2016
DOI: 10.2298/csis150320045g
|View full text |Cite
|
Sign up to set email alerts
|

Publish/subscribe scheme for content centric MANETs

Abstract: It is allowed that data of the content producer is cached anywhere in Content Centric MANET (CCMANET). This scheme decoupling of data from the data source make traditional end-end authentication transmission unavailable in CCMANET. So, it is a challenge how to ensure content publishing or subscribing only by legitimate users. In this paper, we firstly design a new Yaksha system on Elliptic Curve (EC-Yaksha), and then a secure Content Publish/Subscribe System based on EC-Yaksha (ECY-CPS) for CCMANET is proposed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 22 publications
(41 reference statements)
0
3
0
Order By: Relevance
“…Guo et al proposed EC‐Yaksha scheme, then provides secure publish subscribe system ECY‐CPS for CCMANET. EC‐Yaksha is responsible of providing license to the legitimate content publisher and consumer.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Guo et al proposed EC‐Yaksha scheme, then provides secure publish subscribe system ECY‐CPS for CCMANET. EC‐Yaksha is responsible of providing license to the legitimate content publisher and consumer.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In Guo et al (2016), based on elliptic curve cryptography (ECC; Koblitz, 1987), that maybe provide same security strength for a far shorter key and reduce processing overhead compared with RSA, firstly proposed a new Yaksha system and named it as EC-Yaksha system. And then, ECY-CPS (content publish/subscribe system on EC-Yaksha) is developed.…”
Section: Ecy-cps Protocolmentioning
confidence: 99%
“…Aiming at security problems in CCN/NDN, secure content delivery mechanisms are proposed in Wood and Uzun (2014), Misra et al (2013) and Guo et al (2016). These schemes can be applied in different environments, and they can ensure that only a legitimate network user can get content from the network or publish content to the network.…”
Section: Introductionmentioning
confidence: 99%