Advertisement

Distributing Key Revocation Status in Named Data Networking

  • Giulia Mauri
  • Giacomo Verticale
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8115)

Abstract

Content Centric Networking (CCN) [1] is a new network paradigm designed to satisfy user needs considering the growth of data demand. Named Data Networking (NDN) [2] is a research project that is developing the future Internet architecture using the principles behind CCN. In this novel architecture, the contents are addressed by their name and not by their location. Thus, the attention is shifted from user to content, resulting in a caching network that is more efficient and flexible than an IP network for content distribution and management with beneficial effects on timely delivery. In NDN, the content objects are divided into chunks, each digitally signed by its producer, and most papers assume that verification is made only by the content consumer. In order to perform signature verification, a node needs the signer’s key, which can be easily retrieved by issuing a standard interest message. Although content verification at the end node prevents disruptive attacks in which false data is delivered to applications, the verification of key validity is also necessary. Otherwise, false data would be cached and forwarded instead of correct data resulting in a denial of service and paving the way for more sophisticated attacks.

Keywords

Data Packet Round Trip Time False Data Synchronization Protocol Content Centric Networking 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Jacobson, V., et al.: Networking named content. In: Proceedings of the 5th CoNEXT 2009, pp. 1–12. ACM, New York (2009)Google Scholar
  2. 2.
    Zhang, L., et al.: Named data networking (ndn) project. University of California and Arizona, Palo Alto Research Center and others, Tech. Rep. (October 2010)Google Scholar
  3. 3.
    Cooper, D., et al.: Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile. RFC 5280 (May 2008)Google Scholar
  4. 4.
    Myers, M., et al.: X.509 internet public key infrastructure,online certificate status protocol - ocsp. RFC 2560 (June 1999)Google Scholar
  5. 5.
    Afanasyev, A., et al.: ndnsim: Ndn simulator for ns-3. UCLA, Tech. Rep. (2012)Google Scholar
  6. 6.
    Bian, C., et al.: Deploying key management on ndn testbed. UCLA, Peking University and PARC, Tech. Rep. (February 2013)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Giulia Mauri
    • 1
  • Giacomo Verticale
    • 1
  1. 1.Department of Electronics, Information, and BioengineeringPolitecnico di MilanoItaly

Personalised recommendations