Collaborative Computing: Networking, Applications and Worksharing. 14th EAI International Conference, CollaborateCom 2018, Shanghai, China, December 1-3, 2018, Proceedings

Research Article

Research on Access Control of Smart Home in NDN (Short Paper)

Download
159 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-12981-1_39,
        author={Rina Wu and Bo Cui and Ru Li},
        title={Research on Access Control of Smart Home in NDN (Short Paper)},
        proceedings={Collaborative Computing: Networking, Applications and Worksharing. 14th EAI International Conference, CollaborateCom 2018, Shanghai, China, December 1-3, 2018, Proceedings},
        proceedings_a={COLLABORATECOM},
        year={2019},
        month={2},
        keywords={Named Data Networking Access control Smart home Encryption},
        doi={10.1007/978-3-030-12981-1_39}
    }
    
  • Rina Wu
    Bo Cui
    Ru Li
    Year: 2019
    Research on Access Control of Smart Home in NDN (Short Paper)
    COLLABORATECOM
    Springer
    DOI: 10.1007/978-3-030-12981-1_39
Rina Wu1,*, Bo Cui1,*, Ru Li1,*
  • 1: Inner Mongolia University
*Contact email: wrn@mail.imu.edu.cn, cscb@imu.edu.cn, csliru@imu.edu.cn

Abstract

Named Data Networking (NDN) is one of the future Internet architectures and can support smart home very well. There is a large amount of private data with lower security level in smart home. Access control is an effective security solution. However, the existing NDN’s access control mechanisms that can be applied to smart homes don’t reasonably use the cache in NDN and take into account users’ authorization cancellation phase. Therefore, we designed an access control mechanism for smart homes in NDN. We mainly consider the process of the user requests permission, user requests data and user permission cancellation. By using the Cipher Block Chaining (CBC) symmetric encryption algorithm, identity-based encryption, and proxy re-encryption, the cache in NDN is effectively utilized, and the counting Bloom Filter is used to filter ineffective Interest packets and complete the user’s privilege cancellation phase. Experimental results show that the access control mechanism designed in this paper can effectively reduce the total time which starts from user requests the permission to decrypt data and reduce the time overhead of the NDN routers in the process of user privileges cancellation after using the counting Bloom Filter.