Abstract
Information centric networking (ICN) has been in the spotlight of recent research. It is an emerging communication paradigm that relays on the concept of publish and subscribe. It aims to revise the current Internet with a new clean slate architecture where the design is completely different from today’s location based model. To secure the forwarding plan in this network, it is vital to have a time based transient forwarding identifiers by periodically changing the network link identifiers. This assumes shared keys to be distributed prior the communications between an entity termed topology manager (TM) and each forwarder in the network. Exchanging and sharing a secret key between two parties is one of most critical functions in cryptography that needs to be more concerned when integrating cryptographic functions into the system. As ICN is brand new Internet architecture, many existing cryptography protocols may need to be redesigned to fit this new architecture. Therefore, this paper focuses on the security aspect of ICN and proposes an initial design to deploy the integrated Diffie-Hellman-DSA key exchange protocol as a key distributions mechanism.
Highlights
Information-centric networking (ICN) is an emerging communication paradigm that is receiving an increasing attention by the research community
Current statistics reported by the United States Government Accountability Office shows that there were on total 100,000 security incidents reported in the year 2011[2]
Each link identifier (LID) is an m-bit Bloom filter, with k bits set to 1(i.e. k is the number of hash functions applied to set bit position to 1)
Summary
Information-centric networking (ICN) is an emerging communication paradigm that is receiving an increasing attention by the research community. The routing system adopted in PSIRP/PURSUIT ICN is the line speed publish/subscribe internetworking (LISPIN) [9], a multicast forwarding fabric based on Bloom-filter As this mechanism has some security issues discussed later, the zFormation mechanism [10] has been proposed to secure the forwarding plane of ICN by offering a DoS resistant forwarding service. In this paper we extend our previous work proposed in [11] by redesigning the integrated Diffie-Hellman-DSA key exchange protocol to fit securely on the ICN architecture. This enables each newly bootstrapped forwarding node to create and share a key with TM to be used be for the subsequent master key.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International journal of Computer Networks & Communications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.