Keynotes Speaker:

Prof. Erik Bohlin
Ivey Business School,Canada

Erik Bohlin is an expert in telecommunications policy, an inter-disciplinary topic concerned with the impact of digitalization in the economy and society. Erik holds the Ivey Chair in Telecommunication Economics, Policy and Regulation. Its purpose is to enhance Ivey’s research in the area of economic, policy, regulatory, and investment environments of Canada’s digital and telecommunication market. He is Editor-in-Chief of Telecommunications Policy, a premier journal in the field. He is on leave as Professor at Chalmers University of Technology, Sweden. His graduate degree is in Business Administration and Economics at the Stockholm School of Economics (1987) and his Ph.D. is from Chalmers University of Technology (1995). He is a Member of the Swedish Royal Academy of Engineering, and Past Chair of the International Telecommunications Society, an inter-disciplinary professional society convening conferences on the evolving digital society and policy needs. The Chair is funded by the Ivey Business School as well as by support, from Bell Canada and TELUS, to Western University.

Dr. Pushpendu Kar

University of Nottingham , China campus

Dr. Pushpendu Kar is currently working as an Assistant Professor in the School of Computer Science, University of Nottingham (China campus). Before this, he was a Postdoctoral Research Fellow at the Norwegian University of Science and Technology, the National University of Singapore, and Nanyang Technological University. He also worked in different engineering colleges as a lecturer and in the IT industry as a software professional. He has more than 13 years of teaching and research experience as well as one and a half years of industrial experience at IBM. He has completed all his PhD, Master of Engineering, and Bachelor of Technology in Computer Science and Engineering. He also completed Postgraduate Certificate in Higher Education (PGCHE) in 2023. He was awarded the prestigious Erasmus Mundus Postdoctoral Fellowship from the European Commission, ERCIM Alain Bensoussan Fellowship from the European Union, and SERB OPD Fellowship from the Dept. of Science and Technology, Government of India. He has received the 2020 IEEE Systems Journal Best Paper Award. He has received four research grants for conducting research-based projects, three of them as a Principal Investigator (PI). He also received many travel grants to attend conferences and doctoral colloquiums. He is the author of more than 60 scholarly research papers, which have been published in reputed journals, conferences, book chapters, and IT magazines. He has also published one authored and three edited books. He is an inventor of five patents. He has chaired several conference committees, worked as a team member to organize short-term courses, and delivered a few invited talks and Keynote Lectures at international conferences and institutions. He is a Senior Member of IEEE, a Senior Fellow of the Higher Education Academy (SFHEA), UK, and a Fellow of the Institution of Electronics & Telecommunication Engineers (FIETE), India. Ningbo Municipal Government, China has recognized him as a High-Level Talent. Dr. Kar mainly teaches Computer Networks and programming-related modules and his research areas include Wireless Sensor Networks, Internet of Things, Content-Centric Networking, Machine Learning, and Blockchain.

Topic: Enhancing NDN Security: Name Signature Lookup System


Named Data Networking (NDN) is content-centric networking, where the publisher of the packet signs and encapsulates the data packet with name-content-signature encryption to verify its authenticity and integrity of itself. This scheme can solve many of the security issues inherently compared to IP networking. NDN also supports mobility since it hides the point-to-point connection details. However, an extreme attack takes place when an NDN consumer newly connects to a network. A Man-in-the-middle (MITM) malicious node can block the consumer and keep intercepting the interest packets sent out so as to fake the corresponding data packets signed with its own private key. Without knowledge and trust in the network, the NDN consumer can by no means perceive the attack and is thus exposed to severe security and privacy hazard. In this scenario, we proposed the Name Signature Lookup System (NSLS) and corresponding Name Signature Lookup Protocol (NSLP) be introduced to verify packets with their registered genuine publisher even in an untrusted network with the help of embedded keys inside the Network Interface Controller (NIC), by which attacks like MITM is eliminated. A theoretical analysis of comparing NSLS with the existing security model is provided. Digest algorithm SHA-256 and signature algorithm RSA are used in the NSLP model without specific preference.

Keywords: Named Data Networking; Man-in-the-middle attack; Network Interface Controller

Conference Photos