2015
DOI: 10.1109/tifs.2014.2365742
|View full text |Cite
|
Sign up to set email alerts
|

LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking

Abstract: Named data networking (NDN) is a new paradigm for the future Internet wherein interest and data packets carry content names rather than the current IP paradigm of source and destination addresses. Security is built into NDN by embedding a public key signature in each data packet to enable verification of authenticity and integrity of the content. However, existing heavyweight signature generation and verification algorithms prevent universal integrity verification among NDN nodes, which may result in content p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
39
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 81 publications
(39 citation statements)
references
References 26 publications
0
39
0
Order By: Relevance
“…Recently several researches have been conducted to deal with the problem of heavy overhead from public key signature-based data packet authentication in CCN [1,4,[7][8][9][10][11][12][13][14]. PARC implemented MHT-based aggregate signing mechanism into CCNx, which is the reference implementation of CCN protocol [1,4,7,8] [9,10].…”
Section: Content-centric Networking (Ccn) and Content Authentication mentioning
confidence: 99%
See 4 more Smart Citations
“…Recently several researches have been conducted to deal with the problem of heavy overhead from public key signature-based data packet authentication in CCN [1,4,[7][8][9][10][11][12][13][14]. PARC implemented MHT-based aggregate signing mechanism into CCNx, which is the reference implementation of CCN protocol [1,4,7,8] [9,10].…”
Section: Content-centric Networking (Ccn) and Content Authentication mentioning
confidence: 99%
“…Even though self-verifying name-based methods can reduce the number of signature generation and verification, they depend on a certain naming architecture and the works in [11,12] did not provide the implementation results. In 2015, Qi Li et al proposed LIVE (Lightweight Integrity Verification architecture), which provides an efficient data segment integrity mechanism and allows a content publisher to control access to contents stored in remote CCN network nodes [14]. In LIVE, a content publisher provides different kinds of tokens to network nodes according to the access control policy and only nodes that receive the authorized token can verify the content and store it in their Content Store.…”
Section: Content-centric Networking (Ccn) and Content Authentication mentioning
confidence: 99%
See 3 more Smart Citations