Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

DSAC-Digital Signature for Access Control in Information Centric Network

Version 1 : Received: 9 May 2021 / Approved: 10 May 2021 / Online: 10 May 2021 (11:37:05 CEST)

How to cite: Ullah, Z.; Khan, S. DSAC-Digital Signature for Access Control in Information Centric Network. Preprints 2021, 2021050179 (doi: 10.20944/preprints202105.0179.v1). Ullah, Z.; Khan, S. DSAC-Digital Signature for Access Control in Information Centric Network. Preprints 2021, 2021050179 (doi: 10.20944/preprints202105.0179.v1).

Abstract

The world is growing very rapidly concerning technology. In the next-generation Internet, the existing architecture requires to be upgraded from Host-Centric Networking paradigm to Information-centric networking architecture. The unique aspect of information-centric networking is in-network cashing. Due to the system augmentation and In-network cashing technique, this novel system needs extremely high content security to ensure system integrity and maintenance. 5G network may be supported by the Information-Centric Network due to its high data transmission rate. In order to handle the serious security issues such as attack on confidentiality, authentication and integrity of the content, a Digital Signature based Access Control Mechanism in Information-Centric Network (DSAC) scheme is proposed to enhance security of ICN. Briefly, this new scheme uses Digital Signature, hash function, Trusted Third Party (TTP) and Proxy TTP. The client request for content, after receiving a request, the content provider generates and encrypts content with the digital signature and random value ‘k’ hash function and send it to TTP. After the signing process, the TTP sends the encryption hash key to Proxy TTP. In this proposed scheme authentication, confidentiality, the integrity aspects of the content security are improved.

Subject Areas

Information Centric Network; Authentication; Digital Signature

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.