Enhancing Security and Trust in Named Data Networking using Hierarchical Identity Based Cryptography | IGI Global Scientific Publishing
Enhancing Security and Trust in Named Data Networking using Hierarchical Identity Based Cryptography

Enhancing Security and Trust in Named Data Networking using Hierarchical Identity Based Cryptography

Balkis Hamdane (Sup'Com, ENIT, Tunis, Tunisia), Rihab Boussada (ENSI, Manouba, Tunisia), Mohamed Elhoucine Elhdhili (ENSI, Manouba, Tunisia), and Sihem Guemara El Fatmi (Sup'Com, Aryanah, Tunisia)
Copyright: © 2018 |Volume: 8 |Issue: 1 |Pages: 20
ISSN: 1947-3052|EISSN: 1947-3060|EISBN13: 9781522545026|DOI: 10.4018/IJSSOE.2018010101
Cite Article Cite Article

MLA

Hamdane, Balkis, et al. "Enhancing Security and Trust in Named Data Networking using Hierarchical Identity Based Cryptography." IJSSOE vol.8, no.1 2018: pp.1-20. https://doi.org/10.4018/IJSSOE.2018010101

APA

Hamdane, B., Boussada, R., Elhdhili, M. E., & El Fatmi, S. G. (2018). Enhancing Security and Trust in Named Data Networking using Hierarchical Identity Based Cryptography. International Journal of Systems and Service-Oriented Engineering (IJSSOE), 8(1), 1-20. https://doi.org/10.4018/IJSSOE.2018010101

Chicago

Hamdane, Balkis, et al. "Enhancing Security and Trust in Named Data Networking using Hierarchical Identity Based Cryptography," International Journal of Systems and Service-Oriented Engineering (IJSSOE) 8, no.1: 1-20. https://doi.org/10.4018/IJSSOE.2018010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Named data networking (NDN) represents a promising clean slate for future internet architecture. It adopts the information-centric networking (ICN) approach that treats named data as the central element, leverages in-network caching, and uses a data-centric security model. This model is built mainly in the addition of a signature to each of the recovered data. However, the signature verification requires the appropriate public key. To trust this key, multiple models were proposed. In this article, the authors analyze security and trust in NDN, to deduct the limits of the already proposed solutions. They propose a security extension that strengthens security and builds trust in used keys. The main idea of this extension is the derivation of these keys from data name, by using hierarchical identity-based cryptography (HIBC). To confirm the safety of the new proposal, a formal security analysis is provided. To evaluate its efficiency, a performance evaluation is performed. It proves that by adopting the proposed extension, performance is comparable, even better in some cases than plain NDN.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global Scientific Publishing bookstore.