TY - JOUR
T1 - Content Protection in Named Data Networking
T2 - Challenges and Potential Solutions
AU - Yu, Yong
AU - Li, Yannan
AU - Du, Xiaojiang
AU - Chen, Ruonan
AU - Yang, Bo
N1 - Publisher Copyright:
© 1979-2012 IEEE.
PY - 2018/11
Y1 - 2018/11
N2 - ICNs are promising alternatives to current Internet architecture since the Internet struggles with a number of issues such as scalability, mobility, and security. ICN offers a number of potential benefits including reduced congestion and enhanced delivery performance by employing content caching, simpler network configurations, and stronger security for the content. NDN, an instance of ICN, enables content delivery instead of host-centric approaches by naming data rather than host. In order to make NDN practical in the real world, the challenging issues of content security need to be addressed. In this article, we examine the architecture and content security as well as possible solutions to these issues of NDN, with a special focus on the content integrity and provenance. We propose a variety of digital signature schemes to achieve the data integrity and origin authentication in NDN for various applications, which include cost-effective signatures, privacy preserving signatures, network coding signatures, and post-quantum signatures. We also present speed-up techniques in generating signatures and verifying signatures such as pre-computation, batch verification, and server-Aided verification to reduce the computational cost of the producers and receivers in NDN. A number of certificate-free trust management approaches and possible adoptions in NDN are investigated.
AB - ICNs are promising alternatives to current Internet architecture since the Internet struggles with a number of issues such as scalability, mobility, and security. ICN offers a number of potential benefits including reduced congestion and enhanced delivery performance by employing content caching, simpler network configurations, and stronger security for the content. NDN, an instance of ICN, enables content delivery instead of host-centric approaches by naming data rather than host. In order to make NDN practical in the real world, the challenging issues of content security need to be addressed. In this article, we examine the architecture and content security as well as possible solutions to these issues of NDN, with a special focus on the content integrity and provenance. We propose a variety of digital signature schemes to achieve the data integrity and origin authentication in NDN for various applications, which include cost-effective signatures, privacy preserving signatures, network coding signatures, and post-quantum signatures. We also present speed-up techniques in generating signatures and verifying signatures such as pre-computation, batch verification, and server-Aided verification to reduce the computational cost of the producers and receivers in NDN. A number of certificate-free trust management approaches and possible adoptions in NDN are investigated.
UR - http://www.scopus.com/inward/record.url?scp=85057064398&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85057064398&partnerID=8YFLogxK
U2 - 10.1109/MCOM.2018.1701086
DO - 10.1109/MCOM.2018.1701086
M3 - Article
AN - SCOPUS:85057064398
SN - 0163-6804
VL - 56
SP - 82
EP - 87
JO - IEEE Communications Magazine
JF - IEEE Communications Magazine
IS - 11
M1 - 8539026
ER -