An Analysis of Onion-Based Anonymous Routing in Delay Tolerant Networks

Similar documents
An Analysis of Onion-Based Anonymous Routing for Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

( 3 4 ( A 6 5 ( ( A 3 ) 1 6

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks

TOUR: Time-sensitive Opportunistic Utility-based Routing in Delay Tolerant Networks

Social-Aware Data Forwarding through Scattered Caching in Disruption Tolerant Networks

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

Metrics for Security and Performance in Low-Latency Anonymity Systems

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach

Outsourcing Privacy-Preserving Social Networks to a Cloud

Community-home-based Multi-copy Routing in Mobile Social Networks

On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks

Presenter: Wei Chang4

InterestSpread: An Efficient Method for Content Transmission in Mobile Social Networks

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

A Multi-Copy Delegation Forwarding Based On Short-term and Long-Term Speed in DTNs

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Routing Protocol Approaches in Delay Tolerant Networks

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

The Loopix Anonymity System

Opportunistic Routing Algorithms in Delay Tolerant Networks

MDR Based Cooperative Strategy Adaptation in Wireless Communication

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks

Capacity-Aware Routing Using Throw-Boxes

Center for Networked Computing

Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

On Multicopy Opportunistic Forwarding Protocols in Nondeterministic Delay Tolerant Networks

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Energy Efficient Social-Based Routing for Delay Tolerant Networks

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Onion Routing in Deterministic Delay Tolerant Networks

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK

Cashmere: Resilient Anonymous Routing

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Advanced Internet Architectures

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

DTN Interworking for Future Internet Presented by Chang, Dukhyun

Strongly Anonymous Communications in Mobile Ad Hoc Networks

Computer Communications

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Personal Content Caching for Mobiles

Bloom Filters. References:

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Opportunistic Networks: Minimizing Expected Latency

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks

Supporting Cooperative Caching in Disruption Tolerant Networks

Fairness-Aware Cooperative Caching Scheme for Mobile Social Networks

Tracking Anonymous Peer-to-Peer Calls on the Internet

Delay Tolerant Networks

Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding

PRIVACY BY DESIGN FOR DELAY TOLERANT NETWORKS

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion

Studies with ns-2 and ns-3 based DTN Simulators

Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case

Epidemic Routing for Partially-Connected Ad Hoc Networks

A DTN Packet Forwarding Scheme Inspired by Thermodynamics

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

An Empirical Study of an Anonymity Metric for Data Networks. Abinash Vasudevan Bachelor of Engineering Saveetha Engineering College, 2009

Up-and-Down Routing Through Nested Core-Periphery Hierarchy in Mobile Opportunistic Social Networks

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

Store-and-Forward Performance in a DTN

Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording

Modeling Redundancy-based Routing in Delay Tolerant Networks

Identifying Packet Loss In Wireless Sensor Network

Application of Graph Theory in DTN Routing

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks

Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs

Social-Aware Routing in Delay Tolerant Networks

Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

Energy Aware and Anonymous Location Based Efficient Routing Protocol

SECLOUD: Source and Destination Seclusion Using Clouds for Wireless Ad hoc Networks

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J

MobilityFirst GSTAR: Generalized Storage Aware Routing

Computer Science Department University of California, Los Angeles. Problem Current countermeasures Our model Simulation & conclusions

Adaptive Backbone-based Routing in Delay Tolerant Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks

Peculiarities of Delay Tolerant Networks

Community-Aware Opportunistic Routing in Mobile Social Networks

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Bloom Filter for Network Security Alex X. Liu & Haipeng Dai

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

What's the buzz about HORNET?

PRESENTED BY SARAH KWAN NETWORK CODING

Social-Aware Multicast in Disruption-Tolerant Networks

Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks

Transcription:

An Analysis of Onion-Based Anonymous Routing in Delay Tolerant Networks Kazuya Sakai, Tokyo Metropolitan University Min-Te Sun, National Central University Wei-Shinn Ku, Auburn University Jie Wu, Temple University Faisal S. Analazi, The Ohio State University June 27-30, 2016 1

Outline 1. Introduction 2. Preliminary and Related Works 3. Abstract Onion-Based Anonymous Routing 4. Analyses 5. Simulations 6. Conclusions 2

1. Introduction Delay tolerant networks (DTNs) Intermittently disconnected, store-and-carry forwarding The network model of a DTN A graph representation is contact-based The link weight between two nodes is defined by contact frequency, λ i,j λ 1,2 = 1/80 2 λ 2,4 = 1/100 λ 4,5 = 1/120 1 4 5 λ 1,3 = 1/60 3 λ 3,4 = 1/70 3

