2019
DOI: 10.3390/fi11110241
|View full text |Cite
|
Sign up to set email alerts
|

Reputation-Based Trust Approaches in Named Data Networking

Abstract: Information-Centric Networking (ICN) has arisen as an architectural solution that responds to the needs of today’s overloaded Internet, departing from the traditional host-centric access paradigm. In this paper we focus on Named Data Networking (NDN), the most prominent ICN architecture. In the NDN framework, disseminated content is at the core of the design and providing trusted content is essential. In this paper, we provide an overview of reputation-based trust approaches, present their design trade-offs an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 45 publications
0
3
0
Order By: Relevance
“…We have conducted theoretical analyses demonstrating the robustness of this proposed framework against three integrity attacks mentioned in [13]. Authors in [14][15][16] highlighted specific trust management and security aspects in NDN, notably the "producer signature". Their argument supports the notion that signing NDN packets improves data integrity and authenticity by requiring content producers to cryptographically sign their data before transmission.…”
Section: Related Workmentioning
confidence: 99%
“…We have conducted theoretical analyses demonstrating the robustness of this proposed framework against three integrity attacks mentioned in [13]. Authors in [14][15][16] highlighted specific trust management and security aspects in NDN, notably the "producer signature". Their argument supports the notion that signing NDN packets improves data integrity and authenticity by requiring content producers to cryptographically sign their data before transmission.…”
Section: Related Workmentioning
confidence: 99%
“…Reputation-based trust approaches can assist in securing NDN environment [129], while in 2016, author in [128] presented Router-Oriented Mitigation (ROM) using the same strategy as [125], even when the routers are compromised, ROM able to provide security by eliminate it without interfering the transmission process. Reputation-based in each router is introduced, giving the process of content dissemination based on its reputations.…”
Section: B Consumer Dependent Mitigationmentioning
confidence: 99%
“…The fifth paper [5] performs an overview of reputation-based approaches for trust management in ICN, and in particular in Named Data Networking (NDN). It examines and discusses whether existing credential-based mechanisms can be complemented by reputation-based solutions.…”
Section: Contributionsmentioning
confidence: 99%