Advertisement

A Security Calculus for Wireless Networks of Named Data Networking

  • Yuan FeiEmail author
  • Huibiao ZhuEmail author
  • Haiying Sun
  • Jiaqi Yin
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11852)

Abstract

Named Data Networking (NDN) is an architecture of Information-Centric Networking (ICN). The application of NDN on wireless networks is an important area. In this paper, we propose a Security Calculus for Wireless Networks of Named Data Networking (SCWN). Security feature is implemented by using different channel symbols to describe wireless network node. The feature of NDN is introduced by using particular sets to express the environment. We introduce the syntax and the operational semantics of SCWN calculus. By a rewriting logic-based language Maude, we support the automatic implementation of our SCWN calculus, which enhances its practicability. Finally, we apply SCWN calculus to LFBL protocol with its automatic implementation. It indicates that SCWN calculus is useful to describe realistic cases.

Keywords

NDN Calculus of wireless networks Maude 

Notes

Acknowledgement

This work was partly supported by National Natural Science Foundation of China (Grant No. 61872145), National Key Research and Development Program of China (Grant No. 2018YFB2101300), Shanghai Collaborative Innovation Center of Trustworthy Software for Internet of Things (Grant No. ZF1213) and the Fundamental Research Funds for the Central Universities of China.

References

  1. 1.
    Apt, K.R., de Boer, F.S., Olderog, E.: Verification of Sequential and Concurrent Programs. Texts in Computer Science. Springer, London (2009).  https://doi.org/10.1007/978-1-84882-745-5CrossRefzbMATHGoogle Scholar
  2. 2.
    Bazzi, A., Masini, B.M., Zanella, A., Castro, C.D., Raffaelli, C., Andrisano, O.: Cellular aided vehicular named data networking. In: ICCVE 2014, pp. 747–752 (2014)Google Scholar
  3. 3.
    Clavel, M., et al.: All About Maude - A High-Performance Logical Framework: How to Specify, Program and Verify Systems in Rewriting Logic. LNCS, vol. 4350. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-71999-1CrossRefzbMATHGoogle Scholar
  4. 4.
    Godskesen, J.C.: A calculus for mobile ad hoc networks. In: Murphy, A.L., Vitek, J. (eds.) COORDINATION 2007. LNCS, vol. 4467, pp. 132–150. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-72794-1_8CrossRefGoogle Scholar
  5. 5.
    He, J., Hoare, C.A.R.: Unifying theories of programming. In: RelMiCS 1998, pp. 97–99 (1998)Google Scholar
  6. 6.
    Hoare, C.A.R.: An axiomatic basis for computer programming. Commun. ACM 12(10), 576–580 (1969)CrossRefGoogle Scholar
  7. 7.
    Li, Z., Liu, K., Liu, D., Shi, H., Chen, Y.: Hybrid wireless networks with fib-based named data networking. EURASIP J. Wirel. Commun. Netw. 2017, 54 (2017)CrossRefGoogle Scholar
  8. 8.
    Meisel, M., Pappas, V., Zhang, L.: Ad hoc networking via named data. In: Proceedings of the Fifth ACM International Workshop on Mobility in the Evolving Internet Architecture, pp. 3–8 (2010)Google Scholar
  9. 9.
    Meisel, M., Pappas, V., Zhang, L.: Listen first, broadcast later: topology-agnostic forwarding under high dynamics. Technical report, Los Angeles, CA, USA (2010)Google Scholar
  10. 10.
    Merro, M.: An observational theory for mobile ad hoc networks (full version). Inf. Comput. 207(2), 194–208 (2009)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Nanz, S., Hankin, C.: Formal security analysis for ad-hoc networks. Electr. Notes Theor. Comput. Sci. 142, 195–213 (2006)CrossRefGoogle Scholar
  12. 12.
    Prasad, K.V.S.: A calculus of broadcasting systems. Sci. Comput. Program. 25(2–3), 285–327 (1995)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Zhang, L., et al.: Named data networking (NDN) project. Technical report NDN-0001, PARC (2010)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.College of Information, Mechanical and Electrical EngineeringShanghai Normal UniversityShanghaiChina
  2. 2.Shanghai Key Laboratory of Trustworthy ComputingEast China Normal UniversityShanghaiChina

Personalised recommendations