Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures

Cited 34 time in webofscience Cited 33 time in scopus
  • Hit : 712
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorMohaisen, Azizko
dc.contributor.authorMekky, Heshamko
dc.contributor.authorZhang, Xinwenko
dc.contributor.authorXie, Haiyongko
dc.contributor.authorKim, Yongdaeko
dc.date.accessioned2016-05-16T08:50:11Z-
dc.date.available2016-05-16T08:50:11Z-
dc.date.created2015-12-22-
dc.date.created2015-12-22-
dc.date.created2015-12-22-
dc.date.issued2015-11-
dc.identifier.citationIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.12, no.6, pp.675 - 687-
dc.identifier.issn1545-5971-
dc.identifier.urihttp://hdl.handle.net/10203/207473-
dc.description.abstractIn recently proposed information centric networks (ICN), a user issues "interest" packets to retrieve contents from network by names. Once fetched from origin servers, "data" packets are replicated and cached in all routers along routing and forwarding paths, thus allowing further interests from other users to be fulfilled quickly. However, the way ICN caching and interest fulfillment work poses a great privacy risk: the time difference between responses for an interest of cached and uncached content can be used as an indicator to infer whether or not a near-by user has previously requested the same content as that requested by an adversary. This work introduces the extent to which the problem is applicable in ICN and provides several solutions that try to strike a balance between cost and benefits, and raise the bar for an adversary to apply such attack.-
dc.languageEnglish-
dc.publisherIEEE COMPUTER SOC-
dc.titleTiming Attacks on Access Privacy in Information Centric Networks and Countermeasures-
dc.typeArticle-
dc.identifier.wosid000364992800007-
dc.identifier.scopusid2-s2.0-84961338214-
dc.type.rimsART-
dc.citation.volume12-
dc.citation.issue6-
dc.citation.beginningpage675-
dc.citation.endingpage687-
dc.citation.publicationnameIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING-
dc.identifier.doi10.1109/TDSC.2014.2382592-
dc.contributor.localauthorKim, Yongdae-
dc.contributor.nonIdAuthorMohaisen, Aziz-
dc.contributor.nonIdAuthorMekky, Hesham-
dc.contributor.nonIdAuthorZhang, Xinwen-
dc.contributor.nonIdAuthorXie, Haiyong-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorInformation centric networks-
dc.subject.keywordAuthorprivacy-
dc.subject.keywordAuthorside channel attacks-
dc.subject.keywordAuthorcaching-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 34 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0