Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,042 Hits in 2.8 sec

Security and Privacy Issues in Vehicular Named Data Networks: An Overview

Hakima Khelifi, Senlin Luo, Boubakr Nour, Sayed Chhattan Shah
2018 Mobile Information Systems  
A tremendous amount of content and information are exchanging in a vehicular environment between vehicles, roadside units, and the Internet.  ...  We present a state of the art of existing VANET attacks and how NDN can deal with them. We classified these attacks based on the NDN perspective.  ...  As the content in NDN is decoupled from its original location, NDN follows a content-based security concept [20] that consists of securing the content among different network elements regardless of the  ... 
doi:10.1155/2018/5672154 fatcat:t4x7vsf4vnd77ga6zva4s34t64

A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking

Abdelhak Hidouri, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler
2022 Computers  
Despite the highly secure content sharing and the optimized forwarding mechanism, the content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities that can be exploited to  ...  This poses a critical challenge to the design of IDS in NDN.  ...  The main security concern in a Cache Poisoning Attack is the availability of the content.  ... 
doi:10.3390/computers11120186 fatcat:gnaioiofjbhcdnnhkaelud6req

Security Challenges in Future NDN-Enabled VANETs

Salvatore Signorello, Maria Rita Palattella, Luigi Alfredo Grieco
2016 2016 IEEE Trustcom/BigDataSE/ISPA  
Interest flooding attacks, cache poisoning attacks and privacy violation attacks by means of content names represent concrete NDN threats.  ...  Therefore, this paper opens a more comprehensive discussion of the security risks brought by the application of NDN solutions in VANETs.  ...  As any ICN instantiation, NDN supports named contents, in-network caching, name-based routing, asynchronous communication, and in-data security.  ... 
doi:10.1109/trustcom.2016.0272 dblp:conf/trustcom/SignorelloPG16 fatcat:onff5wt5k5bklg6tt5pbh7mfl4

Named Data Networking in Vehicular Ad hoc Networks: State-of-the-Art and Challenges

Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla, Yasir Faheem, Rasheed Hussain, Adlen Ksentini
2019 IEEE Communications Surveys and Tutorials  
Subsequently, we cover in detail, NDN-based naming, routing and forwarding, caching, mobility, and security mechanism for VANET.  ...  More precisely, we investigate the role of NDN in VANET and discuss the feasibility of NDN architecture in VANET environment.  ...  However, in NDN, security mechanisms are applied to the content itself rather than the communication channels. Therefore, the content delivery and caching may not need communication security.  ... 
doi:10.1109/comst.2019.2894816 fatcat:qxljrw7bcrdgfko3itxprhsige

Named Data Networking: A survey

Divya Saxena, Vaskar Raychoudhury, Neeraj Suri, Christian Becker, Jiannong Cao
2016 Computer Science Review  
NDN SYSTEM SERVICES In this Section, we shall introduce an elaborate survey of the major routing, caching, forwarding, security, privacy and trust, and mobility techniques proposed for NDN in recent years  ...  and routing, caching, security, mobility, etc.  ...  Security layer provides security to each and every piece of content, unlike securing the entire communication channel in Internet.  ... 
doi:10.1016/j.cosrev.2016.01.001 fatcat:z256vu3lwrdnpkzsdnruxtlosi

Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN

Wu, Zhang, Xu
2020 Future Internet  
The information cache in the NDN separates content from content publishers, but content security is threatened because of the lack of security controls.  ...  For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/fi12010015 fatcat:2yuxrux5xfhdlhn6gixcwmf7ve

A Content Poisoning Attack Detection and Prevention System in Vehicular Named Data Networking

Arif Hussain Magsi, Leanna Vidya Yovita, Ali Ghulam, Ghulam Muhammad, Zulfiqar Ali
2023 Sustainability  
However, vehicular NDN (VNDN) faces numerous challenges, including security, privacy, routing, and caching.  ...  Finally, we extend the scope of NDN from pull-based content retrieval to push-based content dissemination.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/su151410931 fatcat:nc42axei5bgatcc4oruc5anzhq

LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking

Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, Xiaoming Fu
2015 IEEE Transactions on Information Forensics and Security  
Security is built into NDN by embedding a public key signature in each data packet to enable verification of authenticity and integrity of the content.  ...  Furthermore, caching and location-independent content access disables the capability of a content provider to control content access, e.g., who can cache a content and which end user or device can access  ...  NDN Security Polices In LIVE, CPs realize content access control by enforcing security policies.  ... 
doi:10.1109/tifs.2014.2365742 fatcat:kk4cmhixavf3bpkufwx7ziycty

