A Security Calculus for Wireless Networks of Named Data Networking

  • Yuan Fei*
  • , Huibiao Zhu
  • , Haiying Sun
  • , Jiaqi Yin
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Named Data Networking (NDN) is an architecture of Information-Centric Networking (ICN). The application of NDN on wireless networks is an important area. In this paper, we propose a Security Calculus for Wireless Networks of Named Data Networking (SCWN). Security feature is implemented by using different channel symbols to describe wireless network node. The feature of NDN is introduced by using particular sets to express the environment. We introduce the syntax and the operational semantics of SCWN calculus. By a rewriting logic-based language Maude, we support the automatic implementation of our SCWN calculus, which enhances its practicability. Finally, we apply SCWN calculus to LFBL protocol with its automatic implementation. It indicates that SCWN calculus is useful to describe realistic cases.

Original languageEnglish
Title of host publicationFormal Methods and Software Engineering - 21st International Conference on Formal Engineering Methods, ICFEM 2019, Proceedings
EditorsYamine Ait-Ameur, Shengchao Qin
PublisherSpringer
Pages170-185
Number of pages16
ISBN (Print)9783030324087
DOIs
StatePublished - 2019
Event21st International Conference on Formal Engineering Methods, ICFEM 2019 - Shenzhen, China
Duration: 5 Nov 20199 Nov 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11852 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference21st International Conference on Formal Engineering Methods, ICFEM 2019
Country/TerritoryChina
CityShenzhen
Period5/11/199/11/19

Keywords

  • Calculus of wireless networks
  • Maude
  • NDN

Fingerprint

Dive into the research topics of 'A Security Calculus for Wireless Networks of Named Data Networking'. Together they form a unique fingerprint.

Cite this