Access Control Mechanisms in Named Data Networks: A Comprehensive Survey

被引:24
作者
Nour, Boubakr [1 ]
Khelifi, Hakima [1 ]
Hussain, Rasheed [2 ]
Mastorakis, Spyridon [3 ]
Moungla, Hassine [4 ,5 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci, Beijing 100081, Peoples R China
[2] Innopolis Univ, Secure Syst & Network Engn SNE, Innopolis 420500, Russia
[3] Univ Nebraska, Dept Comp Sci, Omaha, NE 68182 USA
[4] Univ Paris, Paris Descartes Comp Sci Lab, F-75006 Evry, France
[5] Telecom SudParis, F-91000 Evry, France
关键词
Information-centric networking; named data networking; access control mechanisms; survey; INFORMATION-CENTRIC NETWORKING; ATTRIBUTE-BASED ENCRYPTION; SECURITY CHALLENGES; PRIVACY; INTERNET; EDGE; PROTOCOLS; EFFICIENT; ATTACKS;
D O I
10.1145/3442150
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content fromits original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC. Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.
引用
收藏
页数:35
相关论文
共 147 条
  • [1] A Survey of Security Attacks in Information-Centric Networking
    AbdAllah, Eslam G.
    Hassanein, Hossam S.
    Zulkernine, Mohammad
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) : 1441 - 1454
  • [2] Survey on caching approaches in Information Centric Networking
    Abdullahi, Ibrahim
    Arif, Suki
    Hassan, Suhaidi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 56 : 48 - 59
  • [3] A Survey of Information-Centric Networking
    Ahlgren, Bengt
    Dannewitz, Christian
    Imbrenda, Claudio
    Kutscher, Dirk
    Ohlman, Boerje
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (07) : 26 - 36
  • [4] Named Data Networking for Software Defined Vehicular Networks
    Ahmed, Syed Hassan
    Bouk, Safdar Hussain
    Kim, Dongkyun
    Rawat, Danda B.
    Song, Houbing
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (08) : 60 - 66
  • [5] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [6] Security and Privacy Analysis of National Science Foundation Future Internet Architectures
    Ambrosin, Moreno
    Compagno, Alberto
    Conti, Mauro
    Ghali, Cesar
    Tsudik, Gene
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02): : 1418 - 1442
  • [7] [Anonymous], 2012, FUTURE NETWORK MOBIL
  • [8] [Anonymous], 2019, TYPE LENGTH VALUE TL
  • [9] [Anonymous], 2011, FUTURE NETWORK MOBIL
  • [10] [Anonymous], 2016, INT C COMP COMM NETW, DOI DOI 10.1109/ICCCN.2016.7568589