Access Control Mechanisms in Named Data Networks

Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this paper, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC. Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC, etc). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.

[1]  Dipankar Raychaudhuri,et al.  MobilityFirst future internet architecture project , 2011, AINTEC '11.

[2]  Deborah Estrin,et al.  Named Data Networking (NDN) Project , 2010 .

[3]  Lixia Zhang,et al.  Hop-By-Hop Best Effort Link Layer Reliability in Named Data Networking , 2016 .

[4]  Leïla Azouz Saïdane,et al.  PP-NDNoT: On preserving privacy in IoT-based E-health systems over NDN , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[5]  Gene Tsudik,et al.  When encryption is not enough: privacy attacks in content-centric networking , 2017, ICN.

[6]  Adlen Ksentini,et al.  Coexistence of ICN and IP Networks: An NFV as a Service Approach , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[7]  Xin Chen,et al.  Copyright protection in named data networking , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).

[8]  Abderrahmen Mtibaa,et al.  Towards Service Discovery and Invocation in Data-Centric Edge Networks , 2019, 2019 IEEE 27th International Conference on Network Protocols (ICNP).

[9]  Alexander Afanasyev,et al.  The Design of RoundSync Protocol , 2017 .

[10]  Christopher A. Wood,et al.  Flexible end-to-end content security in CCN , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).

[11]  Sihem Guemara El Fatmi,et al.  Access control enforcement in Named Data Networking , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).

[12]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[13]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[14]  Leandro A. Villas,et al.  Vehicular Data Space: The Data Point of View , 2019, IEEE Communications Surveys & Tutorials.

[15]  Samuel Marchal,et al.  PrivICN: Privacy-preserving content retrieval in information-centric networking , 2019, Comput. Networks.

[16]  Satyajayant Misra,et al.  AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge , 2019, IEEE Transactions on Dependable and Secure Computing.

[17]  Yang Liu,et al.  A unified hybrid information-centric naming scheme for IoT applications , 2020, Comput. Commun..

[18]  Emiliano De Cristofaro,et al.  Privacy in content-oriented networking: threats and countermeasures , 2012, CCRV.

[19]  Senlin Luo,et al.  In-Network Caching in ICN-based Vehicular Networks: Effectiveness & Performance Evaluation , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).

[20]  Mauro Conti,et al.  Security and Privacy Analysis of National Science Foundation Future Internet Architectures , 2018, IEEE Communications Surveys & Tutorials.

[21]  Lixia Zhang,et al.  Distributed Dataset Synchronization in Disruptive Networks , 2019, 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[22]  Stefano Paraboschi,et al.  A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks , 2015, Comput. Networks.

[23]  Alexander Afanasyev,et al.  NAC: name-based access control in named data networking , 2017, ICN.

[24]  Senlin Luo,et al.  Named Data Networking in Vehicular Ad Hoc Networks: State-of-the-Art and Challenges , 2020, IEEE Communications Surveys & Tutorials.

[25]  Senlin Luo,et al.  An Optimized Proactive Caching Scheme Based on Mobility Prediction for Vehicular Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[26]  Tao Feng,et al.  A New Access Control System Based on CP-ABE in Named Data Networking , 2018, Int. J. Netw. Secur..

[27]  Hassine Moungla,et al.  A Label-based Producer Mobility Support in 5G-enabled ICN Networks , 2020, 2020 International Wireless Communications and Mobile Computing (IWCMC).

[28]  Guoqiang Zhang,et al.  Caching in information centric networking: A survey , 2013, Comput. Networks.

[29]  Yang Liu,et al.  M2HAV: A Standardized ICN Naming Scheme for Wireless Devices in Internet of Things , 2017, WASA.

[30]  Xiaojiang Du,et al.  T-CAM: Time-based content access control mechanism for ICN subscription systems , 2020, Future Gener. Comput. Syst..

[31]  Mohsen Guizani,et al.  Bringing Deep Learning at the Edge of Information-Centric Internet of Things , 2019, IEEE Communications Letters.

[32]  Alexander Afanasyev,et al.  Fuzzy Interest Forwarding , 2017, AINTEC.

