A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Forwarding in a content-based network
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Protecting access privacy of cached contents in information centric networks
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Hi-index | 0.00 |
Network-level security systems rely significantly on network operations. This reliance has led to conventional network-level security systems based on a host-centric architecture because the network operations themselves are based on hosts. However, host-dependent network security schemes are no longer applicable in content-based networks. In this paper, a host-oblivious network security paradigm for content-based networks is introduced, and then a comprehensive security procedure focusing on generating and sharing diverse secret keys is proposed. Then the proposed scheme, which provides not only essential security functions but also diverse security levels, is discussed. Finally, how this multiple security-level approach helps reducing inevitable performance overhead caused by implementing security functions is demonstrated.