IPDPS 2007 Making Peer-to-Peer Anonymous Routing Resilient to Failures Yingwu Zhu Seattle University

Slides:



Advertisements
Similar presentations
Supporting Cooperative Caching in Disruption Tolerant Networks
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Scalable Content-Addressable Network Lintao Liu
TAP: A Novel Tunneling Approach for Anonymity in Structured P2P Systems Yingwu Zhu and Yiming Hu University of Cincinnati.
Incentives Build Robustness in BitTorrent Bram Cohen.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Lava: A Reality Check of Network Coding in Peer-to-Peer Live Streaming Mea Wang, Baochun Li Department of Electrical and Computer Engineering University.
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
Optimizing Buffer Management for Reliable Multicast Zhen Xiao AT&T Labs – Research Joint work with Ken Birman and Robbert van Renesse.
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks Computer Science Department, UCLA International Computer Science Institute,
SplitStream: High- Bandwidth Multicast in Cooperative Environments Monica Tudora.
MMCN 19 Jan 2005 Ooi Wei Tsang Peer-to-Peer Streaming.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Resilient Peer-to-Peer Streaming Paper by: Venkata N. Padmanabhan Helen J. Wang Philip A. Chou Discussion Leader: Manfred Georg Presented by: Christoph.
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
Efficient and Flexible Parallel Retrieval using Priority Encoded Transmission(2004) CMPT 886 Represented By: Lilong Shi.
Multi-Variate Analysis of Mobility Models for Network Protocol Performance Evaluation Carey Williamson Nayden Markatchev
Slicing the Onion: Anonymous Routing without PKI Saurabh Shrivastava CS 259
Cashmere: Resilient Anonymous Routing CS290F March 7, 2005.
Using Redundancy to Cope with Failures in a Delay Tolerant Network Sushant Jain, Michael Demmer, Rabin Patra, Kevin Fall Source:
Network Coding and Reliable Communications Group DAWN PI meeting – October 2009 Network coding with unreliable, unknown bandwidths Muriel Medard EECS RLE.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science,
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Analysis of Onion Routing Presented in by Jayanthkumar Kannan On 10/8/03.
Before start… Earlier work single-path routing in sensor networks
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao Cisco Systems, Inc. (Joint work with Christine Lv, Edith Cohen, Kai Li and Scott Shenker)
Understanding Mesh-based Peer-to-Peer Streaming Nazanin Magharei Reza Rejaie.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Searching in Unstructured Networks Joining Theory with P-P2P.
Prof. Reza Rejaie Computer & Information Science University of Oregon Winter 2003 An Overview of Internet Multimedia Networking.
MuON: Epidemic Based Mutual Anonymity Neelesh Bansod, Ashish Malgi, Byung Choi and Jean Mayo.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
© 2004 Mobile VCE 1 An SMR Based Advance Resource Reservation Scheme For Combined Mobility and QoS Provisioning Hao Wang The University.
A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, : Adv. Network Security.
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
COCONET: Co-Operative Cache driven Overlay NETwork for p2p VoD streaming Abhishek Bhattacharya, Zhenyu Yang & Deng Pan.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Resilient P2P Anonymous Routing by Using Redundancy Yingwu Zhu.
The Impact of DHT Routing Geometry on Resilience and Proximity K. Gummadi, R. Gummadi..,S.Gribble, S. Ratnasamy, S. Shenker, I. Stoica.
Resilient Peer-to-Peer Streaming Presented by: Yun Teng.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Anonymity – Crowds R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Impact of Topology on Overlay Multicast Suat Mercan.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Exact Regenerating Codes on Hierarchical Codes Ernst Biersack Eurecom France Joint work and Zhen Huang.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Peer-to-Peer Result Dissemination in High-Volume Data Filtering Shariq Rizvi and Paul Burstein CS 294-4: Peer-to-Peer Systems.
Peer to Peer Network Design Discovery and Routing algorithms
Authors: Ing-Ray Chen and Ding-Chau Wang Presented by Chaitanya,Geetanjali and Bavani Modeling and Analysis of Regional Registration Based Mobile Service.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
1 Roie Melamed, Technion AT&T Labs Araneola: A Scalable Reliable Multicast System for Dynamic Wide Area Environments Roie Melamed, Idit Keidar Technion.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Zueyong Zhu† and J. William Atwood‡
A Study of Group-Tree Matching in Large Scale Group Communications
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
CSE 4340/5349 Mobile Systems Engineering
Friendships that last Peer lifespan and its role in P2P protocols
ContinuStreaming: Achieving High Playback Continuity of Gossip-based Peer-to-Peer Streaming IPDPS 2008 LI Zhenhua Dept. Computer, Nanjing University.
Presentation transcript:

