Research on Access Control of Smart Home in NDN (Short Paper)
Named Data Networking (NDN) is one of the future Internet architectures and can support smart home very well. There is a large amount of private data with lower security level in smart home. Access control is an effective security solution. However, the existing NDN’s access control mechanisms that can be applied to smart homes don’t reasonably use the cache in NDN and take into account users’ authorization cancellation phase. Therefore, we designed an access control mechanism for smart homes in NDN. We mainly consider the process of the user requests permission, user requests data and user permission cancellation. By using the Cipher Block Chaining (CBC) symmetric encryption algorithm, identity-based encryption, and proxy re-encryption, the cache in NDN is effectively utilized, and the counting Bloom Filter is used to filter ineffective Interest packets and complete the user’s privilege cancellation phase. Experimental results show that the access control mechanism designed in this paper can effectively reduce the total time which starts from user requests the permission to decrypt data and reduce the time overhead of the NDN routers in the process of user privileges cancellation after using the counting Bloom Filter.
KeywordsNamed Data Networking Access control Smart home Encryption
This paper is supported by the National Natural Science Foundation of China (Grant No. 61751104) and Natural Science Foundation of Inner Mongolia (Grant No. 2018MS06028) and Research Project of Higher Education School of Inner Mongolia Autonomous Region under Grant NJZY16020.
- 1.Shang, W., Yu, Y., Droms, R., et al.: Challenges in IoT networking via TCP/IP architecture. Technical report NDN-0038. NDN Project (2016)Google Scholar
- 2.Datta, S.K., Bonnet, C.: Integrating named data networking in Internet of Things architecture. In: IEEE International Conference on Consumer Electronics-Taiwan, pp. 1–2. IEEE (2016)Google Scholar
- 4.Zhang, L., Estrin, D., Burke, J., et al.: Named data networking (NDN) project. Technical report NDN-0001, 157–158 (2010)Google Scholar
- 5.Zhang, Z., Yu, Y., Afanasyev, A., et al.: NAC: name-based access control in named data networking. In: 4th ACM Conference on Information-Centric Networking on Proceedings, pp. 186–187. ACM (2017)Google Scholar
- 7.Chen, T., Lei, K., Xu, K.: An encryption and probability based access control model for named data networking. In: Performance Computing and Communications Conference, pp. 1–8. IEEE (2014)Google Scholar
- 8.Hamdane, B., Serhrouchni, A., El Fatmi, S.G.: Access control enforcement in named data networking. In: 8th International Conference for Internet Technology and Secured Transactions, pp. 576–581. IEEE (2013)Google Scholar
- 9.Qiao, Z., Liang, S., Davis, S., Jiang, H.: Survey of attribute based encryption. In: International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 1–6. IEEE (2014)Google Scholar
- 10.Wood, C.A., Uzun, E.: Flexible end-to-end content security in CCN. In: 11th Consumer Communications and Networking Conference, pp. 858–865. IEEE (2014)Google Scholar