http://iet.metastore.ingenta.com
1887

CCN framework with privacy support

CCN framework with privacy support

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Content-centric networking (CCN) used the name of an Interest to seek the target content, where the name was a plaintext and unprotected. Apart from the name, the content in one Data is also unprotected. If an unauthorised node intercepted an Interest, it could infer what kind of content is requested. If the node intercepted a response Data, it could illegally acquire the content. This study focused on the privacy issues of CCN and proposed a CCN framework with privacy support. In this framework, the concept of a privacy name was proposed and accordingly the forwarding information base (FIB) and pending Interest table (PIT) establishment algorithms based on privacy names were proposed. On the basis of the proposed FIB and PIT, the content communication algorithm based on privacy names was presented. In this algorithm, one authorised consumer could use a privacy name to seek, retrieve and share the ciphertext of the content, so the privacy was achieved. Finally, the privacy of this framework was analysed and the performance was evaluated to justify its advantages.

References

    1. 1)
      • 1. Hachem, J., Karamchandani, N., Diggavi, S.: ‘Content caching and delivery over heterogeneous wireless networks’. 2015 IEEE Conf. Computer Communications (INFOCOM), April 2015, pp. 756764.
    2. 2)
      • 2. Detti, A., Tassetto, D., Melazzi, N.B., et al: ‘Exploiting content centric networking to develop topic-based, publish–subscribe MANET systems’, Ad Hoc Netw., 2015, 24, pp. 115133.
    3. 3)
      • 3. Thomson, S., Narten, T., Jinmei, T.: ‘IPv6 stateless address autoconfiguration’, IETF RFC 4862, 2007.
    4. 4)
      • 4. Droms, R., Bound, J., Volz, B., et al: ‘Dynamic host configuration protocol for IPv6 (DHCPv6)’, IETF RFC 3315, 2003.
    5. 5)
      • 5. Xylomenos, G., Ververidis, C.N., Siris, V., et al: ‘A survey of information-centric networking research’, IEEE Commun. Surv. Tutor., 2014, 16, (2), pp. 10241049.
    6. 6)
      • 6. Ghodsi, A., Koponen, T., Rajahalme, J., et al: ‘Naming in content-oriented architectures’. Proc. ACM SIGCOMM Workshop on Information-centric Networking, August 2011, pp. 16.
    7. 7)
      • 7. Lu, Y., Li, X., Yu, Y.T., et al: ‘Information-centric delay-tolerant mobile ad-hoc networks’. 2014 IEEE Conf. Computer Communications Workshops (INFOCOM WKSHPS), April 2014, pp. 428433.
    8. 8)
      • 8. Jacobson, V., Smetters, D.K., Thornton, J.D., et al: ‘Networking named content’. Proc. Fifth Int. Conf. Emerging Networking Experiments and Technologies, December 2009, pp. 112.
    9. 9)
      • 9. Jacobson, V., Smetters, D.K., Thornton, J.D., et al: ‘Networking named content’, Commun. ACM, 2012, 55, (1), pp. 117124.
    10. 10)
      • 10. Detti, A., Pomposini, M., Blefari-Melazzi, N., et al: ‘Supporting the web with an information centric network that routes by name’, Comput. Netw., 2012, 56, (17), pp. 37053722.
    11. 11)
      • 11. Wang, X., Zhu, X.: ‘Anycast-based content-centric MANET’, IEEE Syst. J., 2016.
    12. 12)
      • 12. Chaabane, A., De Cristofaro, E., Kaafar, M.A., et al: ‘Privacy in content-oriented networking: threats and countermeasures’, ACM SIGCOMM Comput. Commun. Rev., 2013, 43, (3), pp. 2533.
    13. 13)
      • 13. Arianfar, S., Koponen, T., Raghavan, B., et al: ‘On preserving privacy in content-oriented networks’. Proc. ACM SIGCOMM Workshop on Information-centric Networking, August 2011, pp. 1924.
    14. 14)
      • 14. Amadeo, M., Molinaro, A., Ruggeri, G.: ‘E-CHANET: routing, forwarding and transport in information-centric multihop wireless networks’, Comput. Commun., 2013, 36, (7), pp. 792803.
    15. 15)
      • 15. Li, L., Mao, Y., Leng, S.: ‘Privacy addressing and autoconfiguration for mobile ad hoc networks’, Comput. Commun., 2011, 34, (3), pp. 423428.
    16. 16)
      • 16. Wang, X., Mu, Y.: ‘Addressing and privacy support for 6LoWPAN’, IEEE Sens. J., 2015, 15, (9), pp. 51935201.
    17. 17)
      • 17. Sourlas, V., Georgatsos, P., Flegkas, P., et al: ‘Partition-based caching in information-centric networks’. 2015 IEEE Conf. Computer Communications Workshops (INFOCOM WKSHPS), April 2015, pp. 396401.
    18. 18)
      • 18. Wang, L., Afanasyev, A., Kuntz, R., et al: ‘Rapid traffic information dissemination using named data’. Proc. First ACM Workshop on Emerging Name-oriented Mobile Networking Design-architecture, Algorithms, and Applications, June 2012, pp. 712.
    19. 19)
      • 19. Mohaisen, A., Mekky, H., Zhang, X., et al: ‘Timing attacks on access privacy in information centric networks and countermeasures’, IEEE Trans. Dependable Secur. Comput., 2015, 12, (6), pp. 675687.
    20. 20)
      • 20. Broder, A., Mitzenmacher, M.: ‘Network applications of bloom filters: a survey’, Internet Math., 2004, 1, (4), pp. 485509.
    21. 21)
      • 21. Felten, E.W., Schneider, M.A.: ‘Timing attacks on web privacy’. Proc. Seventh ACM Conf. Computer and Communications Security, November 2000, pp. 2532.
    22. 22)
      • 22. Ion, M., Zhang, J., Schooler, E.M.: ‘Toward content-centric privacy in ICN: attribute-based encryption and routing’. Proc. 3rd ACM SIGCOMM Workshop on Information-centric Networking, August 2013, pp. 3940.
    23. 23)
      • 23. Lauinger, T.: ‘Security & scalability of content-centric networking’, Master's thesis, Technische Universität, 2010.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2017.0390
Loading

Related content

content/journals/10.1049/iet-ifs.2017.0390
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address