Proceedings of the Re-Architecting the Internet Workshop 2010
DOI: 10.1145/1921233.1921248
|View full text |Cite
|
Sign up to set email alerts
|

Secure naming in information-centric networks

Abstract: In this paper, we present a secure naming system to locate resources in information-centric networks. The main goal is to allow secure content retrieval from multiple unknown or untrusted sources. The proposal uses a new, flexible naming scheme that is backwards compatible with the current URL naming scheme and allows for independent content identification regardless of the routing, forwarding, and storage mechanisms by separating the source and location identification rules in the URI/URL authority fields. So… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(24 citation statements)
references
References 14 publications
0
24
0
Order By: Relevance
“…At the same time however, apart from the frequent communication of the updated service class values to the content provider, the transient character of service class values would possibly also necessitate the frequent reconfiguration of caches so as to enable the identification of premium content. A potential approach to address these issues relies on the use of algorithmic identifiers [8], [2]. Instead of ISPs communicating each new ephemeral value of the service class identifier, they can communicate an algorithm through which content providers may produce subsequent ephemeral values themselves.…”
Section: B Handling Service Class Informationmentioning
confidence: 99%
See 2 more Smart Citations
“…At the same time however, apart from the frequent communication of the updated service class values to the content provider, the transient character of service class values would possibly also necessitate the frequent reconfiguration of caches so as to enable the identification of premium content. A potential approach to address these issues relies on the use of algorithmic identifiers [8], [2]. Instead of ISPs communicating each new ephemeral value of the service class identifier, they can communicate an algorithm through which content providers may produce subsequent ephemeral values themselves.…”
Section: B Handling Service Class Informationmentioning
confidence: 99%
“…Generally speaking, content in the ICN area is defined in terms of chunks, which need to be routable and self-certifying [1], [2]. The content name or identifier is then used to route contents, store them and look them up in innetwork caches (i.e., not only in overlay, hierarchical caches or CDNs) and validate their origin.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A content can also be spoofed by injecting fake responses that are not signed or are signed with a wrong key, hoping that the user accepts the response in source. An old content (which may be unsecured) signed with the right key can be also replaced with the original one, or an attacker may get high access to the source's signing key to sign content with the correct key [39].…”
Section: Dos Attacks In Ccnmentioning
confidence: 99%
“…The NetInf design in [1] is more focused on the session layer in ICN: object search and name-resolution while the transport layer is currently studied in the SAIL project. Recent works, evaluating aspects of ICN architectures, explore content router issues [3], secure naming [14], [8] as well as congestion control [2]. Finally, an experimental evaluation of chunk-level caching in CCN is presented in [6].…”
Section: Introductionmentioning
confidence: 99%