Efficient and secure business model for content centric network using elliptic curve cryptography

dc.contributor.authorAdhikari, Sharmistha
dc.contributor.authorRay, Sangram
dc.contributor.authorBiswas, Gosta P.
dc.contributor.authorObaidat, Mohammad S.
dc.date.accessioned2019-12-11T04:34:05Z
dc.date.available2019-12-11T04:34:05Z
dc.date.issued2018-10-25
dc.descriptionhttps://onlinelibrary.wiley.com/doi/full/10.1002/dac.3839en_US
dc.description.abstractInitially, Internet has evolved as a resource sharing model where resources are identified by IP addresses. However, with rapid technological advancement, resources/hardware has become cheap and thus, the need of sharing hardware over Internet is reduced. Moreover, people are using Internet mainly for information exchange and hence, Internet has gradually shifted from resource sharing to information sharing model. To meet the recent growing demand of information exchange, Content Centric Network (CCN) is envisaged as a clean‐slate future network architecture which is specially destined for smooth content distribution over Internet. In CCN, content is easily made available using network caching mechanism which is misaligned with the existing business policy of content providers/publishers in IP‐based Internet. Hence, the transition from contemporary IP‐based Internet to CCN demands attention for redesigning the business policy of the content publishers/providers. In this paper, we have proposed efficient and secure communication protocols for flexible CCN business model to protect the existing business policies of the content publisher while maintaining the salient CCN features like in‐network content caching and Interest packet aggregation. To enhance the efficiency and security, the Elliptic Curve Cryptography (ECC) is used. The proposed ECC‐based scheme is analyzed to show that it is resilient to relevant existing cryptographic attacks. The performance analysis in terms of less computation and communication overheads and increased efficiency is given. Moreover, a formal security verification of the proposed scheme is done using widely used AVISPA simulator and BAN logic that shows our scheme is well secured.en_US
dc.identifier.citationAdhikari, S., Ray, S., Biswas, G. P., & Obaidat, M. S. (2018). Efficient and secure business model for content centric network using elliptic curve cryptography. International Journal of Communication Systems, 32(1), e3839. https://doi.org/10.1002/dac.3839en_US
dc.identifier.other000453543400003
dc.identifier.urihttp://nur.nu.edu.kz/handle/123456789/4345
dc.language.isoenen_US
dc.publisherInternational Journal of Communication Systemsen_US
dc.rightsAttribution-NonCommercial-ShareAlike 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/us/*
dc.subjectContent Centric Networken_US
dc.subjectCCNen_US
dc.subjectIP‐based Interneten_US
dc.subjectelliptic curve cryptographyen_US
dc.titleEfficient and secure business model for content centric network using elliptic curve cryptographyen_US
dc.typeArticleen_US
workflow.import.sourcescience

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Efficient and secure business model for content centricnetwork using elliptic curve cryptography.pdf
Size:
1.42 MB
Format:
Adobe Portable Document Format
Description:
Article
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
6 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections