{"title":"Trapdoor Assignment of PEKS-based NDN Strategy in Two-Tier Networks","authors":"Kyi Thar Ko, M. Mambo","doi":"10.1109/MSN50589.2020.00099","DOIUrl":null,"url":null,"abstract":"Named Data Networking (NDN), where addressable content name is used, is a candidate of next-generation Internet architectures. NDN routers use In-Network cache to replicate and store passing packets to make faster content delivery. NDN uses human-readable names, and therefore, it is easy for an attacker to guess which content is requested. To solve this issue, we have proposed the application of Public Key Encryption with Keyword Search (PEKS) to NDN and a PEKS-based NDN strategy has been developed for forwarding packets. Applying the PEKS scheme produces latency during transmission because of cryptographic operations. To reduce the number of such operations, we consider a network environment based on Two- Tier network design and examine different trapdoor assignments of PEKS-based NDN. We show some evidences that setting trapdoor storage only at core routers in Two-Tier network gives the reduction of the cryptographic operations.","PeriodicalId":447605,"journal":{"name":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","volume":"94 7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MSN50589.2020.00099","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Named Data Networking (NDN), where addressable content name is used, is a candidate of next-generation Internet architectures. NDN routers use In-Network cache to replicate and store passing packets to make faster content delivery. NDN uses human-readable names, and therefore, it is easy for an attacker to guess which content is requested. To solve this issue, we have proposed the application of Public Key Encryption with Keyword Search (PEKS) to NDN and a PEKS-based NDN strategy has been developed for forwarding packets. Applying the PEKS scheme produces latency during transmission because of cryptographic operations. To reduce the number of such operations, we consider a network environment based on Two- Tier network design and examine different trapdoor assignments of PEKS-based NDN. We show some evidences that setting trapdoor storage only at core routers in Two-Tier network gives the reduction of the cryptographic operations.