[33]  Nadeem Javaid,et al.  Realization of VANET-Based Cloud Services through Named Data Networking , 2018, IEEE Communications Magazine.

[34]  Mohsen Guizani,et al.  A blockchain-based architecture for secure vehicular Named Data Networks , 2020, Comput. Electr. Eng..

[35]  M. Laurent-Maknavicius,et al.  PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT , 2018, Comput. Networks.

[36]  Donghyun Kim,et al.  Conditional proxy re-encryption for secure big data group sharing in cloud environment , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[37]  Raj Jain,et al.  A survey of the research on future internet architectures , 2011, IEEE Communications Magazine.

[38]  Scott Shenker,et al.  A data-oriented (and beyond) network architecture , 2007, SIGCOMM 2007.

[39]  Mohsen Guizani,et al.  Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions , 2018, IEEE Communications Surveys & Tutorials.

[40]  Christos-Alexandros Sarros,et al.  Reputation-Based Trust Approaches in Named Data Networking , 2019, Future Internet.

[41]  Lixia Zhang,et al.  A Survey of Distributed Dataset Synchronization in Named Data Networking , 2017 .

[42]  Ravi S. Sandhu,et al.  LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking , 2015, IEEE Transactions on Information Forensics and Security.

[43]  Chin-Yu Wu,et al.  FGAC-NDN: Fine-Grained Access Control for Named Data Networks , 2019, IEEE Transactions on Network and Service Management.

[44]  Jianqing Zhang,et al.  Toward content-centric privacy in ICN: attribute-based encryption and routing , 2013, SIGCOMM 2013.

[45]  Feng Wu,et al.  A Secure, Efficient, and Accountable Edge-Based Access Control Framework for Information Centric Networks , 2019, IEEE/ACM Transactions on Networking.

[46]  Gene Tsudik,et al.  AC3N: Anonymous communication in Content-Centric Networking , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[47]  Fuchun Guo,et al.  Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing , 2018, Future Gener. Comput. Syst..

[48]  Aytac Azgin,et al.  Achieving secure and scalable data access control in information-centric networking , 2015, 2015 IEEE International Conference on Communications (ICC).

[49]  Mohsen Guizani,et al.  PUC: Packet Update Caching for energy efficient IoT-based Information-Centric Networking , 2020, Future Gener. Comput. Syst..

[50]  Nikos Fotiou,et al.  Rendezvous-based access control for information-centric architectures , 2018, Int. J. Netw. Manag..

[51]  Byung-Seo Kim,et al.  ICN with edge for 5G: Exploiting in-network caching in ICN-based edge computing for 5G networks , 2020, Future Gener. Comput. Syst..

[52]  Name-Based Access Control , 2015 .

[53]  Hossam S. Hassanein,et al.  A Survey of Security Attacks in Information-Centric Networking , 2015, IEEE Communications Surveys & Tutorials.

[54]  Kashif Sharif,et al.  A Distributed ICN-Based IoT Network Architecture: An Ambient Assisted Living Application Case Study , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[55]  Anna Volkova,et al.  Security Challenges in Control Network Protocols: A Survey , 2019, IEEE Communications Surveys & Tutorials.

[56]  Yanghee Choi,et al.  A Survey on content-oriented networking for efficient content delivery , 2011, IEEE Communications Magazine.

[57]  Bengt Ahlgren,et al.  A survey of information-centric networking , 2012, IEEE Communications Magazine.

[58]  Mohsen Guizani,et al.  Internet of Things Mobility Over Information-Centric/Named-Data Networking , 2020, IEEE Internet Computing.

[59]  Sapna Singh,et al.  A Trust Based Approach For Secure Access Control In Information Centric Network , 2012 .

[60]  Ersin Uzun,et al.  Trust in Information-Centric Networking: From Theory to Practice , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[61]  Alexander Afanasyev,et al.  CS Interest PIT FIB Data Interest Add incoming interface Drop or NACK F F PIT CS Data Discard cache Downstream Upstream Lookup miss Lookup hit F F Data , 2018 .

[62]  Matthias Wählisch,et al.  Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy , 2017, CCRV.

