[Ndn-interest] [External] Re: [EXT] NDN Applied to Industrial Control Systems

Chin, Jon jonchin at csu.fullerton.edu
Thu Apr 8 09:37:39 PDT 2021


Thank you very much for your feedback. Looks like I'll have to re-consider my project and take a different approach. I am very new to this field, so I'll try tackle something more manageable.

Thank you,

Jon Chin
________________________________
From: Junxiao Shi <shijunxiao at email.arizona.edu>
Sent: Wednesday, April 7, 2021 8:43 PM
To: Chin, Jon <jonchin at csu.fullerton.edu>
Cc: ndn-interest at lists.cs.ucla.edu <ndn-interest at lists.cs.ucla.edu>
Subject: [External] Re: [EXT][Ndn-interest] NDN Applied to Industrial Control Systems

CAUTION: This email originated from outside our campus email system. Do not click links or open attachments unless you can confirm the sender and know the content is safe.


________________________________
Hi Jon

I would like to see if an Industrial Control System (ICS) implemented using NDN has stronger security than an ICS implemented using IP.

My proposed steps are:

  *   Build two similar ICS testbeds (one using IP, one using NDN)
     *   Use simulation/emulation, so no physical hardware is needed

Do you have a specific industrial control system in mind?
UCLA has a building management system that is essentially implemented as a bridge from IP to NDN: https://named-data.net/publications/securing_building_management_ndn/<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fnamed-data.net%2Fpublications%2Fsecuring_building_management_ndn%2F__%3B!!GF3VTAzAMGBM8A!h29OF8doIBfI99km1j3atCcnohApTgI8JjnopeArri508XEGzitJJtF0xxwniR4hBx_4s1U%24&data=04%7C01%7Cjonchin%40csu.fullerton.edu%7C6748990193d843801a0508d8fa408588%7C82c0b871335f4b5c9ed0a4a23565a79b%7C1%7C0%7C637534502311497208%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=XymUK5gn81axeAOEIaEyu96%2BfNywQTuafBjdFPRIDH8%3D&reserved=0>
Or do you mean a more realtime kind, that involves controlling robots, etc?

  *   Perform the same cyberattack on both testbeds (Ex: MITM, DoS)

These two attacks do not work on NDN.
The NDN counterparts are cache poisoning and Interest flooding.

  *   Compare the results to see if NDN is better than IP

What results do you plan to collect?
What conclusions can you possibly draw on an emulated testbed, as opposed to theoretical analysis?

Do you have any thoughts or suggestions regarding this project idea? Would it contribute to the field? Is it feasible to complete in one semester?

UCLA built their building management testbed in more than 3 years, so...

Yours, Junxiao
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.lists.cs.ucla.edu/pipermail/ndn-interest/attachments/20210408/84518412/attachment.html>


More information about the Ndn-interest mailing list