Be the first to like this
The origin of today’s Internet can be traced back to the 1960s. From that time on the Internet has evolved to a global infrastructure for communication. It continuously distributes large amounts of information across the globe and it has become an essential part of our way of living. However, our demands on the Internet are continually growing and the things we actually want to achieve with it are changing. The initial concept of the Internet was simple and tailored to the problem of resource sharing. Of course, the use of the Internet has changed during the last 40 years, but its core architecture still is the same. Changing requirements lead to limitations and therefore the current Internet is facing a lot of them. They often can be circumvented, but the solutions are neither efficient nor cost-effective. In this thesis we discuss a new concept for a Future Internet architecture. It is called Content-Centric Networking (CCN) and is an approach to change the Internet’s communication model. Its objective is to get rid of today’s host-centric view and change it to a content-centric one. The reason for that is that people usually know what information they want to access, but do not care at which location they find it. A content-centric network could improve the Internet’s efficiency, mobility, scalability and security. Particularly, the latter will be surveyed in detail. This thesis shows how the notion of security in CCN has changed from a connection-based to a content-based one. The advantage that CCN couples security with content tightly will be emphasized. We will illustrate how packets are forged into self-authenticating units enabling users to consume cached data from arbitrary sources without having security concerns. Furthermore, today’s state-of-the-art security technologies are compared to the newly proposed ideas, which are also presented in detail. We discuss the current Internet’s abilities to withstand Denial-of-Service attacks in contrast to the capabilities of a content-centric network. Results look promising, however, new attack forms are emerging and we have analysed their threats. CCN’s ability to cache data inherently in the network is favourable, but also offers new points of vantage. We show how an adversary could make caches ineffective or even exploit them to violate user privacy or throttle data distribution. Of course, countermeasures against these attacks will be provided. This work also looks out for new ideas from which the concept of CCN could benefit. One of those is Broadcast Encryption (BE). We show how to build applications combining BE with the idea of CCN in a beneficial manner. Therefore, we have designed, developed and evaluated a prototype that provides video streaming with simple Digital Rights Management features over CCN. The evaluations indicate that these technologies fit together well. It is essential to search for a variety of technologies that could amplify the benefits of CCN ...