DocumentCode
22253
Title
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking
Author
Qi Li ; Xinwen Zhang ; Qingji Zheng ; Sandhu, Ravi ; Xiaoming Fu
Author_Institution
Grad. Sch. at Shenzhen, Tsinghua Univ., Shenzhen, China
Volume
10
Issue
2
fYear
2015
fDate
Feb. 2015
Firstpage
308
Lastpage
320
Abstract
Named data networking (NDN) is a new paradigm for the future Internet wherein interest and data packets carry content names rather than the current IP paradigm of source and destination addresses. Security is built into NDN by embedding a public key signature in each data packet to enable verification of authenticity and integrity of the content. However, existing heavyweight signature generation and verification algorithms prevent universal integrity verification among NDN nodes, which may result in content pollution and denial of service attacks. Furthermore, caching and location-independent content access disables the capability of a content provider to control content access, e.g., who can cache a content and which end user or device can access it. We propose a lightweight integrity verification (LIVE) architecture, an extension to the NDN protocol, to address these two issues seamlessly. LIVE enables universal content signature verification in NDN with lightweight signature generation and verification algorithms. Furthermore, it allows a content provider to control content access in NDN nodes by selectively distributing integrity verification tokens to authorized nodes. We evaluate the effectiveness of LIVE with open source CCNx project. Our paper shows that LIVE only incurs average 10% delay in accessing contents. Compared with traditional public key signature schemes, the verification delay is reduced by over 20 times in LIVE.
Keywords
Internet; authorisation; computer network security; content management; digital signatures; protocols; public domain software; public key cryptography; IP paradigm; Internet; LIVE architecture; NDN nodes; content access control; content pollution; content provider; data packets; denial of service attacks; heavy-weight signature generation algorithms; heavy-weight signature verification algorithms; lightweight integrity verification architecture; location-independent content access; named data networking; open source CCNx project; public key signature schemes; universal content signature verification; universal integrity verification; Access control; Delays; Electronic mail; Encryption; Peer-to-peer computing; Public key; Next generation networking; access control; data security;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2014.2365742
Filename
6942259
Link To Document