Skip to main content

Blockchain-Based PKI for Content-Centric Networking

  • Conference paper
  • First Online:
Innovations in Smart Cities Applications Edition 2 (SCA 2018)

Abstract

Content Centric Networking (CCN) is a new communication architecture built on named data, created to optimize network resources and ensure greater security. Due to its new architecture, CCN has several open security and privacy concerns. Today’s internet creates an encrypted end-to-end connection rather than securing content because content are opaque to the network. On the other hand, because of its separation from location, CCN claims to secure the content rather than the connection. In order to build trust between content providers and clients, content must be authenticated and integrity-protected. Since CCN relies on public key cryptography to protect confidentiality of the data and checking integrity and authentication processes, the public key management becomes a crucial issue for CCN security. In this paper, we address the security challenges related to key management, we propose a Decentralized Public Key Infrastructure (DPKI) used with Blockchain to counter the disadvantages of using a centralized authority (CA) and to build content-based security mechanisms used for securely distributing content in CCN.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Labbi, M., et al.: A game theoretic approach to multipath traffic control in Content-Centric Networking. In: International Conference on Advanced Communication Systems and Information Security (ACOSIS). IEEE (2016)

    Google Scholar 

  2. Jacobson, V.: A Description of Content-Centric Networking. Special Invited Plenary Short Course. Future Internet Summer School, Bremen. Lecture (2009)

    Google Scholar 

  3. Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: CoNEXT (2009)

    Google Scholar 

  4. Named Data Networking (NDN) Project by the NDN project team NDN Technical Report NDN-0001, Oct 2010

    Google Scholar 

  5. Wood, C.A., Uzun, E.: Flexible end-to-end content security in CCN. In: Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th , pp. 858–865, 10–13 Jan 2014

    Google Scholar 

  6. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp 127–144 (1998)

    Google Scholar 

  7. Inbarani, W.S., Shenbagamoorthy, G., Kumar Charlie Paul, C.: Proxy re-encryption schemes for data storage security in cloud—a survey. Int. J. Eng. Res. Technol. 2(1) (2013) (ESRSA Publications)

    Google Scholar 

  8. da Silva, R.S., Zorzo, S.D.: On the use of proxy re-encryption to control access to sensitive data on information centric networking. In: ICOIN (2016)

    Google Scholar 

  9. Sahai, A., Waters, B.: Fuzzy identity based encryption. In: Advances in Cryptology, vol. 3494 of LNCS, pp. 457–473 (2005)

    Google Scholar 

  10. Raykova, M., Lakhani, H., Kazmi, H., Gehani, A.: Decentralized authorization and privacy-enhanced routing for information-centric networks. In: ACSAC (2015)

    Google Scholar 

  11. Wang, J., Lang, B.: An efficient KP-ABE scheme for content protection in information-centric networking. In: 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE (2016)

    Google Scholar 

  12. Fotiou, N., Polyzos, G.C.: Decentralized name-based security for content distribution using blockchains. In: Proceedings of Workshop on Multimedia Streaming in Information/Content-Centric Networks (MuSIC), in Conjuction with IEEE INFOCOM, Apr 2016

    Google Scholar 

  13. Smetters, D.K., Jacobson, V.: Securing network content, Oct 2009. PARC Technical Report

    Google Scholar 

  14. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)

    Google Scholar 

  15. Mahadevan, P., Uzun, E., Sevilla, S., Garcia-Luna-Aceves, J.: CCN-KRS: a key resolution service for CCN. In: Proceedings of the 1st International Conference on Information centric Networking, INC 14, pp. 97–106. ACM, New York, NY, USA (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Labbi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Labbi, M., Kannouf, N., Chahid, Y., Benabdellah, M., Azizi, A. (2019). Blockchain-Based PKI for Content-Centric Networking. In: Ben Ahmed, M., Boudhir, A., Younes, A. (eds) Innovations in Smart Cities Applications Edition 2. SCA 2018. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-11196-0_54

Download citation

Publish with us

Policies and ethics