Exploiting super peers for large- scale peer-to-peer Wi-Fi roaming Efstratios G. Dimopoulos, Pantelis A. Frangoudis and George.C.Polyzos.

Slides:



Advertisements
Similar presentations
SCSC 455 Computer Security
Advertisements

Call Server LIS VPC ESGW SR Manhattan PSAP LO=Wall St Route=Manhattan PSAP The Location Object (LO) is provided in the call setup information to the Call.
1 fairCASH: Concepts and Framework Yen Choon Ching Institute of Computer Science, University of Kiel, Germany Ver Sept 2008.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
Trustworthy Accounting for Wireless LAN Sharing Communities Elias C. Efstathiou and George C. Polyzos Mobile Multimedia Laboratory Department of Informatics.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Διπλωματική Εργασία The Peer-to-Peer Wireless Network Confederation Protocol: Design Specification and Performance Analysis Παρουσίαση: Παντελής Φραγκούδης.
Designing a Peer-to-Peer Wireless Network Confederation Elias C. Efstathiou and George C. Polyzos Department of Computer Science Athens University of Economics.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Building Secure Media Applications over Wireless Community.
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
A Self-Managed Scheme for Free Citywide Wi-Fi Elias C. Efstathiou and George C. Polyzos Mobile Multimedia Laboratory Department of Computer.
Stimulating Participation in Wireless Community Networks Elias C. Efstathiou, Pantelis A. Frangoudis, George C. Polyzos Mobile Multimedia.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Self-Organized Aggregation of Wi-Fi Networks Elias C. Efstathiou, Advisor: George C. Polyzos Mobile Multimedia Laboratory, Department of Computer Science.
1 Awareness Services for Digital Libraries Arturo Crespo Hector Garcia-Molina Stanford University.
Peer WLAN Consortium: A P2P Case Study Mobile Multimedia Laboratory Department of Informatics Athens University of Economics & Business Athens MMAPPS Meeting,
Generic Simulator for Users' Movements and Behavior in Collaborative Systems.
Homework #5 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Bob can sign a message using a digital signature generation algorithm
Chapter 10: Authentication Guide to Computer Network Security.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Masud Hasan Secue VS Hushmail Project 2.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Chapter 6 Synchronization.
Eduroam Louis Twomey HEAnet Library Services Day 20 th November 2014.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Failure Resilience in the Peer-to-Peer-System OceanStore Speaker: Corinna Richter.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Ivan Osipkov Fighting Freeloaders in Decentralized P2P File Sharing Systems.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Autonomous Replication for High Availability in Unstructured P2P Systems (Paper by Francisco Matias Cuenca-Acuna, Richard P. Martin, Thu D. Nguyen) Hristo.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
By Swetha Namburi.  Trust  Trust Model ◦ Reputation-based Systems ◦ Architectural Approach to Decentralized Trust Management.
Topic: P2P Trading in Social Networks: The Value of Staying Connected The purpose of this paper is to propose a P2P incentive paradigm named Networked.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Client Server Network Model:
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Friends Chat. Friends Chat on Voice Voice Chat Friends Chat is a full bodied, well researched, complete user interface for subscribers to talk/ chat.
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
Payment in Identity Federations David J. Lutz Universitaet Stuttgart.
Scalable Grid system– VDHA_Grid: an e-Science Grid with virtual and dynamic hierarchical architecture Huang Lican College of Computer.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Optimal Pipeline Using Perforce, Jenkins & Puppet Nitin Pathak Works on
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Security Mechanisms and Key Refresh for P2PSIP Overlays draft-birkos-p2psip-security-key-refresh-00 Konstantinos Birkos University of Patras, Greece
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
1 Authentication Celia Li Computer Science and Engineering York University.
Presented by Edith Ngai MPhil Term 3 Presentation
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Chapter 25: Advanced Data Types and New Applications
Plethora: Infrastructure and System Design
"Cloud services" - what it is.
Teechain: Scalable Blockchain Payments using Trusted Execution Environments GIZEM AKDENIZ DECEMBER 13 , 2018.
Presentation transcript:

Exploiting super peers for large- scale peer-to-peer Wi-Fi roaming Efstratios G. Dimopoulos, Pantelis A. Frangoudis and George.C.Polyzos

Motivation Very high Wi-Fi density in cities The case for Skyhook Residential Wi-Fi hotspots with excess capacity How to exploit this user-provided infrastructure? We need a Wi-Fi sharing scheme! Can community based Wi-Fi access complement cellular? Very high Wi-Fi density in cities The case for Skyhook Residential Wi-Fi hotspots with excess capacity How to exploit this user-provided infrastructure? We need a Wi-Fi sharing scheme! Can community based Wi-Fi access complement cellular? 2

Design options Centralized Permanent IDs Full view of transactions Easy to detect misuse  FON Centralized Permanent IDs Full view of transactions Easy to detect misuse  FON 3 Decentralized Free/disposable IDs Enhances privacy Should discourage misuse  Our approach Decentralized Free/disposable IDs Enhances privacy Should discourage misuse  Our approach

4 Our approach Design principle Users form a club that relies on indirect service reciprocity Distinct characteristics Fully decentralized No user registration Designed with off-the-shelf equipment in mind Does not assume altruists Design principle Users form a club that relies on indirect service reciprocity Distinct characteristics Fully decentralized No user registration Designed with off-the-shelf equipment in mind Does not assume altruists

