Network-Layer Trust in Named-Data Networking
Autor: | Ersin Uzun, Cesar Ghali, Gene Tsudik |
---|---|
Rok vydání: | 2014 |
Předmět: |
Computer Networks and Communications
Computer science business.industry Context (language use) Construct (python library) Network layer Certificate Computer security computer.software_genre Public-key cryptography Digital signature Key (cryptography) Trust management (information system) Overhead (computing) business computer Software |
Zdroj: | ACM SIGCOMM Computer Communication Review. 44:12-19 |
ISSN: | 0146-4833 |
DOI: | 10.1145/2677046.2677049 |
Popis: | In contrast to today's IP-based host-oriented Internet architecture, Information-Centric Networking (ICN) emphasizes content by making it directly addressable and routable. Named Data Networking (NDN) architecture is an instance of ICN that is being developed as a candidate next-generation Internet architecture. By opportunistically caching content within the network, NDN appears to be well-suited for large-scale content distribution and for meeting the needs of increasingly mobile and bandwidth-hungry applications that dominate today's Internet. One key feature of NDN is the requirement for each content object to be digitally signed by its producer. Thus, NDN should be, in principle, immune to distributing fake (aka "poisoned") content. However, in practice, this poses two challenges for detecting fake content in NDN routers: (1) overhead due to signature verification and certificate chain traversal, and (2) lack of trust context, i.e., determining which public keys are trusted to verify which content. Because of these issues, NDN does not force routers to verify content signatures, which makes the architecture susceptible to content poisoning attacks. This paper explores root causes of, and some cures for, content poisoning attacks in NDN. In the process, it becomes apparent that meaningful mitigation of content poisoning is contingent upon a network-layer trust management architecture, elements of which we construct, while carefully justifying specific design choices. This work represents the initial effort towards comprehensive trust management for NDN. |
Databáze: | OpenAIRE |
Externí odkaz: |