Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting - Publication - Bridge of Knowledge

Search

Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting

Abstract

NDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object recipients can afford costly object content verification. We argue that limited-time validity of stolen cre-dentials gives rise to a mitigation scheme that does without such verification; instead, propagation of trust in an object is carefully designed. We formulate NDN, trust, and intruder models, and specify the mitigation scheme as a Markovian infection process on a graph, whose desirable properties we establish. We validate through simulations that bogus and genuine objects can be distinguished in a probabilistic sense, and evaluate several introduced measures of interest.

Cite as

Full text

download paper
downloaded 47 times
Publication version
Accepted or Published Version
License
Copyright (2019 IEEE)

Keywords

Details

Category:
Conference activity
Type:
publikacja w wydawnictwie zbiorowym recenzowanym (także w materiałach konferencyjnych)
Language:
English
Publication year:
2019
Bibliographic description:
Konorski J.: Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting// / : , 2019,
Sources of funding:
Verified by:
Gdańsk University of Technology

seen 107 times

Recommended for you

Meta Tags