33
MobilityFirst Architecture and Security Analysis Arun Venkataramani University of Massachusetts Amherst

MobilityFirst Architecture and Security Analysis

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: MobilityFirst Architecture and Security Analysis

MobilityFirst Architecture and Security Analysis

Arun VenkataramaniUniversity of Massachusetts Amherst

Page 2: MobilityFirst Architecture and Security Analysis

MobilityFirst architectural components

Name resolution Routing Transport

Context‐awareness Management plane Computing layer 

Standard components of a network stack, but better refactoring in MobilityFirst

Page 3: MobilityFirst Architecture and Security Analysis

Global name resolution service (GNRS)

Functions

• Name certification

• Location resolution 

• Content retrieval 

Name GUID

GUID Network Location(s)

Page 4: MobilityFirst Architecture and Security Analysis

Global name resolution service (GNRS)

Design metrics• Fast • Scalable• Fault‐tolerant• Secure• Privacy‐aware

Page 5: MobilityFirst Architecture and Security Analysis

NA

Location Service: Scale to billions of mobiles

Name servers

NA1 NA2

GUID[NA1]

Locate(GUID)

GUID[NA2]

Data

Function: Resolve GUID  [NA1, NA2,…] Target scale: 10B devices moving across 100 networks/day  10M updates/sec

Page 6: MobilityFirst Architecture and Security Analysis

Routing: Scale to millions of networks (1)

NA1

NA2

Function: Route to GUID@NA Scale: Millions of NA’s  huge forwarding tables  

NA3

……

……

………

……

send(GUID@NA, data)

Network Interface

NA1 2

NA2 6

NA3 1

NA4 2

NA1000000

Page 7: MobilityFirst Architecture and Security Analysis

NA

Routing: Scale to millions of networks (2)

Name servers

NA1 NA2

GUID[NA:NA1]

Locate(GUID)

GUID[NA:NA2]

Data

Function: Route to GUID@NA scalably Approach: Leverage natural hierarchy in networks

Page 8: MobilityFirst Architecture and Security Analysis

Location Service: Mechanisms and tradeoffs

1. Consistent hashing+ Load balance, fault‐

tolerance- Proximity

2. Active replication+ Proximity- Update bandwidth

3. Passive Caching+ Proximity- Staleness

Active replicaPassive cacheHotspot replica

Page 9: MobilityFirst Architecture and Security Analysis

Name servers API design challenges:1. Proximate content retrieval 2. Storage‐aware routing and 

traffic engineering3. Customizing and tracking 

consumed content

Function: Resolve GUID  [NA1, NA2, ..], where NAi‘sare locations where GUID is cached or can be authoritatively tracked

API

Location Service for content retrieval

Contentpublishers Networks

Page 10: MobilityFirst Architecture and Security Analysis

Routing

Page 11: MobilityFirst Architecture and Security Analysis

Routing mechanisms (1) Robust to connectivity and technology diversity

• Uncertainty‐driven metrics + self‐adaptive replication

4GCore

Well‐connected (wired networks)

WiFi, Cellular, WiMax, LTE

Sparsely‐connected 

(Mobile DTNs)

Connectivity

Page 12: MobilityFirst Architecture and Security Analysis

Routing mechanisms (2) 

Storage‐aware routing• Deferred delivery• Opportunistic retrieval

Mobiletrajectory

High quality, cheap WiFi

Routerstore 

Re‐routedpathBlock

Low bandwidth, expensive cellular

Routerstore 

Page 13: MobilityFirst Architecture and Security Analysis

Routing mechanisms (3)

ISP1 ISP2

FileFile

File

Multihomedmultipath

Multicast

Server1Server2

Server3

Anycast

Page 14: MobilityFirst Architecture and Security Analysis

Segmented transport design

Storage at segment (contiguous sequence of links) boundaries

Unit of transmission a large block (instead of small packets in E2E TCP)

ISP1ISP3

ISP2

Block

4G

WiFi

Page 15: MobilityFirst Architecture and Security Analysis

Security and Privacy

Page 16: MobilityFirst Architecture and Security Analysis

Verifiable identifiers (unlike IP) Name certification service

• human_readable_name public_key• contextual_keywords public_key• network_name public_key

Location service• GUID = hash(public_key) or hash(content)                            NA = hash(public_key) + optional_local_hints

Network operations• send(GUID, <data>) or send(NA:GUID, <data>)• get(GUID) or get(NA:GUID)

Verifiable identifiers are robust to hijacking or spoofing unlike location‐encoding IP addresses

Page 17: MobilityFirst Architecture and Security Analysis

Decentralizing trust in naming

Goal: No single root of trust in name certification

Approach:  Multiple name certification service (NCS) providers

Many‐to‐many mapping from namespaces to NCSs

Quorum‐based  certification

Name certification service 1

Name service 2

Name service 3

Page 18: MobilityFirst Architecture and Security Analysis

Proportional robustness

Byzantine fault‐tolerant name service Routing

• Multihomed multipath• Disruption‐tolerant• Storage‐aware• Logically centralized intradomain decisions

ISP AS 7007

ISP ISP

ISP

ISP

Today, a single faulty router can rendermost of Internet unavailable.

Goal: A small number of malicious nodes must not be able to disproportionately impact network performance/availability

Page 19: MobilityFirst Architecture and Security Analysis

MobilityFirst FIA Team Presentation Nov 15,  2010

Intentional data receipt

Internet

ISP1

ISP2

Denial‐of‐serviceSender‐driven IP

Little receiver control in IP

An end‐host must be contactable only if the transmission is consistent with its receipt policy.

