A secure anonymous mobile handover authentication protocol for content centric network
S Adhikari, S Ray - … International Conference, CICBA 2018, Kalyani, India …, 2019 - Springer
In current technological era, content centric network (CCN) is envisaged as a clean-slate
future Internet architecture to meet the growing demand of information exchange as well as …
future Internet architecture to meet the growing demand of information exchange as well as …
A CA-based scheme of user authentication over Content-Centric Networking
Content-Centric Networking (CCN) is a predominant substitute of the current TCP/IP
networking and it is proposed to be the next generation Internet foundation. The evident …
networking and it is proposed to be the next generation Internet foundation. The evident …
Mobile sessions in content-centric networks
Content-centric networking (CCN) is a network architecture for transferring named data from
producers to consumers upon request. This shifts security from that of a connection or …
producers to consumers upon request. This shifts security from that of a connection or …
Consumer-source authentication with conditional anonymity in information-centric networking
Y Lu, C Wang, M Yue, Z Wu - Information Sciences, 2023 - Elsevier
Abstract Information-Centric Networking (ICN) necessitates several inherent security
mechanisms, eg, source authentication is performed by embedding content signature per …
mechanisms, eg, source authentication is performed by embedding content signature per …
ECMHP: ECC-based Secure Handshake Protocol for Multicasting in CCN-IoT Environment
Scalability, heterogeneity, energy efficiency, cost-effectiveness, robustness, interoperability,
and low latency data transfer are some of the critical challenges posed by the Internet of …
and low latency data transfer are some of the critical challenges posed by the Internet of …
A seamless anonymous authentication protocol for mobile edge computing infrastructure
Abstract Mobile Edge Computing (MEC) accommodates processing and data storage and
manipulation capabilities across the scope of wireless network. In MEC environment, MEC …
manipulation capabilities across the scope of wireless network. In MEC environment, MEC …
Efficient data delivery in content-centric network with stronger privacy of publisher
Recently, Youn et. al. have proposed an overlaid packet authentication architecture for faster
data forwarding in content-centric network (CCN). In this article, we briefly review the …
data forwarding in content-centric network (CCN). In this article, we briefly review the …
BlockAuth: BlockChain based distributed producer authentication in ICN
Abstract In Information Centric Networking (ICN), consumer mobility is supported by design
in virtue of its connection-less pull-based communication model. However, producer mobility …
in virtue of its connection-less pull-based communication model. However, producer mobility …
[PDF][PDF] Study and analysis of mobility, security, and caching issues in CCN.
Existing architecture of Internet is IP-centric, having capability to cope with the needs of the
Internet users. Due to the recent advancements and emerging technologies, a need to have …
Internet users. Due to the recent advancements and emerging technologies, a need to have …
Faster data forwarding in content-centric network via overlaid packet authentication architecture
Content-Centric Networking (CCN) is one of the emerging paradigms for the future Internet,
which shifts the communication paradigm from host-centric to data-centric. In CCN, contents …
which shifts the communication paradigm from host-centric to data-centric. In CCN, contents …