A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
Protecting access privacy of cached contents in information centric networks
2013
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13
In recently proposed information centric networks (ICN), a user issues "interest" packets to retrieve contents from network by names. ...
However, the way ICN caching and interest fulfillment work poses a great privacy risk: the time difference between responses for an interest of cached and uncached content can be used as an indicator to ...
CONCLUDING REMARKS In this paper we have introduced an attack on content access privacy that is applicable to several information centric network (ICN) architectures, including the CCN and NDN. ...
doi:10.1145/2484313.2484335
dblp:conf/ccs/MohaisenZSXK13
fatcat:iuz2tkllsvgutpvf6ct7mrlez4
Protecting access privacy of cached contents in information centric networks
2012
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12
In recently proposed information centric networks (ICN), a user issues "interest" packets to retrieve contents from network by names. ...
However, the way ICN caching and interest fulfillment work poses a great privacy risk: the time difference between responses for an interest of cached and uncached content can be used as an indicator to ...
CONCLUDING REMARKS In this paper we have introduced an attack on content access privacy that is applicable to several information centric network (ICN) architectures, including the CCN and NDN. ...
doi:10.1145/2382196.2382305
dblp:conf/ccs/MohaisenZSXK12
fatcat:m47cpkv7njgvtmnvjnuh4ukmtm
Security and Privacy Issues in Vehicular Named Data Networks: An Overview
2018
Mobile Information Systems
A tremendous amount of content and information are exchanging in a vehicular environment between vehicles, roadside units, and the Internet. ...
In this paper, we focus on the vehicular named data networking environment, targeting the security attacks and privacy issues. ...
In the following sections, we classify VANET attacks into three categories: infrastructure attacks, content protection and access control, and content and user privacy. ...
doi:10.1155/2018/5672154
fatcat:t4x7vsf4vnd77ga6zva4s34t64
Security and Privacy in Future Internet Architectures - Benefits and Challenges of Content Centric Networks
[article]
2016
arXiv
pre-print
In this work, we compare the Content Centric Networking approach with the current Internet with respect to security and privacy. ...
While the performance gain of Content Centric Networks is undoubted, there are questions about security and especially privacy since it is not one of its main design principle. ...
Protection against Denial of Service Apart from the protection against direct attacks on hosts, Content Centric Networking even offers a protection against Denial of Service (DoS) attacks on content providers ...
arXiv:1601.01278v2
fatcat:odzaekopuvbmphulsk5vtmoqji
A Privacy Preserving Strategy Based on Anonymous Group in Content Centric Network
2017
DEStech Transactions on Computer Science and Engineering
In Content Centric Networking (CCN), "publish-request-response" is presented in data communications between users and publishers, as well as the response message could be cacheable in the routing node. ...
Based on this model, privacy disclosure is a threat to users and publishers. In this paper, a strategy for CNN privacy information protection is proposed. ...
meaning. (3) The encryption method proposed in the literature [6, 7] can protect the privacy of content, but it cannot play the advantage of the universal cache of nodes. ...
doi:10.12783/dtcse/aiea2017/15007
fatcat:weqf6c226falvoqh3hzzwspjae
DataClouds: Enabling Community-Based Data-Centric Services Over the Internet of Things
2014
IEEE Internet of Things Journal
Index Terms-Data-centric services, information-centric networking (ICN), Internet architecture, Internet of Things (IoT). ...
advanced data-centric services boosted by the IoT in which users care about content and are oblivious to locations where the content is stored. ...
mobility, achieves in-network caching, and protects user privacy, as we will show later in this paper. ...
doi:10.1109/jiot.2014.2353629
fatcat:mnshxu56k5ervbkrm5elbkwlti
A Survey of Security Attacks in Information-Centric Networking
2015
IEEE Communications Surveys and Tutorials
Information-centric networking (ICN) is a new communication paradigm that focuses on content retrieval from the network regardless of storage location or physical representation of this content. ...
Index Terms-Information-centric networking, taxonomy of ICN attacks, ICN security, severity levels of ICN attacks. 1553-877X (c) ...
ACKNOWLEDGMENT This project is partially funded by the Natural Sciences and Engineering Research Council (NSERC) of Canada and Bell Canada. ...
doi:10.1109/comst.2015.2392629
fatcat:2uroqf4lznbm3gyjg2fmozblwe
Privacy risks in named data networking
2012
Computer communication review
A key part of these proposals is the capability of caching arbitrary content in arbitrary network locations. ...
While caching has the potential to improve network performance, the data stored in caches can be seen as transient traces of past communication that attackers can exploit to compromise the users' privacy ...
