Rethinking Caching Security of Information-Centric Networking: A System Recovery Perspective

被引:0
|
作者
Song, Tian [1 ]
Yang, Yating [2 ]
Li, Tianlong [2 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
[2] Beijing Inst Technol, Comp Sci, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
System recovery; Authentication; IP networks; Computer architecture; Topology; ATTACKS;
D O I
10.1109/MCOM.2019.1800864
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
ICN names data rather than hosts and then directly relays packets according to data names. This fundamental shift in naming from host-dependent to host-independent enables ICN to cache data for future service in its network. Therefore, ICN acts as not only a tunnel to transmit data but also a temporary cache of data, which inevitably confronts data attacks. In this article, for the first time, we investigate caching security from a system recovery perspective, and find that ICN attacked by typical caching attacks can be eventually recovered to the normal state if in-network security on data is provided. However, it may cause concern about the recovery time. To address this concern, we introduce a lightweight solution to shorten the recovery period of ICN by constructing and managing trusted zones with Dual Tunnels among Routers in a Penalty-Feedback Way (Duty). The feasibility and effectiveness of our design are verified by the experimental evaluations on real topology. Our work indicates a new perspective in the cache security of ICN and addresses some future work.
引用
收藏
页码:104 / 110
页数:7
相关论文
共 50 条
  • [41] LeafPopDown: Leaf Popular Down Caching Strategy for Information-Centric Networking
    Khattak, Hizbullah
    Ul Amin, Noor
    Din, Ikram Ud
    Insafullah
    Iqbal, Jawaid
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (02) : 148 - 151
  • [42] Collaborative Caching Based on Hash-Routing for Information-Centric Networking
    Wang, Sen
    Bi, Jun
    Wu, Jianping
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) : 535 - 536
  • [43] Efficient Coded-Block Delivery and Caching in Information-Centric Networking
    Liu, Yan
    Cai, Jun
    Zhao, Huimin
    Yu, Shunzheng
    Ruan, JianLiang
    Lu, Hua
    [J]. DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2020, 2020
  • [44] Name-Based Security for Information-Centric Networking Architectures
    Fotiou, Nikos
    Polyzos, George C.
    [J]. FUTURE INTERNET, 2019, 11 (11):
  • [45] THE QUEST FOR INFORMATION-CENTRIC NETWORKING
    Xue, Kaiping
    Wei, David S. L.
    Bruschi, Roberto
    Chih-Lin, I
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (06) : 12 - 12
  • [46] A Survey of Information-Centric Networking
    Ahlgren, Bengt
    Dannewitz, Christian
    Imbrenda, Claudio
    Kutscher, Dirk
    Ohlman, Boerje
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (07) : 26 - 36
  • [47] Survey and taxonomy of information-centric vehicular networking security attacks
    Safwat, Mena
    Elgammal, Ali
    AbdAllah, Eslam G.
    Azer, Marianne A.
    [J]. AD HOC NETWORKS, 2022, 124
  • [48] Information-Centric Networking in Wireless Environments: Security Risks and Challenges
    Nour, Boubakr
    Mastorakis, Spyridon
    Ullah, Rehmat
    Stergiou, Nicholas
    [J]. IEEE WIRELESS COMMUNICATIONS, 2021, 28 (02) : 121 - 127
  • [49] Security, Privacy, and Access Control in Information-Centric Networking: A Survey
    Tourani, Reza
    Misra, Satyajayant
    Mick, Travis
    Panwar, Gaurav
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01): : 566 - 600
  • [50] Information-Centric Networking (ICN)
    Fotiou, Nikos
    [J]. FUTURE INTERNET, 2020, 12 (02):