Resilient P2P Anonymous Routing by Using Redundancy Yingwu Zhu.

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

Supporting Cooperative Caching in Disruption Tolerant Networks
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
On the Coverage Problem in Video- based Wireless Sensor Networks Stanislava Soro Wendi Heinzelman University of Rochester.
Scalable Content-Addressable Network Lintao Liu
TAP: A Novel Tunneling Approach for Anonymity in Structured P2P Systems Yingwu Zhu and Yiming Hu University of Cincinnati.
1 Exploring Efficient and Scalable Multicast Routing in Future Data Center Networks Dan Li, Jiangwei Yu, Junbiao Yu, Jianping Wu Tsinghua University Presented.
© 2005 Andreas Haeberlen, Rice University 1 Glacier: Highly durable, decentralized storage despite massive correlated failures Andreas Haeberlen Alan Mislove.
Lava: A Reality Check of Network Coding in Peer-to-Peer Live Streaming Mea Wang, Baochun Li Department of Electrical and Computer Engineering University.
SplitStream: High- Bandwidth Multicast in Cooperative Environments Monica Tudora.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Cashmere: Resilient Anonymous Routing CS290F March 7, 2005.
Availability in Global Peer-to-Peer Systems Qin (Chris) Xin, Ethan L. Miller Storage Systems Research Center University of California, Santa Cruz Thomas.
Using Redundancy to Cope with Failures in a Delay Tolerant Network Sushant Jain, Michael Demmer, Rabin Patra, Kevin Fall Source:
Data-Centric Energy Efficient Scheduling for Densely Deployed Sensor Networks IEEE Communications Society 2004 Chi Ma, Ming Ma and Yuanyuan Yang.
1 High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two Nov. 24, 2003 Byung-Gon Chun.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Informed Detour Selection Helps Reliability Boulat A. Bash.
Exploring Tradeoffs in Failure Detection in P2P Networks Shelley Zhuang, Ion Stoica, Randy Katz HIIT Short Course August 18-20, 2003.
Low-Cost and Reliable Mutual Anonymity Protocol in Peer-to- Peer Networks Li Xiao Zhichen Xu Xiaodong Zhang IEEE Transactions on parallel and distributed.
Before start… Earlier work single-path routing in sensor networks
Understanding Mesh-based Peer-to-Peer Streaming Nazanin Magharei Reza Rejaie.
Reliability and Relay Selection in Peer- to-Peer Communication Systems Salman A. Baset and Henning Schulzrinne Internet Real-time Laboratory Department.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Introspective Replica Management Yan Chen, Hakim Weatherspoon, and Dennis Geels Our project developed and evaluated a replica management algorithm suitable.
MuON: Epidemic Based Mutual Anonymity Neelesh Bansod, Ashish Malgi, Byung Choi and Jean Mayo.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Performance and Power Efficient On-Chip Communication Using Adaptive Virtual Point-to-Point Connections M. Modarressi, H. Sarbazi-Azad, and A. Tavakkol.
IPDPS 2007 Making Peer-to-Peer Anonymous Routing Resilient to Failures Yingwu Zhu Seattle University
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
COCONET: Co-Operative Cache driven Overlay NETwork for p2p VoD streaming Abhishek Bhattacharya, Zhenyu Yang & Deng Pan.
LPT for Data Aggregation in Wireless Sensor Networks Marc Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering, University of British.
07/21/2005 Senmetrics1 Xin Liu Computer Science Department University of California, Davis Joint work with P. Mohapatra On the Deployment of Wireless Sensor.
Failure Resilience in the Peer-to-Peer-System OceanStore Speaker: Corinna Richter.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
A Prediction-based Fair Replication Algorithm in Structured P2P Systems Xianshu Zhu, Dafang Zhang, Wenjia Li, Kun Huang Presented by: Xianshu Zhu College.
Presented by Chaitanya Nemallapudi Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks Lap Kong.
Circuit & Packet Switching. ► Two ways of achieving the same goal. ► The transfer of data across networks. ► Both methods have advantages and disadvantages.
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
Impact of Topology on Overlay Multicast Suat Mercan.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Toward Fault-tolerant P2P Systems: Constructing a Stable Virtual Peer from Multiple Unstable Peers Kota Abe, Tatsuya Ueda (Presenter), Masanori Shikano,
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
2007/1/15http:// Lightweight Probabilistic Broadcast M2 Tatsuya Shirai M1 Dai Saito.
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Efficient AOI-Cast for Peer-to-Peer Networked Virtual Environments.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Random Key Predistribution Schemes for Sensor.
Network Coordinates : Internet Distance Estimation Jieming ZHU
Exact Regenerating Codes on Hierarchical Codes Ernst Biersack Eurecom France Joint work and Zhen Huang.
Peer-to-Peer Result Dissemination in High-Volume Data Filtering Shariq Rizvi and Paul Burstein CS 294-4: Peer-to-Peer Systems.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
A Fast Repair Code Based on Regular Graphs for Distributed Storage Systems Yan Wang, East China Jiao Tong University Xin Wang, Fudan University 1 12/11/2013.
LASTor: A Low-Latency AS-Aware Tor Client. Tor  Stands for The Onion Router  Goals: Anonymity ○ Each hop only knows previous and next hop on a path.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
An Extensible RTCP Control Framework for Large Multimedia Distributions Paper by: Julian Chesterfield Eve M. Schooler Presented by: Phillip H. Jones.
System Software Lab. A Scalable Web Cache Consistency Architecture Kim Sangyup SSLAB. EE. KAIST SIGCOMM ’ 99 Haobo Yu, Lee Breslau.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
Structure-Free Data Aggregation in Sensor Networks.
1 Roie Melamed, Technion AT&T Labs Araneola: A Scalable Reliable Multicast System for Dynamic Wide Area Environments Roie Melamed, Idit Keidar Technion.
Data Collection and Dissemination
MinJi Kim, Muriel Médard, João Barros
A Case for Mutual Notification
COS 561: Advanced Computer Networks
Elders know best Lifespan-based ideas in P2P systems
Friendships that last Peer lifespan and its role in P2P protocols
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
Design and Implementation of OverLay Multicast Tree Protocol
Presentation transcript:

