Article
Version 1
Preserved in Portico This version is not peer-reviewed
DSAC-Digital Signature for Access Control in Information Centric Network
Version 1
: Received: 9 May 2021 / Approved: 10 May 2021 / Online: 10 May 2021 (11:37:05 CEST)
Version 2 : Received: 3 September 2021 / Approved: 7 September 2021 / Online: 7 September 2021 (07:51:56 CEST)
Version 2 : Received: 3 September 2021 / Approved: 7 September 2021 / Online: 7 September 2021 (07:51:56 CEST)
How to cite: Ullah, Z.; Khan, S. DSAC-Digital Signature for Access Control in Information Centric Network. Preprints 2021, 2021050179. https://doi.org/10.20944/preprints202105.0179.v1 Ullah, Z.; Khan, S. DSAC-Digital Signature for Access Control in Information Centric Network. Preprints 2021, 2021050179. https://doi.org/10.20944/preprints202105.0179.v1
Abstract
The world is growing very rapidly concerning technology. In the next-generation Internet, the existing architecture requires to be upgraded from Host-Centric Networking paradigm to Information-centric networking architecture. The unique aspect of information-centric networking is in-network cashing. Due to the system augmentation and In-network cashing technique, this novel system needs extremely high content security to ensure system integrity and maintenance. 5G network may be supported by the Information-Centric Network due to its high data transmission rate. In order to handle the serious security issues such as attack on confidentiality, authentication and integrity of the content, a Digital Signature based Access Control Mechanism in Information-Centric Network (DSAC) scheme is proposed to enhance security of ICN. Briefly, this new scheme uses Digital Signature, hash function, Trusted Third Party (TTP) and Proxy TTP. The client request for content, after receiving a request, the content provider generates and encrypts content with the digital signature and random value ‘k’ hash function and send it to TTP. After the signing process, the TTP sends the encryption hash key to Proxy TTP. In this proposed scheme authentication, confidentiality, the integrity aspects of the content security are improved.
Keywords
Information Centric Network; Authentication; Digital Signature
Subject
Computer Science and Mathematics, Algebra and Number Theory
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment