2020
DOI: 10.3390/fi12080130
|View full text |Cite
|
Sign up to set email alerts
|

A PEKS-Based NDN Strategy for Name Privacy

Abstract: Named Data Networking (NDN), where addressable content name is used, is considered as a candidate of next-generation Internet architectures. NDN routers use In-Network cache to replicate and store passing packets to make faster content delivery. Because NDN uses a human-readable name, it is easy for an adversary to guess what kind of content is requested. To solve this issue, we develop a PEKS-based strategy for forwarding packets, where PEKS stands for public key encryption with keyword search. We implement t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…There are three ways to mitigate replay attack in NDN: timestamp and nonces [76], [77], [78], [79], authentication [70], [80], [81], [82], [83], [84], and the use of blockchain [85], [86].…”
Section: Replay Attackmentioning
confidence: 99%
“…There are three ways to mitigate replay attack in NDN: timestamp and nonces [76], [77], [78], [79], authentication [70], [80], [81], [82], [83], [84], and the use of blockchain [85], [86].…”
Section: Replay Attackmentioning
confidence: 99%
“…The sixth paper [9] focuses on name data networking (NDN), a subtype of information centric networking (ICN), and proposed a strategy (PEKS-based NDN strategy) for protecting the names in NDN based on the best route strategy and multicast strategy. The proposed strategy can achieve higher privacy preservation without the need for a master secret key, which can be used to derive private keys.…”
Section: Contributionsmentioning
confidence: 99%