Abstract
Named Data Networking (NDN) is an architecture of Information-Centric Networking (ICN). The application of NDN on wireless networks is an important area. In this paper, we propose a Security Calculus for Wireless Networks of Named Data Networking (SCWN). Security feature is implemented by using different channel symbols to describe wireless network node. The feature of NDN is introduced by using particular sets to express the environment. We introduce the syntax and the operational semantics of SCWN calculus. By a rewriting logic-based language Maude, we support the automatic implementation of our SCWN calculus, which enhances its practicability. Finally, we apply SCWN calculus to LFBL protocol with its automatic implementation. It indicates that SCWN calculus is useful to describe realistic cases.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Apt, K.R., de Boer, F.S., Olderog, E.: Verification of Sequential and Concurrent Programs. Texts in Computer Science. Springer, London (2009). https://doi.org/10.1007/978-1-84882-745-5
Bazzi, A., Masini, B.M., Zanella, A., Castro, C.D., Raffaelli, C., Andrisano, O.: Cellular aided vehicular named data networking. In: ICCVE 2014, pp. 747–752 (2014)
Clavel, M., et al.: All About Maude - A High-Performance Logical Framework: How to Specify, Program and Verify Systems in Rewriting Logic. LNCS, vol. 4350. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-71999-1
Godskesen, J.C.: A calculus for mobile ad hoc networks. In: Murphy, A.L., Vitek, J. (eds.) COORDINATION 2007. LNCS, vol. 4467, pp. 132–150. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72794-1_8
He, J., Hoare, C.A.R.: Unifying theories of programming. In: RelMiCS 1998, pp. 97–99 (1998)
Hoare, C.A.R.: An axiomatic basis for computer programming. Commun. ACM 12(10), 576–580 (1969)
Li, Z., Liu, K., Liu, D., Shi, H., Chen, Y.: Hybrid wireless networks with fib-based named data networking. EURASIP J. Wirel. Commun. Netw. 2017, 54 (2017)
Meisel, M., Pappas, V., Zhang, L.: Ad hoc networking via named data. In: Proceedings of the Fifth ACM International Workshop on Mobility in the Evolving Internet Architecture, pp. 3–8 (2010)
Meisel, M., Pappas, V., Zhang, L.: Listen first, broadcast later: topology-agnostic forwarding under high dynamics. Technical report, Los Angeles, CA, USA (2010)
Merro, M.: An observational theory for mobile ad hoc networks (full version). Inf. Comput. 207(2), 194–208 (2009)
Nanz, S., Hankin, C.: Formal security analysis for ad-hoc networks. Electr. Notes Theor. Comput. Sci. 142, 195–213 (2006)
Prasad, K.V.S.: A calculus of broadcasting systems. Sci. Comput. Program. 25(2–3), 285–327 (1995)
Zhang, L., et al.: Named data networking (NDN) project. Technical report NDN-0001, PARC (2010)
Acknowledgement
This work was partly supported by National Natural Science Foundation of China (Grant No. 61872145), National Key Research and Development Program of China (Grant No. 2018YFB2101300), Shanghai Collaborative Innovation Center of Trustworthy Software for Internet of Things (Grant No. ZF1213) and the Fundamental Research Funds for the Central Universities of China.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Fei, Y., Zhu, H., Sun, H., Yin, J. (2019). A Security Calculus for Wireless Networks of Named Data Networking. In: Ait-Ameur, Y., Qin, S. (eds) Formal Methods and Software Engineering. ICFEM 2019. Lecture Notes in Computer Science(), vol 11852. Springer, Cham. https://doi.org/10.1007/978-3-030-32409-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-32409-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-32408-7
Online ISBN: 978-3-030-32409-4
eBook Packages: Computer ScienceComputer Science (R0)