A Lightweight and Secure IoT Communication Framework in Content-Centric Network Using Elliptic Curve Cryptography

  • Sharmistha AdhikariEmail author
  • Sangram Ray
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 524)


In the recent era, content-centric network (CCN) is emerging as a future Internet paradigm to leverage scalable content distribution. Similarly, the Internet of things (IoT) is another upcoming technology which integrates as well as manages heterogeneous connected devices over the Internet. Recent literature have shown that IoT architecture can efficiently perform if it is implemented in CCN environment. In addition, considering the openness of the Internet used in IoT communication and limited capacity of IoT devices, security becomes a serious challenge which demands attention of the research community. In this paper, our main objective is to design a secure IoT communication framework that operates in CCN. A certificateless public key infrastructure is designed for our resource-constrained IoT communication framework in CCN. We have incorporated elliptic curve cryptography (ECC), a state-of-the-art lightweight cryptosystem, to ensure security of the proposed scheme. Finally, an in-depth security analysis confirms that the proposed scheme is resistant to various relevant cryptographic attacks.


Content-centric network (CCN) Internet of things (IoT) Elliptic curve cryptography (ECC) 



This work is financially supported by Visvesvaraya Ph.D. Scheme, Ministry of Electronics and Information Technology, Government of India.


  1. 1.
    Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., Braynard, R. L. (2009). Networking named content. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (pp. 1–12). ACM.Google Scholar
  2. 2.
    Smetters, D., Jacobson, V. (2009). Securing network content (pp. 2009–01). Technical report, PARC.Google Scholar
  3. 3.
    Mahadevan, P. (2014). CCNx 1.0 Tutorial. Technical report, PARC.Google Scholar
  4. 4.
    Kuriharay, J., Uzun, E., Wood, C. A. (2015). An encryption-based access control framework for content-centric networking. In 2015 IFIP Networking Conference (IFIP Networking) (pp. 1–9). IEEE.Google Scholar
  5. 5.
    Li, S., Da Xu, L. (2017). Securing the internet of things. Syngress.Google Scholar
  6. 6.
    Corujo, D., Aguiar, R. L., Vidal, I., Garcia-Reinoso, J. (2012). A named data networking flexible framework for management communications. IEEE Communications Magazine, 50(12).CrossRefGoogle Scholar
  7. 7.
    François, J., Cholez, T., Engel, T. (2013). CCN traffic optimization for IoT. In 2013 Fourth International Conference on the Network of the Future (NOF) (pp. 1–5). IEEE..Google Scholar
  8. 8.
    Baccelli, E., Mehlis, C., Hahm, O., Schmidt, T. C., Wählisch, M. (2014). Information centric networking in the IoT: experiments with NDN in the wild. In Proceedings of the 1st ACM Conference on Information-Centric Networking (pp. 77–86). ACM.Google Scholar
  9. 9.
    Quevedo, J., Corujo, D., Aguiar, R. (2014). A case for ICN usage in IoT environments. In Global Communications Conference (GLOBECOM) (pp. 2770–2775). IEEE.Google Scholar
  10. 10.
    Ahlgren, B., Lindgren, A., Wu, Y. (2016). Experimental Feasibility Study of CCN-lite on Contiki Motes for IoT Data Streams. In Proceedings of the 3rd ACM Conference on Information-Centric Networking (pp. 221–222). ACM.Google Scholar
  11. 11.
    Suarez, J., Quevedo, J., Vidal, I., Corujo, D., Garcia-Reinoso, J., & Aguiar, R. L. (2016). A secure IoT management architecture based on Information-Centric Networking. Journal of Network and Computer Applications, 63, 190–204.CrossRefGoogle Scholar
  12. 12.
    Hankerson, D., Menezes, A. J., Vanstone, S. (2006). Guide to elliptic curve cryptography. Springer Science and Business Media.Google Scholar
  13. 13.
    Stallings, W. (2006). Cryptography and network security: principles and practices. Pearson Education India.Google Scholar
  14. 14.
    Miller, V. S. (1985). Use of elliptic curves in cryptography. In: Conference on the Theory and Application of Cryptographic Techniques (pp. 417–426). Berlin, Heidelberg: Springer.Google Scholar
  15. 15.
    Koblitz, N. (1987). Elliptic Curve Cryptosystems. Mathematics of Computation, 48(177), 203–209.CrossRefGoogle Scholar
  16. 16.
    Lauter, K. (2004). The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications, 11(1), 62–67.MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of Technology SikkimSikkimIndia

Personalised recommendations