TY - JOUR
T1 - An Overview of Security Support in Named Data Networking
AU - Zhang, Zhiyi
AU - Yu, Yingdi
AU - Zhang, Haitao
AU - Newberry, Eric
AU - Mastorakis, Spyridon
AU - Li, Yanbiao
AU - Afanasyev, Alexander
AU - Zhang, Lixia
N1 - Funding Information:
AcknowLedgment This work was partially supported by the National Science Foundation under awards CNS-1345142, CNS-1345318, CNS-1629009, and CNS-1629922.
Funding Information:
This work was partially supported by the National Science Foundation under awards CNS-1345142, CNS-1345318, CNS-1629009, and CNS-1629922.
Publisher Copyright:
© 1979-2012 IEEE.
PY - 2018/11
Y1 - 2018/11
N2 - This article presents an overview of the security mechanisms in the NDN architecture that have been developed over the past several years. NDN changes the network communication model from the delivery of packets to hosts identified by IP addresses to the retrieval of named and secured data packets. Consequently, NDN also fundamentally changes the approaches to network security. Making named data the centerpiece of the architecture leads to a new security framework that secures data directly, and uses name semantics to enable applications to reason about security and to automate the use of cryptographic keys. In this article, we introduce NDN's approaches to security bootstrapping, data authenticity, confidentiality, and availability.
AB - This article presents an overview of the security mechanisms in the NDN architecture that have been developed over the past several years. NDN changes the network communication model from the delivery of packets to hosts identified by IP addresses to the retrieval of named and secured data packets. Consequently, NDN also fundamentally changes the approaches to network security. Making named data the centerpiece of the architecture leads to a new security framework that secures data directly, and uses name semantics to enable applications to reason about security and to automate the use of cryptographic keys. In this article, we introduce NDN's approaches to security bootstrapping, data authenticity, confidentiality, and availability.
UR - http://www.scopus.com/inward/record.url?scp=85057067850&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85057067850&partnerID=8YFLogxK
U2 - 10.1109/MCOM.2018.1701147
DO - 10.1109/MCOM.2018.1701147
M3 - Review article
AN - SCOPUS:85057067850
VL - 56
SP - 62
EP - 68
JO - IEEE Communications Society Magazine
JF - IEEE Communications Society Magazine
SN - 0163-6804
IS - 11
M1 - 8539023
ER -