Fun with Networks: Social, Sensor, and Shape

advertisement

Fun with Networks:

Social, Sensor, and Shape-Shifting

Phillip B. Gibbons

Intel Research Pittsburgh

DISC’08 / Graal’08

September 24, 2008

Slides (except those borrowed from colleagues) are © Phillip B. Gibbons

3

Fun with Networks

 Social Networks

–SybilLimit: Defending against Sybil Attacks in P2P

 Sensor Networks

–Synopsis Diffusion: Robust in-network aggregation

 Shape-Shifting Networks

–Claytronics: Aggregation in programmable matter

Phillip B. Gibbons, DISC’08/Graal’08

4

Background: Sybil Attack

 Sybil attack:

Single user assumes many fake/sybil identities

– Already observed in real-world p2p systems malicious honest launch sybil attack

 Sybil identities can become a large fraction of all identities

– “Out-vote” honest users in collaborative tasks

Phillip B. Gibbons, DISC’08/Graal’08

Background:

Defending Against Sybil Attack

 Using trusted central authority (TCA)

– Ties identities to human beings

– Not always desirable: who to trust, privacy, etc.

– Practice: Gmail accounts

 Much harder without a TCA [Douceur’02]

– Resource challenges not sufficient

– IP address-based approach not sufficient

– Practice: Wikipedia IP blocking

5

 Widely considered real & challenging

– 40 papers on sybil attacks, no distributed solution

Phillip B. Gibbons, DISC’08/Graal’08

SybilGuard/SybilLimit Basic Insight:

Leveraging Social Networks

SybilGuard

[SIGCOMM’06, TON 2008],

SybilLimit

[Oakland’08]

(with Haifeng Yu*, Michael Kaminsky)

First to leverage social networks for thwarting sybil attacks with provable guarantees

6

* Primary author

 Nodes = identities

 Undirected edges = strong mutual trust

– E.g., colleagues, relatives in real-world

– Not online friends !

Phillip B. Gibbons, DISC’08/Graal’08

Attack Model

 n honest users: One identity/node each

 Malicious users: Multiple identities each (sybil nodes)

Attack edge: edge honest nodes sybil nodes between honest node

& sybil node attack edges sybil nodes may collude – the adversary malicious users

7

Observation: Adversary cannot create extra attack edges

Phillip B. Gibbons, DISC’08/Graal’08

SybilGuard/SybilLimit Basic Insight

8

Dis-proportionally small cut disconnecting a large number of identities honest nodes attack edges sybil nodes

But cannot search bruteforce…

Phillip B. Gibbons, DISC’08/Graal’08

9

SybilLimit End Guarantees

 Completely decentralized

 Enables any given verifier node to decide whether to accept any given suspect node

– Accept: Provide service to / receive service from

– Ideally: Accept and only accept honest nodes – unfortunately not possible

 Bounds # of accepted sybil nodes (w.h.p.)

(log n ) per attack edge [up to O

 n / log n

 attack edges]

 Accepts (1 ) n honest nodes (w.h.p.)

Phillip B. Gibbons, DISC’08/Graal’08

10

Example Application Scenarios

If # of sybil nodes accepted is

< n/2

< n

Then applications can do byzantine consensus majority voting

< n/c for some constant c

… secure DHT

[Awerbuch’06,

Castro’02, Fiat’05]

Phillip B. Gibbons, DISC’08/Graal’08

11

Identity Registration

 Each node (honest or sybil) has a locally generated public/private key pair

– “Identity”: V accepts S means

V accepts S’s public key

K

S

– We do not assume/need PKI

 Every suspect S “ registers ”

K

S other nodes on some

Phillip B. Gibbons, DISC’08/Graal’08

12

Registration Goals

 Ensure that sybil nodes (collectively) register only on limited number of honest nodes

– Still provide enough

“registration opportunities” for honest nodes

K : registered keys of sybil nodes

K : registered keys of honest nodes

K

K

K

K

K

K

K

K

K

K

K

K

K

K

K

K honest region sybil region

Phillip B. Gibbons, DISC’08/Graal’08

13

Acceptance Criteria

 Accept S only if

K

S is register on sufficiently many honest nodes

– Without knowing where the honest region is !

