Access Control Mechanisms in Named Data Networks: A Comprehensive Survey

被引:24
作者
Nour, Boubakr [1 ]
Khelifi, Hakima [1 ]
Hussain, Rasheed [2 ]
Mastorakis, Spyridon [3 ]
Moungla, Hassine [4 ,5 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci, Beijing 100081, Peoples R China
[2] Innopolis Univ, Secure Syst & Network Engn SNE, Innopolis 420500, Russia
[3] Univ Nebraska, Dept Comp Sci, Omaha, NE 68182 USA
[4] Univ Paris, Paris Descartes Comp Sci Lab, F-75006 Evry, France
[5] Telecom SudParis, F-91000 Evry, France
关键词
Information-centric networking; named data networking; access control mechanisms; survey; INFORMATION-CENTRIC NETWORKING; ATTRIBUTE-BASED ENCRYPTION; SECURITY CHALLENGES; PRIVACY; INTERNET; EDGE; PROTOCOLS; EFFICIENT; ATTACKS;
D O I
10.1145/3442150
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content fromits original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC. Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.
引用
收藏
页数:35
相关论文
共 147 条
  • [11] A Survey of Naming and Routing in Information-Centric Networks
    Bari, Md. Faizul
    Chowdhury, Shihabur Rahman
    Ahmed, Reaz
    Boutaba, Raouf
    Mathieu, Bertrand
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (12) : 44 - 53
  • [12] PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
    Belguith, Sana
    Kaaniche, Nesrine
    Laurent, Maryline
    Jemai, Abderrazak
    Attia, Rabah
    [J]. COMPUTER NETWORKS, 2018, 133 : 141 - 156
  • [13] MSIDN: Mitigation of Sophisticated Interest flooding-based DDoS attacks in Named Data Networking
    Benmoussa, Ahmed
    Tahari, Abdou el Karim
    Kerrache, Chaker Abdelaziz
    Lagraa, Nasreddine
    Lakas, Abderrahmane
    Hussain, Rasheed
    Ahmad, Farhan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 : 293 - 306
  • [14] PrivICN: Privacy-preserving content retrieval in information-centric networking
    Bernardini, Cesar
    Marchal, Samuel
    Asghar, Muhammad Rizwan
    Crispo, Bruno
    [J]. COMPUTER NETWORKS, 2019, 149 : 13 - 28
  • [15] Bian Chaoyi, 2013, NDN0009 UCLA PARC PE
  • [16] Borgh J, 2017, 2017 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS 2017), P397
  • [17] Named Data Networking's Intrinsic Cyber-Resilience for Vehicular CPS
    Bouk, Safdar Hussain
    Ahmed, Syed Hassan
    Hussain, Rasheed
    Eun, Yongsoon
    [J]. IEEE ACCESS, 2018, 6 : 60570 - 60585
  • [18] Boussada R, 2019, IEEE WCNC
  • [19] Buchmann J, 2006, LECT NOTES COMPUT SC, V4329, P349
  • [20] Hash-Based Signatures: State of Play
    Butin, Denis
    [J]. IEEE SECURITY & PRIVACY, 2017, 15 (04) : 37 - 43