A Survey on Security in Named Data Networking

Over the past three decades, since its invention, the Internet has evolved in both its sheer volume and usage. The Internet's core protocol, Internet Protocol (IP), has proven its usability and effectiveness to support a communication network. However, current Internet usage requires more than a communication network due to a shift in the nature of Internet applications from simple email application to large content producers such as NetFlix, Google, Amazon, etc. Named Data Networking (NDN) is one of the few initiatives/projects addressing the shortcomings of the current Internet architecture and intends to move the Internet toward a content distribution architecture. In this paper, we conduct a brief survey of security topics/problems inherent to the NDN architecture. Specifically, we describe current known problems and propose solutions to major security problems.

[1]  Mauro Conti,et al.  Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking , 2013, 38th Annual IEEE Conference on Local Computer Networks.

[2]  Gene Tsudik,et al.  DoS and DDoS in Named Data Networking , 2012, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[3]  Priya Mahadevan,et al.  Interest flooding attack and countermeasures in Named Data Networking , 2013, 2013 IFIP Networking Conference.

[4]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[5]  Miao Zhang,et al.  Using phoebus data transfer accelerator in cloud environments , 2015, 2015 IEEE International Conference on Communications (ICC).

[6]  Yingdi Yu Public Key Management in Named Data Networking , 2015 .

[7]  Mauro Conti,et al.  Cache Privacy in Named-Data Networking , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[8]  Mauro Conti,et al.  A lightweight mechanism for detection of cache pollution attacks in Named Data Networking , 2013, Comput. Networks.

[9]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[10]  Katsuyoshi Iida,et al.  SAPS: Software Defined Network Aware Pub/Sub -- A Design of the Hybrid Architecture Utilizing Distributed and Centralized Multicast , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[11]  David Clark,et al.  Schematizing and Automating Trust in Named Data Networking , 2015 .

[12]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[13]  V. Jacobson,et al.  Securing Network Content , 2009 .