This commit is contained in:
Quentin 2022-03-18 16:38:38 +01:00
parent 55054e27c3
commit 7fba134d50
5 changed files with 35 additions and 100 deletions

View file

@ -1,5 +1,5 @@
\section{Tor performances \\ \& VoIP requirements}
%\section{Tor performances \\ \& VoIP requirements}
\begin{frame}{What are voice calling requirements?}
\tikzsetnextfilename{rtapp}
@ -9,8 +9,11 @@
\draw[->, solid, black,line width=1mm] (micro) edge node[sloped,anchor=north,text width=6.5cm]{
\Large Call Requirements \\
\normalsize
\textbf{Delay:} $99^{th}$-perc delay $<$ 360 ms \\
\textbf{Drop:} Dropped calls $<$ 2\% \\
\underline{Single call}\\
\textbf{Interactive:} $99^{th}$-perc delay $<$ 360 ms\\
\underline{System}\\
\textbf{Acceptable:} $>$ 80\% \\
\textbf{Drop:} $<$ 2\% \\
\textbf{Duration:} 5 min avg, up to 90 min \\
\textbf{Anonymity:} 2-way anonymity\\
\small Alice is anonymous to Bob,\\Bob is anonymous to Alice
@ -19,7 +22,6 @@
\begin{center}
\Large \includegraphics[scale=0.6]{img/question.pdf} \color{blue} Which Tor configuration should we use? \\
\Large \includegraphics[scale=0.6]{img/question.pdf} \color{blue} Can Tor satisfy these requirements?
\end{center}
\end{frame}
@ -126,7 +128,6 @@ Each configuration is repeated 64 times\\
\underline{Questions}\\
Do Onion Service meet latency requirements?\\
Do Onion Service are stable enough?\\
Get insights on Onion Services' latency
\end{frame}
@ -156,12 +157,15 @@ Get insights on Onion Services' latency
\includegraphics[width=0.8\textwidth]{img/x1.pdf}
\end{column}
\begin{column}{0.5\textwidth}
\normalsize \underline{Acceptable 5-minute calls}\\
\vspace{0.5cm}
\normalsize \underline{5-minute calls $<$ 360ms}\\
\Large \textcolor{red}{9\%}
\vspace{0.5cm}
\normalsize \underline{Acceptable 90-minute calls}\\
\normalsize \underline{90-minute calls $<$ 360ms}\\
\Large \textcolor{red}{3\%}
\end{column}
@ -172,7 +176,7 @@ Get insights on Onion Services' latency
\end{center}
\end{frame}
\begin{frame}{Even with onion service using 2-hop circuits?}
\begin{frame}{What is we use 2-hop circuits?}
\tikzsetnextfilename{petitschema2}
\begin{tikzpicture}
@ -197,12 +201,16 @@ Get insights on Onion Services' latency
\includegraphics[width=0.8\textwidth]{img/x2.pdf}
\end{column}
\begin{column}{0.5\textwidth}
\normalsize \underline{Acceptable 5-minute calls}\\
\vspace{0.5cm}
\normalsize \underline{5-minute calls $<$ 360ms}\\
\Large \textcolor{red}{44\%}
\vspace{0.5cm}
\normalsize \underline{Acceptable 90-minute calls}\\
\normalsize \underline{90-minute calls $<$ 360ms}\\
\Large \textcolor{red}{23\%}
\end{column}
@ -254,11 +262,15 @@ Get insights on Onion Services' latency
\includegraphics[width=0.8\textwidth]{img/x3.pdf}
\end{column}
\begin{column}{0.5\textwidth}
\vspace{0.3cm}
\normalsize \underline{Dropped 5-minute calls}\\
\Large \textcolor{red}{5\%} \normalsize for 2 hops \\
\Large \textcolor{red}{10\%} \normalsize for 3 hops
\vspace{0.5cm}
\vspace{0.3cm}
\normalsize \underline{Dropped 90-minute calls}\\
\Large \textcolor{red}{10\%} \normalsize for 2 hops\\
@ -268,7 +280,7 @@ Get insights on Onion Services' latency
\end{columns}
\begin{center}
\Large \includegraphics[scale=0.4]{img/stop.pdf} \color{red} Calls are dropped too often
\Large \includegraphics[scale=0.4]{img/stop.pdf} \color{red} Calls are dropped too often ($>$ 2\%)
\end{center}
\end{frame}
@ -556,7 +568,7 @@ Alternate + Ranking (6/12 active paths)
\textbf{Donar Double Send}\\
Double Send + Ranking (6/12 active paths)
\scriptsize Implemented in \texttt{C}, notable API/lib: \texttt{epoll}, \texttt{gstreamer}, \texttt{glib}
\scriptsize Implemented in \texttt{C}, notable API/lib: \texttt{epoll}, \texttt{gstreamer}, \texttt{glib}\\
\normalsize
@ -666,9 +678,9 @@ Double Send + Ranking (6/12 active paths)
\end{center}
\end{frame}
\section{Future work \& Conclusion}
\section{Conclusion}
\iffalse
\begin{frame}{Future Work}
\underline{We plan to evaluate}
@ -691,12 +703,15 @@ Double Send + Ranking (6/12 active paths)
To make traffic correlation harder
\end{frame}
\fi
\begin{frame}{Conclusion}
\underline{We contributed}
\Large Foundations \\
\normalsize to build a Tor softphone with stable latency
\normalsize to build a Tor softphone with stable latency \\
over the existing Tor network \\
\scriptsize Source code: github.com/CloudLargeScale-UCLouvain/Donar
\Large Insights \\
\normalsize

