Secure Content Delivery Scheme Based on Yaksha System for CCMANETs

نویسندگان

  • Xian Guo
  • Tao Feng
  • Jun-li Fang
  • Jing Wang
  • Ye Lu
چکیده

Content-Centric Networking (CCN) is a candidate future Internet architecture that gives favorable promises in MANET environment. It is allowed that data of content producer is cached anywhere in Content Centric MANET (CCMANET). This scheme decoupling of data from the source make traditional end-end authentication transmission unavailable in CCMANET. To ensure high availability of the cached data only to legitimate users, Secure Content Delivery scheme based on Yaksha (YSCD) for CCMANET is proposed in this paper. Yaksha server manages users and verifies user identification, and distributes “license” only to legitimate user for publishing content to network or attaining content from network. In this paper, the license is the joint signature of the legitimate user and the Yaksha server. In YSCD, it is guaranteed that only the legitimate users can publish to the network and access the content cached on the network. Finally, we prove security properties of YSCD in Protocol Composition Logic (PCL).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Publish/subscribe scheme for content centric MANETs

It is allowed that data of the content producer is cached anywhere in Content Centric MANET (CCMANET). This scheme decoupling of data from the data source make traditional end-end authentication transmission unavailable in CCMANET. So, it is a challenge how to ensure content publishing or subscribing only by legitimate users. In this paper, we firstly design a new Yaksha system on Elliptic Curv...

متن کامل

A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering

In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCM

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2016