Filters








125 Hits in 1e+01 sec

Toward content-centric privacy in ICN

Mihaela Ion, Jianqing Zhang, Eve M. Schooler
2013 Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking - ICN '13  
We design a content-centric privacy scheme for Information-Centric Networking (ICN).  ...  We enhance ICN's ability to support data confidentiality by introducing attribute-based encryption into ICN and making it specific to the data attributes.  ...  An ABE and SDE based encryption scheme is proposed for content-centric data privacy in ICN with fine-grained access control policies.  ... 
doi:10.1145/2491224.2491237 dblp:conf/acmicn/IonZS13 fatcat:6hqpa4tvhzgpjcqfd5l4uutncm

Toward content-centric privacy in ICN

Mihaela Ion, Jianqing Zhang, Eve M. Schooler
2013 Computer communication review  
We design a content-centric privacy scheme for Information-Centric Networking (ICN).  ...  We enhance ICN's ability to support data confidentiality by introducing attribute-based encryption into ICN and making it specific to the data attributes.  ...  An ABE and SDE based encryption scheme is proposed for content-centric data privacy in ICN with fine-grained access control policies.  ... 
doi:10.1145/2534169.2491717 fatcat:udgie3vzqfeabiycxeonijijzy

Toward content-centric privacy in ICN

Mihaela Ion, Jianqing Zhang, Eve M. Schooler
2013 Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM - SIGCOMM '13  
We design a content-centric privacy scheme for Information-Centric Networking (ICN).  ...  We enhance ICN's ability to support data confidentiality by introducing attribute-based encryption into ICN and making it specific to the data attributes.  ...  An ABE and SDE based encryption scheme is proposed for content-centric data privacy in ICN with fine-grained access control policies.  ... 
doi:10.1145/2486001.2491717 dblp:conf/sigcomm/IonZS13 fatcat:7hc5h2wzjfgmnordfah26r6myy

To route or to secure: Tradeoffs in ICNs over MANETs

Hasanat Kazmi, Hasnain Lakhani, Ashish Gehani, Rashid Tahir, Fareed Zaffar
2016 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)  
Information-Centric Networks (ICNs) operating over Mobile Ad hoc Networks (MANETs) are challenged by the node churn, evolving topologies, and limited resources of the underlying network.  ...  Since our findings are based on an actual system, they have significant implications for building efficient ICNs that have security designed in at the outset (rather than added later when options may be  ...  INTRODUCTION Information-Centric Networking (ICN) is an approach for content distribution and retrieval that has drawn considerable attention in recent years.  ... 
doi:10.1109/nca.2016.7778643 dblp:conf/nca/KazmiLGTZ16 fatcat:2zjtjqlzzvgxjilqclmt23qa5q

Recent Advances in Information-Centric Networking based Internet of Things (ICN-IoT) [article]

Sobia Arshad, Muhammad Awais Azam, Mubashir Husain Rehmani, Jonathan Loo
2018 arXiv   pre-print
ICN models are based on naming the content to get rid of address-space scarcity, accessing the content via name-based-routing, caching the content at intermediate nodes to provide reliable, efficient data  ...  Information-Centric Networking (ICN) is being realized as a promising approach to accomplish the shortcomings of current IP-address based networking.  ...  in close collaboration with both University of West London, UK and Waterford Institute of Technology, Ireland.  ... 
arXiv:1710.03473v3 fatcat:psedk3gg3bbjjhxvit5vae5xxu

Towards Information-Centric Networking (ICN) Naming for Internet of Things (IoT)

Sobia Arshad, Muhammad Awais Azam, Syed Hassan Ahmed, Jonathan Loo
2017 Proceedings of the International Conference on Future Networks and Distributed Systems - ICFNDS '17  
Information-Centric Networking (ICN) specifically Name Data Networking (NDN) is the name-base (content-base) networking and takes named-contents as "first class citizen", being considered as the ideal  ...  In this paper, we study NDN-IoT smart campus (in terms of connected devices and contents) and find that it lacks in a reasonable naming and addressing mechanism; and thus we propose NDN based Hybrid Naming  ...  matching it routes this data towards that (or those) interfaces (s).  ... 
doi:10.1145/3102304.3102345 dblp:conf/icfnds/ArshadAAL17 fatcat:ji5yaqo4jnddhazoecrjes7vcq

Understanding the social impact of ICN: between myth and reality

G. Piro, S. Signorello, M. R. Palattella, L. A. Grieco, G. Boggia, T. Engel
2016 AI & Society: The Journal of Human-Centred Systems and Machine Intelligence  
a request including the name of the desired data item; (iii) the request is processed by the network based on specific name resolution and/or routing-by-name approaches [6] .  ...  They include (just to name a few) Content Delivery Networks, Peer-to-Peer architectures, and cloud-based platforms [2][3].  ...  , and by the CoSDN project, INTER/POLLUX/12/4434480, and the IDSECOM project, INTER/POLLUX/13/6450335, both funded by the Fonds National de la Recherche Luxembourg.  ... 
doi:10.1007/s00146-016-0649-4 fatcat:wxq63vrhgvdanignf3wwx5jdbq

