+ All Categories
Home > Documents > FIGHTING ADVERSARIES IN NETWORKS

FIGHTING ADVERSARIES IN NETWORKS

Date post: 31-Dec-2015
Category:
Upload: lewis-mcfarland
View: 21 times
Download: 3 times
Share this document with a friend
Description:
FIGHTING ADVERSARIES IN NETWORKS. Sidharth Jaggi (MIT). Michelle Effros Michael Langberg Tracey Ho. Muriel Médard Dina Katabi. Peter Sanders. Philip Chou Kamal Jain. Ludo Tolhuizen Sebastian Egner. Network Coding . . . what is it?. - PowerPoint PPT Presentation
Popular Tags:
44
FIGHTING ADVERSARIES IN NETWORKS Michelle Effros Michael Langberg Tracey Ho Philip Chou Kamal Jain Muriel Médard Dina Katabi Peter Sanders Ludo Tolhuizen Sebastian Egner Sidharth Jaggi (MIT)
Transcript
Page 1: FIGHTING ADVERSARIES IN NETWORKS

FIGHTING ADVERSARIES IN NETWORKS

Michelle Effros

Michael Langberg

Tracey Ho

Philip Chou

Kamal Jain

Muriel Médard

Dina Katabi

Peter Sanders

Ludo Tolhuizen

Sebastian Egner

Sidharth Jaggi (MIT)

Page 2: FIGHTING ADVERSARIES IN NETWORKS

“The core notion of network coding is to allow and encourage mixing of data at intermediate network nodes. “

(Network Coding Homepage)

Network Coding . . . what is it?

Page 3: FIGHTING ADVERSARIES IN NETWORKS

Justifications - I

s

t1 t2

b1 b2

b2

b2

b1

b1 ?b1

b1 b1

b1 (b1,b2)

b1+b2

b1+b2b1+b2

(b1,b2)[ACLY00]

Throughput

Page 4: FIGHTING ADVERSARIES IN NETWORKS

Gap Without Coding

. . .

. . .

h2

( )hh2

Coding capacity = h Routing capacity≤2

[JSCEEJT05]

s

Page 5: FIGHTING ADVERSARIES IN NETWORKS

Multicasting

Webcasting

P2P networks

Sensor networks

s1

t1

t2

t|T|

Network

s|S|

Page 6: FIGHTING ADVERSARIES IN NETWORKS

Background

Upper bound for multicast capacity C,

C ≤ min{Ci}

s

t1

t2

t|T|

C|T|

C1

C2

Network

[ACLY00] - achievable!

[LYC02] - linear codes suffice!!

[KM01] - “finite field” linear codes suffice!!!

Page 7: FIGHTING ADVERSARIES IN NETWORKS

Background

{ } )2(1,0)...( 21mm

m Fbbb ∈→∈ α

b1b2 bmα

kkαβαβαβ +++ ...2211

β1

β2

βk

F(2m)-linear network[KM01]

Source:- Group together `m’ bits,

Every node:- Perform linear combinations over finite field F(2m)

Page 8: FIGHTING ADVERSARIES IN NETWORKS

Background

s

t1

t2

t|T|

C|T|

C1

C2

Network

[ACLY00] - achievable!

[LYC02] - linear codes suffice!!

[KM01] - “finite field” linear codes suffice!!!

[JCJ03],[SET03] - polynomial time code design!!!!

[HKMKE03],[JCJ03] - random distributed code design!!!!!

Page 9: FIGHTING ADVERSARIES IN NETWORKS

Justifications - II

s

t1 t2

One link breaks

Robustness/Distributeddesign

Page 10: FIGHTING ADVERSARIES IN NETWORKS

Justifications - II

s

t1 t2

b1 b2

b2

b2

b1

b1

(b1,b2)

b1+b2

Robustness/Distributeddesign

(b1,b2)

b1+2b2

(Finite field arithmetic)b1+b2 b1+b2

b1+2b2

Page 11: FIGHTING ADVERSARIES IN NETWORKS

Random Robust Codes

s

t1

t2

t|T|

C|T|

C1

C2

Original Network

C = min{Ci}

Page 12: FIGHTING ADVERSARIES IN NETWORKS

Random Robust Codes

s

t1

t2

t|T|

C|T|'

C1'

C2'

Faulty Network

C' = min{Ci'}

If value of C' known to s,same code can achieve C' rate!

(interior nodes oblivious)

Page 13: FIGHTING ADVERSARIES IN NETWORKS

Random Robust Codes

Choose random [ß] at each node

Decentralized design

Percolate overall transfer function down network

With high probability, invertible

Page 14: FIGHTING ADVERSARIES IN NETWORKS

Justifications - III

s

t1 t2

Security

Evil adversary hiding in networkeavesdropping,

injecting false information[JLHE05],[JLHKM06?]