BIN
img/fastl.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 163 KiB

BIN
img/proxy.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 588 KiB

BIN
img/torb2.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 207 KiB

View file

@ -1,98 +1,18 @@
\iffalse
\begin{frame}[t]{Privacy concerns}
\begin{columns}
\begin{column}{0.65\textwidth}
\begin{figure}
\includegraphics[width=\textwidth]{img/scandals.jpg}
\end{figure}
\end{column}
\begin{column}{0.35\textwidth}
\begin{center}
\vspace{3cm}
\Large Privacy issues have many \underline{different faces}
\end{center}
\end{column}
\end{columns}
\end{frame}
\begin{frame}{Tor's limitations}
\begin{frame}
\frametitle{The impact of our technological choices}
%\begin{figure}[h]
\Large The underlying Internet \underline{infrastructure}\\allows the collection\\of \underline{communication metadata}.
\vspace{1cm}
\tikzsetnextfilename{actors}
\begin{tikzpicture}[scale=1]
\node (cp1) at (0,0) {\includegraphics[scale=0.26]{img/computer.pdf}};
\node[below = 0cm of cp1] (cp1t) {Alice};
\node (np1) at (2.4,0) {\includegraphics[scale=1]{img/network-provider.pdf}};
\node[below = 0.1cm of np1, text width = 2cm,align=center] (cp1t) {Network Provider};
\node (sp) at (4.75,0) {\includegraphics[scale=1]{img/service-provider.pdf}};
\node[below = 0.1cm of sp, text width = 2cm,align=center] (spt) {Service Provider};
\node (np2) at (7.1,0) {\includegraphics[scale=1]{img/network-provider.pdf}};
\node[below = 0.1cm of np2, text width = 2cm,align=center] (spt) {Network Provider};
\node (cp2) at (9.5,0) {\includegraphics[scale=0.26]{img/computer.pdf}};
\node[below = 0cm of cp2] (cp2t) {Bob};
\draw[<->, solid, black, line width=1mm] (cp1) edge (np1);
\draw[<->, solid, black, line width=1mm] (np1) edge (sp);
\draw[<->, solid, black, line width=1mm] (sp) edge (np2);
\draw[<->, solid, black, line width=1mm] (np2) edge (cp2);
\node[above=-1.2cm of np1] (snp1) {\includegraphics[scale=0.10]{img/eye.pdf}};
\node[above=-1.2cm of sp] (ssp) {\includegraphics[scale=0.10]{img/eye.pdf}};
\node[above=-1.2cm of np2] (snp2) {\includegraphics[scale=0.10]{img/eye.pdf}};
\end{tikzpicture}
%\end{figure}
\end{frame}
\begin{frame}{Building a privacy-aware network}
\tikzsetnextfilename{anonintro2}
\begin{tikzpicture}[scale=1]
\node (cp1) at (0,0) {\includegraphics[scale=0.26]{img/computer.pdf}};
\node[below = 0cm of cp1] (cp1t) {Alice};
\node (np1) at (2.4,0) {\includegraphics[scale=1]{img/network-provider.pdf}};
\node[below = 0.1cm of np1, text width = 2cm,align=center] (cp1t) {Network Provider};
\draw[<->, solid, black, line width=1mm] (cp1) edge (np1);
\node (anet) at (4.75,0) {\includegraphics[scale=0.16]{img/tor.pdf}};
\draw[<->, solid, black, line width=1mm] (np1) edge (anet);
\node[below = 0cm of anet, text width = 2cm,align=center] (anett) {Tor};
\node (qs) at (7,0) {\includegraphics[scale=1.3]{img/question.pdf}};
\draw[<->, solid, black, line width=1mm] (anet) edge (qs);
\node[below = 0cm of qs, text width = 2cm,align=center] (qst) {Unknown\\Destination};
\node[above=-1.4cm of np1] (cloud1) {\includegraphics[scale=0.8]{img/cloud.pdf}};
\end{tikzpicture}
\begin{center}
\normalsize \emph{"[A] system to hide who a participant communicates with [...] in spite of an \underline{unsecured telecommunication system}"}~\footnotemark[1]
\Large With 2M+ users, \underline{Tor} is the biggest privacy-aware network
\end{center}
\footnotetext[1]{\fullcite{chaum1981untraceable}}
\end{frame}
\fi
\begin{frame}{Tor's limitation}
\Large \underline{Performance}
hinders Tor's adoption
\Large \underline{High latency} hinders Tor's adoption\\for \underline{interactive} applications like VoIP
\begin{columns}
\begin{column}{0.5\textwidth}
\vspace{0.5cm}
\begin{figure}
\includegraphics[width=\textwidth]{img/fast.png}
\includegraphics[width=\textwidth]{img/fastl.png}
\end{figure}
\end{column}
\begin{column}{0.5\textwidth}
\vspace{1cm}
\begin{figure}
\includegraphics[width=\textwidth]{img/torb.png}
\includegraphics[width=\textwidth]{img/torb2.png}
\end{figure}
\end{column}
\end{columns}