Abstract

Information centric networking (ICN) has been in the spotlight of recent research. It is an emerging communication paradigm that relays on the concept of publish and subscribe. It aims to revise the current Internet with a new clean slate architecture where the design is completely different from today’s location based model. To secure the forwarding plan in this network, it is vital to have a time based transient forwarding identifiers by periodically changing the network link identifiers. This assumes shared keys to be distributed prior the communications between an entity termed topology manager (TM) and each forwarder in the network. Exchanging and sharing a secret key between two parties is one of most critical functions in cryptography that needs to be more concerned when integrating cryptographic functions into the system. As ICN is brand new Internet architecture, many existing cryptography protocols may need to be redesigned to fit this new architecture. Therefore, this paper focuses on the security aspect of ICN and proposes an initial design to deploy the integrated Diffie-Hellman-DSA key exchange protocol as a key distributions mechanism.

Highlights

  • Information-centric networking (ICN) is an emerging communication paradigm that is receiving an increasing attention by the research community

  • Current statistics reported by the United States Government Accountability Office shows that there were on total 100,000 security incidents reported in the year 2011[2]

  • Each link identifier (LID) is an m-bit Bloom filter, with k bits set to 1(i.e. k is the number of hash functions applied to set bit position to 1)

Read more

Summary

INTRODUCTION

Information-centric networking (ICN) is an emerging communication paradigm that is receiving an increasing attention by the research community. The routing system adopted in PSIRP/PURSUIT ICN is the line speed publish/subscribe internetworking (LISPIN) [9], a multicast forwarding fabric based on Bloom-filter As this mechanism has some security issues discussed later, the zFormation mechanism [10] has been proposed to secure the forwarding plane of ICN by offering a DoS resistant forwarding service. In this paper we extend our previous work proposed in [11] by redesigning the integrated Diffie-Hellman-DSA key exchange protocol to fit securely on the ICN architecture. This enables each newly bootstrapped forwarding node to create and share a key with TM to be used be for the subsequent master key.

Bloom-filter Based Forwarding Mechanism
False Positives in Bloom-filter Based Forwarding
Security Vulnerabilities in Bloom-filter Based Forwarding
Security Enhancements to The Forwarding Plane
SECURITY PROPOSALS
Key Based Hash Function Approach
Local-link Based Approach
Deffie-Hellman Key Exchange
DEPLOYING DH-DSA UNDER ICN
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.