Lightweight Integrity Verification in Named Data Networking

International Journal of Computer Science and Engineering
© 2017 by SSRG - IJCSE Journal
Volume 4 Issue 8
Year of Publication : 2017
Authors : Chaitra D B, Dr. Rashmi R Rachh

How to Cite?

Chaitra D B, Dr. Rashmi R Rachh, "Lightweight Integrity Verification in Named Data Networking," SSRG International Journal of Computer Science and Engineering , vol. 4,  no. 8, pp. 5-10, 2017. Crossref,


In today’s period of Internet, privacy is the major issue. Various methods like encryption, authentication, digital signatures, etc. are used to provide privacy. The algorithms for generation of digital signature and its verification pose a high computational overhead, which directly affects the performance. So, Named Data Networking (NDN) is introduced where the content names are assigned to data packets as the origin and termination points addresses instead of IP addresses. However, a content provider (CP) fails to efficiently control the access to his/her content. Hence, this project aims to implement Lightweight Integrity Verification (LIVE) architecture to address the issues of data pollution and content access control. It involves acceptable computational overhead and enables monitoring content access.


Named Data Networking, Lightweight Integrity Verification, Content Provider.


[4] ―LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking by Qi Li, Member, IEEE, Xinwen Zhang, Member, IEEE, Qingji Zheng, Ravi Sandhu, Fellow, IEEE, and Xiaoming Fu, Senior Member, IEEE
[5] A. Afanasyev, P. Mahadevany, I. Moiseenko, E. Uzuny, and L. Zhang, ―Interest flooding attack and countermeasures in named data networking, in Proc. IFIP Netw. Conf, May 2013, pp. 1–9.
[6] G. Acs, M. Conti, P. Gasti, C. Ghali, and G. Tsudik, ―Cache privacy in named-data networking, in Proc. IEEE 33rd ICDCS,Jul. 2013, pp. 41–51.
[7] T. Lauinger, N. Laoutaris, P. Rodriguez, T. Strufe, E. Biersack, and E. Kirda, ―Privacy risks in named data networking: What is the cost of performance? ACM SIGCOMM Comput. Commun. Rev., vol. 42, no. 5, pp. 54–57, Sep. 2012.
[8] G. Bianchi, A. Detti, A. Caponi, and N. Blefari-Melazzi, ―Check before storing: What is the performance price of content integrity verification in LRU caching? ACM SIGCOMM Comput. Commun. Rev., vol. 43, no. 3, pp. 59–67, 2013.
[9] A. Detti, A. Caponi, G. Tropea, G. Bianchi, and N. Blefari-Melazzi, ―On the interplay among naming, content validity and caching in information centric networks, in Proc. IEEE GLOBECOM, Dec. 2013, pp. 2108–2113.
[10] D. Goergen, T. Cholez, J. Francois, and T. Engel, ―A semantic firewall for content-centric networking, in Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage. (IM), May 2013, pp. 478–484.