Efficient Content Verification in Named Data Networking

作者: Dohyung Kim , Sunwook Nam , Jun Bi , Ikjun Yeom

DOI: 10.1145/2810156.2810165

关键词:

摘要: In Named Data Networking, contents are retrieved from network caches as well the content server by their name. This aspect arises severe security concerns on integrity. Especially, if poisoned lie in cache, called store(CS), interests would be served rather than they propagate toward server. Consequently, users whose pass through contaminated CS cannot access valid content. order to resolve problem, every is verified before inserted into CS. However, this built-in verification mechanism not practically feasible due its huge computational overhead. paper, we address problems of integrity NDN details, including how violate We also propose a practical solution that efficiently detects with minimum Since proposed scheme aligns basic architecture, it and effective solution.

参考文章(17)
Ilya Moiseenko, Alexander Afanasyev, Ersin Uzun, Lixia Zhang, Priya Mahadevan, Interest flooding attack and countermeasures in Named Data Networking 2013 IFIP Networking Conference. pp. 1- 9 ,(2013)
Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp, Backscatter from the data plane - Threats to stability and security in information-centric network infrastructure Computer Networks. ,vol. 57, pp. 3192- 3206 ,(2013) , 10.1016/J.COMNET.2013.07.009
Gene Tsudik, Ersin Uzun, Cesar Ghali, Elements of Trust in Named-Data Networking arXiv: Networking and Internet Architecture. ,(2014) , 10.1145/2677046.2677049
Mengjun Xie, Indra Widjaja, Haining Wang, Enhancing cache robustness for content-centric networking international conference on computer communications. pp. 2426- 2434 ,(2012) , 10.1109/INFCOM.2012.6195632
Raffaele Chiocchetti, Diego Perino, Giovanna Carofiglio, Dario Rossi, Giuseppe Rossini, INFORM: a dynamic interest forwarding mechanism for information centric networking acm special interest group on data communication. pp. 9- 14 ,(2013) , 10.1145/2491224.2491227
Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard, Networking named content Proceedings of the 5th international conference on Emerging networking experiments and technologies - CoNEXT '09. pp. 1- 12 ,(2009) , 10.1145/1658939.1658941
Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang, None, DoS and DDoS in Named Data Networking international conference on computer communications and networks. pp. 1- 7 ,(2013) , 10.1109/ICCCN.2013.6614127
R. Karedla, J.S. Love, B.G. Wherry, Caching strategies to improve disk system performance IEEE Computer. ,vol. 27, pp. 38- 46 ,(1994) , 10.1109/2.268884
Giuseppe Bianchi, Andrea Detti, Alberto Caponi, Nicola Blefari Melazzi, Check before storing: what is the performance price of content integrity verification in LRU caching? acm special interest group on data communication. ,vol. 43, pp. 59- 67 ,(2013) , 10.1145/2500098.2500106
Munyoung Lee, Junghwan Song, Kideok Cho, Sangheon Pack, Ted “Taekyoung” Kwon, Jussi Kangasharju, Yanghee Choi, Content discovery for information-centric networking Computer Networks. ,vol. 83, pp. 1- 14 ,(2015) , 10.1016/J.COMNET.2014.10.006