A Formally Verified Access Control Mechanism for Information Centric Networks
Mahdi Aiash, Jonathan Loo
2015
Abstract
Communications in Information-Centric Networking place more attention on WHAT data are being exchanged rather than WHO are exchanging them. A well-established approach of information centric networks is the Network of Information (NetInf) architecture, developed as part of the EU FP7 project SAIL. The security of NetInf has been fairly analysed in the literature. In particular, research efforts have been focusing on achieving data integrity and confidentially, source or publisher authenticity and authorization. This paper analyses some work in the literature to enforce authorized access to data in NetInf, highlights a potential security threat and proposes an enhancement to address the discovered threat. The new enhancement has been formally verified using formal method approach based on the Casper/FDR tool.
References
- (1993). Failures-divergence refinement: fdr2 user manual and tu- torial.
- Aiash, M. (2014). A formal analysis of authentication protocols for mobile devices in next generation networks. Concurrency and Computation: Practice and Experience.
- B. Ahlgren, C. Dannewitz, C. I. D. K. B. O. (2012). A survey of information-centric networking. IEEE Communication Magazine.
- B. Donovan, P. Norris, G. L. (1999). Analyzing a library of security protocols using casper and fdr,. In In Workshop on Formal Methods and Security Protocols.
- Chen, H. C. (2014). A multi-issued tag key agreement with time constraint for homeland defense sub-department in nfc environment,. Journal of Network and Computer Applications, pages 88-98.
- D. Kutscher, S. Farrell, E. D. (2013). The netinf protocol,. Technical report, Internet Draft.
- Edwall, T. (2013). The network of information: Architecture and applications. Technical report, SAIL Project.
- G. Lowe, P. Broadfoot, C. D. M. H. (2009). Casper: A compiler for the analysis of security protocols. Technical report, Oxford.
- Gollmann, D. (2011). Computer Security. Wiley,, London, 2rd edition.
- H. Baker, R. Stradling, S. F. D. K. B. O. (2012). The named information (ni) uri scheme: Optional features. Technical report, Network Working Group.
- J. Loo, M. A. (2014). Challenges and solutions for secure information centric networks: A case study of the netinf architecture. Journal of Network and Computer Applications, 50:6472.
- K. Pentikousis, B. Ohlman, E. D. S. S. G. B. P. M. (2013). Information-centric networking: Evaluation methodology,. Technical report, Internet Draft.
- M. Aiash, J. L. (2014). An integrated authentication and authorization approach for the network of information architecture. Journal of Network and Computer Applications, 50:7379.
- Shamir, A. (1985). Identity-based cryptosystems and signature schemes,. In CRYPTO 84 on Advances in cryptology,. Springer-Verlag.
Paper Citation
in Harvard Style
Aiash M. and Loo J. (2015). A Formally Verified Access Control Mechanism for Information Centric Networks . In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 377-383. DOI: 10.5220/0005566303770383
in Bibtex Style
@conference{secrypt15,
author={Mahdi Aiash and Jonathan Loo},
title={A Formally Verified Access Control Mechanism for Information Centric Networks},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={377-383},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005566303770383},
isbn={978-989-758-117-5},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - A Formally Verified Access Control Mechanism for Information Centric Networks
SN - 978-989-758-117-5
AU - Aiash M.
AU - Loo J.
PY - 2015
SP - 377
EP - 383
DO - 10.5220/0005566303770383