[Ndn-interest] Regarding NDN packet security

Lixia Zhang lixia at cs.ucla.edu
Mon Dec 25 09:26:20 PST 2023


"CertRevoke: A Certificate Revocation Framework for Named Data NetworkingShashank, thanks for exploring NDN! From your questions, I guess you may be looking into NDN's name-based access control (NAC) solutions?

Your first question: the concern seems that, given the data decryption key is encrypted in an object X using a legit's user Y's public key, an attacker Z could easily fetch the decryption key. As Kundan explained, Z can get a copy of X, but wont be able to read the decryption key in it, because Z doesn't have Y's private key.

Your 2nd question: a good question, yes it is possible to compromise a producer and its key needs to be revoked. NDN based systems try to minimize the danger and damage of key/cert compromises by shortening their life times, though compromises detection is still needed.
for revocation, there's initial work on NDN cert revocation: "CertRevoke: A Certificate Revocation Framework for Named Data Networking", https://dl.acm.org/doi/pdf/10.1145/3517212.3558079, which utilizes distributed ledgers. The paper referenced DLedger from several years ago, a more recent work is
"CLedger: A Secure Distributed Certificate Ledger via Named Data"
https://ieeexplore.ieee.org/document/10279244
again this is very initial work, we are extending it in another ongoing project to cover more general cases.

Lixia

> On Dec 24, 2023, at 11:02 PM, Shashank G via Ndn-interest <ndn-interest at lists.cs.ucla.edu> wrote:
> 
> Hi all,
> 
> I am Shashank, a sophomore at National Institute of Technology, Karnataka from India. I recently began exploring NDN and have been fascinated by its data security aspect. However, since I am new to the field, I have quite a few doubts regarding the same, and I was hoping for your patience and guidance to clarify them.
> 
> 1) I was trying to understand how cryptographically signing packets works, and have got a certain grasp of it's advantages, however, I had a doubt - If the public keys themselves are named, then with the right naming convention, couldn't an attacker get access to data that he is not supposed to view. How is this prevented?
> 
> 2) Is there any mechanism to detect if the producer of data has been compromised, i.e, his private key has been obtained by a third party? If so, since the certificates are cached, how do we detect if the producer is safe or not?
> 
> I look forward to learning a lot here and eagerly await your response. Thank you.
> 
> Yours sincerely,
> _______________________________________________
> Ndn-interest mailing list
> Ndn-interest at lists.cs.ucla.edu
> https://www.lists.cs.ucla.edu/mailman/listinfo/ndn-interest



More information about the Ndn-interest mailing list