DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mohaisen, Aziz | ko |
dc.contributor.author | Mekky, Hesham | ko |
dc.contributor.author | Zhang, Xinwen | ko |
dc.contributor.author | Xie, Haiyong | ko |
dc.contributor.author | Kim, Yongdae | ko |
dc.date.accessioned | 2016-05-16T08:50:11Z | - |
dc.date.available | 2016-05-16T08:50:11Z | - |
dc.date.created | 2015-12-22 | - |
dc.date.created | 2015-12-22 | - |
dc.date.created | 2015-12-22 | - |
dc.date.issued | 2015-11 | - |
dc.identifier.citation | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.12, no.6, pp.675 - 687 | - |
dc.identifier.issn | 1545-5971 | - |
dc.identifier.uri | http://hdl.handle.net/10203/207473 | - |
dc.description.abstract | In recently proposed information centric networks (ICN), a user issues "interest" packets to retrieve contents from network by names. Once fetched from origin servers, "data" packets are replicated and cached in all routers along routing and forwarding paths, thus allowing further interests from other users to be fulfilled quickly. However, the way ICN caching and interest fulfillment work poses a great privacy risk: the time difference between responses for an interest of cached and uncached content can be used as an indicator to infer whether or not a near-by user has previously requested the same content as that requested by an adversary. This work introduces the extent to which the problem is applicable in ICN and provides several solutions that try to strike a balance between cost and benefits, and raise the bar for an adversary to apply such attack. | - |
dc.language | English | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.title | Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures | - |
dc.type | Article | - |
dc.identifier.wosid | 000364992800007 | - |
dc.identifier.scopusid | 2-s2.0-84961338214 | - |
dc.type.rims | ART | - |
dc.citation.volume | 12 | - |
dc.citation.issue | 6 | - |
dc.citation.beginningpage | 675 | - |
dc.citation.endingpage | 687 | - |
dc.citation.publicationname | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
dc.identifier.doi | 10.1109/TDSC.2014.2382592 | - |
dc.contributor.localauthor | Kim, Yongdae | - |
dc.contributor.nonIdAuthor | Mohaisen, Aziz | - |
dc.contributor.nonIdAuthor | Mekky, Hesham | - |
dc.contributor.nonIdAuthor | Zhang, Xinwen | - |
dc.contributor.nonIdAuthor | Xie, Haiyong | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Information centric networks | - |
dc.subject.keywordAuthor | privacy | - |
dc.subject.keywordAuthor | side channel attacks | - |
dc.subject.keywordAuthor | caching | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.