Introduction (Cont.) Anonymous communications Protect the privacy of end hosts Prevent from traffic analyses Intermediate nodes never know where a packet comes from and goes to Applications Critical communications, e.g., battle fields Sink 4

2. Preliminary and Related Works Onion Routing, e.g., Tor Layered encryptions are applied to a message 5

Related Works Many anonymous routing protocols have been proposed for ad hoc networks Onion-based, zone-based, and so on But, only a few protocols have been designed for DTNs e.g., onion-based [1] and threshold-based No protocol with multi-copy forwarding has been designed No theoretical work has been done [1] C. Shi, X. Luo, P. Traynor, M. H. Ammar, and E. W. Zegura, ARDEN: Anonymous Networking in Delay Tolerant Networks, Ad Hoc Netw., vol. 10, no. 6, pp. 918 930, 2012. 6

3. Abstract Onion-Based Anonymous Routing Abstract onion-based anonymous routing protocol Introduction of onion groups A set of nodes consists of an onion group Anycast-lilke forwarding Single-copy and multi-copy forwarding 7

Multi-Copy Forwarding System Initialization: The nodes in the system are divided into n g the group size Public/private keys initializations Input parameters: The number of intermediate onion routers: K The number of message copies: L The message deadline: T Multi-Copy Forwarding (v s, v d, m, K, L, T) Selects a set of onion groups, R 1, R 2,, R K Generates an onion Sets v s. ticket = L groups, where g is 8

Multi-Copy Forwarding (Cont.) v i does the following at contact with v j at the k-th hop v i and v j establishes a secure link If v j R k and Forward(.) v i sends m to v j v i decrements v i. ticket by 1 If v i. ticket = 0, then v i deletes m from the buffer v j sets v j. ticket = 1 if v d receives m, routing succeeds If m is not delivered to v d within T, routing fails Note: the definition of Forward(.) is left to application designers e.g., intermediate onion relays are allow to have one copy 9

4. Analyses Analyses Performance : delivery rate and message overhead Security : traceable rate and path anonymity The attack model The compromise attack: a node is physically compromised, and the transmission of a message is monitored Compromised nodes are randomly chosen by the uniform distribution 10

Delivery Rate One-hop delivery The inter-contact time between v i and v j is defined by 1/λ i,j λ i,j is assumed to be exponentially distributed Pr v i contacts with v j within T = 0 T λi,j e λ i,jt dt = 1 e λ i,jt Multi-hop delivery An opportunistic path is modeled by the hypoexponential distribution [ICDCS 11] For the proposed protocol We will define an opportunistic onion path Which incorporates anycast forwarding [ICDCS 11] W. Gao, G. Cao, A. Iyengar, and M. Srivatsa, Supporting Cooperative Caching in Disruption Tolerant Networks, in ICDCS, 2011, pp. 151 161. 11

Delivery Rate (Cont.) The contact frequency for the k-th hop: λ k λ k = 1 g g j=1 g i=1 g j=1 λ s,rk,1 for k = 1 g j=1 λ rk 1,i,r k,j for 2 k K λ rk 1,j,d for k = K + 1 The delivery rate: P delivery (T) (η) (η) The coefficient: A k = j=1,j k η P delivery T = k=1 A k η η P delivery T, L = k=1 A k η 1 e λ k T 1 e λ k LT λ j λ j λ k v s r k 1,1 r k 1,2 r k 1,g r 1,1 r 1,2 r 1,g Fig 1. The first hop. Fig 1. The k-th hop. r k,1 r k,2 r k,g 12

Message Forwarding Cost The spray-and-wait between two nodes For a connected pair of v i and v d, a message is eventually delivered, when T At most 2L 1 message transmissions Onion-based routing with L = 1 Num of msg tx is K + 1 Onion-based routing with L 2 The first hop: 2L 1 The k-th hop (2 k K): KL Num of msg tx is K + 2 L 1 r k 1,1 r k 1,2 s 1 2 d L-1 Fig 1. Source spray-and-wait 2 L 1 + 1 = 2L 1 r k,1 r k,2 r k 1,L r k,l Fig 2. Msg TX btwn 2 groups (L g holds) 13

