A Self-Managed Scheme for Free Citywide Wi-Fi Elias C. Efstathiou and George C. Polyzos Mobile Multimedia Laboratory Department of Computer.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
On the Economics of P2P Systems Speaker Coby Fernandess.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Peer-to-Peer Wireless Network Confederation (P2PWNC) George C. Polyzos Mobile Multimedia Laboratory Department of Computer Science Athens.
Samsara: Honor Among Thieves in Peer-to-Peer Storage Landon P. Cox and Brian D. Noble University of Michigan.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Trustworthy Accounting for Wireless LAN Sharing Communities Elias C. Efstathiou and George C. Polyzos Mobile Multimedia Laboratory Department of Informatics.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
Διπλωματική Εργασία The Peer-to-Peer Wireless Network Confederation Protocol: Design Specification and Performance Analysis Παρουσίαση: Παντελής Φραγκούδης.
Designing a Peer-to-Peer Wireless Network Confederation Elias C. Efstathiou and George C. Polyzos Department of Computer Science Athens University of Economics.
P2PWNC Wireless Community Network CMSC 711: Computer Networks Yee Lin Tan Adam Phillippy.
Storage Management and Caching in PAST, a large-scale, persistent peer- to-peer storage utility Authors: Antony Rowstorn (Microsoft Research) Peter Druschel.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
1 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Building Secure Media Applications over Wireless Community.
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
A Peer-to-Peer Approach to Wireless LAN Roaming George C. Polyzos Mobile Multimedia Laboratory Department of Informatics Athens University of Economics.
Stimulating Participation in Wireless Community Networks Elias C. Efstathiou, Pantelis A. Frangoudis, George C. Polyzos Mobile Multimedia.
1 Sustaining Cooperation in Multi-Hop Wireless Networks Ratul Mahajan, Maya Rodrig, David Wetherall and John Zahorjan University of Washington Presented.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
SCALLOP A Scalable and Load-Balanced Peer- to-Peer Lookup Protocol for High- Performance Distributed System Jerry Chou, Tai-Yi Huang & Kuang-Li Huang Embedded.
Self-Organized Aggregation of Wi-Fi Networks Elias C. Efstathiou, Advisor: George C. Polyzos Mobile Multimedia Laboratory, Department of Computer Science.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Multicast Communication Multicast is the delivery of a message to a group of receivers simultaneously in a single transmission from the source – The source.
Data Consistency in the Structured Peer-to-Peer Network Cheng-Ying Ou, Polly Huang Network and Systems Lab 台灣大學電機資訊學院電機所.
Network Components 101 Travis Hill.
Allerton 2011 September 28 Mathias Humbert, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux EPFL - Laboratory for Communications and Applications (LCA1)
Exploiting super peers for large- scale peer-to-peer Wi-Fi roaming Efstratios G. Dimopoulos, Pantelis A. Frangoudis and George.C.Polyzos.
A Peer-to-Peer Approach to Sharing Wireless Local Area Networks PhD dissertation Elias C. Efstathiou Adviser: Professor George C. Polyzos Athens University.
Secure Incremental Maintenance of Distributed Association Rules.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Video Streaming over Cooperative Wireless Networks Mohamed Hefeeda (Joint.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Enforcing Fair Sharing of Peer-to-Peer Resources Tsuen-Wan “Johnny” Ngan, Dan S. Wallach and Peter Druschel Department of Computer Science, Rice University.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Key Agreement for Heterogeneous Mobile Ad-hoc Groups (µSTR-H) Mark Manulis Horst-Görtz Institute, Bochum (Germany)
1 University of California, Irvine Done By : Ala Khalifeh (Note : Not Presented)
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
NGMAST Mobile DHT Energy1 Optimizing Energy Consumption of Mobile Nodes in Heterogeneous Kademlia-based Distributed Hash Tables Imre Kelényi Budapest.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
A Peer-to-Peer Approach to Wireless LAN Roaming
Distributed Peer-to-peer Name Resolution
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Presentation transcript:

