Abstract
Content Centric Networking (CCN) is a new communication architecture built on named data, created to optimize network resources and ensure greater security. Due to its new architecture, CCN has several open security and privacy concerns. Today’s internet creates an encrypted end-to-end connection rather than securing content because content are opaque to the network. On the other hand, because of its separation from location, CCN claims to secure the content rather than the connection. In order to build trust between content providers and clients, content must be authenticated and integrity-protected. Since CCN relies on public key cryptography to protect confidentiality of the data and checking integrity and authentication processes, the public key management becomes a crucial issue for CCN security. In this paper, we address the security challenges related to key management, we propose a Decentralized Public Key Infrastructure (DPKI) used with Blockchain to counter the disadvantages of using a centralized authority (CA) and to build content-based security mechanisms used for securely distributing content in CCN.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Labbi, M., et al.: A game theoretic approach to multipath traffic control in Content-Centric Networking. In: International Conference on Advanced Communication Systems and Information Security (ACOSIS). IEEE (2016)
Jacobson, V.: A Description of Content-Centric Networking. Special Invited Plenary Short Course. Future Internet Summer School, Bremen. Lecture (2009)
Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: CoNEXT (2009)
Named Data Networking (NDN) Project by the NDN project team NDN Technical Report NDN-0001, Oct 2010
Wood, C.A., Uzun, E.: Flexible end-to-end content security in CCN. In: Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th , pp. 858–865, 10–13 Jan 2014
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp 127–144 (1998)
Inbarani, W.S., Shenbagamoorthy, G., Kumar Charlie Paul, C.: Proxy re-encryption schemes for data storage security in cloud—a survey. Int. J. Eng. Res. Technol. 2(1) (2013) (ESRSA Publications)
da Silva, R.S., Zorzo, S.D.: On the use of proxy re-encryption to control access to sensitive data on information centric networking. In: ICOIN (2016)
Sahai, A., Waters, B.: Fuzzy identity based encryption. In: Advances in Cryptology, vol. 3494 of LNCS, pp. 457–473 (2005)
Raykova, M., Lakhani, H., Kazmi, H., Gehani, A.: Decentralized authorization and privacy-enhanced routing for information-centric networks. In: ACSAC (2015)
Wang, J., Lang, B.: An efficient KP-ABE scheme for content protection in information-centric networking. In: 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE (2016)
Fotiou, N., Polyzos, G.C.: Decentralized name-based security for content distribution using blockchains. In: Proceedings of Workshop on Multimedia Streaming in Information/Content-Centric Networks (MuSIC), in Conjuction with IEEE INFOCOM, Apr 2016
Smetters, D.K., Jacobson, V.: Securing network content, Oct 2009. PARC Technical Report
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)
Mahadevan, P., Uzun, E., Sevilla, S., Garcia-Luna-Aceves, J.: CCN-KRS: a key resolution service for CCN. In: Proceedings of the 1st International Conference on Information centric Networking, INC 14, pp. 97–106. ACM, New York, NY, USA (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Labbi, M., Kannouf, N., Chahid, Y., Benabdellah, M., Azizi, A. (2019). Blockchain-Based PKI for Content-Centric Networking. In: Ben Ahmed, M., Boudhir, A., Younes, A. (eds) Innovations in Smart Cities Applications Edition 2. SCA 2018. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-11196-0_54
Download citation
DOI: https://doi.org/10.1007/978-3-030-11196-0_54
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-11195-3
Online ISBN: 978-3-030-11196-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)