IPDPS 2007 Making Peer-to-Peer Anonymous Routing Resilient to Failures Yingwu Zhu Seattle University

IPDPS 2007 Overview Background –P2P Anonymous Routing –Research Problem –Current Solutions Our Approach –Erasure Coding –Message and Path Redundancy –Wise Choice of Mixes Evaluation –Experimental Setup –Results Summary

IPDPS 2007 P2P Anonymous Routing Using P2P networks as an anonymizing network to achieve initiator/responder anonymity Using peer nodes as mixes or relay nodes to relay messages, tunneling communication for initiators/responders Many are based on Onion Routing –Layered encryption creates an Onion –Multi-hop routing: an anonymous message represented by an Onion goes through a small number of mixes (strip the Onion)

IPDPS 2007 P2P Anonymous Routing Why appealing? –A potentially large anonymity set offered by the open set of peer nodes –Sidestep political background and local jurisdiction issues due to the distribution of peer nodes –Scalable compared to current static anonymizing networks which operate a small set of fixed mixes –Ideal for hiding anonymous traffics due to communication patterns and heterogeneity of peer nodes’ locations –More?...

IPDPS 2007 P2P Anonymous Routing A big challenge: node churn in P2P networks Problems –Fragile and short-lived paths: node failures disrupts anonymous paths/tunnels –Message loss and communication failures –Complicate path construction which is expensive, i.e., usually incurs expensive asymmetric encryption/decryption

IPDPS 2007 Overview Background –P2P Anonymous Routing –Research Problem –Current Solutions Our Approach –Erasure Coding –Message and Path Redundancy –Wise Choice of Mixes Evaluation –Experimental Setup –Results Summary

IPDPS 2007 Research Problem Can we make P2P anonymous routing resilient to node failures? We are not alone! –Mix-base solutions –Multicast-based solutions

IPDPS 2007 Overview Background –P2P Anonymous Routing –Research Problem –Current Solutions Our Approach –Erasure Coding –Message and Path Redundancy –Wise Choice of Mixes Evaluation –Experimental Setup –Results Summary

IPDPS 2007 Current Solutions Mix-based –Use a group of peer nodes as a mix to mask single mix node failures –The peer nodes in each group share secrecy to encrypt/decrypt messages along the path –E.g., TAP and Cashmere

IPDPS 2007 Current Solutions Multicast-based –Initiators and responders join a group –Messages are multicasted to all group members –Cover/noise traffics are used to gain initiator/responder anonymity –Bandwidth overhead due to message multicasting and cover traffics –E.g., P 5, APFS, Hordes

IPDPS 2007 Overview Background –P2P Anonymous Routing –Research Problem –Current Solutions Our Approach –Erasure Coding –Message and Path Redundancy –Wise Choice of Mixes Evaluation –Experimental Setup –Results Summary

IPDPS 2007 Our Approach Based on a simple yet powerful idea –Resilience can be achieved by redundancy Rely on Onion routing –Layered encryption and multi-hop routing Techniques employed –Message redundancy by erasure coding –Path redundancy (coded messages are sent over multiple disjoint paths) –Wise choice of peer nodes as mixes in each single path

IPDPS 2007 Overview Background –P2P Anonymous Routing –Research Problem –Current Solutions Our Approach –Erasure Coding –Message and Path Redundancy –Wise Choice of Mixes Evaluation –Experimental Setup –Results Summary

IPDPS 2007 Erasure Coding Widely used in file & storage systems –Tradeoff between data availability and storage cost Breaks a message M into n coded segments, each of length |M|/m m of n segments suffice to reconstruct M Redundancy r = n/m

IPDPS 2007 Overview Background –P2P Anonymous Routing –Research Problem –Current Solutions Our Approach –Erasure Coding –Message and Path Redundancy –Wise Choice of Mixes Evaluation –Experimental Setup –Results Summary

IPDPS 2007 Message and Path Redundancy … … M1M1 MkMk MnMn M: original message M i : coded segment with length of |M|/m, 1≤ i ≤ n M1M1 MkMk MnMn M1M1 MkMk MnMn … … M1M1 MkMk MnMn Bob Alice Onion Routing Alice can reconstruct M upon the first m arrived coded segments

IPDPS 2007 Allocation of Coded Segments Message M  n coded segments with length of|M|/m, redundancy r = n/m k disjoint paths from Bob to Alice Idea: equally distribute n segments over k paths (k ≤ n, assume k is a multiple of r for simplicity) P(k) = P success (Alice receives M) = Prob(≥k/r paths succeed in message delivery) Goal: maximize P(k) with respect to k and r p = (p node_availability ) L L: # of nodes in a path

IPDPS 2007 Allocation of Coded Segments Guideline to maximize routing resilience upon different node availabilities and message redundancy degrees

IPDPS 2007 Validation of 3 Observations Impact of different k s on success of routing under different node availabilities of 0.70, 0.86, and 0.95, where L = 3 and r = 2.

IPDPS 2007 Overview Background –P2P Anonymous Routing –Research Problem –Current Solutions Our Approach –Erasure Coding –Message and Path Redundancy –Wise Choice of Mixes Evaluation –Experimental Setup –Results Summary

IPDPS 2007 Wise Choice of Mixes Problem –Current mix-based protocols do NOT consider node lifetime when choosing mixes –Random selection in mixes Our goal –Choose nodes that tend to live longer as mixes –Improve path durability (prolong path lifetime) Challenge –Can we predict node lifetime?

IPDPS 2007 Node Lifetime Distribution Figure 1: Cumulative dist. of the measured Gnutella node lifetime dist. compared with a Pareto dist. with α=0.83 and β = 1560 sec.

IPDPS 2007 Wise Choice of Mixes Based on the Pareto distribution –Prediction: Nodes that have stayed a long time tend to stay longer in the system Each node gossips node liveness information they have learned Each node seeking anonymity makes mix choices to construct anonymous paths based on node liveness prediction

IPDPS 2007 Overview Background –P2P Anonymous Routing –Research Problem –Current Solutions Our Approach –Erasure Coding –Message and Path Redundancy –Wise Choice of Mixes Evaluation –Experimental Setup –Results Summary

IPDPS 2007 Experimental Setup Simulator built from P2psim 3.0 by MIT Augment OneHop –Membership management is essentially a hierarchical gossip protocol –Learn node liveness information Node lifetime dist. to simulate churn –Pareto –Uniform –Exponential

IPDPS 2007 Results Main results are omitted here. Security analysis –Similar to Onion Routing Please see paper for details

IPDPS 2007 Impact of wise choice of mixes on path durability (the duration that a sender can successfully route messages to a destination over 4 disjoint paths with redundancy degree of 4)

IPDPS 2007 Overview Background –P2P Anonymous Routing –Research Problem –Current Solutions Our Approach –Erasure Coding –Message and Path Redundancy –Wise Choice of Mixes Evaluation –Experimental Setup –Results Summary

IPDPS 2007 Summary Strike a balance between routing resilience and bandwidth cost while preserving sender anonymity Message redundancy by erasure coding and path redundancy –Improve path construction and routing resilience –Tolerate up to path failures Choice of mixes based on node lifetime prediction –Based on Pareto dist. –Surprisingly, work very well for other dist. like Uniform and Exponential dist. (significantly better than random selection) Bandwidth cost by erasure coding is modest

IPDPS 2007 Questions ?