Proceedings of the 6th ACM Conference on Information-Centric Networking 2019
DOI: 10.1145/3357150.3357393
|View full text |Cite
|
Sign up to set email alerts
|

NDN-Abs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…The experiment is set up in two parts: the first part tests the security of the communication strategy on the CESNET2010 topology, as shown in Figure 2, that is, whether the certain points in the flooding network have an impact on the data acquisition, where the main evaluation index is the data correctness and the circled points are those used for flooding attack; The second part tests the key update speed, and the network scale is 100, 200, 300, 400, 500, 600, 700, 800, and 900 CRs. In addition, references 5,6 is selected as the comparison benchmarks, for short PPL and ABS respectively. The experiment assumes that the network nodes and transmission channels are insecure, and the connectivity between any two nodes in the network cannot be guaranteed, and the attack method is flood attack.…”
Section: Resultsmentioning
confidence: 99%
“…The experiment is set up in two parts: the first part tests the security of the communication strategy on the CESNET2010 topology, as shown in Figure 2, that is, whether the certain points in the flooding network have an impact on the data acquisition, where the main evaluation index is the data correctness and the circled points are those used for flooding attack; The second part tests the key update speed, and the network scale is 100, 200, 300, 400, 500, 600, 700, 800, and 900 CRs. In addition, references 5,6 is selected as the comparison benchmarks, for short PPL and ABS respectively. The experiment assumes that the network nodes and transmission channels are insecure, and the connectivity between any two nodes in the network cannot be guaranteed, and the attack method is flood attack.…”
Section: Resultsmentioning
confidence: 99%
“…Despite the advantages of this concept in solving the replica content problem, additional interaction between the user and the producer is required to obtain the decryption key, resulting in losing the NDN's advantage in terms of content recovery time. Similarly, the works in [18]- [20] also use content encryption by a key and, therefore, have the same disadvantage of needing additional interaction with the producer or the management center to request the decryption key. Feng and Guo [21] used content encryption by the attribute-based key and ciphertext policy.…”
Section: Related Workmentioning
confidence: 99%
“…ABS, as a new, important signature method, is used in many areas, such as emerging named data networks [12], edge computing [13], swarm intelligence awareness [14] and healthcare systems [15]. The first ABS scheme [3] was based on groups with bilinear pairs and can only be proved secure in the generic group model.…”
Section: Related Workmentioning
confidence: 99%