Securing Named Data Networking: Attribute-Based Encryption and Beyond

As one of the promising information-centric networking (ICN) architectures, NDN has attracted tremendous research attention and effort in the past decade. In particular, security and privacy remain significant concerns and challenges due to the fact that most of the traditional cryptographic primitives are no longer suitable for NDN architecture. For example, the traditional cryptographic primitives aim to secure point-to-point communications, always requiring explicit descriptions of to where or whom the data packets are intended, while network addressing or locating in NDN becomes implicit. To deal with such issues, the recently developed cryptographic primitives such as ABE have been applied to NDN. Also, to efficiently solve the trust-roots problem and seamlessly deploy cryptographic infrastructures, the concept of SDN has been introduced to NDN as well. This tutorial is devoted to exploring the interesting integration between NDN, ABE, and SDN.

[1]  Fernando M. V. Ramos,et al.  Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.

[2]  Xinxin Niu,et al.  Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing , 2017, IEEE Access.

[3]  V. Piskovski,et al.  Five SDN-oriented directions in Information Security , 2014, 2014 First International Science and Technology Conference (Modern Networking Technologies) (MoNeTeC).

[4]  Jianqing Zhang,et al.  Toward content-centric privacy in ICN: attribute-based encryption and routing , 2013, SIGCOMM 2013.

[5]  Jennifer Rexford,et al.  Future Internet architecture , 2010, Commun. ACM.

[6]  Zhenfu Cao New Directions of Modern Cryptography , 2012 .

[7]  Gene Tsudik,et al.  DoS & DDoS in Named Data Networking , 2013 .

[8]  Nick McKeown,et al.  OpenFlow: enabling innovation in campus networks , 2008, CCRV.

[9]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[10]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[11]  Satyajayant Misra,et al.  Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[12]  Hossam S. Hassanein,et al.  A Survey of Security Attacks in Information-Centric Networking , 2015, IEEE Communications Surveys & Tutorials.