Information-Centric Networking (ICN) is a novel network architecture designed to replace the current IP-based architecture. In ICN, contents are identified based on unique names and can be cached in-network in order to immediately serve subsequent requests. These characteristics are particularly important in the context of the Internet of Things (IoT), where they allow to heavily reduce loads on the things, as well as increase content availability and decrease energy consumption. In this paper we address the open problem of providing access control for IoT deployments in ICN. Our protocol takes advantage of the reliance of IoT on Infrastructure-as-a-Service and provides confidentiality, traitor tracing and revocation of an unbound number of users. At the same time, our protocol preserves both network caching and location-independent content retrieval. To the best of our knowledge, our protocol is the first access control protocol for ICN providing all these advantages. We provide an extensive analysis of the security properties of our protocol, as well as a thorough experimental evaluation. Our evaluation shows that our protocol does not pose significant over-head with respect to published content size nor computational time required. Considering a popular IoT camera, our evaluation shows that our protocol introduces 0.27% size overhead and 150ms of computational overhead for a 7 seconds stream.

IaaS-Aided Access Control for Information-Centric IoT / Carofiglio, G.; Compagno, A.; Conti, M.; De Gaspari, F.; Muscariello, L.. - 2018-October:(2018), pp. 208-216. (Intervento presentato al convegno 43rd IEEE Conference on Local Computer Networks, LCN 2018 tenutosi a Chicago; United States) [10.1109/LCN.2018.8638228].

IaaS-Aided Access Control for Information-Centric IoT

De Gaspari F.;
2018

Abstract

Information-Centric Networking (ICN) is a novel network architecture designed to replace the current IP-based architecture. In ICN, contents are identified based on unique names and can be cached in-network in order to immediately serve subsequent requests. These characteristics are particularly important in the context of the Internet of Things (IoT), where they allow to heavily reduce loads on the things, as well as increase content availability and decrease energy consumption. In this paper we address the open problem of providing access control for IoT deployments in ICN. Our protocol takes advantage of the reliance of IoT on Infrastructure-as-a-Service and provides confidentiality, traitor tracing and revocation of an unbound number of users. At the same time, our protocol preserves both network caching and location-independent content retrieval. To the best of our knowledge, our protocol is the first access control protocol for ICN providing all these advantages. We provide an extensive analysis of the security properties of our protocol, as well as a thorough experimental evaluation. Our evaluation shows that our protocol does not pose significant over-head with respect to published content size nor computational time required. Considering a popular IoT camera, our evaluation shows that our protocol introduces 0.27% size overhead and 150ms of computational overhead for a 7 seconds stream.
2018
43rd IEEE Conference on Local Computer Networks, LCN 2018
future internet architectures; ICN; IoT; access control
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
IaaS-Aided Access Control for Information-Centric IoT / Carofiglio, G.; Compagno, A.; Conti, M.; De Gaspari, F.; Muscariello, L.. - 2018-October:(2018), pp. 208-216. (Intervento presentato al convegno 43rd IEEE Conference on Local Computer Networks, LCN 2018 tenutosi a Chicago; United States) [10.1109/LCN.2018.8638228].
File allegati a questo prodotto
File Dimensione Formato  
Carofiglio_IaaS-Aided_2018.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 622.9 kB
Formato Adobe PDF
622.9 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1290822
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 1
social impact