– Circular design? We can use small cut against adversary

K : registered keys of sybil nodes

K : registered keys of honest nodes

K

K

K

K

K

K

K

K

K

K

K

K

K

K

K

K honest region sybil region

Phillip B. Gibbons, DISC’08/Graal’08

14

Key Idea

 Take random “walks” of w=

(log n ) hops

– Honest nodes: likely to remain in honest region*

– Sybil nodes: must cross an attack edge to reach honest region

• Register key at last hop of “walk” K

K

K

K

K

K

K

K

K

K

K

K

* w = Social network’s mixing time End up at ~ random edge in honest region

K

K honest region

K

K sybil region

Phillip B. Gibbons, DISC’08/Graal’08

Random Route: Convergence

15 a b randomized routing table a

 d b

 a c

 b d

 c f d e c d

 e e

 d f

 f

Random 1 to 1 mapping between incoming edge and outgoing edge

Using routing table gives Convergence Property :

Routes merge if crossing the same edge

Phillip B. Gibbons, DISC’08/Graal’08

Implication of Convergence

attack edge

Route length w

K honest nodes

K K

K sybil nodes

16

 Claim: There are at most w

K’s per attack edge

– Proof: By the Convergence property

– Regardless of whether sybil nodes follow protocol

Use  independent instances of random routing

Phillip B. Gibbons, DISC’08/Graal’08

Verification Procedure

 

1. request S’s set of tails A

B

V

2. I have three tails

A

B; C

D; E

F

3.common tail: E

F

S

17

4. Is K

5. Yes.

S registered?

E

F

F

C

D

4 messages involved

V accepts S Tails intersect + key registered

Phillip B. Gibbons, DISC’08/Graal’08

Further Details in Paper

 Birthday paradox V & honest S share a common tail w.h.p.

 Limit on sybil Ks in honest region V & sybil S don’t share a common tail w.h.p.

– Unless V has a tail in sybil region: Handled in paper

 How to estimate parameters: w & m

18

 Evaluation w/ real-world social networks

– Friendster, LiveJournal, DBLP (Added sybil nodes)

Phillip B. Gibbons, DISC’08/Graal’08

19

Conclusions (to Part I)

 Sybil attack:

– Widely considered a real & challenging problem

 SybilLimit: Fully decentralized defense protocol based on social networks

– Provable near-optimal guarantees

– Experimental validation on real social networks

 Open Problem (in SybilLimit & Politics):

Honest users not voting

Phillip B. Gibbons, DISC’08/Graal’08

20

Fun with Networks

 Social Networks

–SybilLimit: Defending against Sybil Attacks in P2P

 Sensor Networks

– Synopsis Diffusion: Robust in-network aggregation

 Shape-Shifting Networks

–Claytronics: Aggregation in programmable matter

Phillip B. Gibbons, DISC’08/Graal’08

Wireless Sensor Network Aggregation

 Aggregate in-network over a tree

– Each node sends 1 short message (saves energy)

21

1

1

2

3

1

7

1

3

1

1

70

60

50

40

30

20

10

0

0 10 20

Time

30 40 50

Phillip B. Gibbons, DISC’08/Graal’08

The Problem and the Goal

 Tree topology used to avoid double-counting

 Aggregation and routing are tightly coupled 1

1

3

3

1

3 4

1

1

22

 Our goal: Decouple the two components

– They can be independently optimized

– Robust multi-path routing can be used

– Can exploit the broadcast medium

In contrast, a gossip approach requires point-to-point messages & explicit acks

Phillip B. Gibbons, DISC’08/Graal’08

Synopsis Diffusion

[with Suman Nath*, Srini Seshan, Zach Anderson, SenSys’04, TOSN 2008]

 Each node generates a small synopsis of its readings (SG)

 Starting with outer ring, each node broadcasts its synopsis

 Synopsis Fusion (SF): Each node in next ring combines all synopses it hears into its own synopsis

 SF must be order- and duplicate- insensitive (ODI) e.g., Compute count or sum using Flajolet-Martin’s distinct-values counting [Considine et al, ICDE’04]

23

* Primary author

Phillip B. Gibbons, DISC’08/Graal’08

Example

Topology:

Rings

24

SD Example: Uniform Sample of Size K

 SG(): Each node selects a random r in

[0,1], and creates a synopsis (r, id, val)

