Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2018
DOI: 10.1109/comst.2017.2749508
|View full text |Cite
|
Sign up to set email alerts
|

Security, Privacy, and Access Control in Information-Centric Networking: A Survey

Abstract: Information-Centric Networking (ICN) replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet, mobile ad hoc networks) with an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents' origin. Content and client security, provenance, and identity privacy are intrinsic in the ICN paradigm versus the current host centric paradigm where they have been instrumented as an after-thought. By design, the ICN paradigm inherently … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
109
0
4

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 218 publications
(121 citation statements)
references
References 118 publications
(358 reference statements)
0
109
0
4
Order By: Relevance
“…In the same context, we will focus on the security features that have been guaranteed by the packet authentication mechanism, though there are a number of security issues (in [3], DoS/DDoS, content poisoning, cache pollution, secure naming and routing, application security, and other general security concerns have been summarized as threats against ICN techniques. An authentication mechanism could be used to protect other attacks, but the fundamental goal of an authentication mechanism in CCN is to guarantee the security against the content poisoning attack) since only the authentication mechanism is considered in our approach.…”
Section: Security Analysis Note That the Goal Of This Work Is Tomentioning
confidence: 99%
See 1 more Smart Citation
“…In the same context, we will focus on the security features that have been guaranteed by the packet authentication mechanism, though there are a number of security issues (in [3], DoS/DDoS, content poisoning, cache pollution, secure naming and routing, application security, and other general security concerns have been summarized as threats against ICN techniques. An authentication mechanism could be used to protect other attacks, but the fundamental goal of an authentication mechanism in CCN is to guarantee the security against the content poisoning attack) since only the authentication mechanism is considered in our approach.…”
Section: Security Analysis Note That the Goal Of This Work Is Tomentioning
confidence: 99%
“…Content-Centric Networking (CCN) has recently been proposed as one of different types of Information-Centric Networking (ICN) [1][2][3][4][5] to solve the problem of heavy traffic increases and the existing IP-based Internet's problems [1]. In CCN, contents are routed by their own content names rather than IP-addresses and data segments in the contents are stored in network nodes' storage (so-called in-network caching) during transmission for handling future requests rapidly.…”
Section: Introductionmentioning
confidence: 99%
“…As a new architecture, on one hand, ICN has many advantages over the traditional TCP/IP architecture. On the other hand, ICN also has many research challenges to be solved [11], such as the specific architecture, naming, routing [12], transport [13], caching [14], mobility [15] and security [16].…”
Section: Related Workmentioning
confidence: 99%
“…Many ICN architectures have been proposed and still being researched. Based on the nature of communication Tourani et al [14] has categorized some common CCN architectures into two models as i) consumer-driven and ii) publish-subscribe. In the consumer driven architectures, the communication is initiated when a user sends a request for a data/content to the network and then the publisher sends the data back or in case of caching the cache sends the reply.…”
Section: Information Centric Networkingmentioning
confidence: 99%
“…But this feature could be exploited by attackers by adding unpopular content to the cache and hampering the cache distribution. Two common caches of cache pollution attacks identified are: locality disruption and false locality [14] . In locality disruption attack, the attacked continuously requests unpopular contents to disrupt the locality of the cache by adding new popular contents continuously.…”
Section: Cache Pollotionmentioning
confidence: 99%