Skip to main content

An Autonomous System Based Security Mechanism for Network Coding Applications in Content-Centric Networking

  • Conference paper
  • First Online:
Mobile, Secure, and Programmable Networking (MSPN 2017)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10566))

Abstract

Content-Centric Networking (CCN), is built on the notion of content-based security. With the integration of Network Coding (NC) into CCN to contribute to the best performance, security, one of the key features of CCN has been left behind. Though the permission for encoding/recoding content packets at producers and intermediate routers provides performance benefits, it also introduces additional security issues and disables existing security practices. In this paper, we fill the gap by analyzing new security challenges brought accordingly and proposing an Autonomous Systems (AS-s) based security mechanism for NC applications in CCN. It can not only guarantee the optimal performance of NC, but also offer the assurance for Integrity, Origin Authentication and Correctness of content packets, together with proving trustworthiness among border routers. More importantly, we also shed light on the performance issues and implementation problems of the mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: ACM CoNEXT 2009, December 2009

    Google Scholar 

  2. Ghali, C., Tsudik, G., Uzun, E.: Network-layer trust in named-data networking. ACM Sigcomm Comput. Commun. Rev. 44(5), 12–19 (2014)

    Article  Google Scholar 

  3. Montpetit, M.-J., Westphal, C., Trossen, D.: Networking, network coding meets information-centric: an architectural case for information dispersion through native network coding. In: 1st ACM NoM Workshop, June 2012

    Google Scholar 

  4. Sundararajan, J., Shah, D., Medard, M., Jakubczak, S., Mitzenmacher, M., Barros, J.: Network coding meets TCP: theory and implementation. Proc. IEEE 99(3), 490–512 (2011)

    Article  Google Scholar 

  5. Saltarin, J., Bourtsoulatze, E., Thomos, N., Braun, T.: Netcodccn: a network coding approach for content-centric networks, arXiv preprint (2015). arXiv:1512.00259

  6. Ramakrishnan, A., Westphal, C., Saltarin, J.: Adaptive video streaming over CCN with network coding for seamless mobility. In: 2016 IEEE International Symposium on Multimedia (ISM), San Jose, CA, pp. 238–242 (2016). doi:10.1109/ISM

  7. Koetter, R., Mdard, M.: An algebraic approach to network coding. IEEE/ACM Trans. Networking 11(5), 782–795 (2003)

    Article  Google Scholar 

  8. Pedersen, M., Heide, J., Vingelmann, P., Fitzek, F.: Network coding over the \(2^{32}-5\) prime field. In: IEEE ICC 2013, June 2013

    Google Scholar 

  9. Zhang, M., Li, H., Chen, F., Hou, H., An, H., Wang, W., Huang, J.: A general co/decoder of network coding in HDL. In: 2011 International Symposium on Network Coding, July 2011

    Google Scholar 

  10. Thomos, N., Frossard, P.: Toward one symbol network coding vectors. IEEE Commun. Lett. 16(11), 1860–1863 (2012)

    Article  Google Scholar 

  11. Lucani, D.E., Pedersen, M.V., Heide, J., Fitzek, F.H.P., Codes, F.N.: A Code for Fluid Allocation of Complexity (2014). http://arxiv.org/abs/1404.6620

  12. Wu, Q., Li, Z., Xie, G.: Codingcache: multipath-aware ccn cache with network coding. In: Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking, pp. 41–42. ACM (2013)

    Google Scholar 

  13. Miyake, S., Asaeda, H.: Network coding and its application to content centric networking, Witmse (2013)

    Google Scholar 

  14. Wang, J., Ren, J., Lu, K., Wang, J., Liu, S., Westphal, C.: An optimal cache management framework for information-centric networks with network coding. In: IFIP/IEEE Networking Conference, June 2014

    Google Scholar 

  15. Wang, J., Ren, J., Lu, K., Wang, J., Liu, S., Westphal, C.: A minimum cost cache management framework for information-centric networks with network coding. Comput. Netw. 110, 1–17 (2016)

    Article  Google Scholar 

  16. Wu, Q., Li, Z., Tyson, G., Uhlig, S., Kaafar, M.A., Xie, G.: Privacyaware multipath video caching for content-centric networks. IEEE J. Sel. Areas Commun. 34, 2219–2230 (2016)

    Article  Google Scholar 

  17. Fayazbakhsh, S.K., Lin, Y., Tootoonchian, A., Ghodsi, A., Koponen, T., Maggs, B., Ng, K., Sekar, V., Shenker, S.: Less pain, most of the gain: incrementally deployable ICN. In: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, pp. 147–158. ACM (2013)

