Schematizing trust in named data networking Conference

Yu, Y, Afanasyev, A, Clark, D et al. (2015). Schematizing trust in named data networking . 177-186. 10.1145/2810156.2810170

cited authors

  • Yu, Y; Afanasyev, A; Clark, D; Claffy, K; Jacobson, V; Zhang, L

abstract

  • Securing communication in network applications involves many complex tasks that can be daunting even for security experts. The Named Data Networking (NDN) architecture builds data authentication into the network layer by requiring all applications to sign and authenticate every data packet. To make this authentication usable, the decision about which keys can sign which data and the procedure of signature verification need to be automated. This paper explores the ability of NDN to enable such automation through the use of trust schemas. Trust schemas can provide data consumers an automatic way to discover which keys to use to authenticate individual data packets, and provide data producers an automatic decision process about which keys to use to sign data packets and, if keys are missing, how to create keys while ensuring that they are used only within a narrowly defined scope ("the least privilege principle"). We have developed a set of trust schemas for several prototype NDN applications with different trust models of varying complexity. Our experience suggests that this approach has the potential of being generally applicable to a wide range of NDN applications.

publication date

  • September 30, 2015

Digital Object Identifier (DOI)

International Standard Book Number (ISBN) 13

start page

  • 177

end page

  • 186