2016
DOI: 10.1109/tifs.2016.2574307
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Path Diversity for Thwarting Pollution Attacks in Named Data Networking

Abstract: With information becoming a first-class citizen on the Internet, Information-centric Networking (ICN) is considered as a promising direction for the future Internet. Named Data Networking (NDN) is a prominent example of emerging ICN architectures. Unfortunately, NDN is vulnerable to various attacks targeting its in-network caching mechanism. In this paper, we focus on the false-locality pollution attack, in which an adversary repeatedly requests a number of unpopular data objects to waste the precious cache sp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(13 citation statements)
references
References 34 publications
0
13
0
Order By: Relevance
“…We expect that FEC-based TLDA can provide more enhanced performance of efficient and reliable delivery of Meta part segments. Furthermore, we will extend TLDA such that it provides protection against content pollution attack [31][32][33][34] on the network nodes. In the future works, we will verify the advantage of our mechanism with large scale scenario by using ndnSIM [35] which is a recently developed NDN simulator.…”
Section: Discussionmentioning
confidence: 99%
“…We expect that FEC-based TLDA can provide more enhanced performance of efficient and reliable delivery of Meta part segments. Furthermore, we will extend TLDA such that it provides protection against content pollution attack [31][32][33][34] on the network nodes. In the future works, we will verify the advantage of our mechanism with large scale scenario by using ndnSIM [35] which is a recently developed NDN simulator.…”
Section: Discussionmentioning
confidence: 99%
“…For example, Sourlas et al [5] proposed an autonomic cache management architecture, in which a distributed manager makes the (re)placement decisions depending on the popularity and locality of content data while minimizing the total network traffic and response time. On the other hand, several researchers have investigated a new scheme for security-aware ICN systems that is a prototyping scratch and/or a promising blueprint [9]- [13]. Xie et al [9] proposed a locality-disruption pollution attack to make a named data networking (NDN) system that is called the cache shield method, which is a traditional and familiar ICN model and more robust by increasing the attack cost.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al [11] proposed and evaluated a lightweight mechanism for integrity verification and access control against poisoning attacks on an NDN system. Mauri et al [12] and Guo et al [13] proposed and analyzed a unified model to profile the attacker's strategy for polluting an NDN framework.…”
Section: Related Workmentioning
confidence: 99%
“…There are many malicious requests for ICN architectures related to naming, routing, caching, and unauthorized access . In this paper, we are concerned with unauthorized access attacks.…”
Section: Introductionmentioning
confidence: 99%
“…More discussions about related work and generic centralized and decentralized access control mechanisms can be found in our earlier conference paper …”
mentioning
confidence: 99%