Self-Verifying Names for Read-Only Named Data

Information-centric networking designs such as Content-Oriented Networking (CCN) and Data-Oriented Networking Architecture (DONA) remove a limitation of the Internet model: the target of a data request is named data instead of a named host. URLs name most web data today based on the host name that serves the data. Information-centric networks must ensure the authenticity and integrity of named data. ICN designs such as Content-Centric Networking apply a digital signature to a collection of packets for this purpose. This paper shifts the mode of ICN authentication: self-verifying names ensure data authenticity for read-only named data; signatures or other means ensure name authenticity. The paper considers how self-verifying names might be used in CCN.

Provided by: Cisco Systems Topic: Security Date Added: Apr 2012 Format: PDF

Find By Topic