Presentation 2012-03-16
Self-Protectable Secure Name Mapping System (S^2NMS)
Ruidong Li, Ved P. Kafle, Hiroaki Harai,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In general network architectures, name mapping systems (NMS) are designed to map a host name to the corresponding locator and other related necessary information (RNI). However, NMS lacks security functions to protect itself from intrinsic security problems, such as impersonation attacks. The existing security mechanisms have their own limitations especially on scalability and may not be well suitable for NMS. To relieve these limitations, we intend to embed built-in security features in the architecture to enable the procedures in NMS to be proactively protected without involving trusted third parties (TTPs). For this purpose, we propose a self-protectable secure name mapping system (S^2NMS), which is mainly composed of secure registration, secure information exchange, secure resolution, mutual authentication, secure mapping update, and revocation. By the S^2NMS, hosts can register their information to the network securely, and then they can obtain secure information of destination hosts, authenticate identities each other, and securely update their RNIs without relying on TTP.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Name mapping system / security / authentication
Paper # ICSS2011-42
Date of Issue

Conference Information
Committee ICSS
Conference Date 2012/3/9(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Self-Protectable Secure Name Mapping System (S^2NMS)
Sub Title (in English)
Keyword(1) Name mapping system
Keyword(2) security
Keyword(3) authentication
1st Author's Name Ruidong Li
1st Author's Affiliation Network Architecture Laboratory, Photonic Network Research Institute National Institute of Information and Communications Technology (NICT)()
2nd Author's Name Ved P. Kafle
2nd Author's Affiliation Network Architecture Laboratory, Photonic Network Research Institute National Institute of Information and Communications Technology (NICT)
3rd Author's Name Hiroaki Harai
3rd Author's Affiliation Network Architecture Laboratory, Photonic Network Research Institute National Institute of Information and Communications Technology (NICT)
Date 2012-03-16
Paper # ICSS2011-42
Volume (vol) vol.111
Number (no) 495
Page pp.pp.-
#Pages 8
Date of Issue