Publications from conferences, workshops, and journals are listed below. Please also see the NDN Technical Reports and Technical Presentations.
2023
Yu, Tianyuan; Ma, Xinyu; Xie, Hongcheng; Jia, Xiaohua; Zhang, Lixia
On the Security Bootstrapping in Named Data Networking Miscellaneous
2023.
Abstract | Links | BibTeX | Tags: Bootstrapping, Security
@misc{yu_security_2023,
title = {On the Security Bootstrapping in Named Data Networking},
author = {Tianyuan Yu and Xinyu Ma and Hongcheng Xie and Xiaohua Jia and Lixia Zhang},
url = {https://arxiv.org/abs/2308.06490v1},
year = {2023},
date = {2023-08-01},
urldate = {2023-08-01},
journal = {arXiv.org},
abstract = {By requiring all data packets been cryptographically authenticatable, the Named Data Networking (NDN) architecture design provides a basic building block for secured networking. This basic NDN function requires that all entities in an NDN network go through a security bootstrapping process to obtain the initial security credentials. Recent years have witnessed a number of proposed solutions for NDN security bootstrapping protocols. Built upon the existing results, in this paper we take the next step to develop a systematic model of security bootstrapping: Trust-domain Entity Bootstrapping (TEB). This model is based on the emerging concept of trust domain and describes the steps and their dependencies in the bootstrapping process. We evaluate the expressiveness and sufficiency of this model by using it to describe several current bootstrapping protocols.},
keywords = {Bootstrapping, Security},
pubstate = {published},
tppubtype = {misc}
}
By requiring all data packets been cryptographically authenticatable, the Named Data Networking (NDN) architecture design provides a basic building block for secured networking. This basic NDN function requires that all entities in an NDN network go through a security bootstrapping process to obtain the initial security credentials. Recent years have witnessed a number of proposed solutions for NDN security bootstrapping protocols. Built upon the existing results, in this paper we take the next step to develop a systematic model of security bootstrapping: Trust-domain Entity Bootstrapping (TEB). This model is based on the emerging concept of trust domain and describes the steps and their dependencies in the bootstrapping process. We evaluate the expressiveness and sufficiency of this model by using it to describe several current bootstrapping protocols.