Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

A mutual key agreement protocol to mitigate replaying attack in eXpressive internet architecture (XIA)

 
: Nugraha, Beny; Khondoker, Rahamatullah; Marx, Ronald; Bayarou, Kpatcha

:
Postprint urn:nbn:de:0011-n-3072813 (300 KByte PDF)
MD5 Fingerprint: 522257d3e6676670402ffe40dbdf454c
© IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Created on: 25.9.2014


Institute of Electrical and Electronics Engineers -IEEE-; IEEE Communications Society; International Telecommunication Union -ITU-:
ITU Kaleidoscope Academic Conference 2014. Proceedings : Living in a converged world - impossible without standards?, 3-5 June 2014, St. Petersburg
Piscataway, NJ: IEEE, 2014
pp.233-240
International Telecommunication Union (ITU Kaleidoscope Academic Conference) <2014, St. Petersburg>
English
Conference Paper, Electronic Publication
Fraunhofer SIT ()

Abstract
Several Future Internet (FI) architectures have been proposed to address the problems of the Internet including flexibility (so called IP bottleneck), host-based addressing (addressing a host rather than the content itself), and security. In this paper, we focus on eXpressive Internet Architecture (XIA) as it is the most secure and open-source Content-Centric Network (CCN). CCN is claimed by the Future Content Networks (FCN) Group to be the Future Internet (FI). However, XIA does not have any mechanisms to mitigate the replaying attack, thus, this paper proposes and implements a solution to mitigate it. Several existing solutions have been analyzed to derive the requirements for the proposed solution. By implementing the proposed protocol, XIA is now able to mitigate all of the reviewed network attacks. The evaluation shows that the proposed solution is more secure and less complex over the existing solutions.

: http://publica.fraunhofer.de/documents/N-307281.html