The Traceable Rate The attack model For path v 1 v 2 v k, should v i be compromised, link v i v i+1 will be disclosed The traceable rate Quantifies how much portion of a path is disclosed P trace = 1 C seg η 2 i=1 c seg,i 2, where η is the path length v 1 v 2 v 3 v 4 v 5 v 1 v 2 v 3 v 4 v 5 Case 1: P trace = 22 +1 2 4 2 = 5 16 Case 2: P trace = 32 4 2 = 9 16 14

The Traceable Rate (Cont.) Our approach The binary rep. of a path is defined by b = b 1, b 2,, b i = 1 indicates the compromised link The problem is reduced to estimating the run length of 1 s The run is the same consecutive 0 s or 1 s v 1 v 2 v 3 v 4 v 5 v 6 b = 01101 P trace = 22 + 1 2 5 2 15

The Traceable Rate (Cont.) This can be modeled by the geometric distribution Let X i be the random variable that represents the run length of the first segment starting from b i c : # of compromised nodes, n : # of nodes η E X i = k= E Xi +1 k 2 c n k 1 c n The traceable rate : P trace (c) We have C seg η/2 b = 10101010 10 P trace c = 1 η/2 η 2 i=1 2 E[Xi ] η-bit There is 0 between neighboring segments 16

Path Anonymity Anonymity An entropy-based metric, i φ p i log p i Application-dependent Example: a bit string 01XX Path anonymity for DTNs { 0100, 0101, 0110, 0111 } Path anonymity : D φ = H φ H max Note: the copies of a message can be correlated Path 2 Path 1 1 2 R k g Compromised node The k-th onion router in path 1 must be one of the nodes in R k 17

Path Anonymity (Cont.) The maximal entropy of the system There are n η possible paths, when c = 0 H max = path φ n η! n! n η! path φ n! log n η! n! equals to 1, since every path in an anonymous set is identified with the same probability n nodes n 1 nodes n η nodes 18

Path Anonymity (Cont.) The entropy of the system The joint probability that a node is selected as an onion router and is compromised: 1 g cg n = c n Let Y be the random variable that represents the number of compromised nodes on a path η η c i This follows the Binomial dist.: E Y = i i 1 c η i i n n The probability that an adversary can guess the next node: P guess v i, n, g, k = 1 g 1 n k if v i is compromised if otherwise 19

Path Anonymity (Cont.) Let c 0 = E[Y] The probability of successfully guessing path i : p i = n K+c 0! n! 1 g c 0 In the case that a node is compromised In the case that a node is NOT compromised The entropy of the system: H(φ ) = path φ n η+c 0! g c 0n! Path anonymity D(φ ) log n η+c 0! g c 0n! D φ = H φ H max = η c 0 ln n 1 +c 0 ln g η(ln n 1) 20

5. Simulations Comparisons between analysis and simulation Delivery rate, message overhead, traceable rate, and path anonymity Parameters Group size g, Num of onion routers K, Num of copies L Two scenarios Randomly generated graphs Real traces with CRAWDAD dataset 21

Simulations with Random Graphs A contact graphs are randomly generated 1000 simulations experiments are conducted Table. Simulation parameters. Parameter Value (default value) The number of nodes, n 1000 The inter-contact time, λ 0 to 360 minutes The group size, g 1 10 (5) The number of onion routers, K 1 10 (3) The number of copies, L 1-5 The message deadline, T 60 to 1800 minutes The % of compromised nodes, c/n 0% - 50% (10%) 22

Delivery Rate and Message Overhead Fig. Delivery rate Fig. Message overhead The delivery rate increases as the value of L increases The # of msg forwarding increases, as the value of L increases 23

Traceable Rate and Anonymity Fig. Traceable rate Fig. Path Anonymity Note: the traceable rate is independent from the value of L The traceable rate decreases, as the onion length increases The path anonymity decreases, as the value of L increases 24

Results with Real Traces Fig. the delivery rate Cambridge traces (a small and dense network with 12 imotes) Fig. the delivery rate Infocom 15 traces (a medium size network with 41 imotes) There exist on and off-business hours 25

6. Conclusions We emphasize the theoretical aspects of onionbased anonymous routing in DTNs An abstract of onion-based anonymous routing protocols The analysis of the delivery rate, message overhead, traceable rate, and path anonymity The analyses provide the closed-form solutions to approximate the simulation results 26

Thank you 27

Observations Three parameters, g, K, and L Group size g : determined by the administrator The onion length K: flexible setting is not possible The number of copies L : tunable by each message transmission Rule of thumb Larger L improve delivery rate, but reduces path anonymity 28