Security Evaluation of a Control System Using Named Data Networking

被引:0
|
作者
Perez, Victor [1 ]
Garip, Mevlut Turker [1 ]
Lam, Silas [1 ]
Zhang, Lixia [1 ]
机构
[1] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
关键词
Computer networks; Computer security; Building automation;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Security is an integral part of networked computer systems. The recent Named Data Networking (NDN) project aims to develop a new Internet architecture that communicates data using names rather than locations, the latter of which is what the current IP-based Internet does with IP addresses. One of the first real-world applications using NDN is a lighting control system. We conduct a red team assessment of the current state of the security of this lighting system and its NDN implementation. The system is representative of a more general class of automated controller systems. Our analysis found that due to NDN's use of named data, the system inherently prevents most attacks that IP-based systems are vulnerable to. Although many parts of the system are secure, we discovered some problems with the verification of timestamps and processing of large packets that led to a severe memory leak. The system also lacks a secure key distribution mechanism. While NDN security is on the right track, there are important security design issues NDN must account for.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Security Analysis and Evaluation of Optimized Authentication in Named Data Networking
    Boussaha, Ryma
    Challal, Yacine
    Bouabdallah, Abdelmadjid
    [J]. ADVANCES IN COMPUTING SYSTEMS AND APPLICATIONS, 2022, 513 : 287 - 297
  • [2] Named-Data Security Scheme for Named Data Networking
    Hamdane, Balkis
    Serhrouchni, Ahmed
    Fadlallah, Ahmad
    El Fatmi, Sihem Guemara
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2012, : 114 - 119
  • [3] Security Bootstrapping for Securing Data Plane and Control Plane in Named Data Networking
    Park, Chang-Seop
    Park, Wang-Seok
    Woo, Samuel
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 3765 - 3781
  • [4] An Overview of Security Support in Named Data Networking
    Zhang, Zhiyi
    Yu, Yingdi
    Zhang, Haitao
    Newberry, Eric
    Mastorakis, Spyridon
    Li, Yanbiao
    Afanasyev, Alexander
    Zhang, Lixia
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (11) : 62 - 68
  • [5] Congestion Control in Named Data Networking
    Tanaka, Daichi
    Kawarasaki, Masatoshi
    [J]. 2016 22ND IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (IEEE LANMAN), 2016,
  • [6] Flooding Control in Named Data Networking
    Dash, Shatarupa
    Sahu, Bharat J. R.
    Saxena, Navrati
    Roy, Abhishek
    [J]. IETE TECHNICAL REVIEW, 2018, 35 (03) : 266 - 274
  • [7] Congestion Control Using Diffusion Method in Named Data Networking
    Lee, Chenglin
    Nakazato, Hidenori
    [J]. PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, : 333 - 336
  • [8] Name-Signature Lookup System: A Security Enhancement to Named Data Networking
    Song, Zhicheng
    Kar, Pushpendu
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1445 - 1449
  • [9] Efficient security credential management for named data networking
    Deng, Bo
    [J]. International Journal of Computational Science and Engineering, 2019, 19 (02): : 251 - 258
  • [10] A Security Monitoring Plane for Named Data Networking Deployment
    Tan Nguyen
    Hoang-Long Mai
    Doyen, Guillaume
    Cogranne, Remi
    Mallouli, Wissam
    de Oca, Edgardo Montes
    Festor, Olivier
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (11) : 88 - 94