A Self-Managed Scheme for Free Citywide Wi-Fi Elias C. Efstathiou and George C. Polyzos Mobile Multimedia Laboratory Department of Computer Science Athens University of Economics and Business WoWMoM-ACC, June 13, 2005

Outline  P2PWNC Overview and Motivation  Background (hotspot market, P2P, and incentives in P2P)  P2PWNC Design Principles  P2PWNC Design  The NWAY Decision Algorithm  Simulations  Protocol and Implementation  Summary and Conclusions

The Peer-to-Peer Wireless Network Confederation (P2PWNC) 1 of 25 Manhattan WLANs, 2002 Skyhook Wireless Wi-Fi Positioning System (WPS) A wireless LAN (WLAN) aggregation scheme  Unites WLANs in citywide [con]federations  Requires no authorities  Relies on reciprocity between peers Motivation  Numerous WLANs, connected to the Internet, are within the range of passersby

Nokia 9500 Motorola CN620 Motivation (III)  WLAN-enabled mobile phones are on the market Motivation (IV)  Public WLAN operators mainly target “hotspots”  Municipal wireless still in its infancy Motivation (II)  Many WLANs are secured against outsiders  Need incentives to keep them open P2PWNC Motivation 2 of 25

P2PWNC: An incentives-based P2P system  Teams provide WLAN access to each other  Teams should provide in order to consume WLAN view Team view : WLAN access point : team member White team Green team Blue team The Rules of P2PWNC 3 of 25

Background

From Gartner:  2001: 1200 public hotspots worldwide  2003: public hotspots worldwide  2005: WLANs in hotels worldwide The Public Hotspot Market A subscription buys you (June 2005):  Sprint PCS: hotspots worldwide  Boingo Wireless: hotspots worldwide  T-Mobile HotSpot: hotspots worldwide Skyhook Wireless data (2005):  WLANs in just 5 Massachusetts cities and towns (Watertown, Brookline, Roxbury, Newton, and Cambridge) 4 of 25

General term  Usually associated with file sharing systems  Also includes: Grids (computation) (Mobile) ad hoc networks (packet forwarding) Distributed Hash Tables (scalable, fault-tolerant storage) eBay-like communities (electronically mediated communities of providers and consumers) P2P Systems Distinctive characteristics  Peers act as both providers and consumers of resources  System relies on peer cooperation  Free-riding will prevail if: there is a cost involved with providing resources there are no authorities that can punish or reward exclusion from consuming the shared resources is impossible 5 of 25

Micropayments  Digitally signed tokens used as payment  Requires online bank to check for double spending (and to issue the credits) Yang, Garcia-Molina, “PPay: Micropayments for P2P Systems,” ACM CCS’03 Incentive Schemes for P2P (and representative papers) 6 of 25 Multiple account holders  Other peers maintain a peer’s account balance  Use majority rule in case of disagreement Visnumurthy, Chandrakumar, Sirer, “Karma: A Secure Economic Framework for P2P Resource Sharing,” p2pecon’03 Tamperproof modules  Each peer maintains its own account balance  Increase when providing, decrease when consuming Buttyan, Hubaux, “Stimulating Cooperation in Self-Organizing MANETs,” ACM/Kluwer MONET 2003

P2PWNC Design Principles

Why P2P?  A lot of underexploited WLANs out there set up by individuals  Hotspot operators (the corresponding “centralized model”): operate only a small fraction of the WLANs out there further segregate WLANs by competing for venues among themselves P2PWNC Design Principles 7 of 25 Micropayments, tamperproof modules, multiple account holders: Why choose another incentive scheme?  Require central authority (micropayments)  Are unrealistic (tamperproof modules)  Assume peers want to maintain accounts for others and/or perform auditing by trying to encourage “account holding” we get back where we started We need a simple incentive scheme that will encourage participation and cooperation even at the expense of accurate accounting

