Advertisement

Research on Access Control of Smart Home in NDN (Short Paper)

  • Rina Wu
  • Bo CuiEmail author
  • Ru Li
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 268)

Abstract

Named Data Networking (NDN) is one of the future Internet architectures and can support smart home very well. There is a large amount of private data with lower security level in smart home. Access control is an effective security solution. However, the existing NDN’s access control mechanisms that can be applied to smart homes don’t reasonably use the cache in NDN and take into account users’ authorization cancellation phase. Therefore, we designed an access control mechanism for smart homes in NDN. We mainly consider the process of the user requests permission, user requests data and user permission cancellation. By using the Cipher Block Chaining (CBC) symmetric encryption algorithm, identity-based encryption, and proxy re-encryption, the cache in NDN is effectively utilized, and the counting Bloom Filter is used to filter ineffective Interest packets and complete the user’s privilege cancellation phase. Experimental results show that the access control mechanism designed in this paper can effectively reduce the total time which starts from user requests the permission to decrypt data and reduce the time overhead of the NDN routers in the process of user privileges cancellation after using the counting Bloom Filter.

Keywords

Named Data Networking Access control Smart home Encryption 

Notes

Acknowledgment

This paper is supported by the National Natural Science Foundation of China (Grant No. 61751104) and Natural Science Foundation of Inner Mongolia (Grant No. 2018MS06028) and Research Project of Higher Education School of Inner Mongolia Autonomous Region under Grant NJZY16020.

References

  1. 1.
    Shang, W., Yu, Y., Droms, R., et al.: Challenges in IoT networking via TCP/IP architecture. Technical report NDN-0038. NDN Project (2016)Google Scholar
  2. 2.
    Datta, S.K., Bonnet, C.: Integrating named data networking in Internet of Things architecture. In: IEEE International Conference on Consumer Electronics-Taiwan, pp. 1–2. IEEE (2016)Google Scholar
  3. 3.
    Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32(9), 40–48 (1994)CrossRefGoogle Scholar
  4. 4.
    Zhang, L., Estrin, D., Burke, J., et al.: Named data networking (NDN) project. Technical report NDN-0001, 157–158 (2010)Google Scholar
  5. 5.
    Zhang, Z., Yu, Y., Afanasyev, A., et al.: NAC: name-based access control in named data networking. In: 4th ACM Conference on Information-Centric Networking on Proceedings, pp. 186–187. ACM (2017)Google Scholar
  6. 6.
    Chaabane, A., De Cristofaro, E., Kaafar, M.A., et al.: Privacy in content-oriented networking: threats and countermeasures. ACM SIGCOMM Comput. Commun. Rev. 43(3), 25–33 (2013)CrossRefGoogle Scholar
  7. 7.
    Chen, T., Lei, K., Xu, K.: An encryption and probability based access control model for named data networking. In: Performance Computing and Communications Conference, pp. 1–8. IEEE (2014)Google Scholar
  8. 8.
    Hamdane, B., Serhrouchni, A., El Fatmi, S.G.: Access control enforcement in named data networking. In: 8th International Conference for Internet Technology and Secured Transactions, pp. 576–581. IEEE (2013)Google Scholar
  9. 9.
    Qiao, Z., Liang, S., Davis, S., Jiang, H.: Survey of attribute based encryption. In: International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 1–6. IEEE (2014)Google Scholar
  10. 10.
    Wood, C.A., Uzun, E.: Flexible end-to-end content security in CCN. In: 11th Consumer Communications and Networking Conference, pp. 858–865. IEEE (2014)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing, College of Computer ScienceInner Mongolia UniversityHohhotChina

Personalised recommendations