Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > publications : papers : 2015 : schematizing_trust_ndn
Schematizing Trust in Named Data Networking
Y. Yu, A. Afanasyev, D. Clark, k. claffy, V. Jacobson, and L. Zhang, "Schematizing Trust in Named Data Networking", in ACM Conference on Information-Centric Networking (ICN), Sep 2015, pp. 177--186.
|   View full paper:    PDF    DOI    |  Citation:    BibTeX    Resource Catalog   |

Schematizing Trust in Named Data Networking

Yingdi Yu3
Alexander Afanasyev3
David Clark2
kc claffy1
Van Jacobson3
Lixia Zhang3
1

CAIDA, San Diego Supercomputer Center, University of California San Diego

2

Massachusetts Institute of Technology's Computer Science & Artificial Intelligence Laboratory (MIT/CSAIL)

3

University of California, Los Angeles (UCLA)

Securing communication in network applications involves many complex tasks that can be daunting even for security experts. The Named Data Networking (NDN) architecture builds data authentication into the network layer by requiring all applications to sign and authenticate every data packet. To make this authentication usable, the decision about which keys can sign which data and the procedure of signature verification need to be automated. This paper explores the ability of NDN to enable such automation through the use of trust schemas. Trust schemas can provide data consumers an automatic way to discover which keys to use to authenticate individual data packets, and provide data producers an automatic decision process about which keys to use to sign data packets and, if keys are missing, how to create keys while ensuring that they are used only within a narrowly defined scope ("the least privilege principle"). We have developed a set of trust schemas for several prototype NDN applications with different trust models of varying complexity. Our experience suggests that this approach has the potential of being generally applicable to a wide range of NDN applications.

Keywords: policy, security
  Last Modified: Wed Dec-15-2021 16:33:44 UTC
  Page URL: https://www.caida.org/publications/papers/2015/schematizing_trust_ndn/index.xml