 SF(s,s’): Output the K (r,id,val) triples from s U s’ with maximum r-values

 SE(s): Output the K val’s in s

K=2: (.4,1,v1), (.7,2,v2), (.3,3,v3), (.8,4,v4)

{(.4,1,v1),(.7,2,v2)} {(.7,2,v2),(.3,3,v3)} {(.3,3,v3),(.8,4,v4)}

{(.7,2,v2), (.4,1,v1)}

{v2,v4}

{(.7,2,v2),(.8,4,v4)}

Phillip B. Gibbons, DISC’08/Graal’08

Key Challenge & A Solution

25

Result

SE

S

1

SG

SF SF SF

SF SF SF

SF

SF

SG SG SG SG r

1 r

2 r

3 r

4

Aggregation Topology r

5

Potentially large unknown set of combinations!

Key Result:

Give 4 simple, locally testable properties for

ODI correctness

(necessary & sufficient)

Makes topology independence tractable

ODI Goal: S

1 is always the same

Phillip B. Gibbons, DISC’08/Graal’08

Order- & Duplicate-Insensitive

Synopses

 Necessary & sufficient conditions

1.

SF is commutative

2.

SF is associative

3.

SF is same-synopsis idempotent: SF(s,s) = s

4.

If readings r and r’ are “duplicates”, then SG(r) = SG(r’)

26

E.g., suppose use SF(s1,s2) = (s1+s2)/2, which of P1-P3 fails?

P2: SF(2,SF(6,30)) = 10 but SF(SF(2,6),30) = 17

Phillip B. Gibbons, DISC’08/Graal’08

27

Implications

 SF forms a semi-lattice

 Lattice property can tell if another

ODI synopsis accounts for my synopsis

10111 6

E.g., SF is bitwise-OR

00101

Not true for non-ODI e.g., sum

4

Implicit acks (Listen to what parent sends to know if your message was “received”)

Efficient adaptation to dynamic message loss, even when asymmetric links

More robust routing More accurate answers

Phillip B. Gibbons, DISC’08/Graal’08

ODI-Correct Algorithms

Count, Count Distinct, Sum, Average,

Standard deviation, Second moment,

Uniform sample, k’th statistical moment,

Quantiles, Frequent items,

Range aggregates, Inner product queries

28

3

5

2

For ODI-correct algorithms:

Approximation guarantees

= same

3 5 2

Well-studied

Streaming Model

2

2

Phillip B. Gibbons, DISC’08/Graal’08

29

Synopsis Diffusion on Rings

TAG (tree)

Adaptive Rings

Rings

Flood

600 sensors in 20x20

Count query

1

0.8

0.6

0.4

0.2

0

0 0.2

0.4

0.6

Loss Rate

0.8

More robust than TAG

1

Scheme Energy

Tree (TAG) 41.8mj

A. Rings

Flood

42.1mj

685mj

Almost as energy efficient as TAG

Phillip B. Gibbons, DISC’08/Graal’08

Synopsis Diffusion vs. Tree

SD

Communication error

Approximation error

1% 10-15%

Number of Packets

1-3

Tree 60% 0-5% 1

Delta

30

Tributary-Delta : run both simultaneously, depending on:

• regional loss rate

• accumulated aggregation

[with Amit Manjhi, Suman Nath, ICDE’05]

Tributary

Phillip B. Gibbons, DISC’08/Graal’08

Conclusions (to Part II)

31

 Synopsis Diffusion

– ODI-correct algorithms + any multi-path routing

 Open Problems

– ODI-correct subtraction

Use Synopsis Diffusion in other contexts:

– P2P, mobile, etc.

– ODI-correctness requires the same synopsis for all aggregation topologies

– However, too strong: E.g., quantiles – always meets guarantees but answer depends on order

– What is a formal framework for such scenarios?

