About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Collaborative Computing: Networking, Applications and Worksharing. 14th EAI International Conference, CollaborateCom 2018, Shanghai, China, December 1-3, 2018, Proceedings

Research Article

Research on Access Control of Smart Home in NDN (Short Paper)

Download(Requires a free EAI acccount)
283 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-12981-1_39,
        author={Rina Wu and Bo Cui and Ru Li},
        title={Research on Access Control of Smart Home in NDN (Short Paper)},
        proceedings={Collaborative Computing: Networking, Applications and Worksharing. 14th EAI International Conference, CollaborateCom 2018, Shanghai, China, December 1-3, 2018, Proceedings},
        proceedings_a={COLLABORATECOM},
        year={2019},
        month={2},
        keywords={Named Data Networking Access control Smart home Encryption},
        doi={10.1007/978-3-030-12981-1_39}
    }
    
  • Rina Wu
    Bo Cui
    Ru Li
    Year: 2019
    Research on Access Control of Smart Home in NDN (Short Paper)
    COLLABORATECOM
    Springer
    DOI: 10.1007/978-3-030-12981-1_39
Rina Wu1,*, Bo Cui1,*, Ru Li1,*
  • 1: Inner Mongolia University
*Contact email: wrn@mail.imu.edu.cn, cscb@imu.edu.cn, csliru@imu.edu.cn

Abstract

Named Data Networking (NDN) is one of the future Internet architectures and can support smart home very well. There is a large amount of private data with lower security level in smart home. Access control is an effective security solution. However, the existing NDN’s access control mechanisms that can be applied to smart homes don’t reasonably use the cache in NDN and take into account users’ authorization cancellation phase. Therefore, we designed an access control mechanism for smart homes in NDN. We mainly consider the process of the user requests permission, user requests data and user permission cancellation. By using the Cipher Block Chaining (CBC) symmetric encryption algorithm, identity-based encryption, and proxy re-encryption, the cache in NDN is effectively utilized, and the counting Bloom Filter is used to filter ineffective Interest packets and complete the user’s privilege cancellation phase. Experimental results show that the access control mechanism designed in this paper can effectively reduce the total time which starts from user requests the permission to decrypt data and reduce the time overhead of the NDN routers in the process of user privileges cancellation after using the counting Bloom Filter.

Keywords
Named Data Networking Access control Smart home Encryption
Published
2019-02-07
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-12981-1_39
Copyright © 2018–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL