71
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Comparison and evaluation of digital signature schemes employed in ndn network

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Named Data networking ensure data integrity so that every important data has to be signed by its owner in order to send it safely inside the network. Similarly, in NDN we have to assure that none could open the data except authorized users. Since only the endpoints have the right to sign the data or check its validity during the verification process, we have considered that the data could be requested from various types of devices used by different people, these devices could be anything like a smartphone, PC, sensor node with a different CPU descriptions, parameters, and memory sizes, however their ability to check the high traffic of a data during the key generation and verification period is definitely a hard task and it could exhaust the systems with low computational resources. RSA and ECDSA as digital signature algorithms have proven their efficiency against cyber attacks, they are characterized by their speed to encrypt and decrypt data, in addition to their competence at checking the data integrity. The main purpose of our research was to find the optimal algorithm that avoids the systems overhead and offers the best time during the signature scheme

          Related collections

          Author and article information

          Journal
          01 August 2015
          Article
          1508.00184
          24e3fa0b-6c3e-426d-91fd-7acc7c1365ba

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          International Journal of Software Engineering & Applications Volume: 7 - Volume No: 3 - issue: June 2015
          cs.CR

          Comments

          Comment on this article