2016 18th International Conference on Advanced Communication Technology (ICACT) 2016
DOI: 10.1109/icact.2016.7423368
|View full text |Cite
|
Sign up to set email alerts
|

Defend against Internet censorship in named data networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Note that we do not assume Adv who aims to block some specific content throughout the networks, such as worldwide censorship authorities. To evade such censorship, we must encrypt Interest and Data packets in an end-to-end manner in exchange for the advantage of content caching because censorship can be enforced by simply dropping Interest/Data packets which contain some censored keywords even if their origins are anonymous [20], [21]. In addition, we do not aim to achieve consumer anonymity against Adv, whereas hidden service is designed so that it provides both sender and receiver anonymity.…”
Section: B Adversarial Modelmentioning
confidence: 99%
“…Note that we do not assume Adv who aims to block some specific content throughout the networks, such as worldwide censorship authorities. To evade such censorship, we must encrypt Interest and Data packets in an end-to-end manner in exchange for the advantage of content caching because censorship can be enforced by simply dropping Interest/Data packets which contain some censored keywords even if their origins are anonymous [20], [21]. In addition, we do not aim to achieve consumer anonymity against Adv, whereas hidden service is designed so that it provides both sender and receiver anonymity.…”
Section: B Adversarial Modelmentioning
confidence: 99%
“…al proposed an anonymous communication network using NDN [20]. Cui et al proposed a model for preventing censorship using smart NDN routers [21]. Neither of these solutions addresses the issue of covert communications in a contested environment.…”
Section: Related Workmentioning
confidence: 99%