Page 15: FIGHTING ADVERSARIES IN NETWORKS

Greater throughputRobust against random errors...

Aha!Network Coding!!!

Page 16: FIGHTING ADVERSARIES IN NETWORKS
Page 17: FIGHTING ADVERSARIES IN NETWORKS

??

?

Page 18: FIGHTING ADVERSARIES IN NETWORKS

Xavier

Yvonne1

Zorba

???

Yvonne|T|

???

.

.

.

Page 19: FIGHTING ADVERSARIES IN NETWORKS

Setup

1. Scheme X Y Z2. Network Z3. Message X Z4. Code Z5. Bad links Z6. Coin X7. Transmit Y Z8. Decode Y

Eureka

WiredWireless (packet losses, fading)

Eavesdropped links ZI

Attacked links ZO

Who knows what

Stage

Page 20: FIGHTING ADVERSARIES IN NETWORKS

Xavier

Yvonne1

?

Zorba

??

Zorba sees MI links ZI, controls MO links ZO pI=MI/C, pO=MO/C

Xavier and Yvonnes share no resources (private key, randomness)

Zorba computationally unbounded; Xavier and Yvonnes -- “simple” computations

Setup

Zorba knows protocols and already knows almost all of Xavier’s message (except Xavier’s private coin tosses)

Goal: Transmit at “high” rate and w.h.p. decode correctly

Zorba (hidden) knows network; Xavier and Yvonnes don’t

C

MO

Yvonne|T|

??

?

Distributed design (interior nodes oblivious/overlay to network coding)

Page 21: FIGHTING ADVERSARIES IN NETWORKS

pO (“Noise parameter”)

0

1

1

C

(C

apac

ity)

Upper bounds

0.5

0.5

1-pO

Page 22: FIGHTING ADVERSARIES IN NETWORKS

pO (“Noise parameter”)

0

1

1

C

(C

apac

ity)

Upper bounds

0.5

0.5

??

?

0

Page 23: FIGHTING ADVERSARIES IN NETWORKS

pI=pO (“Noise parameter” = “Knowledge parameter”)

0

1

1

C

(C

apac

ity)

Unicast [JLHE05]

0.5

0.5

Page 24: FIGHTING ADVERSARIES IN NETWORKS

pO (“Noise parameter”)

0

1

1

C

(C

apac

ity)

Unicast [Folklore]

0.5

(“Knowledge parameter” pI=1)

Page 25: FIGHTING ADVERSARIES IN NETWORKS

pO (“Noise parameter”)

0

1

1

C

(C

apac

ity)

Upper bounds

0.5

(“Knowledge parameter” pI=1)

pO

pO

1-2pO

Page 26: FIGHTING ADVERSARIES IN NETWORKS

pO (“Noise parameter”)

0

1

1

C

(C

apac

ity)

Upper bounds

0.5

“Knowledge parameter” pI>0.5

??

?

Page 27: FIGHTING ADVERSARIES IN NETWORKS

pO (“Noise parameter”)

0

1

1

C

(C

apac

ity)

Upper bounds

0.5

“Knowledge parameter” pI>0.5

pO (“Noise parameter”)

0

1

1

C

(C

apac

ity)

0.5

0.5

“Knowledge parameter” pI<0.5

Page 28: FIGHTING ADVERSARIES IN NETWORKS

Choose random [ß] at each node

Decentralized design

Percolate overall transfer function down network

With high probability, invertible

Distributed Design [HKMKE03]

Page 29: FIGHTING ADVERSARIES IN NETWORKS

t1

t|T|

S

Distributed Design [HKMKE03]

ys(j)=Txs(j)

x

y1

β1

βi

βh

y|T|

xb(i)

01...0000),(),()1,(

0...1...00),(),()1,(

0...10000),1(),1()1,1(

nhxjhxhx

nixjixix

nxjxx

LL

MMMM

LL

MMMM

LL

xb(i)

xs(j)

xb(1)

xb(h)

Rate h=C

Block

Slice

hxh identitymatrix

x’b(i)

h<<n

T

xs(j)=T-1ys(j)

Page 30: FIGHTING ADVERSARIES IN NETWORKS

pO

0

1

1

C

(N

orm

aliz

ed b

y h)

0.5

0.5

Achievability - 1

R1

R|T|

S

S’|Z|

S’2

S’1

Observation 1: Can treatadversaries as new sources

Page 31: FIGHTING ADVERSARIES IN NETWORKS

)(']T' T[)('

)( 1 jyjx

jxs

s

s −=⎥⎦

⎤⎢⎣

01...0000),(),()1,(

0...1...00),(),()1,(

0...10000),1(),1()1,1(

nhxjhxhx

nixjixix

nxjxx

LL

MMMM

LL

MMMM

LL

y’s(j)=Txs(j)+T’x’s(j)

SS

Supersource

Observation 2: w.h.p. over network code design, {TxS(j)} and {T’x’S(j)} do not intersect (robust codes…).

Corrupted Unknown

Achievability - 1

Page 32: FIGHTING ADVERSARIES IN NETWORKS

y’s(j)=Txs(j)+T’x’s(j)

ε redundancy

xs(2)+xs(5)-xs(3)=0

ys(2)+ys(5)-ys(3)=vector in {T’x’s(j)}

{T’x’s(j)}{Txs(j)}

xs(3)+2xs(9)-5xs(1)=0

ys(3)+2ys(9)-5ys(1)=another vector in {T’x’s(j)}

Achievability - 1

Page 33: FIGHTING ADVERSARIES IN NETWORKS

y’s(j)=Txs(j)+T’x’s(j)

ε redundancy

{T’x’s(j)}{Txs(j)}

Repeat MO timesDiscover {T’x’s(j)}“Zero out” {T’x’s(j)}

Estimate T (redundant xs(j) known)

Decode

Achievability - 1

Page 34: FIGHTING ADVERSARIES IN NETWORKS

y’s(j)=Txs(j)+T’x’s(j)

xs(2)+xs(5)-xs(3)=0

ys(2)+ys(5)-ys(3)=vector in {T’x’s(j)}

x’s(2)+x’s(5)-x’s(3)=0

ys(2)+ys(5)-ys(3)=0

Achievability - 1

Page 35: FIGHTING ADVERSARIES IN NETWORKS

Secret Uncorrupted ε-rate Channels

Useful abstraction

[r,(∑jxs(j)rj)]Secret, correct hashes of xs(j)

Zorba doesn’t know how to hide

Will return to this…

Page 36: FIGHTING ADVERSARIES IN NETWORKS

Achievability - 2“Distributed Network Error-correcting Code”

(Knowledge parameter pI>0.5)

[CY06] – bounds, high complexity construction

[JHLMK06?] – tight, poly-time construction

pO (“Noise parameter”)0

1

1

C

(C

apac

ity)

0.5

Page 37: FIGHTING ADVERSARIES IN NETWORKS

pO

pO

y’s(j)=Txs(j)+T’x’s(j)error vector

1-2pO

Achievability - 2

Page 38: FIGHTING ADVERSARIES IN NETWORKS

y’s(j)=T’’xs(j)+T’x’s(j)

01...0000),(),()1,(

0...1...00),(),()1,(

0...10000),1(),1()1,1(

nhxjhxhx

nixjixix

nxjxx

LL

MMMM

LL

MMMM

LL

Achievability - 2T’’

Page 39: FIGHTING ADVERSARIES IN NETWORKS

y’s(j)=T’’xs(j)+T’x’’s(j)

01...0000),(),()1,(

0...1...00),(),()1,(

0...10000),1(),1()1,1(

nhxjhxhx

nixjixix

nxjxx

LL

MMMM

LL

MMMM

LL

e

e

e’

Achievability - 2 T’’

Page 40: FIGHTING ADVERSARIES IN NETWORKS

y’s(j)=Txs(j)+T’x’s(j)

Achievability - 2

y’s(j)=(T+T’L)xs(j)+T’(x’s(j)-Lxs(j))

y’s(j)=T’’xs(j)+T’x’’s(j)

01...0000),(),()1,(

0...1...00),(),()1,(

0...10000),1(),1()1,1(

nhxjhxhx

nixjixix

nxjxx

LL

MMMM

LL

MMMM

LL

T’’

known

Any set of MO+1 {x’’s(j)}s linearly dependent

Let T’x’’s(1) = a(1),…,T’x’’s(MO)=a(MO)A=[a(1)…a(MO)]

y’s(j)=T’’xs(j)+Ac(j)

knownLinearized equation,Size of A finite,Redundancy

Page 41: FIGHTING ADVERSARIES IN NETWORKS

MI+2MO<C

MI<C-2MO Network error-correcting codes

Zorba’s observations

Using network error-correcting codes as small header, can transmit secret, correct information…

… which can be used for first scheme!

Achievability - 1.5Not quite 2MO<C, 2MI<C

Page 42: FIGHTING ADVERSARIES IN NETWORKS

Working on it…

“Slightly” non-linear codes

Achievability - 12MO<C, 2MI<C

Use fact that T, T’ in generalunknown to adversary

Page 43: FIGHTING ADVERSARIES IN NETWORKS

Overview

Hidden, eavesdropping, malicious, computationally unbounded adversary

Network topology unknown Polynomial time decoding overlaid on

network code, achieves “almost optimal” performance

Page 44: FIGHTING ADVERSARIES IN NETWORKS

THE END


Recommended