ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet

被引:2
作者
Adhikari, Sharmistha [1 ]
Ray, Sangram [2 ]
Obaidat, Mohammad S. S. [3 ,4 ]
Biswas, G. P. [5 ,6 ]
机构
[1] Maulana Abul Kalam Azad Univ Technol, Dept Comp Applicat, Simhat 741249, WB, India
[2] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Ravangla 737139, Sikkim, India
[3] Univ Sharjah, Coll Comp & Informat, Sharjah, U Arab Emirates
[4] Univ Jordan, KASIT, Amman, Jordan
[5] Univ Sci & Technol Beijing USTB, Beijing, Peoples R China
[6] Indian Inst Technol ISM Dhanbad, Dept Comp Sci & Engn, Dhanbad 826004, India
关键词
Content centric network; Access control; Elliptic curve cryptography; Group key management; AVISPA and BAN logic; MECHANISM; PRIVACY;
D O I
10.1007/s11277-023-10625-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Content centric network (CCN) is initially envisaged as a next generation Internet paradigm to cope up with the recent growing demand of content delivery. CCN reduces the network response time for content access due to its inherent content caching mechanism by intermediate CCN routers. As in CCN architecture, content is available in routers' cache, it becomes accessible to unauthorized consumers as well as vulnerable to various malicious attacks. Hence, a rigorous content access control measure should be enforced to protect the privacy and security of content in CCN, which is a promising candidate for future Internet. In this paper, we have designed a complete access control scheme for various content access requirements in CCN that includes group-based access control with dynamic group key management protocol. We have used elliptic curve cryptography (ECC), a state-of-the-art lightweight cryptosystem, to design secure access control protocols for providing high security as well as enhanced efficiency. Finally, the security analysis and performance sections confirm that our scheme is highly secured and efficient.
引用
收藏
页码:571 / 607
页数:37
相关论文
共 45 条
  • [31] Access Control to Objects and their Description in the Future Network of Information
    Renault, Eric
    Ahmad, Ahmad
    Abid, Mohamed
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2010, 6 (03): : 359 - 374
  • [32] Survey and taxonomy of information-centric vehicular networking security attacks
    Safwat, Mena
    Elgammal, Ali
    AbdAllah, Eslam G.
    Azer, Marianne A.
    [J]. AD HOC NETWORKS, 2022, 124
  • [33] Schneier B., 1996, Applied cryptography: protocols, algorithms, and source code in c
  • [34] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613
  • [35] Key establishment in large dynamic groups using one-way function trees
    Sherman, AT
    McGrew, DA
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2003, 29 (05) : 444 - 458
  • [36] SPAN, SPAN SEC PROT AN AVI
  • [37] Combining information centric and software defined networking to support command and control agility in military mobile networks
    Stocchero, Jorgito Matiuzzi
    Carneiro, Andre Dexheimer
    Zacarias, Iulisloi
    de Freitas, Edison Pignaton
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (02) : 765 - 784
  • [38] Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers
    Susilo, Willy
    Jiang, Peng
    Lai, Jianchang
    Guo, Fuchun
    Yang, Guomin
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 2138 - 2148
  • [39] A Hybrid Security Scheme for Inter-vehicle Communication in Content Centric Vehicular Networks
    Tandon, Righa
    Gupta, P. K.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (02) : 1083 - 1096
  • [40] Security, Privacy, and Access Control in Information-Centric Networking: A Survey
    Tourani, Reza
    Misra, Satyajayant
    Mick, Travis
    Panwar, Gaurav
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01): : 566 - 600