Security

Self-Verifying Names for Read-Only Named Data

Free registration required

Executive Summary

Information-centric networking designs such as Content-Oriented Networking (CCN) and Data-Oriented Networking Architecture (DONA) remove a limitation of the Internet model: the target of a data request is named data instead of a named host. URLs name most web data today based on the host name that serves the data. Information-centric networks must ensure the authenticity and integrity of named data. ICN designs such as Content-Centric Networking apply a digital signature to a collection of packets for this purpose. This paper shifts the mode of ICN authentication: self-verifying names ensure data authenticity for read-only named data; signatures or other means ensure name authenticity. The paper considers how self-verifying names might be used in CCN.

  • Format: PDF
  • Size: 465.85 KB