Future Internet architectures such as Named Data Networking (NDN) rely heavily on in-network caching to improve performance and reduce latency, an especially valuable feature for resource-constrained IoT environments. However, current IoT-NDN deployments lack mechanisms to securely control how caches are manipulated. Unauthorized insertions, evictions, or modifications of cached data can lead to cache poisoning, cache pollution and denial-of-service.
What this topic is about
This master thesis focuses on designing and evaluating a security protocol that provides authenticated and authorized control over cache operations in IoT environments using Named Data Networking (NDN).
What you will do
- Study security threats targeting NDN caches in IoT environments.
- Design a security protocol to protect cache insertion, eviction and modification.
- Define the threat model and the protocol message flow.
- Implement the solution in the NDN Forwarding Daemon (NFD).
- Evaluate its performance and resource impact in IoT-NDN scenarios.
What you should already know
- Basic knowledge of network security and cryptographic mechanisms.
- Familiarity with Linux and C/C++.
- Interest in IoT systems and experimental network research.
What you will deliver
- Conception of a security protocol that controls cache actions in IoT-NDN
- An implementation of the security protocol
- A performance evaluation of the security protocol
