Affiliation:
1. Beijing Institute of Technology, Beijing, China
2. Innopolis University, Innopolis, Russia
3. University of Nebraska Omaha, Omaha, NE, USA
4. Université de Paris, Evry, France
Abstract
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories:
Encryption-based AC
and
Encryption-independent AC
. Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference144 articles.
1. 2008. 4WARD. Retrieved from http://www.4ward-project.eu/. 2008. 4WARD. Retrieved from http://www.4ward-project.eu/.
2. 2010. FP7 SAIL Project. Retrieved from http://www.sail-project.eu/. 2010. FP7 SAIL Project. Retrieved from http://www.sail-project.eu/.
3. 2019. Type-Length-Value (TLV) Encoding. Retrieved from https://named-data.net/doc/NDN-packet-spec/current/tlv.html. 2019. Type-Length-Value (TLV) Encoding. Retrieved from https://named-data.net/doc/NDN-packet-spec/current/tlv.html.
4. A Survey of Security Attacks in Information-Centric Networking
5. Survey on caching approaches in Information Centric Networking
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献