Mario Gerla Computer Science Dept,
Incentives Build Robustness in BitTorrent Bram Cohen.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
Digital Signatures and Hash Functions. Digital Signatures.
Network Coding in Peer-to-Peer Networks Presented by Chu Chun Ngai
Location-Aware Security Services for Wireless Sensor Networks using Network Coding IEEE INFOCOM 2007 최임성.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Network Coding and Xors in the Air 7th Week.
Informed Content Delivery Across Adaptive Overlay Networks J. Byers, J. Considine, M. Mitzenmacher and S. Rost Presented by Ananth Rajagopala-Rao.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
On-The-Fly Verification of Rateless Erasure Codes Max Krohn (MIT CSAIL) Michael Freedman and David Mazières (NYU)
Oded Regev Tel-Aviv University On Lattices, Learning with Errors, Learning with Errors, Random Linear Codes, Random Linear Codes, and Cryptography and.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
1 Quantitative Evaluation of Secure Network Coding Dawn Meeting UCSC Nov 4, 2010 SeungHoon Lee, Mario Gerla In collaboration with IBM researchers.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Processing Along the Way: Forwarding vs. Coding Christina Fragouli Joint work with Emina Soljanin and Daniela Tuninetti.
Study of the Relationship between Peer-to-Peer Systems and IP Multicasting T. Oh-ishi, K. Sakai, K. Kikuma, and A. Kurokawa NTT Network Service Systems.
Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland Joint work with Randy Cogill, University of Virginia.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
MIS: Malicious Nodes Identification Scheme Network-Coding-Based Peer-to-Peer Streaming Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khurana Department.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Can Network Coding Help in P2P Networks? Dah Ming Chiu, Raymond W Yeung, Jiaqing Huang and Bin Fan Chinese University of Hong Kong Presented by Arjumand.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Study of the Relationship between Peer to Peer Systems and IP Multicasting From IEEE Communication Magazine January 2003 學號 :M 姓名 : 邱 秀 純.
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
Towards a Safe Playground for HTTPS and Middle-Boxes with QoS2 Zhenyu Zhou CS Dept., Duke University.
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Redes Inalámbricas Máster Ingeniería de Computadores 2008/2009 Tema 7.- CASTADIVA PROJECT Performance Evaluation of a MANET architecture.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Tsunami: Maintaining High Bandwidth Under Dynamic Network Conditions Dejan Kostić, Ryan Braud, Charles Killian, Eric Vandekieft, James W. Anderson, Alex.
Alexander Afanasyev Tutors: Seung-Hoon Lee, Uichin Lee Content Distribution in VANETs using Network Coding: Evaluation of the Generation Selection Algorithms.
A Non-Monetary Protocol for P2P Content Distribution in Wireless Broadcast Networks with Network Coding I-Hong Hou, Yao Liu, and Alex Sprintson Dept. of.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Speaker: Meng-Ting Tsai Date:2010/11/16 Toward Publicly Auditable Secure Cloud Data Storage Services Cong Wang and Kui Ren..etc IEEE Communications Society.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Measurement COS 597E: Software Defined Networking.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Ad Hoc Network.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Key insight.  With drop-when-decoded, the busy period of the virtual queue contributes to the physical queue size calculation  Responding to ACK of the.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
Inside the New Coolstreaming: Principles, Measurements and Performance Implications Bo Li, Susu Xie, Yang Qu, Gabriel Y. Keung, Chuang Lin, Jiangchuan.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
1 Using Network Coding for Dependent Data Broadcasting in a Mobile Environment Chung-Hua Chu, De-Nian Yang and Ming-Syan Chen IEEE GLOBECOM 2007 Reporter.
Pouya Ostovari and Jie Wu Computer & Information Sciences
A New Approach to Coding in Content-Based MANETs
UCLA, SRI International
ITIS 6010/8010 Wireless Network Security
Presentation transcript:

Organization  Introduction to Network Coding  Practical Network Coding  Secure Network Coding  Structured File Sharing  Conclusion

Network Coding: What is it?  Traditional Coding/Routing Coding is done on End-to-End bases. Intermediate nodes forward data blindly.  Network Coding Allowing intermediate nodes to manipulate information Information flowing out of a node is a function of information coming into the node Originally developed for wireless multicast Very popular in wireless/sensor networks Relatively much less attention in P2P A B C f (A,B,C) A? B? C? A B C

