Membership Control in P2P and MANETs - PowerPoint PPT Presentation

1 / 48
About This Presentation
Title:

Membership Control in P2P and MANETs

Description:

Douceur [IPTPS'02] An adversary may create multiple identities. Lesson: Verify identities ... Secure group communication does not address membership eligibility ... – PowerPoint PPT presentation

Number of Views:29
Avg rating:3.0/5.0
Slides: 49
Provided by: iisSin
Category:

less

Transcript and Presenter's Notes

Title: Membership Control in P2P and MANETs


1
Membership Control in P2P and MANETs
  • Nitesh Saxena, Gene Tsudik, Jeong H. Yi
  • Computer Science Department
  • University of California at Irvine
  • nitesh, gts, jhyi_at_ics.uci.edu

2
Outline
  • Introduction and Motivation
  • Admission Control
  • Distributed Cryptography
  • System Design and Integration
  • Performance Evaluation
  • Conclusion

3
Peer Group Settings
Decentralized P2P
MANETs
  • Common in MANETs and Internet
  • At many protocol layers
  • Many applications
  • No centralized control
  • No hierarchy
  • Fault-tolerant
  • Dynamic membership

4
P2P Security Prior Work
  • Secure communication
  • Key management
  • Authentication
  • Anonymity
  • Secure routing

5
Key Management
E
D
F
A
C
B
6
Sybil attack
  • Douceur IPTPS02
  • An adversary may create multiple identities

G
I
A3
A3
D
B
H
E
A2
A2
J
C
F
A1
A1
Lesson Verify identities
7
Motivation
  • Secure group communication does not address
    membership eligibility
  • Without secure admission control, secure
    communication (e.g., key management) is useless

8
Outline
  • Introduction and Motivation
  • Admission Control
  • Distributed Cryptography
  • System Design and Integration
  • Performance Evaluation
  • Conclusion

9
Group Membership Issues
  • Naming
  • Name?ownership? Location?
  • Presence
  • on-line e.g., replicated servers, MANETs
  • off-line e.g., Gnutella, MANETs
  • Membership
  • Static, ad hoc reflected where?
  • Enumerated
  • Dynamic admission rules/policies?
  • Longevity
  • Long-term
  • Transient

10
What does a prospective member know?
  • Group name, at least
  • Group location?
  • Group membership?
  • Group charter/policy?
  • Group member(s) name(s)/address(es)?

11
Terminology
  • Group Charter
  • defines admission policies
  • Group Membership Certificate (GMC)
  • proves membership
  • Group Authority (GAUTH)
  • Bootstrapping entity

12
Admission Control Models
  • Admission via Public ACL
  • Not suitable for dynamic peer groups
  • Admission by Centralized Authority
  • Not suitable for dynamic peer groups
  • Single point of failure
  • Admission by Members ? our focus

13
Admission Control
  • New member (Mnew) wants to join the group
  • A quorum of t current members need to issue Mnew
    a group membership certificate (GMC)
  • If no quorum, membership is denied
  • Step 1 Join request
  • Step 2 Join commit (Vote)

Mnew
  • Step 3 GMC issuance
  • share acquisition

14
Threshold Types
  • Fixed Threshold
  • Expressed as minimum of votes (e. g., 5)
  • What if group size lt threshold?
  • Dynamic Threshold
  • Expressed as percentage of of current members
    (e.g., 30)
  • Threshold percentage group size
  • Need to keep accurate state of up-to-date group
    size
  • Group Authority (GAUTH), as bootstrapping node,
    is only trusted to keep account of group size.

15
Relevant crypto techniques
  • Plain signatures
  • ASMs
  • Aggregated Signatures
  • Threshold Signatures
  • Static
  • Dynamic
  • Group signatures

16
Plain Signatures
  • Inefficient in bw/space
  • Efficient in generation/verification
  • Can be gathered asynchronously
  • Can be used to prove membership
  • No membership awareness
  • Accountability
  • Limited anonymity
  • Linkable
  • Lineage problem!

17
Accountable sub-Group Multi-Signatures
  • Due to Ohta, et al. (CCS01)
  • Based on aggregating Schnorr signatures
  • Efficient (but still linear in size)
  • Synchronous (on-line protocol)
  • Membership awareness
  • Can be used to prove membership
  • Accountability
  • Limited anonymity
  • Linkable
  • Lineage Problem!

18
Threshold Signatures
  • Desmedt/Frankel (1989) and many others
  • Usually fixed t
  • Function sharing to avoid reconstruction
  • Inefficient
  • Synchronous (on-line protocol)
  • Membership awareness (partial)
  • No Accountability
  • Limited anonymity
  • Linkable?
  • (Usually) need trusted dealer to set up
  • No lineage problem!

