Skip to main content

Security Hierarchy for the NDN Network: Description and Experimentation

  • Conference paper
  • First Online:
Telematics and Computing (WITCOM 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1053))

Included in the following conference series:

  • 837 Accesses

Abstract

Information centric-networks propose a new architecture for the Internet where IP addresses are replaced by names that represent the information or service that users request. The Named Data Networking (NDN) project is seeking to implement and experiment one type of these networks. A fundamental principle of NDN is that all the information needs to travel through the network using a secure hierarchical infrastructure. This article describes this security hierarchy and, using experiments, shows its implementation in two test networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahlgren, B., Dannewitzh, C., Imbrenda, C., Kutscher, D., Ohlman, B.: A survey of information-centric networking. IEEE Commun. Mag. 50(7), 26–36 (2012)

    Article  Google Scholar 

  2. Xylomenos, G., et al.: A survey of information-centric networking research. IEEE Commun. Surv. Tutor. 16(2) (2014)

    Google Scholar 

  3. Koponen, T., et al.: A data-oriented (and beyond) network architecture. In: ACM SIGCOMM, pp. 181–192 (2007)

    Google Scholar 

  4. FP7 PURSUIT project. http://www.fp7-pursuit.eu/

  5. FP7 SAIL project. http://www.sail-project.eu/

  6. Zhang, L., et al.: Named data networking. ACM SIGCOMM Comput. Commun. Rev. 44(3), 66–73 (2014)

    Article  Google Scholar 

  7. NDN Testbed Status. http://ndndemo.arl.wustl.edu/

  8. NDN Traffic Map. http://ndnmap.arl.wustl.edu/

  9. Bellovin, S., Schiller, J., Kaufman, C.: Security Mechanisms for the Internet, RFC 3631 (2003)

    Google Scholar 

  10. Zhang, Z., et al.: An overview of security support in named data networking, NDN, Technical report NDN-0057 (2018)

    Google Scholar 

  11. Dijkstra, E.: A note on two problems in connection with graphs. Numerische Mathematik 1(1), 269–271 (1959)

    Article  MathSciNet  Google Scholar 

  12. Lehman, V., Mahmudul Hoque, A., Yu, Y., Wang, L., Zhang, B., Zhang, L.: A secure link state routing protocol for NDN, NDN, Technical report NDN-0037 (2016)

    Google Scholar 

  13. ndn-cxx: NDN C++ library with eXperimental eXtensions. http://named-data.net/doc/ndn-cxx/current/

  14. NFD: NDN Forwarding Daemon. http://named-data.net/doc/NFD/current/

  15. NDN Project Team, NFD Developer’s Guide, Technical report NDN-0021 (2016)

    Google Scholar 

  16. NLSR, Named Data Link State Routing. http://named-data.net/doc/NLSR/current/

  17. Arjona-Villicaña, P., Rentería-Vidales, O., Gawande, A.: A beginner’s guide to installing and testing NLSR in Fedora. http://named-data.net/doc/NLSR/current/beginners-guide.html

Download references

Acknowledgments

The authors would like to thank Lan Wang and Ashlesh Gawande form the University of Memphis which helped to understand and clarify many of the concepts exposed in this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. David Arjona-Villicaña .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arjona-Villicaña, P.D., Silva-Trujillo, A.G. (2019). Security Hierarchy for the NDN Network: Description and Experimentation. In: Mata-Rivera, M., Zagal-Flores, R., Barría-Huidobro, C. (eds) Telematics and Computing. WITCOM 2019. Communications in Computer and Information Science, vol 1053. Springer, Cham. https://doi.org/10.1007/978-3-030-33229-7_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-33229-7_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-33228-0

  • Online ISBN: 978-3-030-33229-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics