2013 21st IEEE International Conference on Network Protocols (ICNP) 2013
DOI: 10.1109/icnp.2013.6733675
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of a future Internet architecture

Abstract: In this paper, we analyze the security threats of a newly proposed future Internet architecture called CoLoR. In particular, we describe how CoLoR defends against the most prevalent attacks existing in both the current Internet and some recently proposed information-centric networks such as named data networking (NDN). We also present attacks that are specific to CoLoR and discuss how to deal with them. Through our analysis, we find that CoLoR is more secure than both the current Internet and NDN.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…In addition, CoLoR makes it easy to accurately, efficiently and timely estimate the traffic matrices of networks [13], and to efficiently integrate information-centric networking and software-defined networking [14]. Furthermore, the work in [12] analyzes CoLoR's inherent advantages on security and illustrates how it defenses against traditional attacks (without using the mechanism proposed in this paper).…”
Section: Introductionmentioning
confidence: 93%
“…In addition, CoLoR makes it easy to accurately, efficiently and timely estimate the traffic matrices of networks [13], and to efficiently integrate information-centric networking and software-defined networking [14]. Furthermore, the work in [12] analyzes CoLoR's inherent advantages on security and illustrates how it defenses against traditional attacks (without using the mechanism proposed in this paper).…”
Section: Introductionmentioning
confidence: 93%
“…However, projects carried out in FIA still have open scope of security incorporation. A good initiative towards investigating security over FIA (called as CoLoR) was carried out by Chen et al [59] where the authors have carried out comparative strength analysis of various threat levels. According to authors, designing FIA considering service location and inter-domain routing could offer better resource management as well as its packet forwarding strategy is highly resistive against reflection attacks, poisoning of DNS cache, prefix hijacking, bandwidth depletion, falsification of routing path, etc.…”
Section: Studies Towards Securing Future Internetmentioning
confidence: 99%