Effective Caching for the Secure Content Distribution in Information-Centric Networking

08/01/2018
by   Muhammad Bilal, et al.
1

The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective since encrypted content stored in a cache is useless for any consumer except those who know the encryption key. For effective caching of encrypted content in ICN, we propose a novel scheme, called the Secure Distribution of Protected Content (SDPC). SDPC ensures that only authenticated consumers can access the content. The SDPC is a lightweight authentication and key distribution protocol; it allows consumer nodes to verify the originality of the published article by using a symmetric key encryption. The security of the SDPC was proved with BAN logic and Scyther tool verification.

READ FULL TEXT

page 1

page 2

research
07/26/2019

Secure Distribution of Protected Content in Information-Centric Networking

The benefits of the ubiquitous caching in ICN are profound, such feature...
research
04/11/2018

KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks

Content-Centric Networking (CCN) is an internetworking paradigm that off...
research
08/29/2020

A Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email

To send encrypted emails, users typically need to create and exchange ke...
research
10/03/2021

Generating and Managing Strong Passwords using Hotel Mnemonic

Weak passwords and availability of supercomputers to password crackers m...
research
05/08/2022

Entropically secure cipher for messages generated by Markov chains with unknown statistics

In 2002, Russell and Wang proposed a definition of entropically security...
research
10/13/2016

Stream Reasoning-Based Control of Caching Strategies in CCN Routers

Content-Centric Networking (CCN) research addresses the mismatch between...
research
03/31/2020

How to transform the Apple's application 'Find My' into a toolbox for whistleblowers

The recent introduction of Find My app by Apple will open a large window...

Please sign up or login with your details

Forgot password? Click here to reset