Please use this identifier to cite or link to this item:
http://202.28.34.124/dspace/handle123456789/1211
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | Nattavut Sriwiboon | en |
dc.contributor | ณัฐวุฒิ ศรีวิบูลย์ | th |
dc.contributor.advisor | Somnuk Puangpronpitag | en |
dc.contributor.advisor | สมนึก พ่วงพรพิทักษ์ | th |
dc.contributor.other | Mahasarakham University. The Faculty of Informatics | en |
dc.date.accessioned | 2021-09-05T15:41:58Z | - |
dc.date.available | 2021-09-05T15:41:58Z | - |
dc.date.issued | 11/6/2020 | |
dc.identifier.uri | http://202.28.34.124/dspace/handle123456789/1211 | - |
dc.description | Doctor of Philosophy (Ph.D.) | en |
dc.description | ปรัชญาดุษฎีบัณฑิต (ปร.ด.) | th |
dc.description.abstract | Named Data Networking (NDN) is a new paradigm for the future Internet, aiming for efficient content delivery using in-network cache and information-centric communication. Security is built into NDN by embedding a public key signature in each data packet to enable verification of authenticity and integrity of contents. For NDN access control, the encryption-based model is the main proposed scheme where sensitive data are encrypted by legitimate producers and then decrypted by only authorized consumers. There have been several proposals using this encryption-based model. However, most of them still suffer from Perfect Forward Secrecy (PFS) issues. Without PFS, the previously published contents for an authorized consumer could be compromised if the private key of the consumer is leaked. This could be a serious security threat in several scenarios, particularly the battlefield scenario. Hence, this dissertation proposes EKAC: Ephemeral Key-based Access Control scheme for NDN to address the problem. EKAC considers Mobile Ad-Hoc Network scenarios, like battlefield network, where the connection can be intermittently lost, and provides a new mechanism to provide PFS, immediate revocation. We have evaluated the performance of EKAC by comparing to previous encryption-based access control schemes. From the evaluation results, EKAC is more suitable for security to prevent attackers to access the previously published contents, in case that the attackers compromise consumer devices to gain the consumer’s private key. So, EKAC can support ephemeral key shares. Furthermore, our policy key distribution is more suitable for intermittent connection. For the efficiency of EKAC, we have also found that EKAC computation and communication cost is less than the previous NDN access control scheme. | en |
dc.description.abstract | - | th |
dc.language.iso | en | |
dc.publisher | Mahasarakham University | |
dc.rights | Mahasarakham University | |
dc.subject | Named Data Networking | en |
dc.subject | Ephemeral Key-based Access Control | en |
dc.subject | Ephemeral Key | en |
dc.subject | Mobile Ad-Hoc Network | en |
dc.subject | Intermittent Connection | en |
dc.subject.classification | Computer Science | en |
dc.title | Forward Secrecy Enhancement for Named Data Networking Access Control over Mobile Ad-Hoc Networks | en |
dc.title | การเสริมสร้างความลับส่งต่อสำหรับการควบคุมการเข้าถึงของเครือข่ายเนมดาต้าบนโครงข่ายเคลื่อนที่เฉพาะกิจ | th |
dc.type | Thesis | en |
dc.type | วิทยานิพนธ์ | th |
Appears in Collections: | The Faculty of Informatics |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
57011260001.pdf | 2.11 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.