ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet

被引:2
作者
Adhikari, Sharmistha [1 ]
Ray, Sangram [2 ]
Obaidat, Mohammad S. S. [3 ,4 ]
Biswas, G. P. [5 ,6 ]
机构
[1] Maulana Abul Kalam Azad Univ Technol, Dept Comp Applicat, Simhat 741249, WB, India
[2] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Ravangla 737139, Sikkim, India
[3] Univ Sharjah, Coll Comp & Informat, Sharjah, U Arab Emirates
[4] Univ Jordan, KASIT, Amman, Jordan
[5] Univ Sci & Technol Beijing USTB, Beijing, Peoples R China
[6] Indian Inst Technol ISM Dhanbad, Dept Comp Sci & Engn, Dhanbad 826004, India
关键词
Content centric network; Access control; Elliptic curve cryptography; Group key management; AVISPA and BAN logic; MECHANISM; PRIVACY;
D O I
10.1007/s11277-023-10625-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Content centric network (CCN) is initially envisaged as a next generation Internet paradigm to cope up with the recent growing demand of content delivery. CCN reduces the network response time for content access due to its inherent content caching mechanism by intermediate CCN routers. As in CCN architecture, content is available in routers' cache, it becomes accessible to unauthorized consumers as well as vulnerable to various malicious attacks. Hence, a rigorous content access control measure should be enforced to protect the privacy and security of content in CCN, which is a promising candidate for future Internet. In this paper, we have designed a complete access control scheme for various content access requirements in CCN that includes group-based access control with dynamic group key management protocol. We have used elliptic curve cryptography (ECC), a state-of-the-art lightweight cryptosystem, to design secure access control protocols for providing high security as well as enhanced efficiency. Finally, the security analysis and performance sections confirm that our scheme is highly secured and efficient.
引用
收藏
页码:571 / 607
页数:37
相关论文
共 45 条
  • [1] Adhikari Sharmistha, 2019, Recent Trends in Communication, Computing, and Electronics. Select Proceedings of IC3E 2018. Lecture Notes in Electrical Engineering (LNEE 524), P207, DOI 10.1007/978-981-13-2685-1_21
  • [2] Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure
    Adhikari, Sharmistha
    Ray, Sangram
    Obaidat, Mohammad S.
    Biswas, G. P.
    [J]. COMPUTER COMMUNICATIONS, 2020, 157 : 187 - 203
  • [3] Efficient and secure business model for content centric network using elliptic curve cryptography
    Adhikari, Sharmistha
    Ray, Sangram
    Biswas, Gosta P.
    Obaidat, Mohammad S.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (01)
  • [4] [Anonymous], 2012, P 2 INT C COMP SCI E
  • [5] [Anonymous], 2012, P WORLD C EXP SYST W
  • [6] [Anonymous], 2009, CRYPTOGRAPHY NETWORK
  • [7] AVISPA, ABOUT US
  • [8] A LOGIC OF AUTHENTICATION
    BURROWS, M
    ABADI, M
    NEEDHAM, RM
    [J]. PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871): : 233 - 271
  • [9] Chen T., 2014, Performance Computing and Communications Conference (IPCCC), 2014 IEEE International, P1, DOI 10.1109/PCCC.2014.7017100
  • [10] da Silva RS, 2015, CONSUM COMM NETWORK, P128, DOI 10.1109/CCNC.2015.7157958