![Page 1: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/1.jpg)
Catch Me If You Can: A Practical Framework to Evade Censorship in
Information-Centric Networks
Computer Science Department New Mexico State University
Reza Tourani, Satyajayant (Jay) Misra, Joerg Kliewer, Scott Ortegel, Travis Mick
New Mexico State University, NM
†
Department of Electrical & Computer Engineering New Jersey Institute of Technology
†
![Page 2: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/2.jpg)
Outline
Introduction and Motivation Problem Definition Models and Assumptions Framework Design Experimental Results Conclusions and Future Work
New Mexico State University, NM
![Page 3: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/3.jpg)
Outline
Introduction and Motivation Problem Definition Models and Assumptions Framework Design Experimental Results Conclusions and Future Work
New Mexico State University, NM
![Page 4: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/4.jpg)
New Mexico State University, NM
Censorship is common and widespread.
![Page 5: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/5.jpg)
Outline
Introduction and Motivation Problem Definition Models and Assumptions Framework Design Experimental Results Conclusions and Future Work
New Mexico State University, NM
![Page 6: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/6.jpg)
New Mexico State University, NM
Content Name: /facebook.com/user12
Censorship can be pervasive in ICNs.
Blacklist: /facebook.com /Youtube.com
![Page 7: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/7.jpg)
New Mexico State University, NM
Tor: Using Onion Routing to evade censors.
/facebook.com/user12
/facebook.com/user12
/facebook.com/user12
/facebook.com/user12
![Page 8: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/8.jpg)
New Mexico State University, NM
Tor: Using Onion Routing to evade censors.
/facebook.com/user12
/facebook.com/user12
/facebook.com/user12
/facebook.com/user12
![Page 9: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/9.jpg)
New Mexico State University, NM
ANDaNA
/facebook.com/user12
/facebook.com/user12
/facebook.com/user12
![Page 10: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/10.jpg)
New Mexico State University, NM
ANDaNA
/facebook.com/user12
/facebook.com/user12
/facebook.com/user12
Too slow and require more infrastructure
Can we find something better?!?
![Page 11: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/11.jpg)
Outline
Introduction and Motivation Problem Definition Models and Assumptions Framework Design Experimental Results Conclusions and Future Work
New Mexico State University, NM
![Page 12: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/12.jpg)
Set of users (U), Set of routers (R), Set of providers (P), Set of anonymizers (A), Filtering router (Rf)
Each u ∈ U is connected to an Ri ∈ R (Ri can be filtering/not)
Users can retrieve the set A securely and privately. Content names follow a conventional (ICN) hierarchical naming
scheme (E.g.: /www.facebook.com/user12/frontpage.html). 𝑀𝑘: Name of k-bits; 𝑍: Encrypted message; N = Alphabet Size.
New Mexico State University, NM
System Model
![Page 13: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/13.jpg)
Privacy-Caching Trade-off: Privacy-preservation is more important than caching resultant efficiency.
New Mexico State University, NM
Attack Model
Passive Active
Capture and analyze Modify/drop packets, masquerade as a user
Filter/Drop packets based on names
But, we use names for caching!! 😢😢
![Page 14: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/14.jpg)
Outline
Introduction and Motivation Problem Definition Models and Assumptions Framework Design Numerical Results Conclusions and Future Work
New Mexico State University, NM
![Page 15: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/15.jpg)
New Mexico State University, NM
Huffman coding† leverages the frequency of the source message symbols for data compression.
Example: The frequency of the alphabet in the source message and the corresponding tree.
†D. Huffman et al. A method for the construction of minimum redundancy codes. Proc. IRE, 40(9):1098–1101, 1952.
Alphabet Frequency
A 24
B 12
C 10
D 8
E 8
62
A 38
22
B C
16
D E
0 1
1
1 1
0
0 0
Preliminaries (Huffman Coding)
Codeword
0
100
101
110
111
![Page 16: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/16.jpg)
New Mexico State University, NM
Vanilla Huffman Coding is not Secure!
Plaintext Interest /CAB/ED
/1010100/111110
Encoded Interest /1010100/111110
![Page 17: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/17.jpg)
New Mexico State University, NM
Vanilla Huffman Coding is not Secure!
