Abstract:
A method of transmitting a content reply packet from a content owner in content-centric networking (CCN) includes determining a caching capability value threshold (CCVth) for determining a candidate node for caching a content based on a policy of the content owner, and transmitting a content reply packet including the content and the CCVth in response to a content request packet from a content requester.
Abstract:
Provided is a node and a communication method of the node in a content oriented network (CON) in which the communication method of the node included in the CON may include receiving, at a receiver, a content request packet having a content name comprising hierarchical name components and flat name components, extracting the hierarchical name components and the flat name components from the content request packet, and processing the content request packet using the hierarchical name components and the flat name components.
Abstract:
Provided is a communication method for an administration node in a content centric network (CCN). The communication method includes receiving a packet requesting deletion of an invalid content from a requesting node that detects the invalid content, generating a content revocation list including a name of the invalid content and a period of time over which the deletion is to be performed, and flooding a data packet including the content revocation list to the requesting node and a normal node included in the CCN. Also provided are related communications methods for a receiving node and a normal node, as well as the nodes themselves.
Abstract:
Provided is a method of authenticating and verifying data packet transmission, and apparatuses for performing the same. The method and corresponding apparatus are configured to encode data packets through erasure coding. The method and corresponding apparatus are also configured to generate authentication packets for the encoded data packets based on hash images of the encoded data packets.
Abstract:
Provided are apparatuses and methods of generating and verifying signature information for data authentication. A method of verifying signature information may involves receiving signature information with respect to a predetermined number of data segments from a transmitter, constructing a hash tree based on the signature information, and verifying a validity of the signature information, by verifying trapdoor hash values using a root hash value of the constructed hash tree.
Abstract:
A method of transmitting a content reply packet from a content owner in content-centric networking (CCN) includes determining a caching capability value threshold (CCVth) for determining a candidate node for caching a content based on a policy of the content owner, and transmitting a content reply packet including the content and the CCVth in response to a content request packet from a content requester.