Consumer-source authentication with conditional anonymity in information-centric networking.

التفاصيل البيبلوغرافية
العنوان: Consumer-source authentication with conditional anonymity in information-centric networking.
المؤلفون: Lu, Yanrong1,2 (AUTHOR) yr_lu@cauc.edu.cn, Wang, Chenzhuo2 (AUTHOR), Yue, Meng1 (AUTHOR), Wu, Zhijun1 (AUTHOR)
المصدر: Information Sciences. May2023, Vol. 624, p378-394. 17p.
مصطلحات موضوعية: *INTERNET privacy, *DATA security, *CONSUMER protection, *CONSUMERS, ANONYMITY, TWO-way communication, DATA packeting, PERSONALLY identifiable information
مستخلص: • A security framework for ICN to perform access services authentication. • Two concrete protocols provide a similar level of anonymity but different levels of security guarantees. • Rigorous security proof shows the robustness of the proposed scheme. Information-Centric Networking (ICN) necessitates several inherent security mechanisms, e.g., source authentication is performed by embedding content signature per data packet. However, existing ICN source authentication solutions suffer from two security threats: from the end-hosts perspective, any content consumers could retrieve any content no matter whether they are legitimate or not; from a privacy concern perspective, each consumer-source pair has been leaked because the request-respond information is exposed to the network nodes. We propose an anonymous protection mechanism that ensures secure content transmission from multiple sources to one consumer to address both issues. Furthermore, our mechanism enables each anonymously authenticated content consumer to batch verify the authenticity of different types of requested content belonging to different anonymous content producers (sources). To the best of our knowledge, for the first time, we simultaneously consider two-way authentication with consumer anonymity protection for ICN. We focus on the provable security analysis of the proposed scheme. Theoretical analysis results show that our design has significant advantages compared to the existing frameworks. [ABSTRACT FROM AUTHOR]
Copyright of Information Sciences is the property of Elsevier B.V. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Business Source Index
الوصف
تدمد:00200255
DOI:10.1016/j.ins.2022.12.051