/1010100/111110
/CAB/ED
![Page 18: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/18.jpg)
New Mexico State University, NM
Increasing the number of unique coding tables.
Assigning each client a unique coding table that can be changed at certain frequency (as needed).
Sources of randomness: – The Huffman tree structure. – The conventional key. – The alphabet placement on leaf nodes.
How to Augment Vanilla Approach?
![Page 19: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/19.jpg)
New Mexico State University, NM
Number of mutually independent full binary trees with N leaves (N is the alphabet size) is the (N-1)th Catalan number.
𝐶𝑁−1 =2 × 𝑁 − 1 !𝑁! × 𝑁 − 1 ! ≈ Ω(
4𝑁
𝑁32�
)
𝐹𝐹𝐹 𝑁 = 3 ∶ 𝐶𝑁−1 = 𝐶2 =4!
3! × 2! = 2
Preliminaries (Tree Structure)
𝐹𝐹𝐹 𝑁 = 128 ∶254!
128! × 127!
![Page 20: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/20.jpg)
New Mexico State University, NM
Number of mutation trees for a binary tree with N leaves and N-1 internal nodes is 2(𝑁−1) (each mutation tree is equivalent to a key). The key is the BFS traversal of the tree.
0 1
0 1 1
1 1
1
1
1
0
0 0
0 0
0
0101 0110 1001 1010
𝐹𝐹𝐹 𝑁 = 3 ∶ 2𝑁−1 = 23−1 = 4
Preliminaries (Conventional Key)
𝐹𝐹𝐹 𝑁 = 128 ∶ 2127
![Page 21: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/21.jpg)
New Mexico State University, NM
Number of different alphabet placements on a tree with N leaves is equal to 𝑁! .
a
a
a
a a
a c
c
c
c
c
c
b
b
b
b
b
b
𝐹𝐹𝐹 𝑁 = 3 ∶ 𝑁! = 3! = 6
Preliminaries (Alphabet Placement)
𝐹𝐹𝐹 𝑁 = 128 ∶ 𝑁! = 128!
![Page 22: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/22.jpg)
New Mexico State University, NM
Combine tree structure and the key perturbation to create different Huffman encoding tables (this study). Assign one each to each client.
A combination of these results in a table.
+
![Page 23: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/23.jpg)
New Mexico State University, NM
Initialization Phase
Secure interest
Secure content delivered
Communication Flow in our framework
Huffmanized content interest /Youtube/00110, 𝑝𝑖∈[𝑝𝑖𝑙 ,𝑝𝑖ℎ]
![Page 24: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/24.jpg)
New Mexico State University, NM
Initialization Phase Client interest with credentials. Coding table generation and pseudonym assignment by the anonymizer. Sharing the coding table and the pseudonym range with the client.
Secure content request
Interest creation with encoded name and an in-range random pseudonym.
Secure content response Client lookup by the anonymizer through pseudonym. Interest decoding by the corresponding table. Extended PIT entry creation for the decoded interest. Content retrieval from the network and forwarding to the client.
Communication Flow in words
![Page 25: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/25.jpg)
New Mexico State University, NM
Information-theoretic secrecy Guessing-entropy based secrecy Breakability due to brute force
Privacy Evaluation of the Framework.
![Page 26: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/26.jpg)
The per symbol entropy for the alphabet size of N is:
𝐻 𝑋 = −�𝑝(𝑥𝑘) log 𝑝 𝑥𝑘 = log 𝑁 .𝑁
𝑘=1
The selection of a mutation tree uniformly at random results in the key entropy as:
𝐻 𝐾 = − � 𝑝(𝑖) log 𝑝 𝑖 = 𝑁 − 1.2𝑁−1
𝑖=1
The entropy of a random tree structure selection is:
𝐻 𝑇𝑟 = − � 𝑝(𝑗) log 𝑝 𝑗 = 2𝑁 − 32� log(𝑁) .
( 4𝑁
𝑁32�
)
𝑗=1
New Mexico State University, NM
Our Information-Theoretic Secrecy
![Page 27: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/27.jpg)
Scenario 1 (TKU). The tree structure and the key are unknown: 𝐼 𝑀𝑘;𝑍 = 𝐻 𝑀𝑘 − 𝐻 𝑀𝑘 𝑍 = 𝑘 log𝑁 − 3𝑁 + 3
2� log𝑁 + 1.
