Time Synchronized Decentralized Contextual Attribute and Doubling Kohel Signature Access Control for Information Centric Networks


  • Aravinda Thejas Chandra SJCIT, Chickballapur – 562101, Visvesvaraya Technological University, Belagavi, INDIA
  • Rajashekara Murthy S. RVCE, Bangalore – 560059,INDIA Visvesvaraya Technological University, Belagavi, INDIA


Information Centric Network, Time Windows Synchronization, Contextual Attribute Assignment, Doubling-oriented, Doche–Icart–Kohel, Digital Signature


The internet applications of present data are immensely compassionate and on the other hand, users are found to be more specific about the desired content speed upon comparison to their location being accessed. In such circumstances the targeted users have to be provided finer if the intrinsic network permits to acquire the content being requested without as a matter of course depending on the existing producer of the data. Obviously, both authenticity and security require to be maintained for such types of data being retrieved. The Information Centric Networking (ICN) is intended to validate data access from anywhere taking into account all the requisite safety measures. The ICN is concentrated on minimizing content delivery latency and improving throughput by validating data from any data store upon comparison with the data producers. For the purpose of doing so, numerous changes in the prevailing Internet architecture like decentralized contextual attribute, unique content naming, access control, digital signature, etc. In this work a method called, Time Synchronized Decentralized Contextual Attribute and Doubling Kohel Signature-based access control (TSDCA-DKS) for Information Centric Networks is proposed. The TSDCA-DKS method is split into two sections, namely, Contextual Attribute Assignment using time windows synchronization and digital signature generation using Doubling-oriented Doche–Icart–Kohel model. The validation of the decrypted contextual input vector attribute guarantees data integrity, where the signer or the employer public key is used to ensure authenticity. The proposed method takes shorter access request processing time for the entire signature operation, including signing and verification, compared to other traditional methods. The implementation results of the proposed method manifested encouraging performance in terms of accuracy and robustness. The results confirmed that the proposed method is significant and efficient for employee’s role within an organization and the resources to which they have access to.


Download data is not yet available.


Kaiping Xue, Jiayu Yang, Graduate, Qiudong Xia, David S. L. Wei, Jian Li, Qibin Sun, Jun Lu, “CSEVP: A Collaborative, Secure, and Efficient Content Validation Protection Framework for Information Centric Networking”, IEEE Transactions on Network and Service Management, Vol. 19, No. 2, June 2022 [A Collaborative, Secure, and Efficient Content Validation Protection (CSEVP)]

Ahmad Salehi, Runchao Han, Carsten Rudolph, Marthie Grobler, “DACP: Enforcing a dynamic access control policy in cross-domain Environments”, Computer Networks, Elsevier, Mar 2023 [Dynamic Access Control Policy (DACP)]

Lalitha Chinmayee M. Hurali and Annapurna P. Patil, “Application Areas of Information-Centric Networking: State-of-the-Art and Challenges”, IEEE Access, Nov 2022

Jiancong Zhang, Shining Li, and Changhao Wang, “A Secure Dynamic Content Delivery Scheme in Named Data Networking”, Security and Communication Networks, Wiley, Jun 2022

Bárbara Vieira, Erik Poll, “A security protocol for Information-Centric Networking in smart grids”, ACM, Nov 2013

Keping Yu, Suyong Eum, Toshihiko Kurita, Qiaozhi Hua, Takuro Sato, Hidenori Nakazato, Tohru Asami, Ved P. Kafle, “Information-Centric Networking: Research and Standardization Status”, IEEE Access, Sep 2019

Xuan Hung Le, Terry Doll, Monica Barbosu, Amneris Luque, Dongwen Wang, “An enhancement of the Role-Based Access Control model to facilitate information access management in context of team collaboration and workflow”, Journal of Biomedical Informatics, Elsevier, Jun 2012

Alex Chiquito, Ulf Bodin, Olov Schelen, “Attribute-Based Approaches for Secure Data Sharing in Industrial Contexts”, IEEE Access, Feb 2023

Nitul Dutta, Sudeep Tanwar, Shobhit K. Patel & Gheorghita Ghinea, “SVM-based Analysis for Predicting Success Rate of Interest Packets in Information Centric Networks”, Applied Artificial Intelligence An International Journal, Oct 2022

Zaki Ullah, Samiullah Khan, “DSAC-Digital Signature for Access Control in Information Centric Network”, Sensors, Oct 2021

Danye Wu, Zhiwei Xu, Bo Chen, Yujun Zhang Zhu Han, “Enforcing Access Control in Information-Centric Edge Networking”, IEEE Transactions on Communications, Jul 2020

Tohru Asami, Byambajav Namsraijav, Kohei Sugiyama, Tomohiko Yagyu, Kenichi Nakamura, Toru Hasegawa, “Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking”, ACM, Oct 2015

Cesar Bernardini, Samuel Marchal, Muhammad Rizwan Asghar, Bruno Crispo, “PrivICN: Privacy-preserving content retrieval in information-centric networking”, Computer Networks, Nov 2018

Bing Li, Maode Ma, “An Advanced Hierarchical

Identity‑Based Security Mechanism by Blockchain in Named Data Networking”, Journal of Network and Systems Management, Springer, Nov 2022

Htet Hlaing, Yuki Funamoto, Masahiro Mambo, “Secure Content Distribution with Access Control Enforcement in Named Data Networking”, Sensors, Jun 2021

José Quevedo, Daniel Corujo, “Selective Content Retrieval in Information-Centric Networking”, Sensors, Oct 2022

Eslam G. AbdAllah Mohammad Zulkernine Hossam S. Hassanein, “Preventing unauthorized access in information centric networking”, Security Privacy, Wiley, Oct 2018

Marica Amadeo, Claudia Campolo, José Quevedo, Daniel Corujo, Antonella Molinaro, Antonio Iera, Rui L. Aguiar, and Athanasios V. Vasilakos, “Information-Centric Networking for the Internet of Things: Challenges and Opportunities”, IEEE Network, Apr 2016

Boubakr Nour and Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, Usa Hassine Moungla, “Access Control Mechanisms in Named Data Networks: A Comprehensive Survey”, ACM Computing Surveys, Vol. 54, No. 3, Article 61. Publication date: April 2021

Liehuang Zhu, Nassoro M.R. Lwamob, Kashif Sharif, Chang Xu, Xiaojiang Du, Mohsen Guizani, Fan Li, “T-CAM: Time-based content access control mechanism For ICN subscription systems”, Future Generation Computer Systems, Elsevier, Jan 2020




How to Cite

Chandra, A. T. ., & Murthy S., R. . (2024). Time Synchronized Decentralized Contextual Attribute and Doubling Kohel Signature Access Control for Information Centric Networks. International Journal of Intelligent Systems and Applications in Engineering, 12(15s), 202–214. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4735



Research Article