Information-Centric Networking in Wireless Environments: Security Risks and Challenges

Information-Centric Networking (ICN) has emerged as a paradigm to cope with the lack of built-in security primitives and efficient mechanisms for content distribution of today's Internet. However, deploying ICN in a wireless environment poses a different set of challenges compared to a wired environment, especially when it comes to security. In this article, we present the security issues that may arise and the attacks that may occur from different points of view when ICN is deployed in wireless environments. The discussed attacks may target both applications and the ICN network itself by exploiting elements of the ICN architecture, such as content names and in-network content caches. Furthermore, we discuss potential solutions to the presented issues and countermeasures to the presented attacks. Finally, we identify future research opportunities and directions.

[1]  Marc Mosko CCNx End-To-End Fragmentation , 2015 .

[2]  Lixia Zhang,et al.  An Overview of Security Support in Named Data Networking , 2018, IEEE Communications Magazine.

[3]  Xiaojiang Du,et al.  Content Protection in Named Data Networking: Challenges and Potential Solutions , 2018, IEEE Communications Magazine.

[4]  Alex Afanasyev,et al.  Rapid Establishment of Transient Trust for NDN-Based Vehicular Networks , 2020, 2020 IEEE International Conference on Communications Workshops (ICC Workshops).

[5]  Thomas C. Schmidt,et al.  The need for a name to MAC address mapping in NDN: towards quantifying the resource gain , 2017, ICN.

[6]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[7]  Thomas C. Schmidt,et al.  ICN Adaptation to LowPAN Networks (ICN LoWPAN) , 2019 .

[8]  Yang Li,et al.  A Novel Interest Flooding Attacks Detection and Countermeasure Scheme in NDN , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[9]  Thomas C. Schmidt,et al.  On the impact of QoS management in an Information-centric Internet of Things , 2020, Comput. Commun..

[10]  Mohsen Guizani,et al.  A blockchain-based architecture for secure vehicular Named Data Networks , 2020, Comput. Electr. Eng..

[11]  Marc E. Mosko,et al.  ICN "Begin-End" Hop by Hop Fragmentation , 2016 .

[12]  Nikos Fotiou,et al.  A Survey of Information-Centric Networking Research , 2014, IEEE Communications Surveys & Tutorials.

[13]  Injong Rhee,et al.  An improved hop-by-hop interest shaper for congestion control in named data networking , 2013, ICN '13.

[14]  Biplab Sikdar,et al.  Optimal Pending Interest Table Size for ICN With Mobile Producers , 2020, IEEE/ACM Transactions on Networking.

[15]  Kathleen Nichols Lessons Learned Building a Secure Network Measurement Framework using Basic NDN , 2019, ICN.