Main Reference PaperCapability-Based Security Enforcement in Named Data Networking, IEEE/ACM Transactions on Networking, June 2017 [NS2].
  • The proposed work designs the Capability-Based Security Enforcement Architecture (CSEA). In order to enable data authenticity in named data network in a distributed manner, the access rights of forwarded packets are used. The proposed work allows NDN routers to verify the authenticity of forwarded packets, before transmitting the data. Moreover, this work develops a lightweight one-time signature scheme for CSEA to ensure the timeliness of packets and support efficient verification.

+ Description
  • The proposed work designs the Capability-Based Security Enforcement Architecture (CSEA). In order to enable data authenticity in named data network in a distributed manner, the access rights of forwarded packets are used. The proposed work allows NDN routers to verify the authenticity of forwarded packets, before transmitting the data. Moreover, this work develops a lightweight one-time signature scheme for CSEA to ensure the timeliness of packets and support efficient verification.

  • To improve the security of Named data networking.

  • To solve the issues of void in Named data networking using a security enforcement architecture.

+ Aim & Objectives
  • To improve the security of Named data networking.

  • To solve the issues of void in Named data networking using a security enforcement architecture.

  • A technique is contributed to consider the system performance measures in data transmission.

+ Contribution
  • A technique is contributed to consider the system performance measures in data transmission.

  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language: TCL and AWK script, (C++).

+ Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language: TCL and AWK script, (C++).

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.