Secure identity-to-identity communications over Content-Centric Networking

In this paper we propose a novel network architecture to allow secure identity-based communications, which is completely location independent, supports the mobility of communication parties, prevents traceability, and is designed to work over multiple underlying network infrastructures. Apart from describing the operation of our architecture and protocol, we discuss its security capabilities and other important aspects. Furthermore, we show how to instantiate the architecture in top of Content-Centric Networking (CCN) infrastructure, explaining how to build a test application based on the architecture and, finally, discuss the results obtained from the tests.

[1]  Filip De Turck,et al.  Comparative Study of Peer-to-Peer Architectures for Scalable Resource Discovery , 2009, 2009 First International Conference on Advances in P2P Systems.

[2]  Randy H. Katz,et al.  Identity-based routing , 2007 .

[3]  Antonio F. Gómez-Skarmeta,et al.  Building and Managing Policy-Based Secure Overlay Networks , 2008, 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2008).

[4]  Drummond Reed,et al.  OpenID identity discovery with XRI and XRDS , 2008, IDtrust '08.

[5]  Mohamed Ould-Khaoua,et al.  Improving Probabilistic Route Discovery in Mobile Ad Hoc Networks , 2007 .

[6]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[7]  大島 正嗣,et al.  Simple Object Access Protocol と,その応用としてのソフトウェアの組み合わせについて (渡邉昭夫教授退任記念号) , 2001 .

[8]  Gennaro Cordasco,et al.  Relaxed-2-Chord: Efficiency, flexibility and provable stretch , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[9]  Pekka Nikander,et al.  Host Identity Protocol (HIP) Architecture , 2006, RFC.

[10]  Ramesh Govindan,et al.  Incrementally improving lookup latency in distributed hash table systems , 2003, SIGMETRICS '03.

[11]  Charlie Kaufman,et al.  Internet Key Exchange (IKEv2) Protocol , 2005, RFC.

[12]  Amardeo Sarma,et al.  Identities in the Future Internet of Things , 2009, Wirel. Pers. Commun..

[13]  Luigi Iannone,et al.  LISP-DHT: towards a DHT to map identifiers onto locators , 2008, CoNEXT '08.

[14]  Nikos Fotiou,et al.  Illustrating a publish-subscribe Internet architecture , 2012, Telecommun. Syst..

[15]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[16]  Raj Jian,et al.  Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[17]  Raj Jain,et al.  MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[18]  Tony Li,et al.  Design Goals for Scalable Internet Routing , 2011, RFC.

[19]  Hermann de Meer,et al.  Self-organising Management Overlays for Future Internet Services , 2008, MACE.

[20]  Antonio F. Gómez-Skarmeta,et al.  Cyclone: a novel design schema for hierarchical DHTs , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).

[21]  Antonio F. Gómez-Skarmeta,et al.  A Comparative Study of Hierarchical DHT Systems , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).

[22]  Xiaohu Xu,et al.  Enhanced MILSA Architecture for Naming, Addressing, Routing and Security Issues in the Next Generation Internet , 2009, 2009 IEEE International Conference on Communications.

[23]  Drummond Reed,et al.  OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.

[24]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.