Abstract

Information-Centric Networking (ICN) has arisen as an architectural solution that responds to the needs of today’s overloaded Internet, departing from the traditional host-centric access paradigm. In this paper we focus on Named Data Networking (NDN), the most prominent ICN architecture. In the NDN framework, disseminated content is at the core of the design and providing trusted content is essential. In this paper, we provide an overview of reputation-based trust approaches, present their design trade-offs and argue that these approaches can consolidate NDN trust and security by working complementary to the existing credential-based schemes. Finally, we discuss future research directions and challenges.

Highlights

  • Trust is a concept that is tricky to define

  • We provide an overview of reputation-based schemes designed for the Named Data Networking (NDN) architecture and argue that reputation-based trust should be considered as a viable, complementary solution for achieving trust in NDN, or other related architectures (NDN-based such as UMOBILE (A Universal, Mobile-Centric, and Opportunistic Communications Architecture) [5], or similar ones such as CCNx [6])

  • By using the aforementioned mechanisms, NDN applications can validate received data packets independent from where they are fetched, while utilizing name semantics to reason about which cryptographic keys to use for which content, instead of relying on the “yes-or-no” model provided by third-party certificates [14]

Read more

Summary

Introduction

Trust is a concept that is tricky to define. One of its definitions is “the extent to which one party is willing to participate in a given action with a given partner, considering the risks and incentives involved” [1]. Named Data Networking (NDN) [2], the most prominent ICN architecture, currently utilizes trust mechanisms that are based on cryptographic signatures and certificates This approach is called credential-based [3] or policy-based [4] trust. It be considered as a “strong and crisp” approach, where decisions are founded on logical rules and verifiable properties encoded in digital credentials There exists another major approach to trust management, a “soft and social approach”, based on reputation measures gathered and shared by a distributed community.

Reputation-Based Trust
NDN Trust and Security
Motivation
Reputation-Based Systems
Design Options
Future Directions in NDN
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call