2016 IEEE International Conference on Communications (ICC) 2016
DOI: 10.1109/icc.2016.7511198
|View full text |Cite
|
Sign up to set email alerts
|

DACPI: A decentralized access control protocol for information centric networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…We evaluate ECAC in various scenarios and under different request rates and number of attackers with respect to the number of legitimate users. We measure ICN performance metrics in the presence of and without ECAC, a representative of DACPI, and a representative of centralized access control mechanism (Access Control Enforcement Delegation, ACED) . Our results show that the ECAC requires less overhead than the DACPI in terms of ICN request access time delay and almost achieves results similar to the centralized ACED.…”
Section: Introductionmentioning
confidence: 92%
See 2 more Smart Citations
“…We evaluate ECAC in various scenarios and under different request rates and number of attackers with respect to the number of legitimate users. We measure ICN performance metrics in the presence of and without ECAC, a representative of DACPI, and a representative of centralized access control mechanism (Access Control Enforcement Delegation, ACED) . Our results show that the ECAC requires less overhead than the DACPI in terms of ICN request access time delay and almost achieves results similar to the centralized ACED.…”
Section: Introductionmentioning
confidence: 92%
“…Existing access control mechanisms cannot be applied directly to ICN architectures because of the following three reasons: ICN supports in‐network caching, ICN requests do not have any user identification information, and ICN does not depend on IP addresses. Also, existing access control mechanisms fail to address the following attributes of a “good” access control mechanism: (1) reduce unnecessary communication overhead, (2) eliminate modifications to ICN architectures, (3) minimize the exchange of secret keys, (4) do not require large number of extra operations for access control, (5) prevent access control attacks, (6) preserve the privacy of ICN users, (7) ensure the integrity of the retrieved content, and (8) can be applied with different ICN naming schemes (self‐certifying and hierarchical) …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This makes auditing difficult. Abdallah et al [34] made use of the Diffie-Hellman (DH) protocol in the process of content publishing to achieve decentralized access control. The content, its name, and metadata are sent to the ICN, while only the content name is published.…”
Section: Access Control Schemes For Icnmentioning
confidence: 99%
“…Interest flooding. [27,28,29,30,31] Few authors have tried to analyze these kind of threats in ICN along with various network instabilities. According to their analysis they are able to show that a strong coupling between control and data plane can be misused in various ways.…”
Section: ) Traffic Filtering and Aggregationmentioning
confidence: 99%