首页> 外文期刊>IEEE/ACM Transactions on Networking >In Content We Trust: Network-Layer Trust in Content-Centric Networking
【24h】

In Content We Trust: Network-Layer Trust in Content-Centric Networking

机译:在我们信任的内容中:以内容为中心的网络中的网络层信任

获取原文
获取原文并翻译 | 示例

摘要

Content-Centric Networking (CCN), an instance of information-centric networking, is a candidate next-generation Internet architecture that emphasizes on content distribution by making it directly addressable and routable. By opportunistically caching content within the network, CCN appears to be well-suited for a large-scale content distribution and for meeting the needs of increasingly mobile and bandwidth-hungry applications that dominate today's Internet. To provide content authentication, CCN dictates that each content object must be digitally signed by its respective producer. All entities (consumers and routers) must, in principle, verify the content signature before processing it. However, in practice, this poses two challenges for routers: (1) overhead due to signature verification, key retrieval, and potential certificate chain traversal; and (2) lack of trust context, i.e., determining which public keys are trusted to verify the content signature. This renders signature verification impractical in routers, opening the door for the so-called content poisoning attacks. We study the root causes of the content poisoning attacks and reach the conclusion that meaningful mitigation of content poisoning is contingent upon a network-layer trust management architecture. We propose two approaches: deterministic and probabilistic, that allow routers to detect fake (aka "poisoned") content objects. The usages of each approach depend on the location and role of routers in the network, as well as their computational capabilities.
机译:以内容为中心的网络(CCN),以信息为中心的网络的一个实例,是候选的下一代Internet体系结构,它通过使内容直接可寻址和可路由来强调内容分发。通过在网络中机会性地缓存内容,CCN似乎非常适合大规模内容分发以及满足在当今Internet中占主导地位的日益增长的移动和渴望带宽的应用程序的需求。为了提供内容认证,CCN规定每个内容对象必须由其各自的生产者进行数字签名。原则上,所有实体(消费者和路由器)都必须在处理内容签名之前对其进行验证。但是,在实践中,这给路由器带来了两个挑战:(1)签名验证,密钥检索和潜在的证书链遍历带来的开销; (2)缺乏信任上下文,即确定哪些公钥被信任以验证内容签名。这使得签名验证在路由器中不切实际,从而为所谓的内容中毒攻击打开了大门。我们研究了内容中毒攻击的根本原因,并得出结论,内容中毒的有效缓解取决于网络层信任管理体系结构。我们提出了两种方法:确定性方法和概率性方法,它们使路由器能够检测伪造(也称为“中毒”)的内容对象。每种方法的用法取决于路由器在网络中的位置和角色以及它们的计算能力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号