ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet

被引:2
作者
Adhikari, Sharmistha [1 ]
Ray, Sangram [2 ]
Obaidat, Mohammad S. S. [3 ,4 ]
Biswas, G. P. [5 ,6 ]
机构
[1] Maulana Abul Kalam Azad Univ Technol, Dept Comp Applicat, Simhat 741249, WB, India
[2] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Ravangla 737139, Sikkim, India
[3] Univ Sharjah, Coll Comp & Informat, Sharjah, U Arab Emirates
[4] Univ Jordan, KASIT, Amman, Jordan
[5] Univ Sci & Technol Beijing USTB, Beijing, Peoples R China
[6] Indian Inst Technol ISM Dhanbad, Dept Comp Sci & Engn, Dhanbad 826004, India
关键词
Content centric network; Access control; Elliptic curve cryptography; Group key management; AVISPA and BAN logic; MECHANISM; PRIVACY;
D O I
10.1007/s11277-023-10625-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Content centric network (CCN) is initially envisaged as a next generation Internet paradigm to cope up with the recent growing demand of content delivery. CCN reduces the network response time for content access due to its inherent content caching mechanism by intermediate CCN routers. As in CCN architecture, content is available in routers' cache, it becomes accessible to unauthorized consumers as well as vulnerable to various malicious attacks. Hence, a rigorous content access control measure should be enforced to protect the privacy and security of content in CCN, which is a promising candidate for future Internet. In this paper, we have designed a complete access control scheme for various content access requirements in CCN that includes group-based access control with dynamic group key management protocol. We have used elliptic curve cryptography (ECC), a state-of-the-art lightweight cryptosystem, to design secure access control protocols for providing high security as well as enhanced efficiency. Finally, the security analysis and performance sections confirm that our scheme is highly secured and efficient.
引用
收藏
页码:571 / 607
页数:37
相关论文
共 45 条
  • [11] Ghali C., 2015, P 2 ACM C INF CENTR, P147
  • [12] A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
    Giruka, Venkata C.
    Chakrabarti, Saikat
    Singhal, Mukesh
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (07) : 959 - 970
  • [13] Golle J. P., 2010, CCNX ACCESS CONTROL
  • [14] Hamdane B, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P1234, DOI 10.1109/INM.2015.7140473
  • [15] Hankerson D., 2004, Springer professional computing)
  • [16] A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking
    Hidouri, Abdelhak
    Hajlaoui, Nasreddine
    Touati, Haifa
    Hadded, Mohamed
    Muhlethaler, Paul
    [J]. COMPUTERS, 2022, 11 (12)
  • [17] Jacobson V., 2009, P 5 INT C EM NETW EX, P1, DOI DOI 10.1145/1658939.1658941
  • [18] A Survey of SIP Authentication and Key Agreement Schemes
    Kilinc, H. Hakan
    Yanik, Tugrul
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02) : 1005 - 1023
  • [19] KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
  • [20] KURIHARAY J, 2015, IFIP NETWORKING C IF, P1