New Mexico State University, NM
Attack Scenario 1 and information leakage
𝐹𝐹𝐹 𝑁 = 256 ⇒ 𝑘 ≤ 94.3 (𝑙𝑙𝐹𝑙𝑙𝑙𝑙 𝑛𝑙𝑛𝑙)
![Page 28: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/28.jpg)
Scenario 2 (TK-KU). Tree structure known, but the key is unknown:
𝐼 𝑀𝑘;𝑍 = 𝐻 𝑀𝑘 − 𝐻 𝑀𝑘 𝑍 = 𝑘 log𝑁 −𝑁 + 1.
New Mexico State University, NM
Attack Scenario 2 and information leakage
𝐹𝐹𝐹 𝑁 = 256 ⇒ 𝑘 ≤ 31.8
![Page 29: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/29.jpg)
Scenario 3 (TU-KK). Tree structure unknown but key known:
𝐼 𝑀𝑘;𝑍 = 𝐻 𝑀𝑘 − 𝐻 𝑀𝑘 𝑍 = 𝑘 + 32� log𝑁 − 2𝑁.
New Mexico State University, NM
Attack Scenario 3 and information leakage
𝐹𝐹𝐹 𝑁 = 256 ⇒ 𝑘 ≤62.5
![Page 30: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/30.jpg)
New Mexico State University, NM
Scenario N=32 N=64 N=128 N=256 N=512
TKU 17.5 30.3 53.2 94.3 169.1
TK-KU 6.2 10.5 18.1 31.8 56.7
TU-KK 11.3 19.8 35.07 62.5 112.2
Maximum possible source message length k (in symbols) for perfect secrecy in i.i.d. messages.
Information Leakage Threshold
Leakage ⟹ privacy breach AES-128 leaks after 128 bits of encrypted message!!
![Page 31: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/31.jpg)
Guessing entropy: The expected number of guesses required by the attacker to ascertain the correct source message from an encoded message.
𝐸[𝐺 𝑀𝑘 𝑍 ] ≥ 2𝐻(𝑀𝑘|𝑍)−2 + 1. †
Hence, Scenario 1 (TKU):
𝐸[𝐺 𝑀𝑘 𝑍 ] ≥ 2(3𝑁−3 2� log 𝑁 −3) + 1. Scenario 2 (TK-KU):
𝐸[𝐺 𝑀𝑘 𝑍 ] ≥ 2(2𝑁−3 2� log 𝑁 )−2 + 1. Scenario 3 (TU-KK): 𝐸[𝐺 𝑀𝑘 𝑍 ] ≥ 2 𝑁−1 −2 + 1.
New Mexico State University, NM
What is the chance attacker can get lucky?
†G. Smith. On the foundations of quantitative information flow. In Foundations of Software Science and Computational Structures, pages 288–302.
![Page 32: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/32.jpg)
The lower bound on the guessing entropy.
New Mexico State University, NM
Guessing Entropy Comparison.
![Page 33: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/33.jpg)
Using a brute-force approach for identifying the key and the tree structure, on average, the attacker has to verify half of all the possible coding tables.
𝑇𝐹𝑙𝑙𝑙 # 𝐹𝑜 𝑐𝐹𝑐𝑖𝑛𝑙 𝑙𝑙𝑡𝑙𝑙𝑙 ≈ 2 × 𝑁 − 1 !𝑁! × 𝑁 − 1 !
× 2𝑁−1
New Mexico State University, NM
Number of structures
Number of mutation trees
Computation Secrecy and Breakability
![Page 34: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/34.jpg)
Outline
Introduction and Motivation Problem Definition Models and Assumptions Framework Design Experimental Results Conclusions and Future Work
New Mexico State University, NM
![Page 35: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/35.jpg)
New Mexico State University, NM
Encoding Scheme Encoding (Sec) Decoding (Sec)
Unix aescrypt (L) 0.050 0.021
AES openssl (L) 0.010 0.008
Huffman Coding (L) 0.004 0.004
Huffman* (L) 0.000034 0.000027
AES openssl (M) 0.041 0.023
Huffman Coding (M) 0.006 0.005
SHA-1 (L) 0.000093 0.000093
(L): AMD Turion, 2.4 GHz, dual core laptop. (M): Nexus 5 smartphone.