19
Dynamic Threshold Signatures
  • Frankel, et al. (FOCS97)
  • Shrinkable t
  • Very inefficient
  • Synchronous (on-line protocol)
  • Membership awareness (partial)
  • No Accountability
  • Limited anonymity
  • Linkable?
  • Still need trusted dealer

20
Dynamic Threshold Signatures
  • Kong, et al. (ICNP01)
  • Supports growing t
  • Efficiency unclear
  • Synchronous (on-line protocol)
  • Membership awareness (partial)
  • No Accountability
  • Limited anonymity
  • Linkable?
  • Still need trusted dealer to set up

21
Group Signatures
  • Chaum Van Heijst (1991) and many others
  • Inefficient
  • Asynchronous
  • No membership awareness
  • Can be used to prove membership
  • Accountability (off-line, by Gr. Mgr)
  • Anonymity
  • Unlinkable (except by Gr. Mgr)

22
Outline
  • Introduction and Motivation
  • Admission Control
  • Distributed Cryptography
  • System Design and Integration
  • Performance Evaluation
  • Conclusion

23
Shamirs Secret Sharing
  • Dealing Secret Shares
  • Dealer randomly selects polynomial f(x) of degree
    t-1
  • Note f(0) S
  • Dealer distributes secret shares to users

f(x) S a1x a2x2 at-1xt-1 (mod q)
ssi f(idi) (mod q)
  • Secret Recovery
  • Distributed Share Computation

What if users are malicious?
24
Verifiable Secret Sharing (VSS)
  • P. Feldman FOCS87
  • Select f(x) over Zq as in Shamirs

f(x) a0 a1x a2x2 at-1xt-1 (mod q)
  • Exponent is in mod q
  • q, p large prime
  • q p-1
  • Witness generation (publicly known)

Wi gai (mod q) (mod p)
  • Secret share verification

25
Threshold RSA (TS-RSA)
  • J.Kong, et al. ICNP01, ISCC02, WCMC02
  • Setup
  • Generate RSA key pairs d, e, N
  • Dealer randomly selects polynomial f(x) of degree
    t-1
  • d is never reconstructed.
  • mod N (composite)

f(x) d a1x a2x2 at-1xt-1 (mod N)
  • Signature generation

SK2 SK3 SK5 ? d (mod N)
mSK2 SK3 SK5
26
TS-RSA t-bounded offsetting
SK2 SK3 SK5 ? d (mod N)
  • CRT not applicable
  • Prime factors of N are known only to the dealer

SK2 SK3 SK5 tN d
mSK2SK3SK5 mtNd mtNmd
Y mtNd for (i0 i lt t i) Y Y
m-N mod N if (Ye m mod N) break
return Y ( md mod N)
27
TS-RSA VSS failure
  • Example f(x) 77 2x 5x2 (mod 119), g3
  • Witnesses w037712, w1329, w2355 (mod
    119)

Impossible to detect malicious members, i.e, no
robustness provided!
pssi(idj) ssili(idj) mod N
ss7 pss2(7) pss3(7) pss5(7) 98
mod ?(N)
Impossible to verify if ssi is correct.
28
TS-RSA Summary
  • No verifiability of secret shares
  • Gennaro Crypto96 and Shoup Eurocrypt00
    proposed schemes to provide verifiability
  • require trusted dealer to generate a key-pair
  • Boneh Franklin Crypto97 distributed RSA key
    generation
  • very high communication and/or computation
    overhead
  • impractical in many group setting such as MANETs
  • Trusted dealer involved at initialization phase

29
Threshold DSA (TS-DSA)
  • Extention of threshold DSS scheme by Jarecki, et
    al. Eurocrypt96
  • group size (n) can be increased.
  • threshold (t) can be changed.
  • No dealer involved
  • VSS holds

30
TS-DSA Setup
  • Self-initialization by founding members
  • uses Joint Secret Sharing (JSS), Pedersen
    Eurocrypt91

User1
User2
Usern
No one knows S.
  • Each user computes fi(j) (j1..n, j ! i), and
    sends it to others.
  • Each user computes his own secret share

31
TS-DSA Signature Generation
  • DSA signature (r, s)

O(t2) comm.
2
u3, v3
u2, v2
3
7
u5, v5
extra exp.
5
(t1)/2-secure
32
TS-DSA VSS holds
  • Example f(x) 7 2x 5x2 (mod 11), g9,
    q11, p23
  • Witnesses w0974, w19212, w2958 (mod 23)

pssi(j) ssili(j) mod p
ss7 pss2(7) pss3(7) pss5(7) 2
33
TS-DSA Summary
  • Pros
  • VSS guaranteed
  • Key generation fully distributed
  • Cons
  • Robust only if fewer than ë(t1)/2û malicious
    users
  • Extra O(t2) communications between signers to
    jointly generate random secret k