The authors of this editorial discussed the possibility of privacy attacks based on caches [8, 9] in Content-Centric Networking [6] , but the question of countermeasures is still open. ...
doi:10.1145/2378956.2378966
fatcat:5k3dglb34nadpnb2vquz5q5gyy
Survey Based on Security Aware Caching Scheme for IoT Based Information Centric Networking
2020
EAI Endorsed Transactions on Energy Web
Information-Centric Networking (ICN) empowered by information-centric paradigm takes popular paradigm place of hostcentric networking of communication networks, which in turn helps prioritizing the labeled ...
content delivery, with no information on the origin of the contents. ...
[39] implemented as caching method for delivering content in Information-Centric Network, which is termed as Least Unified Value (LUV)-Path. ...
doi:10.4108/eai.1-7-2020.165960
fatcat:ndhynglnpzdapcyx4ftcyrstda
A Survey on Information-Centric Networking with Cloud Internet of Things and Artificial Intelligence
2022
Wireless Communications and Mobile Computing
An information-centric network (ICN) uses this idea and makes data, instead of host addresses, an integral component. ...
Finally, we explore three broad categories of open issues and challenges raised by the researchers: security, performance, and in-network caching. ...
Acknowledgments The authors would like to acknowledge the support of ICN and Network Communication Technology Research Groups, FTSM, UKM, in providing facilities for this research. ...
doi:10.1155/2022/7818712
fatcat:yhxonbgcezbnjmfjufz6g64oiq
Secure and Efficient Content Distribution in Crowdsourced Vehicular Content-Centric Networking
2018
IEEE Access
However, providing high quality of experience for content distribution in VCCN is challenging due to the dynamic network topologies, varying wireless channel conditions and vehicle user privacy. ...
efficiency, mobility and security via named data and in-networking caching compared with the IP-based network. ...
However, there are still some new security issues needed to be addressed, e.g., secure cached content sharing (due to in-network caching), user privacy protection (owing to crowdsourcing). ...
doi:10.1109/access.2017.2778502
fatcat:hwdbjgkt7bbdthsaffckawnuqy
Investigating Regulative Implications for User-generated Content and a Design Proposal
2014
PIK - Praxis der Informationsverarbeitung und Kommunikation
However, caching of content also raises major implications in terms of legal acts and bills (e.g., data privacy, copyright), dealing with access control, validation scheme, and regulations (e.g., contractual ...
Mechanisms such as content-aware-networks and in-network caching reduce network load, server load, and user response time, thus, manage the network. ...
Therefore, caching such content within a network is prone to various legal constraints in terms of privacy, copyright, and data protection. ...
doi:10.1515/pik-2013-0042
fatcat:2qsokbimk5gzpoxsdqomid7p3i
Security requirements and solutions for integrated satellite-terrestrial Information-Centric Networks
2014
2014 7th Advanced Satellite Multimedia Systems Conference and the 13th Signal Processing for Space Communications Workshop (ASMS/SPSC)
Information-Centric Networking (ICN) has been in the spotlight of recent research efforts. ...
ICN architectures depart from the traditional host-centric (inter-)networking paradigm and leverage the role of information by placing it in the core of all networking functions. ...
CONCLUSIONS In this work we discussed some security requirements for Integrated Satellite-Terrestrial Information-Centric Networks and we evaluated security solutions for: access control, content integrity ...
doi:10.1109/asms-spsc.2014.6934531
dblp:conf/asms-spsc/FotiouTSP14
fatcat:5kcdy2dai5cpzkt6chvhlr2qta
Security, Privacy, and Access Control in Information-Centric Networking: A Survey
[article]
2017
arXiv
pre-print
an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents origin. ...
Information-Centric Networking (ICN) is a new networking paradigm, which replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet, mobile ad hoc networks) with ...
[74] explored proposed caching approaches in information-centric networking. ...
arXiv:1603.03409v3
fatcat:ynhnoqve3nbzrdvlxy4jigzlkq
Security for the Industrial IoT: The Case for Information-Centric Networking
[article]
2019
arXiv
pre-print
Our findings indicate that the content-centric security model, as well as enhanced DoS resistance are important arguments for deploying Information Centric Networking in a safety-critical industrial IoT ...
In this paper, we analyze the potentials of ICN for providing a secure and robust networking solution for constrained controllers in industrial safety systems. ...
Information Centric Networking (ICN) [1] was introduced as a networking paradigm for improved content access in a Future Internet. Ubiquitous caching is a core feature of ICN. ...
arXiv:1810.04645v2
fatcat:weaw3bp3qvdf5ndf6fmxerce5a
« Previous
Showing results 1 — 15 out of 2,695 results