作者: Dohyung Kim , Jun Bi , Athanasios V. Vasilakos , Ikjun Yeom
DOI: 10.1109/TIFS.2017.2725229
关键词:
摘要: In Named-Data Networking (NDN), content is cached in network nodes and served for future requests. This property of NDN allows attackers to inject poisoned into the isolate users from valid sources. Since a digital signature embedded every piece architecture, discarded if routers perform verification; however, verified by router, it would be overly expensive do. our preliminary work, we have suggested verification scheme that minimizes unnecessary favors already store, which reduces overhead as much 90% without failing detect content. Under this scheme, are vulnerable attack , large amount unverified accessed exhaust system resources. paper, carefully look at possible concerns including present simple but effective solution. The proposed solution mitigates weakness work paper deployed real-world applications.