Enhancing Security and Trust in Named Data Networking using Hierarchical Identity Based Cryptography

Author(s):  
Balkis Hamdane ◽  
Rihab Boussada ◽  
Mohamed Elhoucine Elhdhili ◽  
Sihem Guemara El Fatmi

Named data networking (NDN) represents a promising clean slate for future internet architecture. It adopts the information-centric networking (ICN) approach that treats named data as the central element, leverages in-network caching, and uses a data-centric security model. This model is built mainly in the addition of a signature to each of the recovered data. However, the signature verification requires the appropriate public key. To trust this key, multiple models were proposed. In this article, the authors analyze security and trust in NDN, to deduct the limits of the already proposed solutions. They propose a security extension that strengthens security and builds trust in used keys. The main idea of this extension is the derivation of these keys from data name, by using hierarchical identity-based cryptography (HIBC). To confirm the safety of the new proposal, a formal security analysis is provided. To evaluate its efficiency, a performance evaluation is performed. It proves that by adopting the proposed extension, performance is comparable, even better in some cases than plain NDN.

Author(s):  
Balkis Hamdane ◽  
Rihab Boussada ◽  
Mohamed Elhoucine Elhdhili ◽  
Sihem Guemara El Fatmi

Named data networking (NDN) represents a promising clean slate for future internet architecture. It adopts the information-centric networking (ICN) approach that treats named data as the central element, leverages in-network caching, and uses a data-centric security model. This model is built mainly in the addition of a signature to each of the recovered data. However, the signature verification requires the appropriate public key. To trust this key, multiple models were proposed. In this article, the authors analyze security and trust in NDN, to deduct the limits of the already proposed solutions. They propose a security extension that strengthens security and builds trust in used keys. The main idea of this extension is the derivation of these keys from data name, by using hierarchical identity-based cryptography (HIBC). To confirm the safety of the new proposal, a formal security analysis is provided. To evaluate its efficiency, a performance evaluation is performed. It proves that by adopting the proposed extension, performance is comparable, even better in some cases than plain NDN.


2019 ◽  
Vol 9 (2) ◽  
pp. 329 ◽  
Author(s):  
Hayoung Byun ◽  
Hyesook Lim

Network traffic has increased rapidly in recent years, mainly associated with the massive growth of various applications on mobile devices. Named data networking (NDN) technology has been proposed as a future Internet architecture for effectively handling this ever-increasing network traffic. In order to realize the NDN, high-speed lookup algorithms for a forwarding information base (FIB) are crucial. This paper proposes a level-priority trie (LPT) and a 2-phase Bloom filter architecture implementing the LPT. The proposed Bloom filters are sufficiently small to be implemented with on-chip memories (less than 3 MB) for FIB tables with up to 100,000 name prefixes. Hence, the proposed structure enables high-speed FIB lookup. The performance evaluation result shows that FIB lookups for more than 99.99% of inputs are achieved without needing to access the database stored in an off-chip memory.


2021 ◽  
Vol 30 (1) ◽  
pp. 126-149
Author(s):  
Britt S Paris

This article engages the politics of technology as it examines how a discourse of time is framed by engineers and project principals in the course of the development of three future internet architecture projects: named data networking, eXpressive Internet Architecture, and Mobility First. This framing reveals categories of a discourse of time that include articulations of efficiency, speed, time as a technical resource, and notions of the future manifest in each project. The discursive categories fit into a time constructs model that exposes how these projects were built with regard to concepts of speed and how different notions of time are expressed as a design ideology intertwined with other ideologies. This time constructs framework represents a tool that can be used to expose the social and political values of technological development that are often hidden or are difficult to communicate in cross-disciplinary contexts.


2021 ◽  
Vol 13 (5) ◽  
pp. 19-35
Author(s):  
Saad Al-Ahmadi

The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.


