Javascript must be enabled to continue!
DSAC-Digital Signature for Access Control in Information Centric Network
View through CrossRef
The world is growing very rapidly concerning technology. In the next-generation Internet, the existing architecture requires to be upgraded from Host-Centric Networking paradigm to Information-centric networking architecture. The unique aspect of information-centric networking is in-network cashing. Due to the system augmentation and In-network cashing technique, this novel system needs extremely high content security to ensure system integrity and maintenance. 5G network may be supported by the Information-Centric Network due to its high data transmission rate. In order to handle the serious security issues such as attack on confidentiality, authentication and integrity of the content, a Digital Signature based Access Control Mechanism in Information-Centric Network (DSAC) scheme is proposed to enhance security of ICN. Briefly, this new scheme uses Digital Signature, hash function, Trusted Third Party (TTP) and Proxy TTP. The client request for content, after receiving a request, the content provider generates and encrypts content with the digital signature and random value ‘k’ hash function and send it to TTP. After the signing process, the TTP sends the encryption hash key to Proxy TTP. In this proposed scheme authentication, confidentiality, the integrity aspects of the content security are improved.
Title: DSAC-Digital Signature for Access Control in Information Centric Network
Description:
The world is growing very rapidly concerning technology.
In the next-generation Internet, the existing architecture requires to be upgraded from Host-Centric Networking paradigm to Information-centric networking architecture.
The unique aspect of information-centric networking is in-network cashing.
Due to the system augmentation and In-network cashing technique, this novel system needs extremely high content security to ensure system integrity and maintenance.
5G network may be supported by the Information-Centric Network due to its high data transmission rate.
In order to handle the serious security issues such as attack on confidentiality, authentication and integrity of the content, a Digital Signature based Access Control Mechanism in Information-Centric Network (DSAC) scheme is proposed to enhance security of ICN.
Briefly, this new scheme uses Digital Signature, hash function, Trusted Third Party (TTP) and Proxy TTP.
The client request for content, after receiving a request, the content provider generates and encrypts content with the digital signature and random value ‘k’ hash function and send it to TTP.
After the signing process, the TTP sends the encryption hash key to Proxy TTP.
In this proposed scheme authentication, confidentiality, the integrity aspects of the content security are improved.
Related Results
A Novel Method for Developing Post-quantum Digital Signature Algorithms on Non-commutative Associative Algebras
A Novel Method for Developing Post-quantum Digital Signature Algorithms on Non-commutative Associative Algebras
Introduction: Development of practical post-quantum signature algorithms is a current challenge in the area of cryptography. Recently, several candidates on post-quantum signature ...
Perceptions of Telemedicine and Rural Healthcare Access in a Developing Country: A Case Study of Bayelsa State, Nigeria
Perceptions of Telemedicine and Rural Healthcare Access in a Developing Country: A Case Study of Bayelsa State, Nigeria
Abstract
Introduction
Telemedicine is the remote delivery of healthcare services using information and communication technologies and has gained global recognition as a solution to...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Eksistensi Digital Wedding Di Era Disrupsi Dalam Maqashid Syariah
Eksistensi Digital Wedding Di Era Disrupsi Dalam Maqashid Syariah
Abstract
The era of disruption has presented a new phenomenon in wedding procedures, namely digital weddings. The emergence of digital marriage raises questions about its validity...
A post-quantum digital signature scheme on groups with four-dimensional cyclicity
A post-quantum digital signature scheme on groups with four-dimensional cyclicity
Introduction: Development of practical post-quantum signature schemes is a current challenge in the applied cryptography. Recently, several different forms of the hidden discrete l...
Development and Validation a Machine Learning Nomogram Model to Differentiation Mycoplasma Pneumoniae Coinfection with Other Pathogen in Children Patients
Development and Validation a Machine Learning Nomogram Model to Differentiation Mycoplasma Pneumoniae Coinfection with Other Pathogen in Children Patients
Abstract
Objectives
The aim of this study was to develop and validate a machine learning model for distinguishing mycoplasma pneumoniae coinfection with other pathogens (C...
The Predicting Power Of Digital Reading Attitudes Of Primary School Teacher Candidates’ Digital Reading Attitudes On Their Digital Literacy
The Predicting Power Of Digital Reading Attitudes Of Primary School Teacher Candidates’ Digital Reading Attitudes On Their Digital Literacy
In this study, it was is aimed to examine the predictive power of primary school teacher candidates’ digital reading attitudes on their digital literacy. The relational survey mode...
A novel method for development of post-quantum digital signature schemes
A novel method for development of post-quantum digital signature schemes
Introduction: Development of post-quantum digital signature standards represents a current challenge in the area of cryptography. Recently, the signature schemes based on the hidde...


