{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T10:00:52Z","timestamp":1771668052296,"version":"3.50.1"},"reference-count":25,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["643990"],"award-info":[{"award-number":["643990"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that satisfy security requirements that are particular to ICN architectures. In order to achieve our goal, we leverage identity-based encryption, identity-based proxy re-encryption, and the emerging paradigm of decentralized identifiers. Our solutions support outsourcing content storage, content integrity protection and content authentication, and provenance verification, as well as access control. We show that our solutions have tolerable storage and computation overhead, thus proving their feasibility.<\/jats:p>","DOI":"10.3390\/fi11110232","type":"journal-article","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T12:30:50Z","timestamp":1572611450000},"page":"232","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Name-Based Security for Information-Centric Networking Architectures"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9100-1081","authenticated-orcid":false,"given":"Nikos","family":"Fotiou","sequence":"first","affiliation":[{"name":"Mobile Multimedia Laboratory, Dept. of Informatics, School of Information Sciences and Technology, Athens University of Economics and Business, Patision 76, 10434 Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0030-4808","authenticated-orcid":false,"given":"George C.","family":"Polyzos","sequence":"additional","affiliation":[{"name":"Mobile Multimedia Laboratory, Dept. of Informatics, School of Information Sciences and Technology, Athens University of Economics and Business, Patision 76, 10434 Athens, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2019,11,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1109\/SURV.2013.070813.00063","article-title":"A Survey of Information-Centric Networking Research","volume":"16","author":"Xylomenos","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_2","unstructured":"W3C Credentials Community Group (2019, October 31). Decentralized Identifiers (DIDs) v0.13. Available online: https:\/\/www.w3.org\/2019\/08\/did-20190828\/."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1127345.1127346","article-title":"Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage","volume":"9","author":"Ateniese","year":"2006","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_4","first-page":"288","article-title":"Identity-Based Proxy Re-Encryption","volume":"Volume 4521","author":"Katz","year":"2007","journal-title":"Applied Cryptography and Network Security"},{"key":"ref_5","unstructured":"W3C Credentials Community Group (2019, October 31). A Primer for Decentralized Identifiers. Available online: https:\/\/w3c-ccg.github.io\/did-primer\/."},{"key":"ref_6","unstructured":"Sporny, M., Kellogg, G., and Lanthaler, M. (2019, October 31). JSON-LD 1.0. Available online: https:\/\/www.w3.org\/TR\/json-ld\/."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Zhang, X., Chang, K., Xiong, H., Wen, Y., Shi, G., and Wang, G. (2011, January 17\u201320). Towards name-based trust and security for content-centric network. Proceedings of the 2011 19th IEEE International Conference on Network Protocols, Vancouver, BC, Canada.","DOI":"10.1109\/ICNP.2011.6089053"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Hamdane, B., Serhrouchni, A., Fadlallah, A., and Fatmi, S.G.E. (2012, January 21\u201323). Named-Data security scheme for Named Data Networking. Proceedings of the 2012 Third International Conference on the Network of the Future (NOF), Gammarth, Tunisia.","DOI":"10.1109\/NOF.2012.6464002"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Wood, C.A., and Uzun, E. (2014, January 10\u201313). Flexible end-to-end content security in CCN. Proceedings of the 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2014.6994401"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Suksomboon, K., Tagami, A., Basu, A., and Kurihara, J. (2017, January 26\u201328). IPRES: In-device Proxy Re-encryption Service for Secure ICN. Proceedings of the 4th ACM Conference on Information-Centric Networking, Berlin, Germany.","DOI":"10.1145\/3125719.3132089"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.comnet.2018.11.012","article-title":"PrivICN: Privacy-preserving content retrieval in information-centric networking","volume":"149","author":"Bernardini","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-Policy Attribute-Based Encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP \u201907), Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ion, M., Zhang, J., and Schooler, E.M. (2013, January 12). Toward Content-centric Privacy in ICN: Attribute-based Encryption and Routing. Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking, Hong Kong, China.","DOI":"10.1145\/2491224.2491237"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/TDSC.2016.2550437","article-title":"Attribute-based access control for ICN naming scheme","volume":"15","author":"Li","year":"2016","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yu, Y., Afanasyev, A., Burke, J., and Zhang, L. (2017, January 26\u201328). NAC: Name-based Access Control in Named Data Networking. Proceedings of the 4th ACM Conference on Information-Centric Networking, Berlin, Germany.","DOI":"10.1145\/3125719.3132102"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-Based Encryption from the Weil Pairing","volume":"Volume 2139","author":"Kilian","year":"2001","journal-title":"Advances in Cryptology - CRYPTO 2001"},{"key":"ref_17","unstructured":"Garman, C., Green, M., Kaptchuk, G., Miers, I., and Rushanan, M. (2016, January 10\u201312). Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage. Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Fotiou, N., Xylomenos, G., and Polyzos, G.C. (2016, January 21\u201323). Securing Information-Centric Networking without Negating Middleboxes. Proceedings of the 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Larnaca, Cyprus.","DOI":"10.1109\/NTMS.2016.7792475"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Fotiou, N., and Polyzos, G.C. (2016, January 26\u201328). Securing Content Sharing over ICN. Proceedings of the 3rd ACM Conference on Information-Centric Networking, Kyoto, Japan.","DOI":"10.1145\/2984356.2984376"},{"key":"ref_20","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, B., Cachin, C., Christidis, K., Caro, A.D., Enyeart, D., Ferris, C., Laventman, G., and Manevich, Y. (2018, January 23\u201326). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal.","DOI":"10.1145\/3190508.3190538"},{"key":"ref_22","unstructured":"W3C Credentials Community Group (2019, October 31). Linked Data Cryptographic Suite Registry. Available online: https:\/\/w3c-ccg.github.io\/ld-cryptosuite-registry\/."},{"key":"ref_23","unstructured":"Sabadello, M. (2019, October 31). Ed25519 Signature 2018. Available online: https:\/\/w3c-dvcg.github.io\/lds-ed25519-2018\/."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Van Gastel, B., Janssen, W., Lange, T., Schwabe, P., and Smetsers, S. (2014, January 17\u201319). TweetNaCl: A Crypto Library in 100 Tweets. Proceedings of the International Conference on Cryptology and Information Security in Latin America 2014, Florian\u00f3polis, Brazil.","DOI":"10.1007\/978-3-319-16295-9_4"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","article-title":"Charm: A framework for rapidly prototyping cryptosystems","volume":"3","author":"Akinyele","year":"2013","journal-title":"J. Cryptogr. Eng."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/11\/11\/232\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:31:13Z","timestamp":1760189473000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/11\/11\/232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,1]]},"references-count":25,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2019,11]]}},"alternative-id":["fi11110232"],"URL":"https:\/\/doi.org\/10.3390\/fi11110232","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,1]]}}}