Stimulating Participation in Wireless Community Networks Elias C. Efstathiou, Pantelis A. Frangoudis, George C. Polyzos Mobile Multimedia.

Slides:



Advertisements
Similar presentations
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Advertisements

SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
On the Economics of P2P Systems Speaker Coby Fernandess.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Peer-to-Peer Wireless Network Confederation (P2PWNC) George C. Polyzos Mobile Multimedia Laboratory Department of Computer Science Athens.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Elias C. Efstathiou Mobile Multimedia Lab Computer Science Department Athens University of Economics and Business Athens 10434, Greece
The War Between Mice and Elephants LIANG GUO, IBRAHIM MATTA Computer Science Department Boston University ICNP (International Conference on Network Protocols)
Trustworthy Accounting for Wireless LAN Sharing Communities Elias C. Efstathiou and George C. Polyzos Mobile Multimedia Laboratory Department of Informatics.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Διπλωματική Εργασία The Peer-to-Peer Wireless Network Confederation Protocol: Design Specification and Performance Analysis Παρουσίαση: Παντελής Φραγκούδης.
Designing a Peer-to-Peer Wireless Network Confederation Elias C. Efstathiou and George C. Polyzos Department of Computer Science Athens University of Economics.
P2PWNC Wireless Community Network CMSC 711: Computer Networks Yee Lin Tan Adam Phillippy.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
1 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Building Secure Media Applications over Wireless Community.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.
A Self-Managed Scheme for Free Citywide Wi-Fi Elias C. Efstathiou and George C. Polyzos Mobile Multimedia Laboratory Department of Computer.
A Peer-to-Peer Approach to Wireless LAN Roaming George C. Polyzos Mobile Multimedia Laboratory Department of Informatics Athens University of Economics.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
A TCP With Guaranteed Performance in Networks with Dynamic Congestion and Random Wireless Losses Stefan Schmid, ETH Zurich Roger Wattenhofer, ETH Zurich.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Self-Organized Aggregation of Wi-Fi Networks Elias C. Efstathiou, Advisor: George C. Polyzos Mobile Multimedia Laboratory, Department of Computer Science.
Efficient agent-based selection of DiffServ SLAs over MPLS networks Thanasis G. Papaioannou a,b, Stelios Sartzetakis a, and George D. Stamoulis a,b presented.
A Framework for Cost-Effective Peer-to- Peer Content Distribution Mohamed Hefeeda and Bharat Bhargava Department of Computer Sciences Purdue University.
Peer WLAN Consortium: A P2P Case Study Mobile Multimedia Laboratory Department of Informatics Athens University of Economics & Business Athens MMAPPS Meeting,
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Dr. Raimund Ege: Research Summary  Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks  Opportunities for student.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Exploiting super peers for large- scale peer-to-peer Wi-Fi roaming Efstratios G. Dimopoulos, Pantelis A. Frangoudis and George.C.Polyzos.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
IEEE R lmap 23 Feb 2015.
1 Secure Ad-Hoc Network Eunjin Jung
A Peer-to-Peer Approach to Sharing Wireless Local Area Networks PhD dissertation Elias C. Efstathiou Adviser: Professor George C. Polyzos Athens University.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September.
The TAOS Authentication System: Reasoning Formally About Security Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung.
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance Purvi Shah, Jehan-François Pâris, Jeffrey Morgan and John Schettino IEEE.
O.C.E.A.N Open Computation Exchange and Auctioning Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Cooperation between stations in wireless networks Andrea G. Forte, Henning Schulzrinne Department of Computer Science, Columbia University Presented by:
Application Level QoS in Multimedia Peer-to-Peer (P2P) Networks Alireza Goudarzi Nematiy and Makoto Takizawa¤ Tokyo Denki University
Network Security Celia Li Computer Science and Engineering York University.
Deployable Filtering Architectures Against Denial-of-Service Attacks Department of Computer Science University College London Telephone: +44 (0)
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
Using Rhythmic Nonces for Puzzle-Based DoS Resistance Ellick M. Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, and Daniel Rebolledo University of.
Cryptography CSS 329 Lecture 13:SSL.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
Networks – Network Fundamentals
A Peer-to-Peer Approach to Wireless LAN Roaming
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Presentation transcript:

Stimulating Participation in Wireless Community Networks Elias C. Efstathiou, Pantelis A. Frangoudis, George C. Polyzos Mobile Multimedia Laboratory Department of Computer Science Athens University of Economics and Business IEEE INFOCOM 2006, Barcelona, April 23-29, 2006

 Connected to DSL and cable links  Secured (WEP, WPA)  Under-utilized Motivation Many private WLANs in cities An opportunity?  E.g. Skyhook Wireless WPS is a positioning service that relies on detecting catalogued WLANs Boston WLAN coverage © 2005 Skyhook Wireless Inc Manhattan WLANs © 2002 Public Internet Project.org

Outline of Talk 1)The Peer-to-Peer Wireless Network Confederation scheme for WLAN sharing 2)P2PWNC architecture and algorithms 3) Simulation-based evaluation of algorithms 4) P2PWNC protocol 5) P2PWNC implementation

What is P2PWNC ? 3)A public good created through private contributions  Wireless Internet (and VoIP) through third parties  And what about freeriders? 2)A simple protocol for (selfish) WLAN phones and access points  Our implementation runs on Windows Mobile phones/PDAs and Linux access points 1)An incentive scheme for sharing our WLANs with others  Relies on direct and/or cyclical reciprocity  Balances consumption and contribution AB A C B

Distinctive Characteristics 1)Complete decentralization, respect for privacy  Open to all, without central authorities of any kind  Free identities (aka cheap pseudonyms)  No tamperproof modules 2)Selfishness  Nobody cares about the good of the community  Freeriding is rational, and it extends to accounting tasks  No super peers, no P2P overlaysP2PWNC ?sophisticated freeridersAttacker model centralizeddecentralizedArchitecture WLAN sharing Goal versus

Caveats 1)ISP prohibitions on connection sharing 2)People living in the outskirts… what about them? 3) Designed for citywide everyday WLAN roaming, as opposed to global WLAN roaming 4) WLAN standards do not support fast handovers, yet 5)We do not defend against pure irrational malice (i.e. DoS attacks at various layers)

System Elements 1)Identities  System identities are public-private key pairs  Standard cryptographic assumptions apply 3) Receipts  Generated each time WLAN service is contributed and consumed  Digitally signed by the consumer consumer public key timestamp signed using consumer private key weight provider public key 2)P2PWNC peers  Each with a self-generated identity  At least one WLAN access point per peer (for contributing to the community)  At least one WLAN client per peer (for consuming from the community)

Receipt Graph w 14 A B C G H F E D I w1w1 w2w2 w3w3 w4w4 w5w5 w6w6 w7w7 w8w8 w9w9 w 10 w 11 w 12 w 13 1)A (logical) directed graph, with cycles  Vertices represent peer IDs  Edges point from the consumer to the provider (they represent debt)  Edge weight is the sum of the weights of the corresponding receipts 2)Graph security  Freeriders and colluders can create an arbitrary number of vertices and edges (Sybil/false trading attack)  They cannot create fake edges starting from peers who are not colluding 3)Receipt repository  Centralized version  Distributed version  Short-term history, in both versions

Reciprocity Algorithm: Overview mf(P→C) maxflow from P (Provider) to C (Consumer) gmf(P→C) generalized maxflow from P to C: discount sub-flows, multiply them by 2 (1—path_length) quality of flow from P to C qf avg an average qf for the community, estimated independently by each peer P, using: qf avg ← a × qf avg + (1–a) × qf(P→C), 0 < a < 1 r = r 1 × r 2 benefit function

Gossiping and Bootstrap At one extreme, APs would only store graph edges pointing directly to them At the other extreme, a central server would store everything 1)How do we circulate receipts through the system?  Gossip a)Copy “fresh” receipts from your WLAN AP to your phone b)Present them to foreign APs before requesting service c)Foreign APs merge these with their local receipt graph …verification overhead, time horizon, incentive compatibility 2)How to bootstrap a peer?  Reciprocity Algorithm does not work without unconditional cooperation in the beginning  Define patience: the number of successful consumptions after which a new peer starts to use the Reciprocity Algorithm

Evaluation Framework Evolutionary simulations  Uniform peers (consumption rate, benefit and cost functions, repository sizes, merging sizes, patience)  Assume unit weight on receipts, corresponding to a “standard WLAN session”  Constant provider cost (per session), normalized to c = 1  Variable consumer benefit (b min = 0, r th = 0.1, b max = 6)  Rounds: symmetric matches  Strategy ratings  Assume rational but myopic peers: “trial and error”  Strategic mixtures, and learning and mutation  Goal: the evolution of cooperation (average rating near b max – c)  No congestion effects  Also simulate system growth (up to n peers)

Rounds Merging and Patience Community grows to n = 100 peers (at round 100) and private receipt repositories contain 1000 receipts each diminishing returns patience=10 patience=100

Rounds Evolutionary Learning Community grows to n = 100 peers (by round 100) and private receipt repositories contain 1000 receipts each Non-zero learning and mutation probabilities; merge 100 conditions favor freeriding mutations set b max /c = 3 (was: 6) P2PWNC service not valuable enough, ALLD wins

Change ID to Erase Debt (i.e. r = r 1 ) r = r 1 × r 2 qf avg ← a × qf avg + (1–a) × qf(P→C), 0 < a < 1 B C CiCi C i+1 A P hiding in qf avg ’s variance, but still, worse off Community starts with n = 200 peers and private receipt repositories contain 2000 receipts each; merge 200

Simple text-based protocol over TCP/IP The P2PWNC Protocol C P CONN CACK 11:50am = t 0 (consumer connects) C P RREQ RCPT 11:51am (P requests 1 st receipt) RCPT timestamp = t 0 RCPT weight = w 1 C P RREQ RCPT 11:52am (P requests 2 nd receipt) RCPT timestamp = t 0 RCPT weight = w 2 > w 1 P RREQ RCPT 11:53am (consumer has departed) P stores last receipt (timeout) Receipt Repository

P2PWNC Implementation  Open source: downloadable from  Linksys-centric all-in-one version  ECC and RSA digital signatures – tradeoffs  Guru-friendly modular version in preparation, for deployment in AWMN  P2PWNC client for Windows Mobile WLAN phones  Plus, VPN tunnels (PPTP and L2TP/IPsec), QoS module, VoIP proof-of-concept app.

Thanks! Elias C. Efstathiou Mobile Multimedia Laboratory Department of Computer Science Athens University of Economics and Business