Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.6.1375

An Efficient Data Authentication Scheme for Content Centric Networking  

Seo, Seog Chung (The Affiliated Institute of ETRI)
Abstract
This paper presents an efficient hash chain-based data authentication mechanism which can considerably reduce the overhead of processing and transmission for authenticating segments in CCN. The proposed method makes use of hash chain and MHT(Merkle Hash Tree). At first, it applies hash chain methods for data segments and encodes them to Data part. Then, it constitutes Meta part with the hash values generated at the previous step and properly applies both hash chain method and MHT-based signing for not only achieving efficiency, but also mitigating the drawback(data-loss, out-of-order transmission) of hash chain method. We have implemented our method in the CCNx library and measured the performance. When transmitting 100Mbyte of content, the proposed method generates only 2.596% of processing overhead and 1.803% of transmission overhead.
Keywords
Content Centric Networking; Hash chain; Merkle Hash Tree; Data authentication;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 R. Merkle, "A Certified Digital Signature," Proceedings on Advances in cryptology(CRYPTO'89), LNCS 435, pp. 218-238, 1989.
2 J. Deng, R. Han, and S. Mishra, "Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks," Proceedings of the 5th international conference on Information processing in sensor networks(IPSN'06), pp. 292-300, Apr. 2006.
3 Sangwon Hyun, Peng Ning and An Liu, "Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks," Proceedings of the Seventh International Conference on Information Processing in Sensor Networks (IPSN'08), pp. 445-456, May. 2008.
4 Digital Signature with Appendix -Part2: Integer Factorization Based Mechanisms, "ISO/IEC 14888-2:2008," 2008.
5 DaeYoub Kim, Jaesung Park, "Efficient Contents Verification Scheme for Contents-Centric-Networking", The Journal of Korea Information and Communications Society, Vol. 39B, No.04, pp. 234-241, Apr. 2014.   DOI
6 DaeYoub Kim, "A Efficient Contents Verification Scheme for Distributed Networking/Data Store", Journal of the Korea Institute of Information Security & Cryptology, Vol. 25, No. 4, pp. 839-847, Aug. 2015.   DOI
7 Luigi Rizzo, "Effective Erasure Codes for Reliable Computer Communication Protocols", ACM SIGCOMM Computer Communication Review, Vol. 27, No. 2, pp. 24-36, Apr. 1997.   DOI
8 CCNx Project, "http://github.com/ProjectCCNx/ccnx"
9 A. Vakali, and G. Pallis, "Content Delivery Networks: Status and Trends," IEEE Internet Computing, Vol.7, No. 6, pp. 68-74, Nov. 2003.   DOI
10 V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Briggs, and R. Braynard, "Networking Named Content," Proceedings of the 5th international conference on Emerging networking experiments and technologies(CoNEXT'09), pp. 1-12, Dec. 2009.
11 T. Koponen, M. Chawla, B. Chun, A. Ermolinskiy, K. Kim, S. Shenker, and I. Stoica, "A Data-oriented (and beyond) Network Architecture," Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications(SIGCOMM'07), pp. 181-192, Aug. 2007.
12 NetInf project, "http://www.netinf.org"
13 PSIRP project, "http://www.psirp.org"
14 The Content Centric Networking(CCNx) Project, "http://www.ccnx.org"
15 R. Merkle, "A Digital Signature Based on a Conventional Encryption Function," Proceedings on Advances in cryptology(CRYPTO'87), LNCS 293, pp. 369-378, Aug. 1987.