Information-centric networking (ICN) is a new approach to networking contents rather than devices that hold the contents. It has recently attracted much attention of network research and standardization communities. National and multi-national funded research projects have progressed worldwide. International Telecommunication Union -Telecommunication Standardization Sector (ITU-T) started ICN standardization activities in 2012. In parallel, the standards-oriented research cooperation is progressing in the Information-Centric Networking Research Group (ICNRG) of the Internet Research Task Force (IRTF). All these global efforts have been collectively advancing the novel network architecture of ICN. However, there are very few surveys and discussions on the detailed ICN standardization status. To update the reader with information about the ICN research and standardization related activities, this paper starts with the history of global activities on ICN from 2010, giving references to various projects. It then describes the recent progress in the standardization of ICN component technologies in ITU-T and various documents produced by ICNRG. Lastly, it discusses the future directions for progressing ICN.
SUMMARYFor flexibility in supporting mobility and multihoming in edge networks and scalability of the backbone routing system, future Internet is expected to be based on the concept of ID/locator split. Heterogeneity Inclusion and Mobility Adaptation through Locator ID Separation (HIMALIS) has been designed as a generic future network architecture based on ID/locator split concept. It can natively support mobility, multihoming, scalable backbone routing and heterogeneous protocols in the network layer of the new generation network or future Internet. However, HIMALIS still lacks security functions to protect itself from various attacks during the procedures of storing, updating, and retrieving of ID/locator mappings, such as impersonation attacks. Therefore, in this paper, we address the issues of security functions design and implementation for the HIMALIS architecture. We present an integrated security scheme consisting of mapping registration and retrieval security, network access security, communication session security, and mobility security. Through the proposed scheme, the hostname to ID and locator mapping records can be securely stored and updated in two types of name registries, domain name registry and host name registry. Meanwhile, the mapping records retrieved securely from these registries are utilized for securing the network access process, communication sessions, and mobility management functions. The proposed scheme provides comprehensive protection of both control and data packets as well as the network infrastructure through an effective combination of asymmetric and symmetric cryptographic functions. key words: ID/locator split architecture, security, new generation network, future network
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.