quantitative evaluation of secure network coding dawn meeting ucsc nov 4, 2010

24
1 Quantitative Evaluation of Secure Network Coding Dawn Meeting UCSC Nov 4, 2010 SeungHoon Lee, Mario Gerla In collaboration with IBM researchers

Upload: brigid

Post on 14-Jan-2016

42 views

Category:

Documents


0 download

DESCRIPTION

Quantitative Evaluation of Secure Network Coding Dawn Meeting UCSC Nov 4, 2010. SeungHoon Lee, Mario Gerla In collaboration with IBM researchers. Network Coding (NC). Improves throughput and reliability in disruptive MANETs Packets mixed by intermediate nodes - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

1

Quantitative Evaluation of Secure Network Coding

Dawn MeetingUCSC Nov 4, 2010

Quantitative Evaluation of Secure Network Coding

Dawn MeetingUCSC Nov 4, 2010

SeungHoon Lee, Mario GerlaIn collaboration with IBM researchers

Page 2: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

2

Improves throughput and reliability in disruptive MANETs

Packets mixed by intermediate nodes

Receivers still can recover original data under partial packet drop

2

Network Coding (NC)

Decoding success

pkt drop

Page 3: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

No pollution detection/prevention in conventional NC protocols

Internal/ external attacks possible

Even one invalid packet can disrupt the entire data

Homomorphic cryptography can protect NC

However,

Computation is cumbersome, discouraging implementations

6

Vulnerability of NC

Decoding Failure

Pollution Attack

Page 4: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

Investigate the scalability of secure network coding based on homomorphic functions

We address PUSH scenario only (PULL is an extension)

Perform practical evaluation of the theoretical work[1] GKKR by TA2 researchers on secure network coding

Over the INTEGERS (as opposed to Galois field)

7

Objective of this work

[1] R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin. Secure network coding over the integers. In Public Key Cryptography, pages 142–160, 2010.

Implementationof Secure NC

(Linux)

Experimental Measurement

Qualnet Network Simulator

Page 5: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

8

Implementation: NC + NSig

Source Intermediate node Destination

X 1 X 2 X 3

Page 6: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

9

Implementation: NC + NSig

(1) NSig(): Computing signatures of each block*Only once at the beginning

Source Intermediate node Destination

X 1 X 2 X 3

σ 1 σ 2 σ 3

Page 7: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

10

Implementation: NC + NSig

(1) NSig(): Computing signatures of each block*Only once at the beginning

Source Intermediate node Destination

+

X 1 X 2 X 3

e1 e2 e3

e1X1+e2X2+e3X3[e1,e2,e3]

σ 1 σ 2 σ 3

(2) encode(): Generating a coded blockNC: Random linear network coding

Page 8: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

11

Implementation: NC + NSig

(1) NSig(): Computing signatures of each block*Only once at the beginning

Source Intermediate node Destination

x

X 1 X 2 X 3

e1X1+e2X2+e3X3[e1,e2,e3]

σ 1 σ 2 σ 3

(2) encode(): Generating a coded blockNC: Random linear network coding

(3) combine(): Combining signatures

σ

e1 e2 e3

Page 9: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

12

Implementation: NC + NSig

(1) NSig(): Computing signatures of each block*Only once at the beginning

Source Intermediate node Destination

x

X 1 X 2 X 3

e1X1+e2X2+e3X3[e1,e2,e3]

σ 1 σ 2 σ 3

(2) encode(): Generating a coded blockNC: Random linear network coding

(3) combine(): Combining signatures

σ

e1 e2 e3

Page 10: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

13

Implementation: NC + NSig

Source Intermediate node Destination

e1X1+e2X2+e3X3[e1,e2,e3] σ

Page 11: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

14

Implementation: NC + NSig

Source Intermediate node Destination

e1X1+e2X2+e3X3[e1,e2,e3] σ (1) vry_NC(): Checking linear independency(By Gaussian Elimination)

Page 12: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

15

Implementation: NC + NSig

Source Intermediate node Destination

e1X1+e2X2+e3X3[e1,e2,e3] σ (1) vry_NC(): Checking linear independency(By Gaussian Elimination)

If independent,(2) vry_Sig(): Validating signatures

Page 13: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

16

Implementation: NC + NSig

Source Intermediate node Destination

e1X1+e2X2+e3X3[e1,e2,e3] σ (1) vry_NC(): Checking linear independency(By Gaussian Elimination)

If independent,(2) vry_Sig(): Validating signatures

If valid, store the coded block*If either verification fails, immediately drop.