Secure Content Distribution with Access Control Enforcement in Named Data Networking

Htet Htet Hlaing, Yuki Funamoto, Masahiro Mambo
2021 Sensors  
NDN is one of the new emerging future internet architectures which brings up new solutions over today's internet architecture, facilitating content distribution, in-network caching, mobility support, and  ...  NDNs ubiquitous in-network caching allows consumers to access data directly from the intermediate router's cache.  ...  One of the main features of NDN is in-network caching, where contents can be cached in the intermediate routers in the network.  ... 
doi:10.3390/s21134477 pmid:34208900 pmcid:PMC8271773 fatcat:wa5jgns63veyle6h4qbwgoud3e

A Survey on Security in Named Data Networking [article]

Shuoshuo Chen, Fabrice Mizero
2015 arXiv   pre-print
In this paper, we conduct a brief survey of security topics/problems inherent to the NDN architecture.  ...  Named Data Networking (NDN) is one of the few initiatives/projects addressing the shortcomings of the current Internet architecture and intends to move the Internet toward a content distribution architecture  ...  In security, NDN addresses security challenges such as DoS attacks naturally and in-router data caching provides more efficient CDN service.  ... 
arXiv:1512.04127v1 fatcat:7ga4qzeo6zewtifeaqmkhuzlpq

Content Protection in Named Data Networking: Challenges and Potential Solutions [article]

Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, Bo Yang
2018 arXiv   pre-print
In order to make NDN practical in the real world, the challenging issues of content security need to be addressed.  ...  In this article, we examine the architecture, content security as well as possible solutions to these issues of NDN, with a special focus on content integrity and provenance.  ...  In NDN, content security is a challenge since there exist a number of security concerns of NDN content including naming related attacks, caching related attacks, routing related attacks and other attacks  ... 
arXiv:1810.11179v1 fatcat:bsajaxqc3jepzedb3o4kruqyam

Network-Layer Trust in Named-Data Networking

Cesar Ghali, Gene Tsudik, Ersin Uzun
2014 Computer communication review  
By opportunistically caching content within the network (in routers), NDN appears to be well-suited for large-scale content distribution and for meeting the needs of increasingly mobile and bandwidth-hungry  ...  This paper explores root causes of, and some cures for, content poisoning attacks in NDN.  ...  Acknowledgments This work was funded by NSF under the "CNS-1040802: FIA: Collaborative Research: Named Data Networking (NDN)" project.  ... 
doi:10.1145/2677046.2677049 fatcat:vjhto67a5vc75eoiwy4j7auwiy

Reputation-Based Trust Approaches in Named Data Networking

Ioanna Angeliki Kapetanidou, Christos-Alexandros Sarros, Vassilis Tsaoussidis
2019 Future Internet  
In the NDN framework, disseminated content is at the core of the design and providing trusted content is essential.  ...  In this paper, we provide an overview of reputation-based trust approaches, present their design trade-offs and argue that these approaches can consolidate NDN trust and security by working complementary  ...  Author Contributions: All authors contributed equally to the conceptualization and the writing of the paper.  ... 
doi:10.3390/fi11110241 fatcat:f4hjmzyhi5gjnh5zfhu53bj2fi

FQ-BF: An Efficient Forwarding and Query Optimization Framework based on Bloom Filters in NDN

2019 International journal of recent technology and engineering  
Continuous efforts by researchers try to optimize the NDN performance in various areas like routing, forwarding, caching, security, etc.  ...  NDN basically works on searching for the required data packet, so the content search is one of the promising areas in NDN that still needs improvement.  ...  Application of BF in NDN BF has been used at various functional areas of NDN like routing, caching, forwarding and security. A Singh & G. S.  ... 
doi:10.35940/ijrte.d7721.118419 fatcat:zch7tsqx7jginajsvotgyorsdi

Recent Advances in Information-Centric Networking based Internet of Things (ICN-IoT) [article]

Sobia Arshad, Muhammad Awais Azam, Mubashir Husain Rehmani, Jonathan Loo
2018 arXiv   pre-print
delivery and self-certifying contents to ensure better security.  ...  ICN models are based on naming the content to get rid of address-space scarcity, accessing the content via name-based-routing, caching the content at intermediate nodes to provide reliable, efficient data  ...  in close collaboration with both University of West London, UK and Waterford Institute of Technology, Ireland.  ... 
arXiv:1710.03473v3 fatcat:psedk3gg3bbjjhxvit5vae5xxu
« Previous Showing results 1 — 15 out of 1,042 results