Effective Caching for the Secure Content Distribution in Information-Centric Networking

被引:0
作者
Bital, Muhammad [1 ]
Kang, Shin-Gak [2 ]
Pack, Sangheon [3 ]
机构
[1] Hankuk Univ Foreign Studies, Yongin, South Korea
[2] Elect & Telecommun Res Inst, Daejeon, South Korea
[3] Korea Univ, Seoul, South Korea
来源
2018 IEEE 87TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING) | 2018年
关键词
Information-Centric Networking; Content Distribution; In-network Caching; Authentication; Effective Caching;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective since encrypted content stored in a cache is useless for any consumer except those who know the encryption key. For effective caching of encrypted content in ICN, we propose a novel scheme, called the Secure Distribution of Protected Content (SDPC). SDPC ensures that only authenticated consumers can access the content. The SDPC is a lightweight authentication and key distribution protocol; it allows consumer nodes to verify the originality of the published article by using a symmetric key encryption. The security of the SDPC was proved with BAN logic and Scyther tool verification.
引用
收藏
页数:7
相关论文
共 14 条
  • [1] A Survey of Information-Centric Networking
    Ahlgren, Bengt
    Dannewitz, Christian
    Imbrenda, Claudio
    Kutscher, Dirk
    Ohlman, Boerje
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (07) : 26 - 36
  • [2] An Authentication Protocol for Future Sensor Networks
    Bilal, Muhammad
    Kang, Shin-Gak
    [J]. SENSORS, 2017, 17 (05):
  • [3] A Cache Management Scheme for Efficient Content Eviction and Replication in Cache Networks
    Bilal, Muhammad
    Kang, Shin-Gak
    [J]. IEEE ACCESS, 2017, 5 : 1692 - 1701
  • [4] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13
  • [5] Cho E., 2014, P WORKSH SEC EM NETW
  • [6] Cremers C., SCYTHER TOOL VERIFIC
  • [7] Cremers C, 2006, THEORETICAL COMPUTER, V367, P1
  • [8] Ge C., 2013, IEEE COMMUNICATIONS, V15
  • [9] Liu HH, 2014, IEEE INT C BIOINFORM
  • [10] Casper: A compiler for the analysis of security protocols
    Lowe, G
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 18 - 30