Modeling and verifying NDN access control using CSP

  • Yuan Fei
  • , Huibiao Zhu*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

Named Data Networking (NDN) is a new promising architecture of information-centric networking. NDN could not reuse the existing access control solutions designed for the IP architecture due to their fundamental difference of design, as well as NDNs caching property. As a result, several access control solutions have been proposed for NDN. One of them is specially for both closed and open environment. In this paper, we make the very first attempt to model and verify several important properties of NDN access control. We adopt CSP (Communicating Sequential Processes) to model the NDN access control proposed by Hamdane et al., as well as their security properties. By feeding the models into the model checker PAT (Process Analysis Toolkit), we have verified that the NDN access control cannot prevent the NK key pair faking and the data leakage with the appearance of intruders. We introduce a new method to solve these issues. Considering the situation when the entities are invaded, we also improve our method to make the NDN access control strong enough to maintain the property of key authenticity and data security in this vulnerable situation. We hope that our study would help enhancing the adaptability and robustness of the NDN access control.

Original languageEnglish
Title of host publicationFormal Methods and Software Engineering - 20th International Conference on Formal Engineering Methods, ICFEM 2018, Proceedings
EditorsJing Sun, Meng Sun
PublisherSpringer Verlag
Pages143-159
Number of pages17
ISBN (Print)9783030024499
DOIs
StatePublished - 2018
Event20th International Conference on Formal Engineering Methods, ICFEM 2018 - Gold Coast, Australia
Duration: 12 Nov 201816 Nov 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11232 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th International Conference on Formal Engineering Methods, ICFEM 2018
Country/TerritoryAustralia
CityGold Coast
Period12/11/1816/11/18

Keywords

  • Access control
  • Modeling
  • Named Data Networking (NDN)
  • Verification

Fingerprint

Dive into the research topics of 'Modeling and verifying NDN access control using CSP'. Together they form a unique fingerprint.

Cite this