In-Device Proxy Re-encryption Service for Information-Centric Networking Access Control

2018 
Information Centric Networking (ICN), the security, privacy and access control mechanisms are deployed directly in the network layer. However, the gap between security in the network and application layers creates a vulnerable space for cyber attacks from inside a device. We adopt a proxy reencryption technique to facilitate a flexible ICN access control specific to applications. Unlike the existing work in which the proxy re-encryption is done in the network, we propose an In-device Proxy Re-Encryption Service (IPRES) for filling this security gap and for efficiency in both access control management and resource usage. We present the architecture and protocol of IPRES incorporating principles from security management specific to each application. Our evaluation shows that IPRES improves the state of the art by closing the security gap while it introduces acceptable operational and memory overheads at the device level.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    8
    References
    1
    Citations
    NaN
    KQI
    []