2022
DOI: 10.1007/978-3-031-10522-7_22
|View full text |Cite
|
Sign up to set email alerts
|

Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN)

Abstract: HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d'enseignement et de recherche français ou étrangers, des labor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…While NDN is not vulnerable to traditional attacks that target TCP/IP, such as DoS, DDoS, relay, MiTM, or flooding attacks (35), it is still susceptible to new types of attacks, including Cache Pollution Attack (CPA), Cache Poisoning Attack, Interest Flooding Attack (IFA), and Cache Privacy Attack (36). A wider survey of potential attacks in Named Data Networks can be found in (16) (17). The proposed mechanism in the current study specifically targets the Cache Pollution Attack, so in this subsection, we closely investigate the principles and sub-types of CPA.…”
Section: Cache Pollution Attacks In Ndnmentioning
confidence: 99%
See 1 more Smart Citation
“…While NDN is not vulnerable to traditional attacks that target TCP/IP, such as DoS, DDoS, relay, MiTM, or flooding attacks (35), it is still susceptible to new types of attacks, including Cache Pollution Attack (CPA), Cache Poisoning Attack, Interest Flooding Attack (IFA), and Cache Privacy Attack (36). A wider survey of potential attacks in Named Data Networks can be found in (16) (17). The proposed mechanism in the current study specifically targets the Cache Pollution Attack, so in this subsection, we closely investigate the principles and sub-types of CPA.…”
Section: Cache Pollution Attacks In Ndnmentioning
confidence: 99%
“…In recent times, multiple attacks have specifically targeted this architecture, highlighting the need for robust security measures. Indeed, one of the significant attacks that has impacted NDN is the Cache Pollution Attack (CPA) (16) (17) (18), which can be easily developed and manipulated, and poses a serious threat to the main components of NDN, particularly the Content Store (CS) cache, which can result in an increased number of retransmissions, which ultimately leads to a reduction in network throughput.…”
Section: Introductionmentioning
confidence: 99%
“…Secondly, NDN is highly vulnerable to various attacks [12] with severe implications, especially in the context of VNDN, where human lives are directly involved. In VNDN, the illusion of attacker vehicles can disseminate invalid information among their neighboring vehicles.…”
Section: Pending Interest Table (Pit)mentioning
confidence: 99%