An in-network collaborative verification mechanism for defending content poisoning in Named Data Networking

被引:0
|
作者
Kang, Haohao [1 ]
Zhu, Yi [1 ]
Tao, Yu [1 ]
Yang, Jianlong [2 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang, Peoples R China
[2] Jiangsu Univ, JingJiang Coll, Zhenjiang, Peoples R China
关键词
Named data networking; Content poisoning; Collaborative verification; Probability verification; Data packet credibility;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The verification mechanism is the key to ensuring the content security in Name Data Networking (NDN). However, due to the limited computational capacity of NDN router, it is difficult to complete the verification task of all received data packets under heavy traffic. As a consequence, content poisoning has become one of the important security risks of current NDN. To solve this problem, we introduce the concept of data packet credibility and propose an in-network cooperative verification mechanism. In our design, the router calculates the credibility of received data packet from two aspects, one is the internal-evaluation estimated by itself, another is the external-evaluation from its upstream routers. After completing the combined evaluation, router further performs a probabilistic verification according to the credibility. For the data packet with high credibility, it will be verified with low probability. Then router forwards the combined evaluation result to its downstream routers on the reverse path by modifying the structure of data packet. Through building a collaborative verification relationship, this mechanism tries to avoid repeatedly verifying the data packets verified by upstream routers. Simulation results show that it can effectively defend content poisoning while significantly reducing content verification overhead.
引用
收藏
页码:46 / 50
页数:5
相关论文
共 50 条
  • [1] Content verification in Named Data Networking
    Nam, SunWook
    Kim, Dohyung
    Yeom, Ikjun
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 414 - 415
  • [2] Poster: In-Network Retransmissions in Named Data Networking
    Ben Abraham, Hila
    Crowley, Patrick
    PROCEEDINGS OF THE 2016 3RD ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ACM-ICN '16), 2016, : 209 - 210
  • [3] Fast content verification for named data networking
    Wang, Yi
    Liu, Bin
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 : 234 - 242
  • [4] A Hybrid Coordination Approach of In-network Caching for Named Data Networking
    Chang, Chih Yen
    Chang, Ming Sang
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (04): : 285 - 299
  • [5] Python']PythonRepo: Persistent In-Network Storage for Named Data Networking
    Yu, Tianyuan
    Kong, Zhaoning
    Ma, Xinyu
    Wang, Lan
    Zhang, Lixia
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 927 - 931
  • [6] In-network Cache Size Allocation for Video Streaming on Named Data Networking
    Zhang, Yuanzun
    Tan, Xiaobin
    Li, Weiping
    PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 18 - 23
  • [7] Content Checking Mechanism Design in Named Data Networking
    Zhu Y.
    Kang H.-H.
    Huang R.-H.
    Cao Q.-H.
    2017, Beijing University of Posts and Telecommunications (40): : 97 - 103
  • [8] Named Data Networking for Content Delivery Network Workflows
    Thelagathoti, Rama Krishna
    Mastorakis, Spyridon
    Shah, Anant
    Bedi, Harkeerat
    Shannigrahi, Susmit
    2020 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2020,
  • [9] Feedback-Based Content Poisoning Mitigation in Named Data Networking
    Cui, Wenjing
    Li, Yang
    Xin, Yonghui
    Liu, Chang
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 764 - 770
  • [10] An Ant Colony Algorithm Based Content Poisoning Mitigation in Named Data Networking
    Cui, Wenjing
    Li, Yang
    Zhang, Yan
    Liu, Chang
    Zhan, Mengqi
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 176 - 183