A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security and Privacy Issues in Vehicular Named Data Networks: An Overview
2018
Mobile Information Systems
A tremendous amount of content and information are exchanging in a vehicular environment between vehicles, roadside units, and the Internet. ...
We present a state of the art of existing VANET attacks and how NDN can deal with them. We classified these attacks based on the NDN perspective. ...
As the content in NDN is decoupled from its original location, NDN follows a content-based security concept [20] that consists of securing the content among different network elements regardless of the ...
doi:10.1155/2018/5672154
fatcat:t4x7vsf4vnd77ga6zva4s34t64
A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking
2022
Computers
Despite the highly secure content sharing and the optimized forwarding mechanism, the content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities that can be exploited to ...
This poses a critical challenge to the design of IDS in NDN. ...
The main security concern in a Cache Poisoning Attack is the availability of the content. ...
doi:10.3390/computers11120186
fatcat:gnaioiofjbhcdnnhkaelud6req
Security Challenges in Future NDN-Enabled VANETs
2016
2016 IEEE Trustcom/BigDataSE/ISPA
Interest flooding attacks, cache poisoning attacks and privacy violation attacks by means of content names represent concrete NDN threats. ...
Therefore, this paper opens a more comprehensive discussion of the security risks brought by the application of NDN solutions in VANETs. ...
As any ICN instantiation, NDN supports named contents, in-network caching, name-based routing, asynchronous communication, and in-data security. ...
doi:10.1109/trustcom.2016.0272
dblp:conf/trustcom/SignorelloPG16
fatcat:onff5wt5k5bklg6tt5pbh7mfl4
Named Data Networking in Vehicular Ad hoc Networks: State-of-the-Art and Challenges
2019
IEEE Communications Surveys and Tutorials
Subsequently, we cover in detail, NDN-based naming, routing and forwarding, caching, mobility, and security mechanism for VANET. ...
More precisely, we investigate the role of NDN in VANET and discuss the feasibility of NDN architecture in VANET environment. ...
However, in NDN, security mechanisms are applied to the content itself rather than the communication channels. Therefore, the content delivery and caching may not need communication security. ...
doi:10.1109/comst.2019.2894816
fatcat:qxljrw7bcrdgfko3itxprhsige
Named Data Networking: A survey
2016
Computer Science Review
NDN SYSTEM SERVICES In this Section, we shall introduce an elaborate survey of the major routing, caching, forwarding, security, privacy and trust, and mobility techniques proposed for NDN in recent years ...
and routing, caching, security, mobility, etc. ...
Security layer provides security to each and every piece of content, unlike securing the entire communication channel in Internet. ...
doi:10.1016/j.cosrev.2016.01.001
fatcat:z256vu3lwrdnpkzsdnruxtlosi
Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN
2020
Future Internet
The information cache in the NDN separates content from content publishers, but content security is threatened because of the lack of security controls. ...
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/fi12010015
fatcat:2yuxrux5xfhdlhn6gixcwmf7ve
A Content Poisoning Attack Detection and Prevention System in Vehicular Named Data Networking
2023
Sustainability
However, vehicular NDN (VNDN) faces numerous challenges, including security, privacy, routing, and caching. ...
Finally, we extend the scope of NDN from pull-based content retrieval to push-based content dissemination. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/su151410931
fatcat:nc42axei5bgatcc4oruc5anzhq
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking
2015
IEEE Transactions on Information Forensics and Security
Security is built into NDN by embedding a public key signature in each data packet to enable verification of authenticity and integrity of the content. ...
Furthermore, caching and location-independent content access disables the capability of a content provider to control content access, e.g., who can cache a content and which end user or device can access ...
NDN Security Polices In LIVE, CPs realize content access control by enforcing security policies. ...
doi:10.1109/tifs.2014.2365742
fatcat:kk4cmhixavf3bpkufwx7ziycty
Secure Content Distribution with Access Control Enforcement in Named Data Networking
2021
Sensors
NDN is one of the new emerging future internet architectures which brings up new solutions over today's internet architecture, facilitating content distribution, in-network caching, mobility support, and ...
