Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free CCN framework with privacy support

Content-centric networking (CCN) used the name of an Interest to seek the target content, where the name was a plaintext and unprotected. Apart from the name, the content in one Data is also unprotected. If an unauthorised node intercepted an Interest, it could infer what kind of content is requested. If the node intercepted a response Data, it could illegally acquire the content. This study focused on the privacy issues of CCN and proposed a CCN framework with privacy support. In this framework, the concept of a privacy name was proposed and accordingly the forwarding information base (FIB) and pending Interest table (PIT) establishment algorithms based on privacy names were proposed. On the basis of the proposed FIB and PIT, the content communication algorithm based on privacy names was presented. In this algorithm, one authorised consumer could use a privacy name to seek, retrieve and share the ciphertext of the content, so the privacy was achieved. Finally, the privacy of this framework was analysed and the performance was evaluated to justify its advantages.

References

    1. 1)
      • 13. Arianfar, S., Koponen, T., Raghavan, B., et al: ‘On preserving privacy in content-oriented networks’. Proc. ACM SIGCOMM Workshop on Information-centric Networking, August 2011, pp. 1924.
    2. 2)
      • 14. Amadeo, M., Molinaro, A., Ruggeri, G.: ‘E-CHANET: routing, forwarding and transport in information-centric multihop wireless networks’, Comput. Commun., 2013, 36, (7), pp. 792803.
    3. 3)
      • 23. Lauinger, T.: ‘Security & scalability of content-centric networking’, Master's thesis, Technische Universität, 2010.
    4. 4)
      • 5. Xylomenos, G., Ververidis, C.N., Siris, V., et al: ‘A survey of information-centric networking research’, IEEE Commun. Surv. Tutor., 2014, 16, (2), pp. 10241049.
    5. 5)
      • 2. Detti, A., Tassetto, D., Melazzi, N.B., et al: ‘Exploiting content centric networking to develop topic-based, publish–subscribe MANET systems’, Ad Hoc Netw., 2015, 24, pp. 115133.
    6. 6)
      • 15. Li, L., Mao, Y., Leng, S.: ‘Privacy addressing and autoconfiguration for mobile ad hoc networks’, Comput. Commun., 2011, 34, (3), pp. 423428.
    7. 7)
      • 9. Jacobson, V., Smetters, D.K., Thornton, J.D., et al: ‘Networking named content’, Commun. ACM, 2012, 55, (1), pp. 117124.
    8. 8)
      • 17. Sourlas, V., Georgatsos, P., Flegkas, P., et al: ‘Partition-based caching in information-centric networks’. 2015 IEEE Conf. Computer Communications Workshops (INFOCOM WKSHPS), April 2015, pp. 396401.
    9. 9)
      • 11. Wang, X., Zhu, X.: ‘Anycast-based content-centric MANET’, IEEE Syst. J., 2016.
    10. 10)
      • 18. Wang, L., Afanasyev, A., Kuntz, R., et al: ‘Rapid traffic information dissemination using named data’. Proc. First ACM Workshop on Emerging Name-oriented Mobile Networking Design-architecture, Algorithms, and Applications, June 2012, pp. 712.
    11. 11)
      • 19. Mohaisen, A., Mekky, H., Zhang, X., et al: ‘Timing attacks on access privacy in information centric networks and countermeasures’, IEEE Trans. Dependable Secur. Comput., 2015, 12, (6), pp. 675687.
    12. 12)
      • 12. Chaabane, A., De Cristofaro, E., Kaafar, M.A., et al: ‘Privacy in content-oriented networking: threats and countermeasures’, ACM SIGCOMM Comput. Commun. Rev., 2013, 43, (3), pp. 2533.
    13. 13)
      • 16. Wang, X., Mu, Y.: ‘Addressing and privacy support for 6LoWPAN’, IEEE Sens. J., 2015, 15, (9), pp. 51935201.
    14. 14)
      • 7. Lu, Y., Li, X., Yu, Y.T., et al: ‘Information-centric delay-tolerant mobile ad-hoc networks’. 2014 IEEE Conf. Computer Communications Workshops (INFOCOM WKSHPS), April 2014, pp. 428433.
    15. 15)
      • 10. Detti, A., Pomposini, M., Blefari-Melazzi, N., et al: ‘Supporting the web with an information centric network that routes by name’, Comput. Netw., 2012, 56, (17), pp. 37053722.
    16. 16)
      • 8. Jacobson, V., Smetters, D.K., Thornton, J.D., et al: ‘Networking named content’. Proc. Fifth Int. Conf. Emerging Networking Experiments and Technologies, December 2009, pp. 112.
    17. 17)
      • 1. Hachem, J., Karamchandani, N., Diggavi, S.: ‘Content caching and delivery over heterogeneous wireless networks’. 2015 IEEE Conf. Computer Communications (INFOCOM), April 2015, pp. 756764.
    18. 18)
      • 3. Thomson, S., Narten, T., Jinmei, T.: ‘IPv6 stateless address autoconfiguration’, IETF RFC 4862, 2007.
    19. 19)
      • 4. Droms, R., Bound, J., Volz, B., et al: ‘Dynamic host configuration protocol for IPv6 (DHCPv6)’, IETF RFC 3315, 2003.
    20. 20)
      • 21. Felten, E.W., Schneider, M.A.: ‘Timing attacks on web privacy’. Proc. Seventh ACM Conf. Computer and Communications Security, November 2000, pp. 2532.
    21. 21)
      • 6. Ghodsi, A., Koponen, T., Rajahalme, J., et al: ‘Naming in content-oriented architectures’. Proc. ACM SIGCOMM Workshop on Information-centric Networking, August 2011, pp. 16.
    22. 22)
      • 22. Ion, M., Zhang, J., Schooler, E.M.: ‘Toward content-centric privacy in ICN: attribute-based encryption and routing’. Proc. 3rd ACM SIGCOMM Workshop on Information-centric Networking, August 2013, pp. 3940.
    23. 23)
      • 20. Broder, A., Mitzenmacher, M.: ‘Network applications of bloom filters: a survey’, Internet Math., 2004, 1, (4), pp. 485509.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2017.0390
Loading

Related content

content/journals/10.1049/iet-ifs.2017.0390
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address