期刊文献+

信息中心网络架构NetInf安全性改进研究

Research on improvement of information-centric networking architecture for NetInf security
下载PDF
导出
摘要 信息中心网络(information-centric networking,ICN)已经成为下一代网络架构研究的新热点。针对NetInf(network of information)架构下,由于无效的数据注册,NRS在发布阶段容易受伪装和内容投毒攻击,提出在发布和检索之前增加一个注册阶段,并集成认证和授权方案;该阶段在主机访问Net Inf系统之前,对其进行身份认证并采用基于能力的访问策略来解决未经授权的访问问题。通过形式化方法验证,该方法提高了Net Inf框架的安全性。 Information-eentric networking(ICN) has been a novel hotspot in the field of future Internet architecture. Aiming at NRS is vulnerable to masquerading and content poisoning attacks in the NetInf, because of invalid data registration, this paper proposed a registration stage, which integrated authentication and authorization scheme and took place before the publication and retrieval. The stage authenticated hosts before they accessed the NetInf system. In addition, the registration stage used the capability-based access policies to solve the problem of unauthorized access. It formally verified the proposed schemes by using formal methods. The results show the schemes improves the security of the NetInf framework.
出处 《计算机应用研究》 CSCD 北大核心 2015年第11期3416-3420,3429,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(61272500)
关键词 信息网络 信息中心网络 形式化方法 身份认证 授权 network of information information-centric networking formal methods authentication authorization
  • 相关文献

参考文献17

  • 1吴超,张尧学,周悦芝,等.信息中心网络发展研究综述[J].计算机学报,2014,37(13):1-18.
  • 2Sipat T, A1-Qudah Z, Michael R. Content delivery networks: protec- tion or threat? [ C ]//Proc of ESORICS, Lecture Notes in Computer Science. Berlin: Springer, 2009:371-589.
  • 3Edwall T. The network of information: architecture and applications [R]. Stockholm: SAIL, 2013.
  • 4Kutscher D, Farrell S, Davies E. The NetInf protocol [ EB/OL ]. [ 2014-05- 12 ]. http ://tools. ietf. org/html/draft-kutscher-icnrg-net- inf-proto-01, txt.
  • 5Teemu K, Mohit C, Byung-Gon C, et al. A data-oriented (and be- yond) network architecture [ C ~//Proc of Conference on Applications, Technologies, Architectures, and Protocols for Computer Communica- tions. 2007: 181-192.
  • 6Zhang Xinggong, Niu Tong, Lao Feng, et al. Topology-aware con- tent-centric networking [ C ]//Proc of ACM SIGCOMM. New York : ACM Press,2013:559-560.
  • 7Baker H, Stradling R, Farrell S, et al. The named information(NI) RR1 scheme optional features [ EB/OL]. [ 2014- 05- 12 ]. http:// tools, ietf. org/html/draft-hallambaker-decade-ni-params-03, txt.
  • 8文坤,杨家海,张宾.低速率拒绝服务攻击研究与进展综述[J].软件学报,2014,25(3):591-605. 被引量:27
  • 9Shamir A. Identity-based cryptosystems and signature schemes[ C ]// Proc of CRYPTO on Advances in Cryptology. Berlin : Springer-Verlag, 1985:47-53.
  • 10Gollmann D. Computer security[ M]. 3rd ed. [ S. 1. ] : Wiley, 2011.

二级参考文献20

  • 1国务院办公厅.国务院关于推进物联网有序健康发展的指导意见[EB/OL].(2013-02-17).http://www.gov.cn/zwgk/2013-02/17/content一2333141.htm2013.
  • 2Lowe G. Breaking and fixing the needham-schroeder public- key pprotocol using FDR [ M ] //Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidel- berg, 1996:147 - 166.
  • 3Armstrong P, Goldsmith M, Lowe G, et al. Recent develop-ments in FDR [ C ] //Computer Aided Verification. Springer Berlin Heidelberg, 2012 : 699 - 704.
  • 4Lowe G, Roscoe B. Using CSP to detect errors in the TMN protocol [ J ]. Software Engineering, IEEE Transactions on, 1997, 23 (10) : 659-669.
  • 5Palikareva H, Ouaknine J, Roscoe A W. SAT-solving in CSP trace refinement [ J ]. Science of Computer Program-ming, 2012, 77 (10): 1178-1197.
  • 6Shaikh S A, Bush V J, Schneider S A. Specifying authentica- tion using signal events in CSP[ C ]//Information Security and Cryptology. Springer Berlin Heidelberg,2005 : 63 - 74.
  • 7WC,802. 11 - Wireless LAN Working Group. 802. 11 w - 2009 - IEEE Standard [ S].
  • 8何炎祥,刘陶,曹强,熊琦,韩奕.低速率拒绝服务攻击研究综述[J].计算机科学与探索,2008,2(1):1-19. 被引量:20
  • 9魏蔚,董亚波,鲁东明,金光.低速率TCP拒绝服务攻击的检测响应机制[J].浙江大学学报(工学版),2008,42(5):757-762. 被引量:5
  • 10宋金晶,沈军.基于CSP的网络协议描述与仿真[J].东南大学学报(自然科学版),2008,38(A01):28-33. 被引量:3

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部