2019
DOI: 10.1007/s11390-019-1978-9
|View full text |Cite
|
Sign up to set email alerts
|

Security Attacks in Named Data Networking: A Review and Research Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(26 citation statements)
references
References 69 publications
0
20
0
Order By: Relevance
“…Caching in NDN is managed by different policies such as: Least Recently Used (LRU), Least Frequently Used (LFU), First In First Out (FIFO), Random. However, since no pre-existing mechanism is defined to detect the access of different malicious nodes into the Content Store (CS) [15], this "secured-by design" architecture is vulnerable to attacks that mainly aim to abuse the Content Caching process, disturb the availability of the data, maximize the data retrieval delay and manipulate the privacy of data. These attacks include Cache Privacy Attacks, Content Poisoning Attacks, Interest Flooding Attacks and Cache Pollution Attacks.…”
Section: Security Vulnerabilities In Named Data Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Caching in NDN is managed by different policies such as: Least Recently Used (LRU), Least Frequently Used (LFU), First In First Out (FIFO), Random. However, since no pre-existing mechanism is defined to detect the access of different malicious nodes into the Content Store (CS) [15], this "secured-by design" architecture is vulnerable to attacks that mainly aim to abuse the Content Caching process, disturb the availability of the data, maximize the data retrieval delay and manipulate the privacy of data. These attacks include Cache Privacy Attacks, Content Poisoning Attacks, Interest Flooding Attacks and Cache Pollution Attacks.…”
Section: Security Vulnerabilities In Named Data Networkmentioning
confidence: 99%
“…Although the routers can not check the validity of these malicious data due to their limited resources and time, as a result, only the corrupted content will stay in the cache of the CS, which causes a high delay in retrieving certain content and legitimate content will not be served from the cache. Content Poisoning Attack affects consumer applications and routers [15].…”
Section: B Content Poisoning Attackmentioning
confidence: 99%
“… Kumar et al (2019) and Hassanein & Zulkernine (2015) explained some of the most common attacks within the existing TCP/IP model such as Denial of Service (DoS) attack, Distributed Denial of Service (DDoS) attack, eavesdropping (snooping), masquerading, TCP Replay Attack, Man in the Middle Attack, repudiation, and traffic analysis attack. These legacy attacks are not possible in NDN because of the absence of the host, but with the advent of this new architecture, some new attack surfaces have emerged which need to be addressed and it is an active research area.…”
Section: Related Workmentioning
confidence: 99%
“…A consumer can acquire a public key by following this field of KeyLocator and can retrieve it just like a normal data packet. Kumar et al (2019) explained some of the most common attacks within the existing TCP/IP model such as Denial of Service (DoS) attack, Distributed Denial of Service (DDoS) attack, eavesdropping (snooping), masquerading, TCP Replay Attack, Man in the Middle Attack, repudiation, and traffic analysis attack. In a modification attack, the attacker does not only compromise the confidentiality of the data by accessing it but also compromises the integrity of the data by trying to alter it.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation