A brief introduction to named data networking

A Afanasyev, J Burke, T Refaei, L Wang… - MILCOM 2018-2018 …, 2018 - ieeexplore.ieee.org
As a proposed Internet architecture, Named Data Networking (NDN) is designed to network
the world of computing devices by naming data instead of naming data containers as IP …

A novel name-based security mechanism for information-centric networking

B Hamdane, SG El Fatmi… - 2014 IEEE Wireless …, 2014 - ieeexplore.ieee.org
The Information-Centric Networking (ICN) approach represents a prominent future Internet
research activity. It aims to ensure a large-scale content distribution while supporting …

What if routers are malicious? mitigating content poisoning attack in ndn

D Wu, Z Xu, B Chen, Y Zhang - 2016 IEEE Trustcom/BigDataSE …, 2016 - ieeexplore.ieee.org
Named data networking (NDN) shifts today's host-centric Internet architecture to a new data-
centric network architecture. This well suits the increasingly mobile and information …

Detecting and mitigating collusive interest flooding attacks in named data networking

RA Al-Share, AS Shatnawi, B Al-Duwairi - IEEE Access, 2022 - ieeexplore.ieee.org
The large expansion in network services and applications seen in the last few years requires
new network architectures to satisfy an increasing number of users and enhance content …

Advanced interest flooding attacks in named-data networking

S Signorello, S Marchal, J François… - 2017 IEEE 16th …, 2017 - ieeexplore.ieee.org
The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the
wave of Information-Centric Networking. Although the NDN's data-plane seems to offer …

On the urgency of implementing Interest NACK into CCN: from the perspective of countering advanced interest flooding attacks

K Wang, Y Zhao, S Liu, X Tong - IET Networks, 2018 - Wiley Online Library
Content centric networking (CCN) where content/named data as the first entity has become
one of the most promising architectures for the future Internet. To achieve better security, the …

Capability-based security enforcement in named data networking

Q Li, PPC Lee, P Zhang, P Su, L He… - IEEE/ACM Transactions …, 2017 - ieeexplore.ieee.org
Named data networking (NDN) enhances traditional IP networking by supporting in-network
content caching for better bandwidth usage and location-independent data accesses for …

[引用][C] Performance assessment of routing strategies in named data networking

M Tortelli, LA Grieco, G Boggia - IEEE ICNP, 2013

Hierarchical naming scheme in named data networking for Internet of Things: A review and future security challenges

MSM Shah, YB Leau, Z Yan, M Anbar - IEEE access, 2022 - ieeexplore.ieee.org
The proliferation of connected devices in the Internet of Things (IoT) presents a connectivity
challenge. The future internet will require a paradigm shift in which content is evaluated on …

[PDF][PDF] Detection of malicious consumer interest packet with dynamic threshold values

AM Qureshi, N Anjum, RNB Rais, M Ur-Rehman… - PeerJ Computer …, 2021 - peerj.com
As a promising next-generation network architecture, named data networking (NDN)
supports name-based routing and in-network caching to retrieve content in an efficient, fast …