2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) (2015)
Dallas, TX, USA
Oct. 19, 2015 to Oct. 22, 2015
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MASS.2015.51
Information Centric Networks (ICN), such as Content Centric Networks (CCNx) or Named Data Networks (NDN) disseminate data using hierarchal names for each chunk of data, where a chunk is roughly the size of an IP datagram. To secure the named exchange, each chunk has a digital signature or a hash-based name. Because these datagrams may be much larger than a link MTU, there is a need for fragmentation, and to date several hop-by-hop, end-to-end, and mid-to-end fragmentation schemes have been proposed. Only one scheme, FIGOA, a cut-through mid-to-end fragmentation scheme (i.e. Without reassembly) claims to be secure by using delayed authentication. We propose a secure cut-through fragmentation scheme derived from FIGOA that allows immediate validation. We also consider queuing and timing issues that were not discussed in FIGOA.
Data structures, Boolean functions, Payloads, Routing protocols, Authentication
M. Mosko and C. A. Wood, "Secure Fragmentation for Content Centric Networking," 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Dallas, TX, USA, 2015, pp. 506-512.