LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking

被引:71
|
作者
Li, Qi [1 ]
Zhang, Xinwen [2 ]
Zheng, Qingji [3 ]
Sandhu, Ravi [4 ]
Fu, Xiaoming [5 ]
机构
[1] Tsinghua Univ, Grad Sch Shenzhen, Shenzhen 518055, Peoples R China
[2] Samsung Res Amer, Santa Clara, CA 95134 USA
[3] Huawei Res Ctr, Santa Clara, CA 95050 USA
[4] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX 78249 USA
[5] Univ Gottingen, Inst Comp Sci, D-37073 Gottingen, Germany
基金
中国国家自然科学基金;
关键词
Next generation networking; access control; data security; POLLUTION ATTACKS;
D O I
10.1109/TIFS.2014.2365742
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Named data networking (NDN) is a new paradigm for the future Internet wherein interest and data packets carry content names rather than the current IP paradigm of source and destination addresses. Security is built into NDN by embedding a public key signature in each data packet to enable verification of authenticity and integrity of the content. However, existing heavyweight signature generation and verification algorithms prevent universal integrity verification among NDN nodes, which may result in content pollution and denial of service attacks. Furthermore, caching and location-independent content access disables the capability of a content provider to control content access, e.g., who can cache a content and which end user or device can access it. We propose a lightweight integrity verification (LIVE) architecture, an extension to the NDN protocol, to address these two issues seamlessly. LIVE enables universal content signature verification in NDN with lightweight signature generation and verification algorithms. Furthermore, it allows a content provider to control content access in NDN nodes by selectively distributing integrity verification tokens to authorized nodes. We evaluate the effectiveness of LIVE with open source CCNx project. Our paper shows that LIVE only incurs average 10% delay in accessing contents. Compared with traditional public key signature schemes, the verification delay is reduced by over 20 times in LIVE.
引用
收藏
页码:308 / 320
页数:13
相关论文
共 50 条
  • [1] Content verification in Named Data Networking
    Nam, SunWook
    Kim, Dohyung
    Yeom, Ikjun
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 414 - 415
  • [2] Fast content verification for named data networking
    Wang, Yi
    Liu, Bin
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 : 234 - 242
  • [3] Traceable Lightweight and Fine-grained Access Control in Named Data Networking
    Luo Jiangtao
    He Chen
    Wang Junxia
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (10) : 2428 - 2434
  • [4] Secure Content Distribution with Access Control Enforcement in Named Data Networking
    Htet Hlaing, Htet
    Funamoto, Yuki
    Mambo, Masahiro
    SENSORS, 2021, 21 (13)
  • [5] Towards a Secure Access to Content in Named Data Networking
    Hamdane, Balkis
    Boussada, Rihab
    Elhdhili, Mohamed Elhoucine
    El Fatmi, Sihem Guemara
    2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, : 250 - 255
  • [6] An interest-based access control scheme via edge verification in Named Data Networking
    Tao, Yu
    Zhu, Yi
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (10)
  • [7] NAC: Name-Based Access Control in Named Data Networking
    Zhang, Zhiyi
    Yu, Yingdi
    Afanasyev, Alexander
    Burke, Jeff
    Zhang, Lixia
    PROCEEDINGS OF THE 4TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN 2017), 2017, : 186 - 187
  • [8] An Encryption and Probability based Access Control Model for Named Data Networking
    Chen, Tao
    Lei, Kai
    Xu, Kuai
    2014 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2014,
  • [9] A Credential and Encryption Based Access Control Solution for Named Data Networking
    Hamdane, Balkis
    El Fatmi, Sihem Guemara
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1234 - 1237
  • [10] An in-network collaborative verification mechanism for defending content poisoning in Named Data Networking
    Kang, Haohao
    Zhu, Yi
    Tao, Yu
    Yang, Jianlong
    PROCEEDINGS OF 2018 1ST IEEE INTERNATIONAL CONFERENCE ON HOT INFORMATION-CENTRIC NETWORKING (HOTICN 2018), 2018, : 46 - 50