wow mom 2008 talk

Upload: sumsun-naher

Post on 07-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 Wow Mom 2008 Talk

    1/26

    Secure Group Communication inWireless Mesh Networks

    Jing Dong, Kurt Ackermann, Cristina Nita-Rotaru

    Department of Computer Science and CERIAS

    Purdue University

    http://www.purdue.edu/http://www.cerias.purdue.edu/
  • 8/6/2019 Wow Mom 2008 Talk

    2/26

    2

    Group Communication in

    Wireless Mesh NetworksMultimedia

    Conferencing

    Video/audio

    broadcasting

    Online gaming

    Distancelearning

  • 8/6/2019 Wow Mom 2008 Talk

    3/26

  • 8/6/2019 Wow Mom 2008 Talk

    4/26

    4

    Related Work On wired networks

    LKH [Wong 00] and its variants [Li 01, Zhang03, Zhang 04]

    Protocols for overlay networks [Yiu 04, Abad

    05, Zhu 05] Wireless networks

    GKMPAN [Zhu 04]

    CRTDH [Balachandran 05]

    Secret key management [Chan 03, Du 06]

    None of them address the uniquefeatures of WMNs

  • 8/6/2019 Wow Mom 2008 Talk

    5/26

    5

    Our Approach: SeGrOM Decentralize membership management

    To avoid communication andcomputation bottleneck

    Localize communication

    To save limited bandwidth To reduce communication latency

    Exploit wireless broadcast

    To improve performance and save bandwidth Use symmetric cryptography

    To reduce computation overhead

  • 8/6/2019 Wow Mom 2008 Talk

    6/26

    6

    System and Security Model Tree-based multicast protocol

    Public key infrastructure Group membership authentication

    supports dynamic group membership

    Security Goal Confidentiality against outsider attacks

    Wireless routers, Non-member clients, or

    Other devices Forward and backward secrecy

    Protect future data from members who have left Protect past data from newly joined members

  • 8/6/2019 Wow Mom 2008 Talk

    7/26

    7

    SeGrOM ArchitectureTwo-level architecture

    Local Data DeliveryIntra-router communication

    Global Data DeliveryInter-router communication

  • 8/6/2019 Wow Mom 2008 Talk

    8/26

    8

    SeGrOM Head Member and

    Group Overlay Head member

    One per access router

    Elected among local

    member clients Participate in global data delivery

    Coordinate local data delivery

    Secure group overlay

    Secret key between neighboring head

    members

  • 8/6/2019 Wow Mom 2008 Talk

    9/26

  • 8/6/2019 Wow Mom 2008 Talk

    10/26

    10

    SeGrOM Data Flow

    Source forwards data tothe local head member

    Local head memberforwards data to

    other local member clients downstream head members

    Downstream headmembers forwards data to their local member clients

    downstream head members

  • 8/6/2019 Wow Mom 2008 Talk

    11/26

    11

    Secure Local Data Delivery Relies on a common local data key

    Data delivery Encrypt data using the local data key

    Send it to the access router

    Access router broadcast to other client nodes

    To preserve forward and backward secrecy

    Join or leave of local group member refreshesthe local data key

  • 8/6/2019 Wow Mom 2008 Talk

    12/26

    12

    Global Data Delivery on

    Secure Group Overlay SeGrOM-Group

    Use a common group key The group key is refreshed to provide forward/backward

    secrecy

    SeGrOM-Link Use the symmetric keys on the secure group overlay

    directly Encrypt and deliver data for each of the downstream head

    members separately

    SeGrOM-Hop

    Maintain a hop key on each hop Exploit broadcast for group data delivery Optimized communication and computation cost

    compared to SeGrOM-Link

  • 8/6/2019 Wow Mom 2008 Talk

    13/26

    13

    Global Data Delivery on

    Secure Group Overlay

    SeGrOM-Group

    SeGrOM-Link

    SeGrOM-Hop

  • 8/6/2019 Wow Mom 2008 Talk

    14/26

    14

    SeGrOM-Group All head members share a common group key

    Data is encrypted using the common group key fordelivery across the backbone routers

