Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure

被引:18
作者
Adhikari, Sharmistha [1 ]
Ray, Sangram [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ]
Biswas, G. P. [5 ]
机构
[1] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Sikkim 737139, India
[2] Nazarbayev Univ, Dept ECE, Astana, Kazakhstan
[3] Univ Jordan, KASIT, Amman, Jordan
[4] Univ Sci & Technol Beijing USTB, Beijing, Peoples R China
[5] Indian Inst Technol ISM Dhanbad, Dept Comp Sci & Engn, Dhanbad 826004, Bihar, India
关键词
Content centric network (CCN); Content dissemination architecture; Public key infrastructure (PKI); Elliptic curve cryptography (ECC); ECC-PKI; BAN logic; AVISPA; ELLIPTIC CURVE CRYPTOGRAPHY; MULTISOURCE CONTENT DELIVERY;
D O I
10.1016/j.comcom.2020.04.024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Initially, Internet was designed with the goal of sharing resources. With the recent technological advancement and huge information need, Internet has gradually shifted from resource sharing mode to information sharing mode. To meet the demands of current Internet usage pattern, content centric network (CCN) is envisaged as a clean-slate Internet architecture. This paper proposes secure content dissemination architecture for CCN using elliptic curve cryptography based public key infrastructure (ECC-PKI). The proposed scheme restores the current business model of the Internet by decoupling the encrypted content from its access control specifications while maintaining the in-network content caching mechanism of the CCN. In the proposed security architecture, content will be securely communicated between each pair of entities of CCN using ECC-based protocols. While designing proposed protocols our main aim is to minimize the computation and communication cost and to increase the performance, efficiency and security. Finally, a formal security verification using well known AVISPA simulator and BAN logic concludes that the proposed scheme is secure against the existing relevant cryptographic attacks.
引用
收藏
页码:187 / 203
页数:17
相关论文
共 51 条
[1]   A Survey of Security Attacks in Information-Centric Networking [J].
AbdAllah, Eslam G. ;
Hassanein, Hossam S. ;
Zulkernine, Mohammad .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1441-1454
[2]  
Adhikari Sharmistha, 2019, Recent Trends in Communication, Computing, and Electronics. Select Proceedings of IC3E 2018. Lecture Notes in Electrical Engineering (LNEE 524), P207, DOI 10.1007/978-981-13-2685-1_21
[3]   Efficient and secure business model for content centric network using elliptic curve cryptography [J].
Adhikari, Sharmistha ;
Ray, Sangram ;
Biswas, Gosta P. ;
Obaidat, Mohammad S. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (01)
[4]  
[Anonymous], 2013, CISCO VISUAL NETWORK
[5]  
[Anonymous], IEEE SYST J
[6]  
[Anonymous], 2016, 7945 RFC
[7]  
[Anonymous], AVISPA AUTOMATED VAL
[8]  
[Anonymous], BEG GUID MOD AN INT
[9]  
[Anonymous], 2005, ADV ELLIPTIC CURVE C
[10]  
[Anonymous], 2009, TECHNICAL REPORT