NDNs ubiquitous in-network caching allows consumers to access data directly from the intermediate router's cache. ...
One of the main features of NDN is in-network caching, where contents can be cached in the intermediate routers in the network. ...
doi:10.3390/s21134477
pmid:34208900
pmcid:PMC8271773
fatcat:wa5jgns63veyle6h4qbwgoud3e
A Survey on Security in Named Data Networking
[article]
2015
arXiv
pre-print
In this paper, we conduct a brief survey of security topics/problems inherent to the NDN architecture. ...
Named Data Networking (NDN) is one of the few initiatives/projects addressing the shortcomings of the current Internet architecture and intends to move the Internet toward a content distribution architecture ...
In security, NDN addresses security challenges such as DoS attacks naturally and in-router data caching provides more efficient CDN service. ...
arXiv:1512.04127v1
fatcat:7ga4qzeo6zewtifeaqmkhuzlpq
Content Protection in Named Data Networking: Challenges and Potential Solutions
[article]
2018
arXiv
pre-print
In order to make NDN practical in the real world, the challenging issues of content security need to be addressed. ...
In this article, we examine the architecture, content security as well as possible solutions to these issues of NDN, with a special focus on content integrity and provenance. ...
In NDN, content security is a challenge since there exist a number of security concerns of NDN content including naming related attacks, caching related attacks, routing related attacks and other attacks ...
arXiv:1810.11179v1
fatcat:bsajaxqc3jepzedb3o4kruqyam
Network-Layer Trust in Named-Data Networking
2014
Computer communication review
By opportunistically caching content within the network (in routers), NDN appears to be well-suited for large-scale content distribution and for meeting the needs of increasingly mobile and bandwidth-hungry ...
This paper explores root causes of, and some cures for, content poisoning attacks in NDN. ...
Acknowledgments This work was funded by NSF under the "CNS-1040802: FIA: Collaborative Research: Named Data Networking (NDN)" project. ...
doi:10.1145/2677046.2677049
fatcat:vjhto67a5vc75eoiwy4j7auwiy
Reputation-Based Trust Approaches in Named Data Networking
2019
Future Internet
In the NDN framework, disseminated content is at the core of the design and providing trusted content is essential. ...
In this paper, we provide an overview of reputation-based trust approaches, present their design trade-offs and argue that these approaches can consolidate NDN trust and security by working complementary ...
Author Contributions: All authors contributed equally to the conceptualization and the writing of the paper. ...
doi:10.3390/fi11110241
fatcat:f4hjmzyhi5gjnh5zfhu53bj2fi
FQ-BF: An Efficient Forwarding and Query Optimization Framework based on Bloom Filters in NDN
2019
International journal of recent technology and engineering
Continuous efforts by researchers try to optimize the NDN performance in various areas like routing, forwarding, caching, security, etc. ...
NDN basically works on searching for the required data packet, so the content search is one of the promising areas in NDN that still needs improvement. ...
Application of BF in NDN BF has been used at various functional areas of NDN like routing, caching, forwarding and security. A Singh & G. S. ...
doi:10.35940/ijrte.d7721.118419
fatcat:zch7tsqx7jginajsvotgyorsdi
Recent Advances in Information-Centric Networking based Internet of Things (ICN-IoT)
[article]
2018
arXiv
pre-print
delivery and self-certifying contents to ensure better security. ...
ICN models are based on naming the content to get rid of address-space scarcity, accessing the content via name-based-routing, caching the content at intermediate nodes to provide reliable, efficient data ...
in close collaboration with both University of West London, UK and Waterford Institute of Technology, Ireland. ...
arXiv:1710.03473v3
fatcat:psedk3gg3bbjjhxvit5vae5xxu
« Previous
Showing results 1 — 15 out of 1,042 results