Social Network based Security Scheme in Mobile Information-Centric Network You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla University of California, Los Angeles (UCLA) {youlu, seanwangsk, yutingyu, gerla}@cs.ucla.edu
Outline Introduction Background Protocol Design Performance Evaluation Conclusion 12/1/2018
Introduction Content retrieval in mobile ad hoc network Vehicle-NDN, MANET-CCN, etc. How to validate the received content data? Trust Graph & Data Integrity ICN encrypts data by Public-key cryptography Trust Graph: to authenticate the sender [1] [1] You Lu, et al, "Mobile Social Network Based Trust Authentication", Med-Hoc-Net 2012, Ayia Napa, Cyprus, June. 2012 12/1/2018
Introduction (cont’d) Data integrity: PKI signature But, PKI system is inefficient and difficult to deploy in mobile ad hoc network. PKI Centralized design PKI Certificate Authority (CA) Mobile ICN needs a flexible certificate scheme to certify the binding relationship between the public-key and the user-identity. 12/1/2018
Background Mobile Information-Centric Network Public-Key Cryptography an alternative approach to the architecture of IP-based computer networks hierarchical naming scheme caching system Public-Key Cryptography Content data is encrypt/decrypt by private/public keys PKI Certificate Authority verify the public-key and the user identity binding relationship 12/1/2018
Social network assisted certification Identity Bundle: <identity-id, public-key> Identity-id: user-id, SSN, etc Encrypted by private-key Social trust graph if node A has a link to node B, that means node A can certify public-key & ID bundle of node B. after node A verifies node B’s identity bundle, node A will sign this identity bundle using its own private key, and keep both the signature and node B’s identity bundle into node A’s local identity bundle table 12/1/2018
Trust Graph A user who wants to participate in this security system will have to give his identity bundle to his closest and trustworthy friends The more neighbors he gave his identity bundle to, the better the performance of his public-key retrieval in the application will be. The connections between nodes will be gradually increased, as shown in Figure 4. A unidirectional link means that only one end node has the identity bundle of the other end. A bi-directional link means that both end nodes have each other’s identity bundle 12/1/2018
Identity Bundle Retrieval A receives data from D A must now authenticate the data (i.e., get D_pub-key) Propagate the identity bundle along the friend chain Identity bundle is signed and kept hop by hop the user’s identity bundle is signed and kept hop by hop in the directional social trust graph. This design makes it possible to propagate the identity bundle along the friend chain from one node to some other nodes. 12/1/2018
Identity Bundle Query First, look up his local identity bundle table. If not, send out the Interest pkt with identity Query along social graph 12/1/2018
Social Trust Graph Evolvement The requester will store the newly retrieved identity bundle into his local identity bundle table using the cache scheme of ICN. A new social link will be generated between the requester and the node D. The popular content producer in the social trust network will have a relatively higher node degree than other normal nodes eventually. the social trust graph will evolve to a pattern where the popular content producers acquire high degrees and form large, highly connected components The more nodes keep node D’s identity bundle, the more direct links the node D has to other nodes. So, the popular content producer in the social trust network will have a relatively higher node degree than other normal nodes. Consequently, popular content producers will have a better connection and shorter hop path to the requester. With the increase of the identity bundle propagation, the social trust graph will evolve to a pattern where the popular content producers acquire high degrees and form large, highly connected components. This will further speedup identity bundle queries in the future. 12/1/2018
Performance Evaluation Epinions social network dataset contains a who-trust-whom online social network of a general consumer review site Epinions.com. 75879 nodes and 508837 edges 12/1/2018
Conclusion Public-key cryptography provides the security service in ICN. User identity and public-key verification is essential for secure key delivery The proposed social network based security scheme provides the verification of binding relationship User requests the public-key along the signed social friend chain 12/1/2018
Thank You! Q & A 12/1/2018