Abstract

The purpose of this tutorial is twofold: to discuss ICN privacy requirements and related solutions, as well as to acquaint participants with the latest advances in name-based security. ICN architectures are often criticized for exposing user preferences. Privacy issues in ICN cannot be investigated using traditional approaches since they differ significantly from the conventional end-to-end architectures. The tutorial will introduce a comprehensive threat model and it will present a methodology for evaluating privacy risks in ICN architectures. Moreover, it will detail related privacy preserving solutions. Many ICN research efforts advocate that a departure from the traditional PKI model is desirable. To this end, they propose security solutions that are applied at the content level using the content name as a security primitive. Although (content) name-based security solutions can be built using traditional cryptographic solutions, recent advances in cryptography create opportunities for new, exciting applications. The tutorial will discuss the advantages of name-based security solutions and it will introduce Identity-Based cryptography and its applications in ICN.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call