Security, interoperability, scalability, and mobility support are key challenges for the Internet of Things (IoT). Information Centric Networking (ICN) is an emerging paradigm for the Future Internet design that brings all the potential to face these challenges thanks to name-driven networking primitives. As a matter of fact, ICN natively supports multicast, mobility, content oriented security, and can be effectively used to design de-verticalizing middlewares for the IoT. In this context, the so called ICN-IoT middleware has been proposed within an initiative of the ICNRG (Information Centric Networking Research Group) of the Internet Research Task Force (IRTF) to encompass the key requirements of IoT systems. An important issue to be addressed is how to guarantee the security and the privacy of the information transmitted over the network, which may include sensitive data. Herein, the current security functionalities of ICN-IoT are analyzed and enriched in order to strengthen its resilience to violation attempts. The proposed approach is validated, at a design level, by means of a running example.
A Secure ICN-IoT Architecture
SICARI, SABRINA SOPHY;RIZZARDI, ALESSANDRA;COEN PORISINI, ALBERTO
2017-01-01
Abstract
Security, interoperability, scalability, and mobility support are key challenges for the Internet of Things (IoT). Information Centric Networking (ICN) is an emerging paradigm for the Future Internet design that brings all the potential to face these challenges thanks to name-driven networking primitives. As a matter of fact, ICN natively supports multicast, mobility, content oriented security, and can be effectively used to design de-verticalizing middlewares for the IoT. In this context, the so called ICN-IoT middleware has been proposed within an initiative of the ICNRG (Information Centric Networking Research Group) of the Internet Research Task Force (IRTF) to encompass the key requirements of IoT systems. An important issue to be addressed is how to guarantee the security and the privacy of the information transmitted over the network, which may include sensitive data. Herein, the current security functionalities of ICN-IoT are analyzed and enriched in order to strengthen its resilience to violation attempts. The proposed approach is validated, at a design level, by means of a running example.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.