2016 13th IEEE Annual Consumer Communications &Amp; Networking Conference (CCNC) 2016
DOI: 10.1109/ccnc.2016.7444899
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the producer-consumer collusion attack in Content-Centric Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…However, this work does not specify how the attackers obtain the PIT expiration time exactly. Nasserala and Moraesy [30] point out that the purpose of the collusive attack is to increase the retrieval time of legitimate contents by decreasing the cache hit ratio of the legitimate requests in the intermediate routers, but the countermeasures are not given. The authors then promote a producer-consumer collusion attack countermeasure called Cache nFace [31], which divides the cache store of a router into sub caches for different interfaces.…”
Section: B the Content-provider Collusive Attackmentioning
confidence: 99%
“…However, this work does not specify how the attackers obtain the PIT expiration time exactly. Nasserala and Moraesy [30] point out that the purpose of the collusive attack is to increase the retrieval time of legitimate contents by decreasing the cache hit ratio of the legitimate requests in the intermediate routers, but the countermeasures are not given. The authors then promote a producer-consumer collusion attack countermeasure called Cache nFace [31], which divides the cache store of a router into sub caches for different interfaces.…”
Section: B the Content-provider Collusive Attackmentioning
confidence: 99%