Abstract
Recently, Fan et al. proposed the File Transfer Protocol Based on Re-Encryption for Named Data Network (FTP-NDN) in order to reduce the cost that affects simultaneous access of same video services. The authors designed an elegant network architecture to deal with secure file transmission to the unknown potential customers. The technique is shown to be secured under Decisional Bilinear Diffie-Hellman (DBDH) assumption and computationally efficient than other existing techniques. Although, the protocol achieves data confidentiality, it does not provide node authentication during transmission in the NDN. In this paper, we propose an authentication scheme using the bilinear pairing. Performance evaluation shows that the proposed technique can be incorporated with considerable computation overhead.
The work is supported by Information Security Research Center, National Sun Yat-sen University, Taiwan.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13
Etefia, B., Gerla, M., Zhang, L.: Supporting military communications with named data networking: an emulation analysis. In: MILCOM, pp. 1–6 (2012)
Fan, C.I., Chen, I.T., Cheng, C.K., Huang, J.J., Chen, W.T.: FTP-NDN: file transfer protocol based on re-encryption for named data network supporting nondesignated receivers. IEEE Syst. J. 12(1), 473–484 (2018)
Grassi, G., et al.: ACM hotmobile 2013 poster: vehicular inter-networking via named data. ACM SIGMOBILE Mobile Comput. Commun. Rev. 17(3), 23–24 (2013)
Hamdane, B., Serhrouchni, A., Fadlallah, A., El Fatmi, S.G.: Named-data security scheme for named data networking. In: 2012 Third International Conference on the Network of the Future (NOF), pp. 1–6. IEEE (2012)
Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pp. 1–12. ACM (2009)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Zhang, L., et al.: Named data networking (NDN) project. Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC 157, 158 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Karati, A., Fan, CI., Hsu, RH. (2019). Enhancement of FTP-NDN Supporting Nondesignated Receivers. In: Chang, CY., Lin, CC., Lin, HH. (eds) New Trends in Computer Technologies and Applications. ICS 2018. Communications in Computer and Information Science, vol 1013. Springer, Singapore. https://doi.org/10.1007/978-981-13-9190-3_65
Download citation
DOI: https://doi.org/10.1007/978-981-13-9190-3_65
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9189-7
Online ISBN: 978-981-13-9190-3
eBook Packages: Computer ScienceComputer Science (R0)