Fig. 1. MHT-based Content Authentication. 그림 1. MHT에 기반한 콘텐츠 인증 기법
Fig. 2. MHT Transmission and Computation Optimization. 그림 2. MHT에 기반한 콘테츠 인증 기법의 최적화 방법
Fig. 3. The Description of Error Propagation of improved MHT. 그림 3. MHT에 기반한 콘텐츠 인증 기법의 개선에 따른 오류 발생 및 그 영향력
Fig. 4. Countermeasure for Authentication Error Propagation. 그림 4. MHT 기반한 콘텐츠 인증 개선안의 오류 제한 기법
Table 1. Authentication Error Propagation. 표 1. 콘텐츠 인증 기술의 오류 전파 정도 분석
Table 2. Performance Evaluation. 표 2. 콘텐츠 인증 기술의 성능 비교 분석
참고문헌
- B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher and B. Ohlmann, "A Survey of Information-Centric Networking," IEEE Communications Magazine, Vol.50, No.7, pp.26-36, 2012. DOI: 10.1109/MCOM.2012.6231276
- V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Briggs and R. Braynard, "Networking Named Content," 5th International Conference on Emerging Networking Experiments and Technologies, pp.1-12, 2009. DOI: 10.1145/1658939.1658941
- D. Kim, "Content Centric Networking Naming Scheme for Efficient Data Sharing," Journal of Korea Multimedia Society, Vol.15, No.9, pp. 1126-1132, 2012. DOI: 10.9717/kmms.2012.15.9.1126
- "Trend and Improvement for Privacy Protection of Future Internet," Journal of Digital Convergence, Vol.14, No.6, pp.405-413, 2016. DOI: 10.14400/JDC.2016.14.6.405
- "A Comparison Study on Data Caching Policies of CCN," Journal of Digital Convergence, Vol.15, No.1, pp.327-334, 2017. DOI: 10.14400/JDC.2017.15.2.327
- R. Merkle, "Protocol for public key cryptosystems," IEEE Sympo. Research in Security and Privacy, 1980. DOI: 10.1109/SP.1980.10006
- B. Georg "Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis," Ruhr-Universitat Bochum. Retrieved. 2013. DOI: 10.1.1.392.7879
- D. Y. Kim and J. S. Park, "Efficient Contents Verification Scheme for Contents-Centric-Networking," The Journal of Korean Institute of Comm. and Inform Sciences, Vol.39, No.4, pp.234-241, 2014. DOI: 10.7840/kics.2014.39B.4.234
- D. Kim, "A Efficient Content Verification Scheme for Distributed Networking/Data Store," Journal of The Korea Institue of Information Security & Cryptology, Vol.25, No.4, 2015. DOI: 10.13089/JKIISC.2015.25.4.839
- D. Y. Kim, "Improvement of the Data Authentication of CCN," Journal of Digital Convergence, Vol.15, No.8, pp.341-349, 2017. DOI: 10.14400/JDC.2017.15.8.341
- D. Kim, "Network Overhead Improvement for MHT-based Content Authentication Scheme," Journal of Digital Convergence, Vol.16, No.1, pp.271-279, 2018. DOI: 10.14400/JDC.2018.16.1.271
- D. Kim, "The Shortest Authentication Path for Performance Improvement of MHT Contents Authentication Method in Distributed Network Environment," KIPS Trans. Comp. and Comm. Sys., Vol.7, No.9, pp.235-242, 2018. DOI: 10.3745/KTCCS.2018.7.9.235
- D. Kim, "Group-Interest-based Verifiable CCN," Mobile Information System, Vol.2016 Article ID 9202151. 2016. DOI: 10.1155/2016/9202151