Hierarchical Identity Based Cryptography For Security and Trust in Named Data Networking

被引:9
作者
Hamdane, Balkis [1 ]
Boussada, Rihab [2 ]
Elhdhili, Mohamed Elhoucine [2 ]
El Fatmi, Sihem Guemara [1 ]
机构
[1] Higher Sch Commun Tunis SupCom, Digital Secur Res Unit, Tunis, Tunisia
[2] Univ Manouba, ENSI, CRISTAL Lab, Manouba, Tunisia
来源
2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE) | 2017年
关键词
NDN; security; trust; HIBC;
D O I
10.1109/WETICE.2017.33
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Named Data Networking (NDN) represents an emergent Information-Centric Networking architecture. It treats data as the central element and it leverages in-network caching. With the latter feature, traditional security mechanisms, tied to data location, can no longer be used. That's why a data-centric security model is adopted. This model relies mainly on the addition of a signature to each of the recovered data. However, the signature verification requires the appropriate public key. To trust this key, NDN provides an interesting platform, supporting multiple models. In this paper, we analyze the security and the trust in NDN. We determine the limits of the already proposed solutions. We propose then a security extension that relies on Hierarchical Identity-Based Cryptography (HIBC). This extension better meets the security requirements and it builds trust in the keys used in signature verification. To validate our proposal, it is integrated into the current prototype of NDN and its performance evaluation is provided. This evaluation proves that by adopting our extension, performance is comparable, even better in some cases than plain NDN.
引用
收藏
页码:226 / 231
页数:6
相关论文
共 11 条
  • [1] Afanasyev Alexander, 2013, IFIP NETW C
  • [2] [Anonymous], TR20091 PARC
  • [3] Bian C., 2013, TECH REP
  • [4] Compagno A., 2013, C LOC COMP NETW LCN
  • [5] Freeman D., 2010, J CRYPTOLOGY, V23
  • [6] Gentry C., 2002, ADV CRYPTOLOGYASIACR
  • [7] Hamdane B., 2012, INT C NETW FUT NOF I
  • [8] Scott M., 2004, ELECTRONICS LETT IEE, V40
  • [9] Yu Y., 2014, An endorsement-based key management system for decentralized ndn chat application
  • [10] Zhang L., 2010, XEROX PALO ALTO RES, V157, P158