Utilize este identificador para referenciar este registo: https://hdl.handle.net/1822/69259

Registo completo
Campo DCValorIdioma
dc.contributor.authorDogruluk, Ertugrulpor
dc.contributor.authorGama, Óscar Sílvio Marques Almeidapor
dc.contributor.authorCosta, Antóniopor
dc.contributor.authorMacedo, Joaquimpor
dc.date.accessioned2021-01-15T01:31:01Z-
dc.date.available2021-01-15T01:31:01Z-
dc.date.issued2020-
dc.identifier.citationE. Dogruluk, Ó. Gama, A. D. Costa and J. Macedo, "Public Key Certificate Privacy in VoNDN: Voice Over Named Data Networks," in IEEE Access, vol. 8, pp. 145803-145823, 2020, doi: 10.1109/ACCESS.2020.3014898.por
dc.identifier.issn2169-3536por
dc.identifier.urihttps://hdl.handle.net/1822/69259-
dc.descriptionScenarios were scripted by the C++11 library in ndnSIM 2.6. The scenario implementations and required tools can be publicly accessible at the author’s GitHub account—https://git.io/JJqEwpor
dc.description.abstractNamed Data Network (NDN) is a network paradigm that attempts to answer today's needs for distribution. One of the NDN key features is in-network caching to increase content distribution and network efficiency. However, this feature may increase the privacy concerns, as the adversary may identify the call history, and the callee/caller location through side-channel timing responses from the cache of trusted Voice over NDN (VoNDN) application routers. The side-channel timing attack can be mitigated by countermeasures, such as additional unpredictable delay, random caching, group signatures, and no-caching configurations. However, the content distribution may be affected by pre-configured countermeasures, which may be against the original purpose of NDN. In this work, the detection and defense (DaD) approach is proposed to mitigate the attack efficiently and effectively. With the DaD usage, an attack can be detected by a multi-level detection mechanism, in order to apply the countermeasures against the adversarial faces. Also, the detections can be used to determine the severity of the attack. In order to detect the behavior of an adversary, a brute-force timing attack was implemented and simulated of the VoNDN application on NDN-testbed. A trusted application that mimics the VoNDN and identifies the cached certificate on a worldwide NDN-testbed. In simulation primary results showed that the multi-level detection based on DaD mitigated the attack about 39.1% in best-route, and 36.5% in multicast communications. Additionally, the results showed that DaD preserves privacy without compromising the efficiency benefits of in-network caching in the VoNDN application.por
dc.description.sponsorshipThis work was supported by the Fundacao para a Ciencia e Tecnologia (FCT) within the Research and Development Units Project Scope under Grant UIDB/00319/2020.por
dc.language.isoengpor
dc.publisherIEEEpor
dc.relationUIDB/00319/2020por
dc.rightsopenAccesspor
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/por
dc.subjectPrivacypor
dc.subjectDelayspor
dc.subjectPublic keypor
dc.subjectInternetpor
dc.subjectIP networkspor
dc.subjectData privacypor
dc.subjectNDNpor
dc.subjectVoNDNpor
dc.subjectcertificate privacypor
dc.subjecta side-channel timing attackpor
dc.titlePublic key certificate privacy in VoNDN: voice over named data networkspor
dc.typearticle-
dc.peerreviewedyespor
dc.relation.publisherversionhttps://ieeexplore.ieee.org/document/9162115por
oaire.citationStartPage145803por
oaire.citationEndPage145823por
oaire.citationVolume8por
dc.date.updated2021-01-15T00:18:43Z-
dc.identifier.doi10.1109/ACCESS.2020.3014898por
dc.subject.fosEngenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informáticapor
dc.subject.wosScience & Technology-
sdum.export.identifier7769-
sdum.journalIEEE Accesspor
oaire.versionVoRpor
Aparece nas coleções:CAlg - Artigos em livros de atas/Papers in proceedings

Ficheiros deste registo:
Ficheiro Descrição TamanhoFormato 
Public Key Certificate Privacy in VoNDN Voice Over Named Data Networks.pdf3,83 MBAdobe PDFVer/Abrir

Este trabalho está licenciado sob uma Licença Creative Commons Creative Commons

Partilhe no FacebookPartilhe no TwitterPartilhe no DeliciousPartilhe no LinkedInPartilhe no DiggAdicionar ao Google BookmarksPartilhe no MySpacePartilhe no Orkut
Exporte no formato BibTex mendeley Exporte no formato Endnote Adicione ao seu ORCID