Secure Scuttlebutt

Dominic Tarr, Erick Lavoie, Aljoscha Meyer, Christian Tschudin
2019 Proceedings of the 6th ACM Conference on Information-Centric Networking - ICN '19  
CCS CONCEPTS • Networks → Network architectures; • Software and its engineering → Publish-subscribe / event-based architectures; • Computer systems organization → Peer-to-peer architectures; • Information  ...  In this paper we describe SSB's features, its operations as well as the rationale behind the design.  ...  (end-to-end encryption and metadata privacy) and running in pure peer-to-peer mode.  ... 
doi:10.1145/3357150.3357396 dblp:conf/acmicn/TarrLMT19 fatcat:aekfffnurnci3psc7sc7bl7u4u

Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks

Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
As information-centric networks are deployed in increasingly diverse settings, there is a growing need to protect the privacy of participants.  ...  It ensures the integrity and confidentiality of published content, the associated descriptive metadata, and the interests of subscribers.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/2818000.2818001 dblp:conf/acsac/RaykovaLKG15 fatcat:i5nbyz7jgfbpdgkedg7duld36y

Survey Based on Security Aware Caching Scheme for IoT Based Information Centric Networking

M. Sakthivanitha, S. Saradha
2020 EAI Endorsed Transactions on Energy Web  
Security of client and content, originating place, and identity privacy are inherent in ICN paradigm design in contrast to present host centric concept where they are introduced as a second-thought.  ...  In this work, current literature in ICN privacy and security are explored and open challenges are presented.  ...  [40] implemented as routing method for providing caching in routing and name based methods.  ... 
doi:10.4108/eai.1-7-2020.165960 fatcat:ndhynglnpzdapcyx4ftcyrstda

Security, Privacy, and Access Control in Information-Centric Networking: A Survey [article]

Reza Tourani, Travis Mick, Satyajayant Misra, Gaurav Panwar
2017 arXiv   pre-print
In this broad area, we review existing access control mechanisms including encryption-based, attribute-based, session-based, and proxy re-encryption-based access control schemes.  ...  In the broad area of privacy, we discuss user privacy and anonymity, name and signature privacy, and content privacy.  ...  [122] , [123] used attribute-based encryption for access control enforcement in ICN.  ... 
arXiv:1603.03409v3 fatcat:ynhnoqve3nbzrdvlxy4jigzlkq

DataClouds: Enabling Community-Based Data-Centric Services Over the Internet of Things

Hao Yue, Linke Guo, Ruidong Li, Hitoshi Asaeda, Yuguang Fang
2014 IEEE Internet of Things Journal  
advanced data-centric services boosted by the IoT in which users care about content and are oblivious to locations where the content is stored.  ...  In this paper, we propose a novel architecture for the future Internet based on information-centric networking (ICN), which is called DataClouds, to better accommodate datacentric services.  ...  For the purpose of content privacy, content publishers encrypt given content m by using the attributes of this content, e.g., health, sports, business, or transportation.  ... 
doi:10.1109/jiot.2014.2353629 fatcat:mnshxu56k5ervbkrm5elbkwlti

Securing Named Data Networking: Attribute-Based Encryption and Beyond

Licheng Wang, Zonghua Zhang, Mianxiong Dong, Lihua Wang, Zhenfu Cao, Yixian Yang
2018 IEEE Communications Magazine  
To deal with such issues, the recently developed cryptographic primitives such as attribute-based encryption (ABE) have been applied to NDN.  ...  As one of the promising information-centric networking (ICN) architectures, named data networking (NDN) has attracted tremendous research attentions and efforts in the past decade.  ...  It is clear that KSE and ETE are very useful in name-based routing and attribute-based routing in NDN (See Fig.4) , where an interest-packet consists of two parts: encrypted interests, and encrypted requester-attributes  ... 
doi:10.1109/mcom.2018.1701123 fatcat:k4sjlepfxnervhh7phducjcwtu

A Survey of Security Attacks in Information-Centric Networking

Eslam G. AbdAllah, Hossam S. Hassanein, Mohammad Zulkernine
2015 IEEE Communications Surveys and Tutorials  
Further, the paper shows the relation between ICN attacks and unique ICN attributes; ICN attacks and security requirements: confidentiality, integrity, availability, and privacy.  ...  It also provides a taxonomy of these attacks in ICN, which are classified into four main categories: naming, routing, caching, and other miscellaneous related attacks.  ...  ACKNOWLEDGMENT This project is partially funded by the Natural Sciences and Engineering Research Council (NSERC) of Canada and Bell Canada.  ... 
doi:10.1109/comst.2015.2392629 fatcat:2uroqf4lznbm3gyjg2fmozblwe

Improving V2X-6G network capacity using a new UAV-based approach in a Cloud/ICN architecture, case Study: VANET network

Abdeslam Houari, Tomader Mazri, S. Krit
2021 E3S Web of Conferences  
In this article, we present a new approach based on 6G Unmanned Aerial Vehicles (UAV) technology on a vehicular cloud architecture while exploiting the exchange support of information-centric networking  ...  6G of mobile networks plays a crucial role in improving the capacity and enhancing the quality of services of Vehicle-to-Everything (V2X) based networks evolving in an intelligent environment.  ...  Information Centric Networking (ICN) Introduction ICN is a content-centric network architecture proposed to replace the IP Protocol on which the Internet is based.  ... 
doi:10.1051/e3sconf/202129701019 fatcat:wdr2pdkmerc2vhl6ir4osgqtva
« Previous Showing results 1 — 15 out of 125 results