Linear Network Coding  Information Packets are vectors over finite field with a fixed dimension  Encoding Outgoing packets are linear combination of incoming packets  Decoding Solving a linear equation

Linear Network Coding: Equation

Setup  Information (Data) a file

Setup  Information (Data) a file m original blocks (vectors) x1x1 x2x2 …xixi ……xmxm

Setup  Information (Data) a file m original blocks (vectors) n elements in a block x1x1 x2x2 …xixi ……xmxm n dimension (x i1, x i2, …, x ij, …, x in )

Setup  Information (Data) m augmented vector (coded block) m+n elements in an augmented vector x1x1 x2x2 x3x3 x4x4 x5x5 x1x1 x2x2 x3x3 x4x4 x5x yjyj Example: m=5

BitTorrent: How it works? Seed … … … … … … … … 1 3

Network Coding for P2P  Benefits: Most blocks are useful! Solving New Peer Disadvantage in BitTorrent New peer can download one block for free Solving Rare Block Problem All blocks have to be downloaded in BitTorrent Churn may result in rare block problem Taking long time to finish As a result, potentially almost all nodes can finish at the same time!  Applications File sharing, Software update, streaming, CDN, P2P TV

Network Coding for P2P  Problems Resource Overhead Encoding: P out =  a i P i, a i is an random in F p Decoding: Solving linear equation: O(n 3 ) DVD: 4.3 GB  Can’t fit everything in memory Requires random disc I/O Pollution Attack Intermediate node has no way to verify if the incoming packet is linear combination of the original block Corrupted packets can be easily propagated

Solving Resource Overhead  Incremental Encoding

Solving Resource Overhead  Incremental Encoding: Linear Dependency

Secure Network Coding  Threat Pollution Attacks General (traditional) hashes do NOT work Corrupted packet can be mixed with others Corrupted data can easily be propagated  Problem Can we verify the integrity of a network-coded block? Or can we verify if a received block is legitimately mixed before decoding a file?

Secure Network Coding: possible solutions  Homomorphic Hash Find homomorphic hash function h such that: h(x+y) = h(x) h(y) If hash of each block can be securely distributed, the receiver can verify the integrity of a linearly transformed block.  Homomorphic signature Find homomorphic signature function s such that s(x+y) = s(x) s(y) Verification: v(linearly transformed block, signature) returns true or false.

Ours: Signature Generation  Private key (s 1, …, …, s m+n )  Public key p, q, g, (g s 1, g s 2,…, …, g s m+n )  Signature generation at a source network-coded block v =(v 1, v 2, …,…, v m+n ) signature σ= s 1 v 1 +s 2 v 2 + … + s m+n v m+n  Signature aggregation at intermediate nodes new block w’ =   w 1  k w k new signature  w’) =    1  k  k

Ours: signature verification  Public Key p, q, (g s 1, g s 2,…, …, g s m+n )  network-coded block v =(v 1, v 2, …,…, v m+n )  Compute d = (g s 1 ) v 1 (g s 2 ) v 2 … (g s m+n ) v m+n  verify: d ?= g 

Comparison Krohn’sOursEtc TypeHashSignature Generatorsnm+n # of hash/signaturemm Signing costn modexpm+n mult Precomputationn modexpN/A h(x i ) =  n j=1 g j x i j Robust ChannelNeededN/ADelivery of h(x i ) AggregationN/ALinear combination Verificationm+n modexpm+n+1 modexp

Batch Verification  For each block, verify signatures  Problem A single block verification takes 13 seconds.  Solution? Pipelining While downloading/uploading verify signature. Downloading time of a block: 7 seconds.  Solutions? Batching Verify linearly combined blocks before sending it out.

Batch Verification

Structured File Sharing  To improve mixing  Setup Peers form a DHT. Nodes choose their partners from their routing tables.  Data Transfer A source randomly distributes blocks to nodes. A node exchange blocks with partners starting from closest partners.

Simulation Result (No Churn)

Conclusion  Network coding Have not fully investigated Mainly by researchers in coding and networking independently  Many problems remaining before large deployment