[63]  Senlin Luo,et al.  A Name-to-Hash Encoding Scheme for Vehicular Named Data Networks , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).

[64]  Patrick Crowley,et al.  iSync: a high performance and scalable data synchronization protocol for named data networking , 2014, ICN '14.

[65]  Anand Seetharam On Caching and Routing in Information-Centric Networks , 2018, IEEE Communications Magazine.

[66]  Tao Chen,et al.  An encryption and probability based access control model for named data networking , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[67]  Xiang-Chuan Gao,et al.  Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions , 2021, J. Netw. Comput. Appl..

[68]  Gene Tsudik,et al.  Interest-Based Access Control for Content Centric Networks , 2015, ICN.

[69]  Zhijun Wu,et al.  CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN , 2019, 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[70]  Boubakr Nour,et al.  Compute-Less Networking: Perspectives, Challenges, and Opportunities , 2020, IEEE Network.

[71]  Christian F. Tschudin,et al.  Schematized access control for data cubes and trees , 2017, ICN.

[72]  Alexander Afanasyev,et al.  NDN-ABS: Attribute-Based Signature Scheme for Named Data Networking , 2019, ICN.

[73]  Maitreyee Dutta,et al.  A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things , 2019, IEEE Access.

[74]  Zhenfu Cao,et al.  Securing Named Data Networking: Attribute-Based Encryption and Beyond , 2018, IEEE Communications Magazine.

[75]  Phan Cong Vinh,et al.  Security Analysis of the Access Control Solution of NDN Using BAN Logic , 2020, Mob. Networks Appl..

[76]  Stelvio Cimato,et al.  Encyclopedia of Cryptography and Security , 2005 .

[77]  Mingwei Xu,et al.  Session-based access control in information-centric networks: Design and analyses , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[78]  Xiaochen Zhang,et al.  SBAC: A secure blockchain-based access control framework for information-centric networking , 2020, J. Netw. Comput. Appl..

[79]  Chun Yang,et al.  Securing content-centric networks with content-based encryption , 2019, J. Netw. Comput. Appl..

[80]  Kashif Sharif,et al.  NNCP: A Named Data Network Control Protocol for IoT Applications , 2018, 2018 IEEE Conference on Standards for Communications and Networking (CSCN).

[81]  Jalel Ben-Othman,et al.  DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks , 2015, Perform. Evaluation.

[82]  Mohsen Guizani,et al.  A survey of Internet of Things communication using ICN: A use case perspective , 2019, Comput. Commun..

[83]  Alexander Afanasyev,et al.  Real-Time Data Retrieval in Named Data Networking , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).

[84]  Lixia Zhang,et al.  An Overview of Security Support in Named Data Networking , 2018, IEEE Communications Magazine.

[85]  Ahmed E. Kamal,et al.  NCP: A near ICN Cache Placement Scheme for IoT-Based Traffic Class , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[86]  Christian F. Tschudin,et al.  Access-Controlled In-Network Processing of Named Data , 2016, ICN.

[87]  Carlos Maziero,et al.  A distributed online certificate status protocol for named data networks , 2018, SAC.

[88]  Christian F. Tschudin Private Information Retrieval over ICN , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[89]  Fabian Oehlmann,et al.  Content-Centric Networking , 2013 .

[90]  Senlin Luo,et al.  LQCC: A Link Quality-based Congestion Control Scheme in Named Data Networks , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[91]  Shuai Gao,et al.  CDAC: A Collaborative Data Access Control Scheme in Named Data Networking , 2019, 2019 2nd International Conference on Hot Information-Centric Networking (HotICN).

[92]  Syed Hassan Ahmed,et al.  Named Data Networking for Software Defined Vehicular Networks , 2017, IEEE Communications Magazine.

[93]  Abderrahmane Lakas,et al.  MSIDN: Mitigation of Sophisticated Interest flooding-based DDoS attacks in Named Data Networking , 2020, Future Gener. Comput. Syst..

[94]  Zhijun Wu,et al.  Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN , 2020, Future Internet.

