Paper Icon

    Schematizing Trust in Named Data Networking

    paper:2015_schematizing_trust_ndn

    Links to Access
    caida.org/catalog/papers/2015_...ndn/schematizing_trust_ndn.pdfPDFpublic
    Securing communication in network applications involves many complex tasks that can be daunting even for security experts. The Named Data Networking (NDN) architecture builds data authentication into the network layer by requiring all applications to sign and authenticate every data packet. To make this authentication usable, the decision about which keys can sign which data and the procedure of signature verification need to be automated. This paper explores the ability of NDN to enable such automation through the use of trust schemas. Trust schemas can provide data consumers an automatic way to discover which keys to use to authenticate individual data packets, and provide data producers an automatic decision process about which keys to use to sign data packets and, if keys are missing, how to create keys while ensuring that they are used only within a narrowly defined scope ("the least privilege principle"). We have developed a set of trust schemas for several prototype NDN applications with different trust models of varying complexity. Our experience suggests that this approach has the potential of being generally applicable to a wide range of NDN applications.

    Date Published

    2015-09

    Authors

    Yingdi Yu1

    Alexander Afanasyev1

    David Clark2

    kc claffy3

    Van Jacobson1

    Lixia Zhang1

    Publisher

    ACM Conference on Information-Centric Networking (ICN)

    Organization Affiliated With

    1 University of California, Los Angeles (UCLA)

    2 Massachusetts Institute of Technology's Computer Science & Artificial Intelligence Laboratory (MIT/CSAIL)

    3 CAIDA, San Diego Supercomputer Center, University of California San Diego

    Related Objects Quick Glance