240 likes | 450 Views
Διπλωματική Εργασία . The Peer-to-Peer Wireless Network Confederation Protocol: Design Specification and Performance Analysis Παρουσίαση: Παντελής Φραγκούδης Επιβλέπων: Γ. Πολύζος Εξωτερικός αξιολογητής: Κ. Κουρκουμπέτης. Outline. Introduction System overview and architecture
E N D
Διπλωματική Εργασία The Peer-to-Peer Wireless Network Confederation Protocol: Design Specification and Performance Analysis Παρουσίαση: Παντελής Φραγκούδης Επιβλέπων: Γ. Πολύζος Εξωτερικός αξιολογητής: Κ. Κουρκουμπέτης
Outline • Introduction • System overview and architecture • P2PWNC protocol • Reference implementation • Performance evaluation • Conclusion
Introduction • Peer-to-Peer Wireless Network Confederation (P2PWNC) • WLAN roaming scheme based on the P2P paradigm • Sharing WLAN resources • Motivation • Wide spread of WLAN low-cost equipment and broadband access • Underutilized residential WLAN resources • Limited WLAN roaming capabilities • Purpose • Fueling ubiquitous internet access • Exploiting underutilized residential WLAN resources • Enforcing cooperation through reciprocity • Characteristics • Deployment simplicity • Agent autonomy • Low managerial overhead
P2PWNC Overview • Users organized in teams • Rule of reciprocity • Members of a team are freely served by other teams if their team also serves members of other teams • Autonomous decisions • Decisions are based on transaction history • Decision algorithms: not specified by the protocol • Trust model • Team members know and trust each other • Teams do not trust one another • Two operation modes: Centralized (TCA), Decentralized (no TCA) • ASCII-based communication protocol
System Entities (1/3) • Teams • P2PWNC peers • Team identifier: public/secret key pair • Each team operates a number of access points • Team members • Member identifier: public/secret key pair • Team membership established via a certificate • Access Points
System Entities (2/3) • Receipts • Proofs of prior transactions • Issued (signed) by service consumer • 1 receipt per session Member PK Team PK Consumer Certificate Team Signature Provider PK Timestamp Weight Consumer Signature
System Entities (3/3) • Receipt Repository • Stores transaction history • History used as input to the decision algorithm • Trusted Central Authority • Issues key pairs for teams • Manages a central receipt repository • Team Server • Issues member key pairs and certificates • Manages a team-local receipt repository • Updates member repositories by answering UPDT messages
The P2PWNC Protocol • ASCII-based messages • Support for RSA and Elliptic Curve Cryptography (ECC) digital signatures • Specifies cryptosystem parameters • Specifies key, certificate and signature data representations • Does not specify decision algorithms, data storage formats, software agent implementation details
Cryptosystem Parameters • RSA • Bit lengths: 1024, 1536, 2048 • Digest values produced by SHA-1 • ECC • Bit lengths: 160, 192, 224, 256 • ECDSA algorithm (using SHA-1)
Protocol Messages • CONN: session initiation • CACK: session establishment • RREQ: receipt request • RCPT: receipt • QUER: query to the Receipt Repository • QRSP: query response (grant/deny access) • UPDT: repository update request
Mobile User – Access Point Session Mobile User Access Point Repository CONN QUER CACK QRSP RREQ RCPT RREQ Timeout/ Conn. closed RCPT
Reference Implementation (1/3) • AP module • Runs on top of embedded Linux-based wireless access points • Multithreaded TCP server • Uses netfilter/iptables for network access control • Kernel-level traffic measurements per session • Mandatory support for RSA, ECC • Mobile User module • Currently, C and Java implementations • Need not support both RSA, ECC.
Reference Implementation (2/3) • Receipt Repository module • Composite data structure for receipt storage • Decision algorithms: pluggable modules • Decisions based on the maximum-flow algorithm • Push-Relabel Algorithm - O(V3) • “Global relabeling” heuristic
Reference Implementation (3/3) • TCA module • Includes receipt repository module • TCP server waiting for RCPT & QUER messages • Team database • Team key pair generation module • Mandatory support for both RSA, ECC • Team Server module • Includes receipt repository module • TCP server waiting for RCPT, QUER, UPDT messages • Mandatory support for both RSA, ECC
Performance Evaluation • Testbed • Linksys WRT54GS wireless router • AMD AthlonXP 2800 laptop • Cryptographic operations performance tests • Signature, verification tests • ECC vs RSA, AthlonXP vs Linksys WRT54GS • Maximum flow algorithm performance tests • Peer population: 100, 500, 1000 teams • Receipt repository size: 100 to 10000 receipts • Running time and memory consumption tests • Effects of signature verifications on AP operation • Tests run on Linksys WRT54GS • FTP transfer of a ~220Mb file • 160bit ECDSA verifications
Cryptographic Operations Performance Time measured in milliseconds
Effect of CPU Intensive Tasks on Throughput • Verification wall clock time: 0.12sec • 223.33Mbyte FTP transfer over Linksys WRT54GS (wired): 3956.62 Kbytes/sec
Extensions • Denial-of-Service attacks • DoS attacks to APs/Receipt Repositories • Exploit of probabilistic nature of decision algorithms • Implementation issues • Maxflow algorithm heuristics • Receipt Repository as a distributed database • Study and improve ECC efficiency • Deployment issues • Porting client software to more platforms (esp. PDAs) • Downloadable Linksys WRT54GS firmware distribution • Evaluation issues • Maxflow testing on various graph types (based on user mobility models)
Summary • Specified, implemented and evaluated a protocol for the provision of unified WLAN roaming services • Aiming at fueling ubiquitous Internet access • Scheme built around the ideas of agent autonomy and service reciprocity • Maximum flow-based decision algorithms • Designed with embedded/constrained devices in mind • Efficient data structures for data storage/retrieval and graph operations • Tested applicability of Elliptic Curve Cryptography