2020 ◽  
Vol 48 (4) ◽  
pp. 165-177
Author(s):  
Dimitris Kanellopoulos

Purpose Information-centric networking (ICN) is an innovative paradigm for the future internet architecture. This paper aims to provide a view on how academic video lectures can exploit the ICN paradigm. It discusses the design of academic video lectures over named data networking (NDN) (an ICN architecture) and speculates their future development. To the best of author’s knowledge, a similar study has not been presented. Design/methodology/approach The paper is a visionary essay that introduces the background, elaborates the basic concepts and presents the author’s views and insights into academic video lectures that exploit the latest development of NDN approach and its applications. Findings The ICN paradigm is closely related to the levels of automation and large-scale uptake of multimedia applications that provide video lectures. Academic video lectures over NDN have: improved efficiency, better scalability with respect to information/bandwidth demand and better robustness in challenging communication scenarios. A framework of academic video lectures over NDN must take into account various key issues such as naming (name resolution), optimized routing, resource control, congestion control, security and privacy. The size of the network in which academic video lectures are distributed, the content location dynamics and the popularity of the stored video lectures will determine which routing scheme must be selected. If semantic information is included into academic video lectures, the network dynamically may assist video (streaming) lecture service by permitting the network to locate the proper version of the requested video lecture that can be better delivered to e-learners and/or select the appropriate network paths. Practical implications The paper helps researchers already working on video lectures in finding a direction for designing and deploying platforms that will provide content-centric academic video lectures. Originality/value The paper pioneers the investigation of academic video lecture distribution in ICN and presents an in-depth view to its potentials and research trends.


2020 ◽  
Vol 245 ◽  
pp. 04018
Author(s):  
Cǎtǎlin Iordache ◽  
Ran Liu ◽  
Justas Balcas ◽  
Raimondas Šrivinskas ◽  
Yuanhao Wu ◽  
...  

We present the design and implementation of a Named Data Networking (NDN) based Open Storage System plug-in for XRootD. This is an important step towards integrating NDN, a leading future internet architecture, with the existing data management systems in CMS. This work outlines the first results of data transfer tests using internal as well as external 100 Gbps testbeds, and compares the NDN-based implementation with existing solutions.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Hakima Khelifi ◽  
Senlin Luo ◽  
Boubakr Nour ◽  
Sayed Chhattan Shah

A tremendous amount of content and information are exchanging in a vehicular environment between vehicles, roadside units, and the Internet. This information aims to improve the driving experience and human safety. Due to the VANET’s properties and application characteristics, the security becomes an essential aspect and a more challenging task. On the contrary, named data networking has been proposed as a future Internet architecture that may improve the network performance, enhance content access and dissemination, and decrease the communication delay. NDN uses a clean design based on content names and Interest-Data exchange model. In this paper, we focus on the vehicular named data networking environment, targeting the security attacks and privacy issues. We present a state of the art of existing VANET attacks and how NDN can deal with them. We classified these attacks based on the NDN perspective. Furthermore, we define various challenges and issues faced by NDN-based VANET and highlight future research directions that should be addressed by the research community.


2019 ◽  
Vol 2019 ◽  
pp. 1-12
Author(s):  
Inayat Ali ◽  
Huhnkuk Lim

Information-centric networking (ICN) is one of the promising solutions that cater to the challenges of IP-based networking. ICN shifts the IP-based access model to a data-centric model. Named Data Networking (NDN) is a flexible ICN architecture, which is based on content distribution considering data as the core entity rather than IP-based hosts. User-generated mobile contents for real-time multimedia communication such as Internet telephony are very common these days and are increasing both in quality and quantity. In NDN, producer mobility is one of the challenging problems to support uninterrupted real-time multimedia communication and needs to be resolved for the adoption of NDN as future Internet architecture. We assert that mobile node’s future location prediction can aid in designing efficient anchor-less mobility management techniques. In this article, we show how location prediction techniques can be used to provide an anchor-less mobility management solution in order to ensure seamless handover of the producer during real-time multimedia communication. The results indicate that with a low level of location prediction accuracy, our proposed methodology still profoundly reduces the total handover latency and round trip time without creating network overhead.


Sign in / Sign up

Export Citation Format

Share Document