5 Entities Peer: provides service via home AP, consumes when mobile Peer ID: uncertified public/private key pair Accounting unit: digital receipt Signed by roaming user Proof of transaction Receipt repositories Peer: provides service via home AP, consumes when mobile Peer ID: uncertified public/private key pair Accounting unit: digital receipt Signed by roaming user Proof of transaction Receipt repositories

6 Receipts and the reciprocity algorithm Consuming member Certificate Timestamp Member Signature (Signed with member private key) Weight (amount of bytes relayed) Contributor Public Key Receipt generation AP periodically requests fresh receipt Roamer sends signed receipt Storage Receipt repositories Input to the reciprocity algorithm Algorithm output Indirect Normalized Debt (IND) Translated to QoS Receipt generation AP periodically requests fresh receipt Roamer sends signed receipt Storage Receipt repositories Input to the reciprocity algorithm Algorithm output Indirect Normalized Debt (IND) Translated to QoS

7 Can it scale?

8 The locality of visits Visits to foreign areas are rare IND ≈0 Receipts are unvalued in foreign areas Visits to foreign areas are rare IND ≈0 Receipts are unvalued in foreign areas

9 A Super-Peer-assisted architecture At least one Super Peer per Area Super Peers: Globally known Trusted Without extra computational capabilities

10 An algorithm for large-scale roaming - Specification The algorithm should run for all transactions (not only for roaming ones) Low Complexity As few Super Peers as possible Super peers should be used only when necessary Incentive based Normal users To contribute service to Super Peers To contribute service to roamers Super Peers To mediate other transactions The algorithm should run for all transactions (not only for roaming ones) Low Complexity As few Super Peers as possible Super peers should be used only when necessary Incentive based Normal users To contribute service to Super Peers To contribute service to roamers Super Peers To mediate other transactions

11 Example A user visits a foreign area He asks service from an AP and informs the AP about the SP of his home area The team server runs the reciprocity algorithm According to the result he should not contribute service. So, he asks the SP of his home location to find a guarantor, in order to provide service to the user Simultaneously asks from the user’s home location SP to calculate the same quantity and the waits for the answer. The VSP runs the reciprocity algorithm for the prospective consumer, in order to calculate the quantity (IND) that he is able to guarantee. The HSP runs the reciprocity algorithm in order to calculate the IND for the prospective consumer Informs the VSP for the calculated IND VSP calculates: 1. The final IND for the prospective consumer. 0,2xIND (VSP) + 0,8xIND (HSP) 2.The guarantor SP for this transaction. Informs the HSP (guarantor) and the Team Server of the provider about the IND calculated AP asks receipts from the SP for his own use and also from the consumer on behalf of the SP The consumer signs receipts to the SP and the SP signs receipts to the AP

12 Everyone is happy! Roaming users have consumed service The AP has gained the valuable receipts of the SP The SP helped a member of his area and paid off his debt Roaming users have consumed service The AP has gained the valuable receipts of the SP The SP helped a member of his area and paid off his debt

13 Simulations Input Parameters Server Repository Size Client Repository Size Users Number Areas Number Area Population Roaming probability Number of stay rounds in the foreign area(stop over rounds) Contribution of the super peers to IND Number of super peers per area Input Parameters Server Repository Size Client Repository Size Users Number Areas Number Area Population Roaming probability Number of stay rounds in the foreign area(stop over rounds) Contribution of the super peers to IND Number of super peers per area Output Parameters SW Hit Ratio Requests to the super peers Super peers guarantees Output Parameters SW Hit Ratio Requests to the super peers Super peers guarantees

14 Number of Regions Effect Input Parameters Patience=20 (rounds) Server Repository Size=2000 (receipts) Client Repository Size=300 (receipts) Number of peers=1000 (2x x x x x50) Roaming Start Round=5 Roaming Probability p=0.1 Stop Over Rounds=1 Super peers Participation=80% consumer part. - 20% provider part. Super Peers per Region=1

15 Server Repository Size Effect Input Parameters Patience=20(rounds) Server Repository Size=1000 (250) 3000 Client Repository Size=250 Number of peers=1000 (4x250) Roaming Start Round=5 Roaming Probability p=0.1 Stop Over Rounds=1 Super peers Participation=80% consumer part. - 20% provider part. Super Peers per Region=1

16 Participations of super peers in the IND result Input Parameters Patience = 20 (rounds) Repository size = 2000 (receipts) Receipts to merge = 300 Number of Peers = 1000 ( 4x250) - (20x50) Roaming Start Round = 25 Roaming Probability p = 0.1 Stop Over Rounds = 1 super peers participation=variable Super Peers per Region = 1

17 The effect of the number of super peers per region Input Parameters Patience = 5 (rounds) Repository size = 500 (receipts) Receipts to merge = 100 Number of Peers = 1000 ( 8x125) Roaming Start Round = 1 Roaming Probability p = 0.1 Stop Over Rounds = 1 super peers participation (Home - Visited)=80% - 20% Super Peers per Region = 1,2,3

18 Scale Effect Input Parameters Patience = 20 (rounds) Repository size = 1500 (receipts) Receipts to merge = 250 Number of Peers = (4x250) (10x250) (20x250) (28X250) Roaming Start Round = 1 Roaming Probability p = 0.1 Stop Over Rounds = 2 super peers participation (Home - Visited)=80% - 20% Super Peers per Region = 1

19 THE END Thank you!