DocumentCode
3745303
Title
Data authentication for NDN using hash chains
Author
Tamer Refaei;Mark Horvath;Michelle Schumaker;Creighton Hager
Author_Institution
The MITRE Corporation, McLean, VA 22102
fYear
2015
fDate
7/1/2015 12:00:00 AM
Firstpage
982
Lastpage
987
Abstract
Named Data Networking (NDN) is considered to be a viable replacement of the traditional IP networking for the next generation Internet architecture. NDN is a data centric, rather than host centric, approach to discovery and retrieval of information distributed across a network. This paradigm shift results in a host of new challenges, one of which is authentication of data and data-sources. NDN requires each content producer to digitally sign each data packet it produces. While the use of digital signatures certainly accomplishes data and data source authentication, it imposes significant overhead on the whole network. In this paper, we propose a novel data and source authentication mechanism that relies primarily on hashing. The mechanism utilizes hash chaining to ensure that unauthorized modification, insertion, or deletion of data can be easily detected by routers and content consumers.
Keywords
"Authentication","Digital signatures","Computer architecture","Public key","Seals","IP networks"
Publisher
ieee
Conference_Titel
Computers and Communication (ISCC), 2015 IEEE Symposium on
Type
conf
DOI
10.1109/ISCC.2015.7405641
Filename
7405641
Link To Document