    Google Scholar 

  18. Ghodsi, A., Koponen, T., Rajahalme, J., Sarolahti, P., Shenker, S.: Naming in content-oriented architectures. In: Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, pp. 1–6. ACM (2011)

    Google Scholar 

  19. Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., Wilcox, J.: Information-centric networking: seeing the forest for the trees. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, p. 1. ACM (2011)

    Google Scholar 

  20. Koponen, T., Chawla, M., Chun, B.-G., Ermolinskiy, A., Kim, K.H., Shenker, S., Stoica, I.: A data-oriented (and beyond) network architecture. ACM SIGCOMM Comput. Commun. Rev. 37(4), 181–192 (2007)

    Article  Google Scholar 

  21. Gasti, P., Tsudik, G., Uzun, E., Zhang, L.: DoS DDoS in named-data networking. In: Proceedings of the International Conference on Computer Communications and Networks (ICCCN) (2013)

    Google Scholar 

  22. Afanasyev, A., Mahadevan, P., Moiseenko, I., Uzun, E., Zhang, L.: Interest flooding attack and countermeasures in named data networking. In: Proceedings of the IFIP Networking Conference (2013)

    Google Scholar 

  23. Compagno, A., Conti, M., Gasti, P., Tsudik, G.: Poseidon: mitigating interest flooding DDoS attacks in named data networking. In: Proceedings of the 38th IEEE Conference on Local Computer Networks (LCN) (2013)

    Google Scholar 

  24. Ghali, C., Tsudik, G., Uzun, E.: Needle in a haystack: mitigating content poisoning in named-data networking. In: The Workshop on Security of Emerging NETWORKING Technologies (2014)

    Google Scholar 

  25. Smetters, D., Jacobson, V.: Securing network content. Technical report, PARC (2009)

    Google Scholar 

  26. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 164–173 (1996)

    Google Scholar 

  27. Cho, J.-H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials 13(4), 562–583 (2011)

    Article  Google Scholar 

  28. Conner, W., Iyengar, A., Mikalsen, T., Rouvellou, I., Nahrstedt, K.: A trust management framework for service-oriented environments. In: Proceedings of the 18th International Conference on World Wide Web (WWW), pp. 891–900 (2009)

    Google Scholar 

  29. Li, W., Joshi, A., Finin, T.: Coping with node misbehaviors in ad hoc networks: a multi-dimensional trust management approach. In: Proceedings of the 11th International Conference on Mobile Data Management (MDM), pp. 85–94 (2010)

    Google Scholar 

  30. Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: best practices. Comput. Commun. 33(9), 1086–1093 (2010)

    Article  Google Scholar 

  31. Omar, M., Challal, Y., Bouabdallah, A.: Certification-based trust models in mobile ad hoc networks: a survey and taxonomy. J. Netw. Comput. Appl. 35(1), 268–286 (2012)

    Article  Google Scholar 

  32. Zahariadis, T., Leligou, H.C., Trakadas, P., Voliotis, S.: Trust management in wireless sensor networks. Eur. Trans. Telecommun. 21(4), 386–395 (2010)

    Google Scholar 

  33. Mahadevan, P., Uzun, E., Sevilla, S., et al.: CCN-KRS: a key resolution service for CCN. In: Proceedings of the 1st International Conference on Information-Centric Networking. ACM (2014)

    Google Scholar 

  34. Chaabane, A., Cristofaro, E.D., Kaafar, M.A., et al.: Privacy in content-oriented networking: threats and countermeasures. ACM Sigcomm Comput. Commun. Rev. 43(3), 25–33 (2013)

    Article  Google Scholar 

  35. Jacobson, V., Smetters, D.K., et al.: VoCCN: voice over content-centric networks. In: ACM ReArch 2009, December 2009

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by National Keystone R&D Program of China (No. 2016YFB0800101), the Natural Science Foundation of China (NSFC) (No. 61671001, No.61521003), together with the Guangdong Research Programs 2016B030305005 and Shenzhen Research Programs (ZDSYS201603311739428, JCYJ20150331100723974 & 20140509093817684).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Xu, L., Li, H., Hu, J., Wang, Y., Zhang, H. (2017). An Autonomous System Based Security Mechanism for Network Coding Applications in Content-Centric Networking. In: Bouzefrane, S., Banerjee, S., Sailhan, F., Boumerdassi, S., Renault, E. (eds) Mobile, Secure, and Programmable Networking. MSPN 2017. Lecture Notes in Computer Science(), vol 10566. Springer, Cham. https://doi.org/10.1007/978-3-319-67807-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67807-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67806-1

  • Online ISBN: 978-3-319-67807-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics