Information-Centric Networking in Wireless Environments: Security Risks and Challenges
暂无分享,去创建一个
Boubakr Nour | Spyridon Mastorakis | Rehmat Ullah | Nicholas Stergiou | R. Ullah | Spyridon Mastorakis | Boubakr Nour | Nicholas Stergiou
[1] Marc Mosko. CCNx End-To-End Fragmentation , 2015 .
[2] Lixia Zhang,et al. An Overview of Security Support in Named Data Networking , 2018, IEEE Communications Magazine.
[3] Xiaojiang Du,et al. Content Protection in Named Data Networking: Challenges and Potential Solutions , 2018, IEEE Communications Magazine.
[4] Alex Afanasyev,et al. Rapid Establishment of Transient Trust for NDN-Based Vehicular Networks , 2020, 2020 IEEE International Conference on Communications Workshops (ICC Workshops).
[5] Thomas C. Schmidt,et al. The need for a name to MAC address mapping in NDN: towards quantifying the resource gain , 2017, ICN.
[6] Patrick Crowley,et al. Named data networking , 2014, CCRV.
[7] Thomas C. Schmidt,et al. ICN Adaptation to LowPAN Networks (ICN LoWPAN) , 2019 .
[8] Yang Li,et al. A Novel Interest Flooding Attacks Detection and Countermeasure Scheme in NDN , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[9] Thomas C. Schmidt,et al. On the impact of QoS management in an Information-centric Internet of Things , 2020, Comput. Commun..
[10] Mohsen Guizani,et al. A blockchain-based architecture for secure vehicular Named Data Networks , 2020, Comput. Electr. Eng..
[11] Marc E. Mosko,et al. ICN "Begin-End" Hop by Hop Fragmentation , 2016 .
[12] Nikos Fotiou,et al. A Survey of Information-Centric Networking Research , 2014, IEEE Communications Surveys & Tutorials.
[13] Injong Rhee,et al. An improved hop-by-hop interest shaper for congestion control in named data networking , 2013, ICN '13.
[14] Biplab Sikdar,et al. Optimal Pending Interest Table Size for ICN With Mobile Producers , 2020, IEEE/ACM Transactions on Networking.
[15] Kathleen Nichols. Lessons Learned Building a Secure Network Measurement Framework using Basic NDN , 2019, ICN.