Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for replying to naming attack and time analysis attack under content center network

A technology of content-centric network and time analysis, which is applied to countermeasures against encryption mechanisms, digital transmission systems, electrical components, etc., can solve problems such as inability to infer adjacent requester request records, requester privacy threats, etc., to reduce response Time, the effect of improving network performance

Active Publication Date: 2018-10-26
GUANGDONG UNIV OF TECH
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, even if the attacker can request the content in the cache, he cannot infer the request record of the adjacent requester
However, if the intermediate router is controlled by the attacker, the attacker can intercept the requester's request and return malicious content to the requester, which poses a threat to the requester's privacy. Data packets are transmitted in plain text, through naming attacks, attackers can easily obtain the requester's private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for replying to naming attack and time analysis attack under content center network
  • Method for replying to naming attack and time analysis attack under content center network
  • Method for replying to naming attack and time analysis attack under content center network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with specific embodiment:

[0025] A method for responding to naming attacks and time analysis attacks under a content-centric network described in this embodiment includes the following steps:

[0026] S1. The key management center (Key Manager Center, KMC) is initialized to generate the key required by the requester, the content publisher and each router; the details are as follows:

[0027] Run Init(K), K is a security parameter, and then generate public parameters (G, g, q, f), where G is a cyclic group, and there is an element g that can be used by g i to represent that g is a generator of G. The key management center selects two large prime numbers p and q, so that p-1 has a large prime factor q. In this case, there is a subgroup of order q, by satisfies X (p-1) / q ≡ elemental composition of 1 mod p. F is a pseudo-random function, and the key management center selects two random numbers as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for replying to a naming attack and a time analysis attack under a content center network. When data is transmitted between routers, different public key encryption data is used, so that even an attacker can control the certain router and crack encrypted content, the attacker also can not judge a specific requester according to the content; furthermore, during a data packet transferring process, a sending timestamp and a time difference are set, when a content publisher receives an interest packet sent by the requester, a corresponding data packet is returned,when the data packet passes through each hop of router along an original path, the sending time of the data packet at the current router is recorded, when the data packet reaches the next-hop router,current reaching time minus the sending time of the previous-hop router, and the time difference is the time of the data packet transmitting between the two hops of routers; therefore, event the attacker can deduce according to the time, the accurate caching position of the content also can not be determined.

Description

technical field [0001] The invention relates to the technical field of content-centric network defense, in particular to a method for dealing with naming attacks and time analysis attacks under content-centric networks. Background technique [0002] With the continuous progress and development of Internet information technology and the continuous growth of Internet business, the current IP network architecture has exposed many disadvantages, such as the continuous expansion of network scale, the current shortage of IP addresses, network attacks, data security, etc. In order to solve the problems exposed by the current Internet. The academic circles at home and abroad have carried out many research projects on the architecture of the next generation Internet, mainly including the Data-Oriented Network Architecture (Data-Oriented Network Architecture, DONA) proposed by the UC Berkeley RAD laboratory (Koponen T, Chawla M, Chun B G, et al. al.A data-oriented(and beyond)network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/00
CPCH04L9/002H04L9/005H04L63/0428H04L63/06H04L63/1441
Inventor 柳毅白雪峰凌捷
Owner GUANGDONG UNIV OF TECH