Secure naming in information-centric networks

Walter Wong*, Pekka Nikander

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

30 Citations (Scopus)

Abstract

In this paper, we present a secure naming system to locate resources in information-centric networks. The main goal is to allow secure content retrieval from multiple unknown or untrusted sources. The proposal uses a new, flexible naming scheme that is backwards compatible with the current URL naming scheme and allows for independent content identification regardless of the routing, forwarding, and storage mechanisms by separating the source and location identification rules in the URI/URL authority fields. Some benefits of the new naming system include the opportunity to securely retrieve content from any source in the network, content mobility, content validation with the original source, and full backwards compatibility with the current naming system.

Original languageEnglish
Title of host publicationProceedings of the Re-Architecting the Internet (ReArch) Workshop, Held in Conjunction with CoNEXT 2010
DOIs
Publication statusPublished - 1 Dec 2010
MoE publication typeA4 Conference publication
EventWorkshop on Re-Architecting the Internet - Philadelphia, United States
Duration: 30 Nov 201030 Nov 2010

Workshop

WorkshopWorkshop on Re-Architecting the Internet
Abbreviated titleReArch
Country/TerritoryUnited States
CityPhiladelphia
Period30/11/201030/11/2010

Keywords

  • Information networking
  • Naming system

Fingerprint

Dive into the research topics of 'Secure naming in information-centric networks'. Together they form a unique fingerprint.

Cite this