Adopt N-way exchanges as the incentive technique  A generalization of barter, which retains some of its simplicity  “Provide to those [who provided to those]* who provided to me”  A type of indirect reciprocity (sociology term)  Scales to larger populations, compared to direct-only exchanges  Does not require (central or distributed) authorities N-way Exchanges ABCD 8 of 25 Some variants of the basic N-way scheme: Cox, Noble, “Samsara: Honor Among Thieves in P2P Storage,” SOSP’03 Ngan, Wallach, Druschel, “Enforcing Fair Sharing of P2P Resources, “ IPTPS’03 Anagnostakis, Greenwald, “Exchange-based Incentive Mechanisms for P2P File Sharing,” ICDCS’04 Feldman, Lai, Stoica, Chuang, “Robust Incentive Techniques for P2P Networks,” ACM EC’04

P2PWNC Design

System Entities Team = Members + Access Points (APs)  Teams := P2PWNC peers  Assume intra-team trust  Team ID = (unique) PK-SK pair Member certificate  Member ID = (unique) PK-SK pair  Member certificate binds Member PK to Team PK Receipt  Encodes P2PWNC transactions between teams  Signed by consuming member  Receipt weight: amount of bytes the AP forwarded Member PK Team PK Member cert Timestamp Team PK Signed by Team SK Signed by Member SK Weight PK: public key SK: private key 9 of 25

Receipt Generation 10 of 25 C P CONN CACK 11:50am = t 0 (member connects) C P RREQ RCPT 11:51am (P requests 1 st receipt) RCPT timestamp = t 0 RCPT weight = w 1 C P RREQ RCPT 11:52am (P requests 2 nd receipt) RCPT timestamp = t 0 RCPT weight = w 2 > w 1 P RREQ RCPT 11:53am (member has departed) P stores last receipt (timeout) Receipt Repository

The Receipt Graph 11 of 25 A B C G H F E D I Directed weighted graph (with cycles) Vertices: team public keys Edge weight: sum of weights of corresponding receipts Edges point from the consuming team to the providing team W1 W2 W3 W4 W5W6 W7 W8 W9 W10 W11 W12 W13 W14 Graph security Free-riders and colluders can create an arbitrary number of fake vertices and edges They cannot create fake outgoing edges starting from teams who are outside the colluding group (they do not have the relevant private keys)

Receipt Repository 12 of 25 Two options:  Centralized repository Requires a well-known server that all teams can agree on All receipts are visible by all teams Server drops oldest receipts when full Mostly used to gauge the effectiveness of decentralized repositories Could have some practical importance  Decentralized repository Each team maintains its own private repository Fills it with receipts it receives during a WLAN transaction And with receipts it receives when gossiping Gossiping algorithm:  Roaming members carry receipts from their team repositories  They present them to the teams they visit  With RSA-1024 keys, a receipt is about 650 bytes long  With ECC-160 keys, a receipt is about 150 bytes long

Cooperation Strategies 13 of 25 Three cooperation strategies tested so far, each one:  Uses a different decision algorithm Input: the receipt graph Output: a decision of whether to provide service or not  May use a different gossiping algorithm (in the decentralized case) Different ways to choose the receipts that roaming members present  May use a different bootstrapping algorithm New teams need to provide before starting to consume For how long, and to whom? Specific decision algorithms include:  NWAY (assumes unit weights on receipts)  maxflow (borrowed from Feldman, Lai, Stoica, Chuang, “Robust Incentive Techniques for P2P Networks,” ACM EC’04)  gmf (generalized maximum flow) Progressively more robust against double-spending and collusion

The NWAY Decision Algorithm Searches for potential N-way exchanges  Red provides to Blue if there is a chain of receipts connecting Red to Blue  Red then discards all receipts in the discovered chain Team PK Member cert Signed by Member SK R: “B?” B G R Y X Z Team PK Member cert Signed by Member SK 14 of 25 Timestamp Weight Timestamp Weight

