Visible to the public Securing Named Data Networks: Challenges and the Way Forward

TitleSecuring Named Data Networks: Challenges and the Way Forward
Publication TypeConference Paper
Year of Publication2018
AuthorsBertino, Elisa, Nabeel, Mohamed
Conference NameProceedings of the 23Nd ACM on Symposium on Access Control Models and Technologies
Date PublishedJune 2018
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5666-4
KeywordsAccess Control, clean slate, Collaboration, confidentiality, edge computing, Human Behavior, human factors, integrity, Metrics, named data networks, policy, Policy Based Governance, policy governance, privacy, pubcrawl, resilience, Resiliency, security
Abstract

Despite decades of research on the Internet security, we constantly hear about mega data breaches and malware infections affecting hundreds of millions of hosts. The key reason is that the current threat model of the Internet relies on two assumptions that no longer hold true: (1) Web servers, hosting the content, are secure, (2) each Internet connection starts from the original content provider and terminates at the content consumer. Internet security is today merely patched on top of the TCP/IP protocol stack. In order to achieve comprehensive security for the Internet, we believe that a clean-slate approach must be adopted where a content based security model is employed. Named Data Networking (NDN) is a step in this direction which is envisioned to be the next generation Internet architecture based on a content centric communication model. NDN is currently being designed with security as a key requirement, and thus to support content integrity, authenticity, confidentiality and privacy. However, in order to meet such a requirement, one needs to overcome several challenges, especially in either large operational environments or resource constrained networks. In this paper, we explore the security challenges in achieving comprehensive content security in NDN and propose a research agenda to address some of the challenges.

URLhttps://dl.acm.org/doi/10.1145/3205977.3205996
DOI10.1145/3205977.3205996
Citation Keybertino_securing_2018