Abstract
Content-Centric Networking (CCN), is built on the notion of content-based security. With the integration of Network Coding (NC) into CCN to contribute to the best performance, security, one of the key features of CCN has been left behind. Though the permission for encoding/recoding content packets at producers and intermediate routers provides performance benefits, it also introduces additional security issues and disables existing security practices. In this paper, we fill the gap by analyzing new security challenges brought accordingly and proposing an Autonomous Systems (AS-s) based security mechanism for NC applications in CCN. It can not only guarantee the optimal performance of NC, but also offer the assurance for Integrity, Origin Authentication and Correctness of content packets, together with proving trustworthiness among border routers. More importantly, we also shed light on the performance issues and implementation problems of the mechanism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: ACM CoNEXT 2009, December 2009
Ghali, C., Tsudik, G., Uzun, E.: Network-layer trust in named-data networking. ACM Sigcomm Comput. Commun. Rev. 44(5), 12–19 (2014)
Montpetit, M.-J., Westphal, C., Trossen, D.: Networking, network coding meets information-centric: an architectural case for information dispersion through native network coding. In: 1st ACM NoM Workshop, June 2012
Sundararajan, J., Shah, D., Medard, M., Jakubczak, S., Mitzenmacher, M., Barros, J.: Network coding meets TCP: theory and implementation. Proc. IEEE 99(3), 490–512 (2011)
Saltarin, J., Bourtsoulatze, E., Thomos, N., Braun, T.: Netcodccn: a network coding approach for content-centric networks, arXiv preprint (2015). arXiv:1512.00259
Ramakrishnan, A., Westphal, C., Saltarin, J.: Adaptive video streaming over CCN with network coding for seamless mobility. In: 2016 IEEE International Symposium on Multimedia (ISM), San Jose, CA, pp. 238–242 (2016). doi:10.1109/ISM
Koetter, R., Mdard, M.: An algebraic approach to network coding. IEEE/ACM Trans. Networking 11(5), 782–795 (2003)
Pedersen, M., Heide, J., Vingelmann, P., Fitzek, F.: Network coding over the \(2^{32}-5\) prime field. In: IEEE ICC 2013, June 2013
Zhang, M., Li, H., Chen, F., Hou, H., An, H., Wang, W., Huang, J.: A general co/decoder of network coding in HDL. In: 2011 International Symposium on Network Coding, July 2011
Thomos, N., Frossard, P.: Toward one symbol network coding vectors. IEEE Commun. Lett. 16(11), 1860–1863 (2012)
Lucani, D.E., Pedersen, M.V., Heide, J., Fitzek, F.H.P., Codes, F.N.: A Code for Fluid Allocation of Complexity (2014). http://arxiv.org/abs/1404.6620
Wu, Q., Li, Z., Xie, G.: Codingcache: multipath-aware ccn cache with network coding. In: Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking, pp. 41–42. ACM (2013)
Miyake, S., Asaeda, H.: Network coding and its application to content centric networking, Witmse (2013)
Wang, J., Ren, J., Lu, K., Wang, J., Liu, S., Westphal, C.: An optimal cache management framework for information-centric networks with network coding. In: IFIP/IEEE Networking Conference, June 2014
Wang, J., Ren, J., Lu, K., Wang, J., Liu, S., Westphal, C.: A minimum cost cache management framework for information-centric networks with network coding. Comput. Netw. 110, 1–17 (2016)
Wu, Q., Li, Z., Tyson, G., Uhlig, S., Kaafar, M.A., Xie, G.: Privacyaware multipath video caching for content-centric networks. IEEE J. Sel. Areas Commun. 34, 2219–2230 (2016)
Fayazbakhsh, S.K., Lin, Y., Tootoonchian, A., Ghodsi, A., Koponen, T., Maggs, B., Ng, K., Sekar, V., Shenker, S.: Less pain, most of the gain: incrementally deployable ICN. In: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, pp. 147–158. ACM (2013)
Ghodsi, A., Koponen, T., Rajahalme, J., Sarolahti, P., Shenker, S.: Naming in content-oriented architectures. In: Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, pp. 1–6. ACM (2011)
Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., Wilcox, J.: Information-centric networking: seeing the forest for the trees. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, p. 1. ACM (2011)
Koponen, T., Chawla, M., Chun, B.-G., Ermolinskiy, A., Kim, K.H., Shenker, S., Stoica, I.: A data-oriented (and beyond) network architecture. ACM SIGCOMM Comput. Commun. Rev. 37(4), 181–192 (2007)
Gasti, P., Tsudik, G., Uzun, E., Zhang, L.: DoS DDoS in named-data networking. In: Proceedings of the International Conference on Computer Communications and Networks (ICCCN) (2013)
Afanasyev, A., Mahadevan, P., Moiseenko, I., Uzun, E., Zhang, L.: Interest flooding attack and countermeasures in named data networking. In: Proceedings of the IFIP Networking Conference (2013)
Compagno, A., Conti, M., Gasti, P., Tsudik, G.: Poseidon: mitigating interest flooding DDoS attacks in named data networking. In: Proceedings of the 38th IEEE Conference on Local Computer Networks (LCN) (2013)
Ghali, C., Tsudik, G., Uzun, E.: Needle in a haystack: mitigating content poisoning in named-data networking. In: The Workshop on Security of Emerging NETWORKING Technologies (2014)
Smetters, D., Jacobson, V.: Securing network content. Technical report, PARC (2009)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 164–173 (1996)
Cho, J.-H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials 13(4), 562–583 (2011)
Conner, W., Iyengar, A., Mikalsen, T., Rouvellou, I., Nahrstedt, K.: A trust management framework for service-oriented environments. In: Proceedings of the 18th International Conference on World Wide Web (WWW), pp. 891–900 (2009)
Li, W., Joshi, A., Finin, T.: Coping with node misbehaviors in ad hoc networks: a multi-dimensional trust management approach. In: Proceedings of the 11th International Conference on Mobile Data Management (MDM), pp. 85–94 (2010)
Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: best practices. Comput. Commun. 33(9), 1086–1093 (2010)
Omar, M., Challal, Y., Bouabdallah, A.: Certification-based trust models in mobile ad hoc networks: a survey and taxonomy. J. Netw. Comput. Appl. 35(1), 268–286 (2012)
Zahariadis, T., Leligou, H.C., Trakadas, P., Voliotis, S.: Trust management in wireless sensor networks. Eur. Trans. Telecommun. 21(4), 386–395 (2010)
Mahadevan, P., Uzun, E., Sevilla, S., et al.: CCN-KRS: a key resolution service for CCN. In: Proceedings of the 1st International Conference on Information-Centric Networking. ACM (2014)
Chaabane, A., Cristofaro, E.D., Kaafar, M.A., et al.: Privacy in content-oriented networking: threats and countermeasures. ACM Sigcomm Comput. Commun. Rev. 43(3), 25–33 (2013)
Jacobson, V., Smetters, D.K., et al.: VoCCN: voice over content-centric networks. In: ACM ReArch 2009, December 2009
Acknowledgments
This work was supported in part by National Keystone R&D Program of China (No. 2016YFB0800101), the Natural Science Foundation of China (NSFC) (No. 61671001, No.61521003), together with the Guangdong Research Programs 2016B030305005 and Shenzhen Research Programs (ZDSYS201603311739428, JCYJ20150331100723974 & 20140509093817684).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Xu, L., Li, H., Hu, J., Wang, Y., Zhang, H. (2017). An Autonomous System Based Security Mechanism for Network Coding Applications in Content-Centric Networking. In: Bouzefrane, S., Banerjee, S., Sailhan, F., Boumerdassi, S., Renault, E. (eds) Mobile, Secure, and Programmable Networking. MSPN 2017. Lecture Notes in Computer Science(), vol 10566. Springer, Cham. https://doi.org/10.1007/978-3-319-67807-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-67807-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67806-1
Online ISBN: 978-3-319-67807-8
eBook Packages: Computer ScienceComputer Science (R0)