[95]  Senlin Luo,et al.  Reputation-Based Blockchain for Secure NDN Caching in Vehicular Networks , 2018, 2018 IEEE Conference on Standards for Communications and Networking (CSCN).

[96]  Pekka Nikander,et al.  Developing Information Networking Further: From PSIRP to PURSUIT , 2010, BROADNETS.

[97]  Sihem Guemara El Fatmi,et al.  A credential and encryption based access control solution for named data networking , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[98]  Ning Wang,et al.  COMET: Content mediator architecture for content-aware networks , 2011, 2011 Future Network & Mobile Summit.

[99]  Sérgio Donizetti Zorzo,et al.  An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[100]  Atsushi Tagami,et al.  A Consumer-Driven Access Control Approach to Censorship Circumvention in Content-Centric Networking , 2016, ICN.

[101]  Teng Liang,et al.  NDNizing existing applications: research issues and experiences , 2018, ICN.

[102]  Senlin Luo,et al.  Security and Privacy Issues in Vehicular Named Data Networks: An Overview , 2018, Mob. Inf. Syst..

[103]  Jian Shen,et al.  Key-policy attribute-based encryption against continual auxiliary input leakage , 2019, Inf. Sci..

[104]  Siu-Ming Yiu,et al.  A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms , 2016, IEEE Communications Surveys & Tutorials.

[105]  Suyong Eum,et al.  Information-Centric Networking (ICN) Research Challenges , 2016, RFC.

[106]  Pei-Chi Huang,et al.  DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding , 2020, 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC).

[107]  Sylvia Ratnasamy,et al.  BlindBox: Deep Packet Inspection over Encrypted Traffic , 2015, SIGCOMM.

[108]  Edith C. H. Ngai,et al.  Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context , 2017, 2017 Global Internet of Things Summit (GIoTS).

[109]  Satyajayant Misra,et al.  Secure content delivery in information-centric networks: design, implementation, and analyses , 2013, ICN '13.

[110]  Giannis F. Marias,et al.  Access control enforcement delegation for information-centric networking architectures , 2012, ICN.

[111]  Yu Zhang,et al.  KITE: producer mobility support in named data networking , 2018, ICN.

[112]  Satyajayant Misra,et al.  Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[113]  Alexander Afanasyev,et al.  nTorrent: Peer-to-Peer File Sharing in Named Data Networking , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[114]  Satyajayant Misra,et al.  ICedge: When Edge Computing Meets Information-Centric Networking , 2020, IEEE Internet of Things Journal.

[115]  Liu Yan,et al.  Packet Forwarding in Named Data Networking Requirements and Survey of Solutions , 2019, IEEE Communications Surveys & Tutorials.

[116]  Syed Hassan Ahmed,et al.  Towards Multi-metric Cache Replacement Policies in Vehicular Named Data Networks , 2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC).

[117]  Safdar H. Bouk,et al.  A Collaborative Multi-Metric Interface Ranking Scheme for Named Data Networks , 2020, 2020 International Wireless Communications and Mobile Computing (IWCMC).

[118]  Patrick Crowley,et al.  Synchronizing namespaces with invertible bloom filters , 2015, 2015 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS).

[119]  Haitao Zhang,et al.  Data synchronization in Ad Hoc mobile networks , 2018, ICN.

[120]  Jalel Ben-Othman,et al.  GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs , 2017, IEEE Transactions on Mobile Computing.

[121]  Neeraj Suri,et al.  Named Data Networking: A survey , 2016, Comput. Sci. Rev..

[122]  Sihem Guemara El Fatmi,et al.  Data-based access control in named data networking , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[123]  F. Richard Yu,et al.  A Survey of Green Information-Centric Networking: Research Issues and Challenges , 2015, IEEE Communications Surveys & Tutorials.

[124]  Gene Tsudik,et al.  In Content We Trust: Network-Layer Trust in Content-Centric Networking , 2019, IEEE/ACM Transactions on Networking.

[125]  Akbar Rahman,et al.  Deployment Considerations for Information-Centric Networking (ICN) , 2020, RFC.

[126]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[127]  Lan Wang,et al.  Secure bootstrapping and access control in NDN-based smart home systems , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[128]  Ersin Uzun,et al.  An encryption-based access control framework for content-centric networking , 2015, 2015 IFIP Networking Conference (IFIP Networking).

