Secure Distribution of Protected Content in Information-Centric Networking

Muhammad Bilal, Sangheon Pack

Research output: Contribution to journalArticlepeer-review

20 Citations (Scopus)


The benefits of the ubiquitous caching in information centric networking (ICN) are profound; even though such features make ICN promising for content distribution, but it also introduces a challenge to content protection against the unauthorized access. The protection of a content against unauthorized access requires consumer authentication and involves the conventional end-to-end encryption. However, in ICN, such end-to-end encryption makes the content caching ineffective since encrypted contents stored in a cache are useless for any consumers except those who know the encryption key. For effective caching of encrypted contents in ICN, we propose a secure distribution of protected content (SDPC) scheme, which ensures that only authenticated consumers can access the content. SDPC is lightweight and allows consumers to verify the originality of the published content by using a symmetric key encryption. SDPC also provides protection against privacy leakage. The security of SDPC was proved with the Burrows-Abadi-Needham (BAN) logic and Scyther tool verification, and simulation results show that SDPC can reduce the content download delay.

Original languageEnglish
Article number8798748
Pages (from-to)1921-1932
Number of pages12
JournalIEEE Systems Journal
Issue number2
Publication statusPublished - 2020 Jun

Bibliographical note

Publisher Copyright:
© 2007-2012 IEEE.


  • 5G
  • Access control
  • authentication
  • content distribution
  • in-network caching
  • information-centric networking
  • named data networking
  • privacy
  • security

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Information Systems
  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Secure Distribution of Protected Content in Information-Centric Networking'. Together they form a unique fingerprint.

Cite this