Page 20: MobilityFirst Architecture and Security Analysis

Intentional data receipt for security + privacy

Goal: Controlling access to network location

Approaches: Blacklist known bad senders Whitelist known good senders Switch GUID pseudonyms

NA1 NA2

Name servers

HomeHospital

Alice’s GUID

Locate(GUID)

Pseudonym switching can help both security and privacy.

Page 21: MobilityFirst Architecture and Security Analysis

Other threats and mitigations

Dynamic peering with unknown mobile network• Trust management service

Ensuring fair resource allocation with multicast Balancing utility and privacy in context‐aware services

ISP1

Page 22: MobilityFirst Architecture and Security Analysis

Other threats and mitigations

Dynamic peering with unknown mobile network Ensuring fair resource allocation with multicast Balancing utility and privacy in context‐aware services

ISP1 ISP3ISP2

send(taxis in times square, DATA)

Page 23: MobilityFirst Architecture and Security Analysis

Other threats and mitigations

Dynamic peering with unknown mobile network Ensuring fair resource allocation with multicast Balancing utility and privacy in context‐aware services

ISP1 ISP3ISP2

Page 24: MobilityFirst Architecture and Security Analysis

Summary

Mobility and security synergistic –mechanisms for one improve other, e.g.,• Unstructured names  • Disruption‐tolerance • Intentional/context‐aware receipt• Management plane 

Design, evaluation, re‐design cycle ongoing

Page 25: MobilityFirst Architecture and Security Analysis

Summary

Designing for mobility also improves trust

Key challenge is performance security• Ensuring graceful performance/availability degradation with malicious node presence

Logically centralized decision making is easier to secure

Performan

ce

Fraction of faults

Goal

Today

Page 26: MobilityFirst Architecture and Security Analysis

MobilityFirst FIA Team Presentation Nov 15,  2010

Mobility =TrustMobilityMobility

Unstructured =  location‐

independent 

Performance

Multihomed TEGeo‐services

Client‐assistedVisibility+choice

Mobile contentGeo‐services

TrustTrust

Unstructured = cryptographically 

verifiable

Reliability

DDoSUsability

ReliabilitySecurity

UsabilityEmergency

Disruption tolerance

Naming & addressing

Intentionalreceipt

Management plane

Context‐awareness

Page 27: MobilityFirst Architecture and Security Analysis

MobilityFirst FIA Team Presentation Nov 15,  2010

MobilityFirst Design Goals

1. Host + network mobility2. No global root of trust3. Intentional data receipt4. Proportional robustness5. Content addressability6. Evolvable network 

Page 28: MobilityFirst Architecture and Security Analysis

Name servers Metrics:

1. Query/Update delay (<50ms)2. Response staleness (<500ms)3. Load balance4. Fault tolerance

Function: Resolve GUID  [NA1, NA2,…]

Scale: 10B devices, 100 networks/day  10M/sec

Location Service: Scalability to billions of mobiles

Page 29: MobilityFirst Architecture and Security Analysis

Name servers Design issues:

1. In‐situ routing deflection (?)2. Structured local scope IDs (?)3. Network anycast to root servers4. Context‐based addressing

Function: Resolve Host  [NA1, NA2,…]

Scale: 10B devices, 100 networks/day  10M/sec

API

Location Service: Scalability to billions of mobiles

Page 30: MobilityFirst Architecture and Security Analysis

Proportional robustness (1)

Goal: A small number of malicious nodes must not be able to disproportionately impact network performance/availability

Approach for naming: Byzantine‐fault tolerant (BFT) name certification and location service BFT both within and across name service providers

Page 31: MobilityFirst Architecture and Security Analysis

Proportional robustness (2)

Goal: A small number of malicious nodes must not be able to disproportionately impact network performance/availability

ISP1 ISP2

ISP3

Managementplane

req_path_info()

p_info1, p_info2,p_info3,…

Approach for routing:1. Multipath routing and 

congestion control2. Disruption‐tolerance3. Storage‐aware routing4. Logically centralizing decisions 

with network‐wide impactA. Intradomain: Aggregate 

network‐wide information centrally, compute routes, and disseminate to routers

B. Interdomain: BFT “consensus routing” 

Page 32: MobilityFirst Architecture and Security Analysis

Proportional robustness (2)

Goal: A small number of malicious nodes must not be able to disproportionately impact network performance/availability

Approach for routing:1. Multipath2. Disruption‐tolerance: Disconnec on ≠ unreachability

A. Hop‐by‐hop block transportB. Uncertainty‐driven replication routing

3. Storage‐aware routing4. Logically centralizing decisions with network‐wide impact

A. Intradomain: Aggregate network‐wide information centrally, compute routes, and disseminate to routers

B. Interdomain: BFT “consensus routing” 

Well‐connected (wired networks)

WiFi, Cellular, WiMax, LTE

Sparsely‐connected 

(Mobile DTNs)

Connectivity

Page 33: MobilityFirst Architecture and Security Analysis

MobilityFirst FIA Team Presentation Nov 15, 2010

Intentional receipt for DDos

nop

Congestion policing feedback

(1) mon

mon

HsHd

Ra

mon

Policing

(2)

(3)(4)

Rb

congested

Goal: Scalable fair resource allocation under DDoSApproach:   Packets carry unspoofable congestion policing feedback Congested routers use pair‐wise keys for congestion policing 

feedback that receivers use as capability tokens Access routers police senders’ traffic to guarantee per‐sender 

fairness without per‐sender queues