http://iet.metastore.ingenta.com
1887

CCN framework with privacy support

CCN framework with privacy support

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Content-centric networking (CCN) used the name of an Interest to seek the target content, where the name was a plaintext and unprotected. Apart from the name, the content in one Data is also unprotected. If an unauthorised node intercepted an Interest, it could infer what kind of content is requested. If the node intercepted a response Data, it could illegally acquire the content. This study focused on the privacy issues of CCN and proposed a CCN framework with privacy support. In this framework, the concept of a privacy name was proposed and accordingly the forwarding information base (FIB) and pending Interest table (PIT) establishment algorithms based on privacy names were proposed. On the basis of the proposed FIB and PIT, the content communication algorithm based on privacy names was presented. In this algorithm, one authorised consumer could use a privacy name to seek, retrieve and share the ciphertext of the content, so the privacy was achieved. Finally, the privacy of this framework was analysed and the performance was evaluated to justify its advantages.

References

    1. 1)
      • J. Hachem , N. Karamchandani , S. Diggavi .
        1. Hachem, J., Karamchandani, N., Diggavi, S.: ‘Content caching and delivery over heterogeneous wireless networks’. 2015 IEEE Conf. Computer Communications (INFOCOM), April 2015, pp. 756764.
        . 2015 IEEE Conf. Computer Communications (INFOCOM) , 756 - 764
    2. 2)
      • A. Detti , D. Tassetto , N.B. Melazzi .
        2. Detti, A., Tassetto, D., Melazzi, N.B., et al: ‘Exploiting content centric networking to develop topic-based, publish–subscribe MANET systems’, Ad Hoc Netw., 2015, 24, pp. 115133.
        . Ad Hoc Netw. , 115 - 133
    3. 3)
      • S. Thomson , T. Narten , T. Jinmei .
        3. Thomson, S., Narten, T., Jinmei, T.: ‘IPv6 stateless address autoconfiguration’, IETF RFC 4862, 2007.
        .
    4. 4)
      • R. Droms , J. Bound , B. Volz .
        4. Droms, R., Bound, J., Volz, B., et al: ‘Dynamic host configuration protocol for IPv6 (DHCPv6)’, IETF RFC 3315, 2003.
        .
    5. 5)
      • G. Xylomenos , C.N. Ververidis , V. Siris .
        5. Xylomenos, G., Ververidis, C.N., Siris, V., et al: ‘A survey of information-centric networking research’, IEEE Commun. Surv. Tutor., 2014, 16, (2), pp. 10241049.
        . IEEE Commun. Surv. Tutor. , 2 , 1024 - 1049
    6. 6)
      • A. Ghodsi , T. Koponen , J. Rajahalme .
        6. Ghodsi, A., Koponen, T., Rajahalme, J., et al: ‘Naming in content-oriented architectures’. Proc. ACM SIGCOMM Workshop on Information-centric Networking, August 2011, pp. 16.
        . Proc. ACM SIGCOMM Workshop on Information-centric Networking , 1 - 6
    7. 7)
      • Y. Lu , X. Li , Y.T. Yu .
        7. Lu, Y., Li, X., Yu, Y.T., et al: ‘Information-centric delay-tolerant mobile ad-hoc networks’. 2014 IEEE Conf. Computer Communications Workshops (INFOCOM WKSHPS), April 2014, pp. 428433.
        . 2014 IEEE Conf. Computer Communications Workshops (INFOCOM WKSHPS) , 428 - 433
    8. 8)
      • V. Jacobson , D.K. Smetters , J.D. Thornton .
        8. Jacobson, V., Smetters, D.K., Thornton, J.D., et al: ‘Networking named content’. Proc. Fifth Int. Conf. Emerging Networking Experiments and Technologies, December 2009, pp. 112.
        . Proc. Fifth Int. Conf. Emerging Networking Experiments and Technologies , 1 - 12
    9. 9)
      • V. Jacobson , D.K. Smetters , J.D. Thornton .
        9. Jacobson, V., Smetters, D.K., Thornton, J.D., et al: ‘Networking named content’, Commun. ACM, 2012, 55, (1), pp. 117124.
        . Commun. ACM , 1 , 117 - 124
    10. 10)
      • A. Detti , M. Pomposini , N. Blefari-Melazzi .
        10. Detti, A., Pomposini, M., Blefari-Melazzi, N., et al: ‘Supporting the web with an information centric network that routes by name’, Comput. Netw., 2012, 56, (17), pp. 37053722.
