1 / 44

FIGHTING ADVERSARIES IN NETWORKS

FIGHTING ADVERSARIES IN NETWORKS. Sidharth Jaggi (MIT). Michelle Effros Michael Langberg Tracey Ho. Muriel Médard Dina Katabi. Peter Sanders. Philip Chou Kamal Jain. Ludo Tolhuizen Sebastian Egner. Network Coding . . . what is it?.

Download Presentation

FIGHTING ADVERSARIES IN NETWORKS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. FIGHTING ADVERSARIES IN NETWORKS Sidharth Jaggi (MIT) Michelle Effros Michael Langberg Tracey Ho Muriel Médard Dina Katabi Peter Sanders Philip Chou Kamal Jain Ludo Tolhuizen Sebastian Egner

  2. Network Coding . . . what is it? “The core notion of network coding is to allow and encourage mixing of data at intermediate network nodes. “ (Network Coding Homepage)

  3. Justifications - I s Throughput b1 b2 b1 b2 b1 b1+b2 b1 ? b2 b1 b1 b1+b2 b1+b2 t1 t2 [ACLY00] (b1,b2) b1 (b1,b2)

  4. Gap Without Coding s [JSCEEJT05] . . . . . . Coding capacity = h Routing capacity≤2

  5. Multicasting Webcasting t1 t2 s1 Network P2P networks s|S| t|T| Sensor networks

  6. Background Upper bound for multicast capacity C, C ≤ min{Ci} t1 [ACLY00] - achievable! C1 [LYC02] - linear codes suffice!! C2 t2 [KM01] - “finite field” linear codes suffice!!! s Network C|T| t|T|

  7. Background F(2m)-linear network [KM01] b1 b2 bm Source:- Group together `m’ bits, Every node:- Perform linear combinations over finite field F(2m) β1 β2 βk

  8. Background t1 [ACLY00] - achievable! C1 [LYC02] - linear codes suffice!! C2 t2 [KM01] - “finite field” linear codes suffice!!! s Network [JCJ03],[SET03] - polynomial time code design!!!! C|T| [HKMKE03],[JCJ03] - random distributed code design!!!!! t|T|

  9. Justifications - II s Robustness/Distributed design One link breaks t1 t2

  10. Justifications - II s Robustness/Distributed design b1 b2 b1 b2 b1+b2 b1+2b2 b1 b2 (Finite field arithmetic) b1+b2 b1+b2 b1+2b2 t1 t2 (b1,b2) (b1,b2)

  11. Random Robust Codes t1 C1 C = min{Ci} C2 t2 Original Network s C|T| t|T|

  12. Random Robust Codes t1 C1' C' = min{Ci'} C2' t2 Faulty Network s If value of C' known to s, same code can achieve C' rate! (interior nodes oblivious) C|T|' t|T|

  13. Random Robust Codes Choose random [ß] at each node Percolate overall transfer function down network With high probability, invertible Decentralized design

  14. Justifications - III s Security Evil adversary hiding in network eavesdropping, injecting false information [JLHE05],[JLHKM06?] t1 t2

  15. Greater throughput Robust against random errors . . . Aha! Network Coding!!!

  16. ? ? ?

  17. ? ? ? Yvonne1 . . . ? ? ? Xavier Yvonne|T| Zorba

  18. Setup Eureka Who knows what Stage • Scheme X Y Z • Network Z • Message X Z • Code Z • Bad links Z • Coin X • Transmit Y Z • Decode Y Wired Wireless (packet losses, fading) Eavesdropped links ZI Attacked links ZO

  19. Setup ? C ? ? Yvonne1 ? ? ? MO Xavier Yvonne|T| Zorba Xavier and Yvonnes share no resources (private key, randomness) Distributed design (interior nodes oblivious/overlay to network coding) Zorba (hidden) knows network; Xavier and Yvonnes don’t Zorba sees MI links ZI, controls MO links ZO pI=MI/C, pO=MO/C Zorba computationally unbounded; Xavier and Yvonnes -- “simple” computations Zorba knows protocols and already knows almost all of Xavier’s message (except Xavier’s private coin tosses) Goal: Transmit at “high” rate and w.h.p. decode correctly