NWAY: Space Requirements Each team maintains 4 receipt repositories  IR – Incoming Receipts  OR – Outgoing Receipts  RR – Random Receipts  DR – Discarded Receipts holding up to s IR, s OR, s RR, s DR entries replacement rule: delete oldest receipt Each team has a Time Horizon (TH)  When DR overflows, TH holds the timestamp of the receipt that was just evicted  TH and DR allow ignoring all discarded receipts (at a cost…) time TH OLD TH NEW discardings evictions DR (filled to capacity) R’s repositories Hashes of discarded DR IRORRR R R 15 of 25

NWAY Operation Step 1. Provider searches for chain in merged repositories Temporarily merge IR C, RR C, RR P, OR P Consumer should carry IR C, RR C : space requirements? Consumer information revelation: incentives? Step 2. Provider discards receipts and updates TH First receipt can simply be deleted from OR P Provider may still want to send locally discarded receipts to its own roaming members Step 3. Provider and consumer store new receipt Consumer sends it to home OR C : incentives? Step 4. Receipt dissemination (as a side-effect) Provider updates RR P with receipts from IR C and RR C PC PC IR C RR C +RR P OR P …… … … … … … …… …… PC is visiting 16 of 25

Evaluation Framework Used to evaluate the performance of the 3 cooperation strategies against each other and against 3 strategies that do not rely on feedback (ALLC, ALLD, RAND)  Teams are randomly paired 1 round : every team gets one chance to consume, one to provide if a team decides to provide service, it loses c = 1 points if a team is provided service by another team, it gains b = 7 points  Peers may learn – evolve towards the highest-rated strategy from the ones available With probability proportional to the difference in rating  A strategy’s rating := the average of the running average score/round of its followers weighted according to how many rounds they have been using the strategy We also simulate system growth  Start with two teams; a new team joins at the end of each round; teams never leave NWAY parameters for the experiments that follow: s IR = s RR = s DR = 100, s OR = of 25

NWAY against ALLC, ALLD 18 of 25

NWAY against ALLC, ALLD, RAND 19 of 25

NWAY against Traitors 20 of 25

Design Summary 21 of 25

P2PWNC Implementation

P2PWNC Protocol Messages (1/2) 22 of 25 CONN  Sent by the roaming member to the AP  Contains the member certificate (base64-encoded) CACK  Positive or negative response to connection request, sent by the AP  If positive, contains timestamp of session and public key of the providing team RREQ  Request to sign a new receipt for this session, sent by the AP  Contains the volume of traffic, as measured by the AP

P2PWNC Protocol Messages (2/2) 23 of 25 RCPT  Receipt (base64-encoded)  Sent by members to APs and by APs to the repository UPDT (only in distributed repository mode) Request by member to home repository for an update with the latest receipts (newer than a timestamp) QUER and QRES (algorithm specific) Communication between AP and home (or global) repository. The request contains the public keys of the (prospective) consuming and providing teams. The response contains a PROVIDE or DO_NOT_PROVIDE reply

Linux-based WLAN access point  We implemented the P2PWNC protocol (AP side) on it  32 MB RAM, 8 MB Flash, 200 MHz CPU  Retails for less than $70  Cryptographic, maxflow performance comparable to 200 MHz PC  Can act as home repository (storing more than receipts) Linksys WRT54GS 24 of 25

Conclusion

Final Points and Summary 25 of 25  Hurdle to P2PWNC deployment: ISP sharing prohibitions?  Centralized or decentralized deployments?  People living in the outskirts: will the notion of teams be enough to incorporate them? (In all 3 decision algorithms, teams end up having to provide approximately as much as they consume – how will this work within a team?)  We demonstrated a family of practical incentive techniques for WLAN sharing  Teams do not have to trust one another!  There are no hard service guarantees  More at

Thanks! Elias C. Efstathiou Mobile Multimedia Laboratory Department of Computer Science Athens University of Economics and Business