        . Comput. Netw. , 17 , 3705 - 3722
    11. 11)
      • X. Wang , X. Zhu .
        11. Wang, X., Zhu, X.: ‘Anycast-based content-centric MANET’, IEEE Syst. J., 2016.
        . IEEE Syst. J.
    12. 12)
      • A. Chaabane , E. De Cristofaro , M.A. Kaafar .
        12. Chaabane, A., De Cristofaro, E., Kaafar, M.A., et al: ‘Privacy in content-oriented networking: threats and countermeasures’, ACM SIGCOMM Comput. Commun. Rev., 2013, 43, (3), pp. 2533.
        . ACM SIGCOMM Comput. Commun. Rev. , 3 , 25 - 33
    13. 13)
      • S. Arianfar , T. Koponen , B. Raghavan .
        13. Arianfar, S., Koponen, T., Raghavan, B., et al: ‘On preserving privacy in content-oriented networks’. Proc. ACM SIGCOMM Workshop on Information-centric Networking, August 2011, pp. 1924.
        . Proc. ACM SIGCOMM Workshop on Information-centric Networking , 19 - 24
    14. 14)
      • M. Amadeo , A. Molinaro , G. Ruggeri .
        14. Amadeo, M., Molinaro, A., Ruggeri, G.: ‘E-CHANET: routing, forwarding and transport in information-centric multihop wireless networks’, Comput. Commun., 2013, 36, (7), pp. 792803.
        . Comput. Commun. , 7 , 792 - 803
    15. 15)
      • L. Li , Y. Mao , S. Leng .
        15. Li, L., Mao, Y., Leng, S.: ‘Privacy addressing and autoconfiguration for mobile ad hoc networks’, Comput. Commun., 2011, 34, (3), pp. 423428.
        . Comput. Commun. , 3 , 423 - 428
    16. 16)
      • X. Wang , Y. Mu .
        16. Wang, X., Mu, Y.: ‘Addressing and privacy support for 6LoWPAN’, IEEE Sens. J., 2015, 15, (9), pp. 51935201.
        . IEEE Sens. J. , 9 , 5193 - 5201
    17. 17)
      • V. Sourlas , P. Georgatsos , P. Flegkas .
        17. Sourlas, V., Georgatsos, P., Flegkas, P., et al: ‘Partition-based caching in information-centric networks’. 2015 IEEE Conf. Computer Communications Workshops (INFOCOM WKSHPS), April 2015, pp. 396401.
        . 2015 IEEE Conf. Computer Communications Workshops (INFOCOM WKSHPS) , 396 - 401
    18. 18)
      • L. Wang , A. Afanasyev , R. Kuntz .
        18. Wang, L., Afanasyev, A., Kuntz, R., et al: ‘Rapid traffic information dissemination using named data’. Proc. First ACM Workshop on Emerging Name-oriented Mobile Networking Design-architecture, Algorithms, and Applications, June 2012, pp. 712.
        . Proc. First ACM Workshop on Emerging Name-oriented Mobile Networking Design-architecture, Algorithms, and Applications , 7 - 12
    19. 19)
      • A. Mohaisen , H. Mekky , X. Zhang .
        19. Mohaisen, A., Mekky, H., Zhang, X., et al: ‘Timing attacks on access privacy in information centric networks and countermeasures’, IEEE Trans. Dependable Secur. Comput., 2015, 12, (6), pp. 675687.
        . IEEE Trans. Dependable Secur. Comput. , 6 , 675 - 687
    20. 20)
      • A. Broder , M. Mitzenmacher .
        20. Broder, A., Mitzenmacher, M.: ‘Network applications of bloom filters: a survey’, Internet Math., 2004, 1, (4), pp. 485509.
        . Internet Math. , 4 , 485 - 509
    21. 21)
      • E.W. Felten , M.A. Schneider .
        21. Felten, E.W., Schneider, M.A.: ‘Timing attacks on web privacy’. Proc. Seventh ACM Conf. Computer and Communications Security, November 2000, pp. 2532.
        . Proc. Seventh ACM Conf. Computer and Communications Security , 25 - 32
    22. 22)
      • M. Ion , J. Zhang , E.M. Schooler .
        22. Ion, M., Zhang, J., Schooler, E.M.: ‘Toward content-centric privacy in ICN: attribute-based encryption and routing’. Proc. 3rd ACM SIGCOMM Workshop on Information-centric Networking, August 2013, pp. 3940.
        . Proc. 3rd ACM SIGCOMM Workshop on Information-centric Networking , 39 - 40
    23. 23)
      • T. Lauinger .
        23. Lauinger, T.: ‘Security & scalability of content-centric networking’, Master's thesis, Technische Universität, 2010.
        .
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2017.0390
Loading

Related content

content/journals/10.1049/iet-ifs.2017.0390
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address