2022
DOI: 10.1109/tnsm.2022.3165144
|View full text |Cite
|
Sign up to set email alerts
|

A Security Certification Scheme for Information-Centric Networks

Abstract: Information-Centric Networking is an emerging alternative to host-centric networking designed for large-scale content distribution and stricter privacy requirements. Recent research on Information-Centric Networking focused on the protection of the network from attacks targeting the content delivery protocols, while assuming genuine content can always be retrieved from trustworthy nodes. In this paper, we depart from the assumption of the trustworthiness of network nodes and propose a novel certification meth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…In order to support QoS and constraintaware integration, the CSP exposes to the Deployment Agents suitable hooks to relevant resource (e.g., resource manager for deployment) or services (e.g., services offering security features) constituting their capabilities (R5). For instance, the CSP can offer a hook to access non-functional certificates (i.e., using certification scheme in [17], [18]) proving some capabilities or to invoke authentication services to support authentication requirements.…”
Section: B Deployment Architecturementioning
confidence: 99%
“…In order to support QoS and constraintaware integration, the CSP exposes to the Deployment Agents suitable hooks to relevant resource (e.g., resource manager for deployment) or services (e.g., services offering security features) constituting their capabilities (R5). For instance, the CSP can offer a hook to access non-functional certificates (i.e., using certification scheme in [17], [18]) proving some capabilities or to invoke authentication services to support authentication requirements.…”
Section: B Deployment Architecturementioning
confidence: 99%