Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.

Slides:



Advertisements
Similar presentations
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
A Survey of Key Management for Secure Group Communications Celia Li.
IP datagrams Service paradigm, IP datagrams, routing, encapsulation, fragmentation and reassembly.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Group #1: Protocols for Wireless Mobile Environments.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style A Survey on Decentralized Group Key Management Schemes.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Computer Science 1 ShapeShifter: Scalable, Adaptive End-System Multicast John Byers, Jeffrey Considine, Nicholas Eskelinen, Stanislav Rost, Dmitriy Zavin.
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
Multicasting in Mobile Ad-Hoc Networks (MANET)
SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy,
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
Computer Science ROMA: Reliable Overlay Multicast with Loosely Coupled TCP Connections Gu-In Kwon and John Byers Computer Science Dept. Boston University.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Network Layer4-1 Spanning trees r Suppose you have a connected undirected graph m Connected: every node is reachable from every other node m Undirected:
CS 268: Lecture 5 (Project Suggestions) Ion Stoica February 6, 2002.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Application Layer Multicast
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Group Key Distribution Chih-Hao Huang
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Purdue University - Infocom Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System Ruben Torres, Xin Sun, Aaron Walters, Cristina.
Multicast Security Issues and Solutions. Outline Explain multicast and its applications Show why security is needed Discuss current security implementations.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Communication Part IV Multicast Communication* *Referred to slides by Manhyung Han at Kyung Hee University and Hitesh Ballani at Cornell University.
Scalable Reliable Multicast Architecture Wenjun Zeng Computer Science Department University of Missouri-Columbia.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Common Devices Used In Computer Networks
AD HOC WIRELESS MUTICAST ROUTING. Multicasting in wired networks In wired networks changes in network topology is rare In wired networks changes in network.
An IPSec-based Host Architecture for Secure Internet Multicast R. Canetti, P-C. Cheng, F.Giraud, D. Pendarakis, J.R. Rao, P. Rohatgi, IBM Research D. Saha.
Hierarchical agent-based secure and reliable multicast in wireless mesh networks Yinan LI, Ing-Ray Chen Robert Weikel, Virginia Sistrunk, Hung-Yuan Chung.
Computer Science Informed Content Delivery Across Adaptive Overlay Networks Overlay networks have emerged as a powerful and highly flexible method for.
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Secure Group Communication: Key Management by Robert Chirwa.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Let’s ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking Zhenkai Zhu Alexander Afanasyev (presenter) Tuesday, October 8,
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Impact of Topology on Overlay Multicast Suat Mercan.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Source specific multicast routing and QoS issues Laurentiu Barza.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
This paper appears in: Computer Communications and Networks, ICCCN Proceedings.15th International Conference on 指導教授 : 許子衡 報告者 : 黃群凱 1.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
APPLICATION LAYER MULTICASTING
Video Multicast over the Internet Presented by: Liang-Yuh Wu Lung-Yuan Wu Hao-Hsiang Ku 12 / 6 / 2001 Bell Lab. And Georgia Institute of Technologies IEEE.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Group Key Distribution Xiuzhen Cheng The George Washington University.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
Peer-to-Peer Result Dissemination in High-Volume Data Filtering Shariq Rizvi and Paul Burstein CS 294-4: Peer-to-Peer Systems.
ECE 544 Project3 Group 9 Brien Range Sidhika Varshney Sanhitha Rao Puskuru.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #09: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Security Kim Soo Jin. 2 Contents Background Introduction Secure multicast using clustering Spatial Clustering Simulation Experiment Conclusions.
Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
GUIDED BY: N.SRIDHAR Assoc Professor Dept of IT GMRIT Rajam PROJECT MEMBERS: E.PRASAD BABU(06341A1214) G.SRIRAMULU(07341A1275) S.SRAVANI(07341A1272) P.KARTIKEYAN(06341A1233)
Network Processing Systems Design
Overlay Networking Overview.
Design and Implementation of SUPnP Networks
Ch 17 - Binding Protocol Addresses
Presentation transcript:

Overlay Network Physical LayerR : router Overlay Layer N R R R R R N

Overlay Network Problem of IP Multicast (Physical Layer) Multicast for key distribution requires router must have specific function. It costs to change every router has Multicast function.