    Pro:

    Simplicity Broadcast advantage and computation efficiency

    Cons:

    Group key needs to refreshed for every head member

    change global communication

  • 8/6/2019 Wow Mom 2008 Talk

    15/26

    15

    SeGrOM-Link Use symmetric keys on the secure group

    overlay for data delivery

    Pros:

    Avoids global communication Cons:

    Expensive in computation

    Does not exploit broadcast advantage

  • 8/6/2019 Wow Mom 2008 Talk

    16/26

    16

    SeGrOM-Hop Maintain a hop key at each hop

    Data is encrypted using the hop key hop byhop

    Pros: Localized communication Exploit broadcast for group data delivery Optimized communication and computation cost

    compared to SeGrOM-Link

    Cons: The need to maintain hop keys but it involves

    only local communication

  • 8/6/2019 Wow Mom 2008 Talk

    17/26

    17

    Handling Group Dynamics Join/leave of non-head members

    Only involves communication with the localhead member

    Refreshes local data key

    Join/leave of head members Involves communication with neighboring head

    members

    Updates the group overlay

    Localized communication

    Application responsiveness

  • 8/6/2019 Wow Mom 2008 Talk

    18/26

    18

    Member Revocation:

    SeGrOM-Revoke CRL is inefficient in WMNs

    Exploit client movement locality Each client selects a set of home routers

    Maintains the revocation status

    Revocation CA sends a revocation notice to the members on the

    home routers

    Check revocation status Sends a query to any member on any of the homerouters Localized communication

    If no member exists, send query to the CA

  • 8/6/2019 Wow Mom 2008 Talk

    19/26

    19

    Experimental Evaluation ns2 with MAODV

    802.11 radio, bandwidth 2Mbps, range 250m,1500m x1500m area

    Network structure

    100 wireless routers 100 member clients

    Member clients join with the nearest router

    One client as source Poisson group dynamics

    join rate = leave rate for stabilized group size

  • 8/6/2019 Wow Mom 2008 Talk

    20/26

    20

    Protocols Compared W-LKH

    Centralized protocol

    SeGrOM Protocols SeGrOM-Group

    SeGrOM-Link SeGrOM-Hop

  • 8/6/2019 Wow Mom 2008 Talk

    21/26

    21

    Application Performance

    Theimagecannotbedisplayed.Your computer may nothaveenough memory to open theimage,or theimagemay havebeen corrupted.Restartyour computer,and then open thefileagain.Ifthered x stillappears,you may haveto deletetheimageand then insertitagain.

    Delivery ratio vs. data ratesDelivery ratio vs. group

    dynamics

    Adding confidentiality does notdegrade performance

  • 8/6/2019 Wow Mom 2008 Talk

    22/26

    22

    Computation OverheadSymmetric encryptions Asymmetric encryptions

    Decentralized protocol avoids computationbottleneck

  • 8/6/2019 Wow Mom 2008 Talk

    23/26

    23

    Join and Leave Bandwidth

    Overhead and LatencyJoin bandwidth overhead and latency

    Leave bandwidth overhead and latency

    Decentralized membership managementreduces bandwidth overhead

  • 8/6/2019 Wow Mom 2008 Talk

    24/26

    24

    Peak Bandwidth

    ComparisonsSeGrOM-Group SeGrOM-Link W-LKHSeGrOM-Hop

    Decentralized schemes reduces bandwidthvariability

  • 8/6/2019 Wow Mom 2008 Talk

    25/26

    25

    Conclusion We proposed a framework for achieving data

    confidentiality for group communications inWMNs

    We proposed several variants that tradeoff

    complexity and performance We show that

    Adding confidentiality does not degrade

    performance

    Decentralized protocols are more efficient

  • 8/6/2019 Wow Mom 2008 Talk

    26/26

    26

    Thank You!

    Questions?

    Contact: [email protected]