[129]  Gennaro Boggia,et al.  Information-Centric Networking: Evaluation and Security Considerations , 2016, RFC.

[130]  Senlin Luo,et al.  A QoS-Aware Cache Replacement Policy for Vehicular Named Data Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[131]  Xiongwen Zhao,et al.  3D MIMO for 5G NR: Several Observations from 32 to Massive 256 Antennas Based on Channel Measurement , 2018, IEEE Communications Magazine.

[132]  Raouf Boutaba,et al.  A survey of naming and routing in information-centric networks , 2012, IEEE Communications Magazine.

[133]  Michal Król,et al.  Compute First Networking: Distributed Computing meets ICN , 2019, ICN.

[134]  Nikos Fotiou,et al.  A Survey of Information-Centric Networking Research , 2014, IEEE Communications Surveys & Tutorials.

[135]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[136]  Athanasios V. Vasilakos,et al.  Information centric network: Research challenges and opportunities , 2015, J. Netw. Comput. Appl..

[137]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[138]  Syed Hassan Ahmed,et al.  Named Data Networking’s Intrinsic Cyber-Resilience for Vehicular CPS , 2018, IEEE Access.

[139]  Dijiang Huang,et al.  Attribute-based Access Control for ICN Naming Scheme , 2018, IEEE Trans. Dependable Secur. Comput..

[140]  Jun Bi,et al.  A survey on Information-centric Networking: Rationales, designs and debates , 2015 .

[141]  Kalika Suksomboon,et al.  IPRES: in-device proxy re-encryption service for secure ICN , 2017, ICN.

[142]  Johannes A. Buchmann,et al.  CMSS - An Improved Merkle Signature Scheme , 2006, INDOCRYPT.

[143]  Nikos Fotiou,et al.  Decentralized name-based security for content distribution using blockchains , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[144]  Reihaneh Safavi-Naini,et al.  A Post-Quantum One Time Signature Using Bloom Filter , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[145]  Denis Butin,et al.  Hash-Based Signatures: State of Play , 2017, IEEE Security & Privacy.

[146]  Ibrahim Abdullahi,et al.  Survey on caching approaches in Information Centric Networking , 2015, J. Netw. Comput. Appl..

[147]  Lixia Zhang,et al.  DAPES: Named Data for Off-the-Grid File Sharing with Peer-to-Peer Interactions , 2020, 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS).

[148]  Donghyun Kim,et al.  A new outsourcing conditional proxy re‐encryption suitable for mobile cloud environment , 2017, Concurr. Comput. Pract. Exp..

[149]  Dijiang Huang,et al.  Toward Privacy-preserving Content Access Control for Information Centric Networking , 2014 .

[150]  Xiaojiang Du,et al.  Content Protection in Named Data Networking: Challenges and Potential Solutions , 2018, IEEE Communications Magazine.

[151]  Yu Wang,et al.  ICN Publisher-Subscriber Models: Challenges and Group-based Communication , 2019, IEEE Network.

[152]  Roman Lutz,et al.  Security and Privacy in Future Internet Architectures - Benefits and Challenges of Content Centric Networks , 2016, ArXiv.

[153]  Byung-Seo Kim,et al.  Information-Centric Networking With Edge Computing for IoT: Research Challenges and Future Directions , 2018, IEEE Access.

[154]  Hannes Frey,et al.  EnCIRCLE: Encryption-based access control for information-centric connected vehicles , 2017, 2017 8th International Conference on the Network of the Future (NOF).

[155]  Henk C. A. van Tilborg,et al.  Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .

[156]  Nicola Blefari-Melazzi,et al.  Publish/subscribe over information centric networks: A Standardized approach in CONVERGENCE , 2012, 2012 Future Network & Mobile Summit (FutureNetw).

[157]  Chengyu Fan,et al.  SCARI: a strategic caching and reservation protocol for ICN , 2018, ICN.

[158]  Hassine Moungla,et al.  CnS: A Cache and Split Scheme for 5G-enabled ICN Networks , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).