Page 14: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

17

Implementation: NC + NSig

Source Intermediate node Destination

e1X1+e2X2+e3X3[e1,e2,e3] σ (1) vry_NC(): Checking linear independency(By Gaussian Elimination)

If independent,(2) vry_Sig(): Validating signatures

If valid, store the coded block*If either verification fails, immediately drop.

Generate a new coded blockby encode(data), combine(signatures)

Page 15: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

18

Implementation: NC + NSig

Source Intermediate node Destination

e1X1+e2X2+e3X3[e1,e2,e3] σ (1) vry_NC(), vry_Sig()If valid, store the coded block.

Page 16: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

19

Implementation: NC + NSig

Source Intermediate node Destination

e1X1+e2X2+e3X3[e1,e2,e3] σ (1) vry_NC(), vry_Sig()If valid, store the coded block.

Once collect m blocks (valid & independent),(2) decode(): Recover the original data

*m: # of blocks of data in the generation

Page 17: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

Another way of Secure Network Coding

instead of NSig (computing/validating signatures)

Hash Verification:

verify multiple coded blocks with a single verification

20

Implementation: NC + NHash

+

X 1 X 2 X 3

e1 e2 e3

e1X1+e2X2+e3X3[e1,e2,e3] x

encode()vry_Hash() If vry_Hash() passes,

sends out the coded block

Page 18: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

Hardware Intel Core 2 Duo T9600 processor (2.8GHz, 6MB cache)

RAM: 2GB

Software Linux platform

C++ / GMP library[2] (for cryptography implementation)

21

Experimental Setup (1)

[2] The GNU Multiple Precision Arithmetic Library. http://gmplib.org/

Page 19: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

23

Experimental Results (1)

vry_NC()

Processing delays are proportional to # of blocksAs downloaded more blocks, vry_NC() requires more delay for processing Gaussian elimination

Page 20: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

24

Experimental Results (2)

Processing delays of vry_Sig() and vry_Hash() do not depend on mThe operations done with only a coded block being verified

In general, Secure NC operations require more delay than NC0.015ms (vry_NC) vs 22.5ms (vry_Sig), m=8

Page 21: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

Evaluate the performance in realistic network scenario (PUSH Model)

QualNet 3.9.5Bandwidth: 2Mbps (broadcasting)

Data rate at source: 256Kbps

Network Topology (static topology)1 Source/ 1 destination

Variable # of hops H

We compare four schemesNC_Only: Plain NC

NC + Nsig

NC + Nhash

BFKW[3]: Previously proposed homomorphic signature schemes

25

Simulation Setup

[3] D. Boneh, D. Freeman, J. Katz, and B. Waters. Signing a linear subspace: Signature schemesfor network coding. In Public Key Cryptography (PKC), 2009.

Page 22: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

27

Simulation Results

Delay increases with more hops between Src/ Dst NSig/NHash take less delay than BFKW

Page 23: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

Conclusion

28

Studied feasibility of secure network coding schemes Implemented the theoretical works and measured processing overhead from

experiments Integrated the experimental results into a packet-level network simulator,

and evaluated the schemes in a realistic network scenario Secure NC increases delay by only 30% with respect to plain NC GKKR secure NC outperforms previously proposed BFKW

Ongoing work Extend to PULL model (large generation) Comparison with end-to-end coding schemes (Fountain/ Raptor codes)

Protected from internal attacks by conventional signatures

More dynamic network scenarios: node mobility, pollution attacks Heterogeneous nodes(some cannot do Homomorphic operations)

Page 24: Quantitative Evaluation of  Secure Network Coding Dawn Meeting UCSC Nov 4, 2010

Question & Answer

29

Thank You!