Huffman Encoding is much quicker!
![Page 36: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/36.jpg)
Content providers – Three 2.4 GHz Intel Core i7, 8 GB RAM nodes.
Content forwarder – Four 2.5 GHz Intel Core 2 Quad, 3.8 GB RAM nodes.
Clients – Six 1.66 GHz Intel Centrino Duo, 2.5 GB RAM nodes (Stationary) – One 3 GHz Intel Xeon Quad Core, 2 GB RAM nodes (Stationary) – Three Nexus 4 mobile phones (1.5 GHz Quad core, 2GB RAM) – One Nexus 5 mobile phone (2.3 GHz Quad core, 2GB RAM)
Access point – 802.11 n
Switches – 100 Mb/s switches
New Mexico State University, NM
Testbed Setup
![Page 37: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/37.jpg)
New Mexico State University, NM
Testbed Setup
![Page 38: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/38.jpg)
Using the CCNx-0.7 ccnputfile and ccngetfile tools to store/retrieve contents to/from the content provider.
One client requests the content from the provider. Caching was disabled on all the routers for the sake of fair
comparison. Various content object sizes: {1 MB, 10 MB, 100 MB, and
500MB}. We compare latency and protocol overhead over baseline
CCN, our anti-censorship framework (CCN+Huffman), FTP, and Tor (The Onion Routing).
Tor includes three layers of encryption at the forwarders. The results were averaged over 100 runs.
New Mexico State University, NM
Test Setup
![Page 39: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/39.jpg)
New Mexico State University, NM
C: Baseline CCN H: CCN+Huffman F: FTP T: Tor
Average download time comparison on the laptop clients.
Comparable latency between Huffman and CCN (log-scale graph).
![Page 40: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/40.jpg)
New Mexico State University, NM
Latency overhead comparison between Huffman over CCN (H/C) and Tor over FTP (T/F) on laptops.
Latency overhead ratio of Tor is dramatically higher for larger content.
![Page 41: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/41.jpg)
New Mexico State University, NM
Estimated average round trip time on the laptop clients. C: Baseline CCN H: CCN+Huffman F: FTP T: Tor
Layers of encryption increase Tor’s cost in comparison to Huffman.
![Page 42: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/42.jpg)
New Mexico State University, NM
C: Baseline CCN H: CCN+Huffman
Average download time comparison on the smartphone client.
1 MB 10 MB 100 MB 500 MB
Smartphone clients experience higher latency due to the lossy channel.
![Page 43: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/43.jpg)
New Mexico State University, NM
Latency overhead of Huffman (H/C) in smartphone client.
Modest Huffman overhead ratio (1.2) for smartphone clients.
![Page 44: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/44.jpg)
New Mexico State University, NM
Estimated average round trip time on the smartphone client.
C: Baseline CCN H: CCN+Huffman
Lightweight Huffman encoding and decoding maintain comparable RTT.
![Page 45: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/45.jpg)
Outline
Introduction and Motivation Problem Definition Models and Assumptions Framework Design Experimental Results Conclusions and Future Work
New Mexico State University, NM
![Page 46: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/46.jpg)
In this article, we present a lightweight anti-censorship framework for ICN clients, applicable to mobile users.
We proved the conditions and thresholds for perfect secrecy as well as breakability analysis of the proposed framework over AES.
For future, we will analyze the trade-off between the privacy and caching by decoupling the anonymizer from the provider.
We will also investigate the design of an algorithm for a seamless dynamic coding table updates.
Take-away: May be we do not need to use Tor. We propose something faster for smartphones, IoTs, mobile nodes, etc.
New Mexico State University, NM
Conclusions and Future Work
![Page 47: Catch Me If You Can: A Practical Framework to Evade ...conferences.sigcomm.org/acm-icn/2015/slides/07-02.pdf · Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric](https://reader030.vdocument.in/reader030/viewer/2022040520/5e792141c6cf8501fd05c144/html5/thumbnails/47.jpg)
Thank you! Email:[email protected]
New Mexico State University, NM
Research funded by the US National Science Foundation and the US Dept. of Defense.