Securing network content

  • Smetters D
  • Jacobson V
  • 124


    Mendeley users who have this article in their library.
  • N/A


    Citations of this article.


Current networks derive their security from a communication model. The security of content is determined by who (what host) you retrieved that content from, and the properties of the communication channel over which you retrieved it -- was it encrypted, authenticated, and so on. Such security is transient, evaporating after the connection ends, and not transitive -- everyone wanting a piece of content must get it from “the horse's mouth” in order to trust it. We propose a more scalable model wherein content itself is secured, rather than the connections over which it travels. By authenticating content itself with digital signatures, and adding the ability to retrieve that content by name rather than by the identity of the host on which it happens to be stored, we can build networks with a number of desirable security and performance properties. To make content-based security practical and effective, we argue that we must authenticate the linkage between (arbitrary) names and content, rather than merely authenticating the content or its publisher. We introduce a specific proposal for securing named content effective for both current and future, potentially content-based networks.

Author-supplied keywords

  • CCN
  • ICN
  • Security

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document


  • Diana Smetters

  • Van Jacobson

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free