Phillip B. Gibbons, DISC’08/Graal’08

32

Fun with Networks

 Social Networks

–SybilLimit: Defending against Sybil Attacks in P2P

 Sensor Networks

–Synopsis Diffusion: Robust in-network aggregation

 Shape-Shifting Networks

– Claytronics: Aggregation in programmable matter

Phillip B. Gibbons, DISC’08/Graal’08

The Vision: A Material That

Changes Shape

 Large groups of tiny robot modules (10 6

-10 9 units), working in unison to form tangible, moving 3D shapes

33

 Not just an illusion of 3D (as with stereo glasses), but real physical objects

 Both an output device (rendering, haptics) & an input device (sensing)

Phillip B. Gibbons, DISC’08/Graal’08

Suppose Software Could

Control Shape

34

Video: CMU Entertainment Technology Center

Phillip B. Gibbons, DISC’08/Graal’08

35

Applications

 Product design

 Medical visualization

 Adaptive form-factor devices

 Telepario

 3D fax

 Smart antennas

 Paramedic-on-demand

 Entertainment

 Etc.

Phillip B. Gibbons, DISC’08/Graal’08

Claytronics

[PIs: Seth Goldstein, Jason Campbell, Todd Mowry]

 Each sub-millimeter module (“catom”)

integrates computing & actuation

36

 Key issues:

– very high concurrency ( 10 6 -10 9 catoms)

– nondeterminism & unreliability

– efficient actuators, strong adhesion

– power, heat, dirt

– complex, dynamic networking (network diameters

≥ 1000, and changing topologies)

Phillip B. Gibbons, DISC’08/Graal’08

Moving Catoms Without Moving Parts:

Two Potential Actuation Methods

 Magnetic field one coil

 Electric field two assembled magnet rings

2 magnetic-field prototype catoms

37 electrostatic latch design

Phillip B. Gibbons, DISC’08/Graal’08 completed latch

Making Submillimeter Catoms

patterned “flower”, including actuators

& control circuitry

2 mold wafers bonded around

1 thinned logic wafer arms curl up due to stresses between layers

Note: Both are early attempts

38

[J. Robert Reid,

Air Force Research Labs]

[Igal Chertkow & Boaz Weinfeld,

Phillip B. Gibbons, DISC’08/Graal’08

Intel]

Catom Design

 Actuation: Roll across each other (using electrostatics) under software control

– Planned motion, Reactive motion

 Power: Form own power grid

– Connected to external power source

39

 Communication: Between physically adjacent modules

– Either electrical contact, capacitive-coupled connections, or free space optics ( wire-like )

– Simultaneously with multiple neighbors

Phillip B. Gibbons, DISC’08/Graal’08

40

Aggregation Goal

 In order to self-organize into a desired shape, the catom ensemble must:

– Be able to measure key aggregate properties

(e.g., center of mass)

– Coordinate their activities

…in real time

Diameter too large for standard hop-by-hop approach

Ensemble too dense for longer range wireless

Phillip B. Gibbons, DISC’08/Graal’08

Speculative Forwarding

[with Casey Helfrich, Todd Mowry, Babu Pillai,

Ben Rister, Srini Seshan]

E.g., regular 2D grid

Standard approach:

(regular) gradient

Our approach:

• Hierarchical Overlay

• Speculative forwarding on the long links

41 Phillip B. Gibbons, DISC’08/Graal’08

42

Speculative Forwarding

 Each catom maintains incoming-tooutgoing link mapping (e.g., last used)

 Each bit along incoming wire sent on outgoing wire according to the mapping

 When accumulate header, check for miss-speculation

Initial results are promising

Many issues:

• miss-speculations

• creating overlay

• shape changes

Aggregation deferred to nodes in the overlay

Phillip B. Gibbons, DISC’08/Graal’08

Conclusions (to Part III)

 Shape-Shifting Networks pose a new problem domain for algorithmic research

– Details are in flux; realizations years away

– Key issues: scale, dynamics, soft real-time

43

 Open Problems

– Much theory work to be done:

Formal modeling, new algorithms, new insights, lower bounds, etc.

– E.g., what is a robust, low-latency communication/aggregation scheme for catom ensembles?

– Ensemble algorithmics : local algs

Brownian hole motion

Grow/consume holes

Phillip B. Gibbons, DISC’08/Graal’08

44

Fun with Networks

 Social Networks

–SybilLimit: Defending against Sybil Attacks in P2P

 Sensor Networks

–Synopsis Diffusion: Robust in-network aggregation

 Shape-Shifting Networks

–Claytronics: Aggregation in programmable matter

Phillip B. Gibbons, DISC’08/Graal’08

Download