Resilient P2P Anonymous Routing by Using Redundancy Yingwu Zhu

Outline Introduction Motivation Design Evaluation Conclusion and Future Work

Introduction Two main groups of anonymity protocols in the literature Multicast-based (through multicast groups) Mix-based (through a set of relay nodes)

Why P2P anonymous routing? A potentially large anonymity set Sidesteps political background and local jurisdiction issues Good scalability Communication patterns and heterogeneity of peer node’s location render P2P networks an appealing environment for hiding anonymous traffics

Motivation of this work Churn is a hurdle to P2P anonymous routing Complicates anonymous path construction in mix-based protocols, usually involving expensive asymmetric encryption/decryption Makes anonymous paths fragile and short- lived, resulting in message loss and communication failures

Naïve design Use broadcasting/multicasting But, it incurs costly bandwidth consumption due to Massive messages Cover traffics

Our approach Simple yet powerful idea: routing resilience can be achieved by redundancy Message redundancy using erasure coding Path redundancy Using Onion Routing scheme Goals: strike a balance between resilience and bandwidth cost while preserving sender anonymity

Our design (SimEra) A sender needs to anonymously send a message M to a responder Use erasure coding to spit M into n segments, each of length |M|/m Evenly distribute n segments over k paths, each of which consists of L relay nodes The responder reconstructs M upon receiving m segments Thus, tolerate up to k(1 - (1/r)) path failures, where r = n/m

Message segment allocation in SimEra Provide 3 observations A guideline for choosing k and replication factor r in erasure coding upon different node availabilities in order to maximize routing resilience

Evaluation P2PSim 3.0 developed by MIT Node membership management by OneHop, a hierarchical gossip protocol Compare SimEra and CurMix (current mix-based protocols) Measure path construction success rate and routing resilience under churn

Validation of 3 observations in SimEra Different k s have different impact on SimEra (success of routing) under different node availabilities of 0.70, 0.86, and 0.95

Performance comparisons ProtocolsDurability (Sec) Path construction attempts Latency (ms) Bandwidth (KB) CurMix SimEra(k=2, r=2) SimEra(k=4, r=4) Node churn follows a Pareto distribution 2.Message size is 1KB 3.SimEra improves both path construction and routing resilience, at the cost of moderate bandwidth overhead

Performance of SimEra under different churn rates Lifetime (minutes) Durability (Sec) Path construction attempts Latency (ms) Bandwidth (KB) Lower (median) node lifetimes mean higher churn, modeled as a Pareto distribution 2.K=4, r=4

Performance of SimEra under different node churn distributions DistributionParetoUniformExponential Durability (Sec) Path construction attempts Latency (ms) Bandwidth (KB) k=4, r=4

Conclusion P2P anonymous routing resilience can be achieved by message redundancy based on erasure coding and path redundancy Strike a balance between resilience and bandwidth cost by choosing different k s and r s

Future work Explore weighted message segment allocations over k paths Choose stable nodes as mix in each single path, prolonging single path durability Compare with existing work such as TAP and Cashmere

Q&A ?