34
Feature Summary
RSA ASM TS-RSA TS-DSA
Dealer involved ?
Simultaneous on-line presence ? ? ?
Accountability ? ?
Unlinkability ? ?
Verifiable Secret Sharing NA NA ?
35
Outline
  • Introduction and Motivation
  • Admission Control
  • Distributed Cryptography
  • System Design and Integration
  • Performance Evaluation
  • Conclusion

36
System Design - Bouncer toolkit
Peer Group Applications (Gnutella, Secure Spread,
etc.)
GAC APIs
Certificate Management Module
Policy Management Module
Data Encoding Module
Protocol Handling Module
General Crypto. Functions
SHA-1,AES,RSA,DSA,etc.
Crypto Primitives OpenSSL
Linux
37
Dynamic Threshold Update
38
GAC APIs
  • Plain RSA APIs
  • GAC_PACKET PS_Join_Reqest()
  • GAC_PACKET PS_Join_Commit()
  • GAC_PACKET PS_GMC_Request() / optional /
  • GAC_PACKET PS_GMC_Reply() / optional /
  • TS-DSA APIs
  • GAC_PACKET TSD_Join_Request()
  • GAC_PACKET TSD_Join_Commit()
  • GAC_PACKET TSD_Chal_Req()
  • GAC_PACKET TSD_Chal_Rly()
  • GAC_PACKET TSD_Rnd_Req()
  • GAC_PACKET TSD_Rnd_Rly()
  • GAC_PACKET TSD_Sign_Request()
  • GAC_PACKET TSD_Part_Sign()
  • GAC_PACKET TSD_GMC_Request() / optional /
  • GAC_PACKET TSD_GMC_Reply() / optional /
  • TS-RSA APIs
  • GAC_PACKET TSS_Join_Request()
  • GAC_PACKET TSS_Join_Commit()
  • GAC_PACKET TSS_Sign_Request()
  • GAC_PACKET TSS_Part_Sign()
  • GAC_PACKET TSS_GMC_Request() / optional /
  • GAC_PACKET TSS_GMC_Reply() / optional /
  • ASM APIs
  • GAC_PACKET ASM_Join_Request()
  • GAC_PACKET ASM_Join_Commit()
  • GAC_PACKET ASM_Sign_Request()
  • GAC_PACKET ASM_Part_Sign()
  • GAC_PACKET ASM_GMC_Request() / optional /
  • GAC_PACKET ASM_GMC_Reply() / optional /

39
Integration with Gnutella
New Member
Current Members
Gnutella Protocol
Secure Gnutella
40
Integration with Secure Spread
  • Spread A wide area reliable group communication
    system
  • Secure Spread Integrates security services with
    Spread
  • Supports only static access control
  • daemon level ACLs
  • flush mechanism
  • No notion of secure, dynamic, distributed
    admission.
  • Modified Spread APIs
  • SP_GAC_Join() / new /
  • SP_receive() / modified /

Application
Crypto Library
Bouncer
Secure Spread
GKA_API
Encryption
Access control
Engine
Spread
41
Outline
  • Introduction and Motivation
  • Admission Control
  • Distributed Cryptography
  • System Design and Integration
  • Performance Evaluation
  • Conclusion

42
Performance Evaluation
  • Gnutella Experiment
  • Integrated decentralized protocol with
    Gnut-0.4.21
  • Tested on a high-speed LAN
  • Secure Spread Experiment
  • Integrated centralized protocol with Secure
    SPREAD-2.1.0
  • Spread daemons on 10 machines at Johns Hopkins
    Univ.
  • A client at UCI
  • Measurements
  • Fixed threshold
  • Dynamic threshold

Source code available at http//sconce.ics.uci.edu
/gac
43
Computation Cost
Signature verification
  • Signature generation

44
Signature Size
Signature length
RSA t ( K id )
ASM q E t id
TS-RSA K
TS-DSA 2q
t threshold K private key id signers id
q modulus q E challenge (hash size)
45
Fixed Threshold Experiments
Gnutella
Secure Spread
46
Dynamic Threshold Experiments
Gnutella
Secure Spread
47
Conclusions
  • Designed several P2P admission control mechanisms
  • Assessed practicality of distributed cryptography
    for dynamic peer groups.
  • Threshold signatures are currently NOT PRACTICAL
    in MANETs and sensor networks
  • Reasonable for Internet-based P2P systems that
    operate in (at least partially) synchronous mode
  • Difficult to identify one scheme best-suited for
    all peer group admission scenarios.
  • If admission is difficult, distributed membership
    revocation is even harder!

48
Future Work
  • TS-RSA
  • Efficient RSA distributed modulus generation
  • VSS in Dynamic setting
  • TS-DSA
  • Better communication efficiency?
  • Aggregated Signatures?
  • Other, more systems approaches?
  • Revocation?
Write a Comment
User Comments (0)
About PowerShow.com