DOI QR코드

DOI QR Code

Network Overhead Improvement for MHT-based Content Authentication Scheme

MHT 기반 콘텐츠 인증 기술의 전송량 개선

  • 김대엽 (수원대학교 정보보호학과)
  • Received : 2017.10.19
  • Accepted : 2018.01.20
  • Published : 2018.01.28

Abstract

Various technologies have been developed to more efficiently share content such as P2P and CDN. These technologies take a common approach that request packets are responded by distributed network nodes, not by a single distributor. Such approaches not only resolve network congestion around content distributors, but also make it possible to distribute content regardless of the system and network status of content distributors. However, when receiving content from distributed nodes/hosts, not from authenticated distributors, users cannot practically identify which node/host sent content to them. Due to this characteristic, various hacking caused by the malicious modification of content is possible. Therefore, to make such approaches more secure, a content authentication technique is required. In this paper, we propose a improved operation of MHT used in CCN for authenticating distributed content. Then we evaluate the proposed method by comparing its performance with the existing technology.

인터넷을 이용하여 콘텐츠를 보다 효율적으로 공유하기 위하여 P2P, CDN과 같은 다양한 기술들이 개발되어왔다. 이러한 기술들은 콘텐츠 배포자에 집중되는 요청 패킷이 네트워크에 분산된 다수의 노드들에 의해 처리되도록 설계되어, 네트워크 병목 문제를 해결할 뿐만 아니라 콘텐츠 배포 시스템과 네트워크의 상태와 상관없이 지속적으로 콘테츠를 배포할 수 있다. 그러나 분산 노드로부터 콘텐츠를 전송 받는 경우, 사용자가 실제 콘텐츠 전송 노드를 식별/인증할 수 없기 때문에 공격자 개입 및 악의적인 콘텐츠 변경을 통한 다양한 해킹이 가능하다. 그러므로 분산 노드/호스트를 이용한 네트워킹 기술의 경우, 콘텐츠 인증 기술이 반드시 필요하다. 본 논문에서는 CCN에 적용된 콘텐츠 인증 기술인 MHT 기반의 콘텐츠 인증 기법을 소개하고, MTH의 인증 정보 중복 전송 문제를 해결하여 전송량을 개선할 수 있는 방안을 제안하고, 기존 기술과의 성능 비교를 통하여 개선안의 성능을 평가한다.

Keywords

References

  1. "Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015-2020," Cisco Public, February 3, 2016.
  2. "Cisco Visual Networking Index: Forecast and Methodology, 2015-2020," Cisco Public, February 3, 2016.
  3. A. K. Pathan, and R. Buyya, "A Taxonomy and Survey of Content Delivery Networks," Tech Report, Univ. of Melbourne, 2007.
  4. E. Meshkova, J. Riihijarvi, M. Petrova, and P. Mahonen, "A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks," Computer Networks J., vol. 52, no. 11, pp. 2097-2128, 2008. https://doi.org/10.1016/j.comnet.2008.03.006
  5. D. Clark, "The Design Philosophy of the DARPA Internet Protocols," ACM Sigcomm Comp. Comm. Review, Vol. 18, No. 1, pp. 106-114, Aug. 1988. https://doi.org/10.1145/52325.52336
  6. B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher and B. Ohlmann, "A Survey of Information-Centric Networking," IEEE Communications Magazine, Vol. 50, No. 7, pp. 26-36, 2012. https://doi.org/10.1109/MCOM.2012.6231276
  7. V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Briggs and R. Braynard, "Networking Named Content," 5th International Conference on Emerging Networking Experiments and Technologies, pp. 1-12, 2009.
  8. D. Kim, "Content Centric Networking Naming Scheme for Efficient Data Sharing," Journal of Korea Multimedia Society, Vol. 15, No. 9, pp. 1126-1132, 2012. https://doi.org/10.9717/kmms.2012.15.9.1126
  9. D. Y. Kim, "Trend and Improvement for Privacy Protection of Future Internet," Journal of Digital Convergence, Vol. 14, No. 6, pp. 405-413, 2016. https://doi.org/10.14400/JDC.2016.14.6.405
  10. D. Y. Kim, "A Comparison Study on Data Caching Policies of CCN," Journal of Digital Convergence, Vol. 15, No. 1, pp. 327-334, 2017.
  11. R. Merkle, "Protocol for public key cryptosystems," IEEE Sympo. Research in Security and Privacy, Apr. 1980.
  12. D. Y. Kim, J. S. Park, "Efficient Contents Verification Scheme for Contents-Centric-Networking," The Journal of Korean Institute of Comm. and Inform. Sciences, Vol. 39, No. 4, pp. 234-241, 2014.
  13. D. Kim, "A Efficient Content Verification Scheme for Distributed Networking/Data Store," Journal of The Korea Institue of Information Security & Cryptology, Vol. 25, No. 4, pp. 839-847, 2015. https://doi.org/10.13089/JKIISC.2015.25.4.839
  14. D. Kim, "Group-Interest-based Verifiable CCN," Mobile Information Systems, Volume 2016, Article ID 9202151
  15. B. Georg "Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis,". Ruhr-Universitat Bochum. Retrieved 2013-11-20.
  16. T. Cormen,"Introduction to Algorithm," The MIT Press, pp. 301-328, 1992
  17. D. Y. Kim, "Improvement of the Data Authentication of CCN," Journal of Digital Convergence, Vol. 15, No. 8, pp. 341-349, 2017. https://doi.org/10.14400/JDC.2017.15.8.341