{"id":"https://openalex.org/W7137373326","doi":"https://doi.org/10.1109/ants66931.2025.11430016","title":"Certificateless Probabilistic Group Signature Verification Scheme Against Content Poisoning Attacks in NDN","display_name":"Certificateless Probabilistic Group Signature Verification Scheme Against Content Poisoning Attacks in NDN","publication_year":2025,"publication_date":"2025-12-15","ids":{"openalex":"https://openalex.org/W7137373326","doi":"https://doi.org/10.1109/ants66931.2025.11430016"},"language":null,"primary_location":{"id":"doi:10.1109/ants66931.2025.11430016","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants66931.2025.11430016","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064953167","display_name":"Atanu Sarkar","orcid":null},"institutions":[{"id":"https://openalex.org/I101326570","display_name":"National Institute of Technology Sikkim","ror":"https://ror.org/04pam3b03","country_code":"IN","type":"education","lineage":["https://openalex.org/I101326570"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Atanu Sarkar","raw_affiliation_strings":["National Institute of Technology Sikkim,Department of CSE,Ravangla,Sikkim,India,737139"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Sikkim,Department of CSE,Ravangla,Sikkim,India,737139","institution_ids":["https://openalex.org/I101326570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045477456","display_name":"Sangram Ray","orcid":"https://orcid.org/0000-0002-1920-4172"},"institutions":[{"id":"https://openalex.org/I101326570","display_name":"National Institute of Technology Sikkim","ror":"https://ror.org/04pam3b03","country_code":"IN","type":"education","lineage":["https://openalex.org/I101326570"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sangram Ray","raw_affiliation_strings":["National Institute of Technology Sikkim,Department of CSE,Ravangla,Sikkim,India,737139"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Sikkim,Department of CSE,Ravangla,Sikkim,India,737139","institution_ids":["https://openalex.org/I101326570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033009171","display_name":"Mou Dasgupta","orcid":"https://orcid.org/0000-0002-9948-6041"},"institutions":[{"id":"https://openalex.org/I38335241","display_name":"National Institute of Technology Raipur","ror":"https://ror.org/02y553197","country_code":"IN","type":"education","lineage":["https://openalex.org/I38335241"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mou Dasgupta","raw_affiliation_strings":["National Institute of Technology Raipur,Department of Computer Application,Raipur,Chhattisgarh,India,492010"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Raipur,Department of Computer Application,Raipur,Chhattisgarh,India,492010","institution_ids":["https://openalex.org/I38335241"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064953167"],"corresponding_institution_ids":["https://openalex.org/I101326570"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79067759,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.6308000087738037,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.6308000087738037,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.08190000057220459,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.04749999940395355,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.626800000667572},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5954999923706055},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5773000121116638},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.3249000012874603},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.3199000060558319},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.29660001397132874}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6362000107765198},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.626800000667572},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5954999923706055},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5773000121116638},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4223000109195709},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37220001220703125},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3521000146865845},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.3249000012874603},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.3199000060558319},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3147999942302704},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29660001397132874},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2930999994277954},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.29100000858306885},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.2892000079154968},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.2800999879837036},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27630001306533813},{"id":"https://openalex.org/C2778152352","wikidata":"https://www.wikidata.org/wiki/Q5165061","display_name":"Content (measure theory)","level":2,"score":0.2572000026702881}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ants66931.2025.11430016","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants66931.2025.11430016","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/5","score":0.6890411972999573,"display_name":"Gender equality"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2033300564","https://openalex.org/W2164736940","https://openalex.org/W2512103536","https://openalex.org/W2739053192","https://openalex.org/W2901143826","https://openalex.org/W3024518161","https://openalex.org/W3130299457","https://openalex.org/W3161427599","https://openalex.org/W3209414004","https://openalex.org/W4385302063","https://openalex.org/W4393171934","https://openalex.org/W4402265784","https://openalex.org/W4407118335","https://openalex.org/W4408092412","https://openalex.org/W4408400419"],"related_works":[],"abstract_inverted_index":{"Information":[0],"Centric":[1,34],"Networking":[2,30,35],"(ICN)":[3],"paradigm":[4],"introduces":[5],"a":[6,9,118,148,165],"shift":[7],"from":[8],"host-centric":[10],"model":[11],"to":[12,52,169,225],"content-centric":[13],"communication":[14],"by":[15],"enabling":[16,147],"in-network":[17],"caching":[18],"and":[19,32,75,108,164,187,203,220],"location-independent":[20],"content":[21,70,85,134,186],"retrieval.":[22],"Among":[23],"the":[24,43,65,178,185,196,200,226],"various":[25],"ICN":[26],"architectures,":[27],"Named":[28],"Data":[29],"(NDN)":[31],"Content":[33,53],"(CCN)":[36],"have":[37],"emerged":[38],"as":[39,223],"leading":[40],"frameworks":[41],"for":[42,126,133],"future":[44],"Internet.":[45],"Despite":[46],"their":[47,138],"advantages,":[48],"NDN":[49],"remains":[50],"susceptible":[51],"Poisoning":[54],"Attacks":[55],"(CPA),":[56],"where":[57],"adversaries":[58],"inject":[59],"fake":[60],"or":[61],"harmful":[62],"data":[63,77,96],"into":[64],"network.":[66],"These":[67],"attacks":[68],"compromise":[69],"integrity,":[71],"authenticity,":[72,97],"waste":[73],"bandwidth,":[74],"decrease":[76],"delivery":[78],"performance.":[79],"Existing":[80],"countermeasures":[81],"typically":[82],"rely":[83],"on":[84,137],"signature":[86,122,142,150,162,190],"verification":[87,123,151,156,167,174],"at":[88,177],"intermediate":[89],"routers":[90,180],"during":[91],"forwarding.":[92],"Although":[93],"this":[94],"ensures":[95,181],"it":[98],"imposes":[99],"significant":[100],"computation":[101,171,218],"overhead,":[102],"which":[103],"adversely":[104],"affects":[105],"router":[106],"performance":[107,222],"overall":[109],"network":[110],"efficiency.":[111],"To":[112],"overcome":[113],"these":[114],"limitations,":[115],"we":[116,145],"propose":[117],"trust-based":[119],"certificateless":[120],"group":[121],"mechanism":[124],"tailored":[125],"NDN.":[127],"Trust":[128],"values":[129],"are":[130,146],"dynamically":[131],"calculated":[132],"producers":[135],"based":[136],"history":[139],"of":[140,184,199],"successful":[141],"verification.":[143,191],"Further,":[144],"probabilistic":[149],"strategy":[152],"that":[153,213],"minimizes":[154],"redundant":[155],"operations.":[157],"We":[158],"integrate":[159],"an":[160],"identity-based":[161],"scheme":[163,202,215],"batch":[166],"technique":[168],"reduce":[170],"overhead.":[172],"A":[173],"module":[175],"placed":[176],"edge":[179],"efficient":[182],"filtering":[183],"avoids":[188],"repetitive":[189],"Formal":[192],"security":[193],"proofs":[194],"confirm":[195],"signature\u2019s":[197],"unforgeability":[198],"proposed":[201],"its":[204],"robustness":[205],"against":[206],"CPAs.":[207],"The":[208],"ndnSIM":[209],"simulation":[210],"results":[211],"demonstrate":[212],"our":[214],"achieves":[216],"lower":[217],"overhead":[219],"improved":[221],"compared":[224],"existing":[227],"state-of-the-art":[228],"schemes.":[229]},"counts_by_year":[],"updated_date":"2026-03-18T06:27:02.140700","created_date":"2026-03-17T00:00:00"}