Overlay Network An overlay network is a computer network which is built on top of another network. Nodes in the overlay can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. - wikipedia - Advance : Multicast group self-organize into efficient structures for delivering data without requiring any support from the existing network infrastructure.

Confidential data delivery Previous work Security mechanisms can be efficiently provided by using symmetric key based cryptographic algorithm, which in turn require all participants to share a secret key (Group key) using IP Multicast.

Problem of previous work 1. To use IP Multicast with previous existing router, it might be replaced to new router which can support IP Multicast function.  May incur cost to replace router 2. While a few recent works have considered issues with key dissemination using overlays, these works rely on analysis or simulations with synthetic workloads and don’t consider issues such as resilient key delivery. 3. There doesn’t exist real implementation and Internet experiments in an overlay context

Solution & Contribution Conduct a systematic performance evaluation of strategies for key dissemination in the context of overlay broadcasting system on the Planetlab testbed using real traces of join/leave dynamics. Considering resilient key dissemination on an overlay network. Design space for dissemination of data and keys using decoupled architecture.

Why we consider? Using key dissemination for a network security Network bandwidth is limited Frequent rekeying causes network slowly

Key management algorithm Centralized key management schemes Relying on single key server Batch rekeying  several group changes are accumulated in group key. In rekey period, Low rekey period  frequent rekeying, high overhead High rekey period  make scheme more vulnerable to violation of security properties

Key management algorithm 2 key management algorithms 1. Key-star encrypt new key when performing a rekey operation. Required O(N) encrypt message where N is the group size. 2. Marking variant of LKH protocol, using subgroup key to reduce encryption cost.  Not considering members left

Resilient key dissemination Losing rekey packets can be severe. Focusing on minimizing loss of rekey packets Naïve Unicast : using TCP connection individually Tree-TCP, Tree-UDP : For overlay multicast Tree-Unicast

Key and Data dissemination coupling strategies Fig. 1. a) An LKH keys tree. b) An overlay structure optimized for data delivery. Intermediate nodes are positioned by their network characteristics. New keys are sent to all nodes. c) An overlay structure optimized for keys delivery. Intermediate nodes are positioned by their ID. New keys are sent only to nodes that need them.

Key and Data dissemination coupling strategies Coupled-Data Optimized : sub-optimal,High overhead Coupled-Key Optimized : May reduce rekeying overhead Can violate saturation degree of nodes when bandwidth demanding broadcasting application are considered. Decoupled : two specialized dissemination structure Advance : providing good performance data delivery and reduction in overhead to disseminate key message. Drawback: source must maintain two structures, hence needs additional complexity and overhead to maintain extra structure

Evaluation goals Reliable key dissemination : Considering data & keys loss or delay. Which algorithm is the best? Key & data coupling : Reduction of overhead. Benefits significant under real work-load.

Test Based on real world Internet load, classified 5 types Conference 1 Conference 2 Portal Competition Rally Each type has different type of data transmission, which means numbers of join/leaves are variable.

Result Choice of rekey period : Marking algorithm

Result Choice of Resilient key dissemination: Tree-TCP, Tree-Unicast

Result Coupling strategies: Decoupled Overhead of key messages is reduced by 50%~67% of that incurred with Coupled-DataOptimized. Even though there needs additional overhead of maintaining the separate key-delivery structure, the reduction in total overhead is still significant. Especially, it shows remarkably reduced where overhead of key messages is the major component like type “Rally”.

Limitation on the proposed solution Only considering single-source broadcasting application. There might be many multi-source broadcasting system in the real world. It may incur lots of rekeying overhead to the sub-group Bottleneck