  20. Upper bounds 1 C (Capacity) 0.5 0 1 0.5 pO (“Noise parameter”) 1-pO

  21. Upper bounds 1 ? C (Capacity) ? ? 0.5 0 1 0.5 pO (“Noise parameter”) 0

  22. Unicast [JLHE05] 1 C (Capacity) 0.5 0 1 0.5 pI=pO (“Noise parameter” = “Knowledge parameter”)

  23. Unicast [Folklore] 1 C (Capacity) 0 1 0.5 pO (“Noise parameter”) (“Knowledge parameter” pI=1)

  24. Upper bounds 1 1-2pO pO C (Capacity) pO 0 1 0.5 pO (“Noise parameter”) (“Knowledge parameter” pI=1)

  25. Upper bounds “Knowledge parameter” pI>0.5 1 ? C (Capacity) ? ? 0 1 0.5 pO (“Noise parameter”)

  26. Upper bounds “Knowledge parameter” pI<0.5 “Knowledge parameter” pI>0.5 1 1 C (Capacity) C (Capacity) 0.5 0 0 1 1 0.5 0.5 pO (“Noise parameter”) pO (“Noise parameter”)

  27. Distributed Design [HKMKE03] Choose random [ß] at each node Percolate overall transfer function down network With high probability, invertible Decentralized design

  28. Distributed Design [HKMKE03] Rate h=C xb(i) Block t1 y1 xs(j) hxh identity matrix h<<n Slice S x xb(1) β1 T xb(i) x’b(i) βi ys(j)=Txs(j) t|T| y|T| xs(j)=T-1ys(j) βh xb(h)

  29. Achievability - 1 Observation 1: Can treat adversaries as new sources 1 C (Normalized by h) R1 S’1 0.5 S S’2 0 1 0.5 R|T| pO S’|Z|

  30. Achievability - 1 y’s(j)=Txs(j)+T’x’s(j) Supersource SS Observation 2: w.h.p. over network code design, {TxS(j)} and {T’x’S(j)} do not intersect (robust codes…). Corrupted Unknown

  31. Achievability - 1 y’s(j)=Txs(j)+T’x’s(j) ε redundancy xs(2)+xs(5)-xs(3)=0 xs(3)+2xs(9)-5xs(1)=0 ys(3)+2ys(9)-5ys(1)= another vector in {T’x’s(j)} ys(2)+ys(5)-ys(3)= vector in {T’x’s(j)} {Txs(j)} {T’x’s(j)}

  32. Achievability - 1 y’s(j)=Txs(j)+T’x’s(j) ε redundancy Repeat MO times Discover {T’x’s(j)} “Zero out” {T’x’s(j)} Estimate T (redundant xs(j) known) Decode {Txs(j)} {T’x’s(j)}

  33. Achievability - 1 y’s(j)=Txs(j)+T’x’s(j) xs(2)+xs(5)-xs(3)=0 ys(2)+ys(5)-ys(3)= vector in {T’x’s(j)} x’s(2)+x’s(5)-x’s(3)=0 ys(2)+ys(5)-ys(3)=0

  34. Secret Uncorrupted ε-rate Channels Secret, correct hashes of xs(j) [r,(∑jxs(j)rj)] Zorba doesn’t know how to hide Useful abstraction Will return to this…

  35. Achievability - 2 “Distributed Network Error-correcting Code” (Knowledge parameter pI>0.5) [CY06] – bounds, high complexity construction [JHLMK06?] – tight, poly-time construction 1 C (Capacity) 0 1 0.5 pO (“Noise parameter”)

  36. Achievability - 2 error vector y’s(j)=Txs(j)+T’x’s(j) 1-2pO pO pO

  37. Achievability - 2 T’’ y’s(j)=T’’xs(j)+T’x’s(j)

  38. Achievability - 2 T’’ y’s(j)=T’’xs(j)+T’x’’s(j) e e’ e

  39. Achievability - 2 T’’ y’s(j)=Txs(j)+T’x’s(j) y’s(j)=(T+T’L)xs(j)+T’(x’s(j)-Lxs(j)) y’s(j)=T’’xs(j)+T’x’’s(j) known Any set of MO+1 {x’’s(j)}s linearly dependent Let T’x’’s(1) = a(1),…,T’x’’s(MO)=a(MO) A=[a(1)…a(MO)] y’s(j)=T’’xs(j)+Ac(j) Linearized equation, Size of A finite, Redundancy known

  40. Achievability - 1.5 Not quite 2MO<C, 2MI<C MI+2MO<C MI<C-2MO Network error-correcting codes Zorba’s observations Using network error-correcting codes as small header, can transmit secret, correct information… … which can be used for first scheme!

  41. Achievability - 1 2MO<C, 2MI<C Working on it… “Slightly” non-linear codes Use fact that T, T’ in general unknown to adversary

  42. Overview • Hidden, eavesdropping, malicious, computationally unbounded adversary • Network topology unknown • Polynomial time decoding overlaid on network code, achieves “almost optimal” performance

  43. T H E E N D

More Related