M Aamir, SMA Zaidi - Security and Communication Networks, 2015 - Wiley Online Library
Content centric networking (CCN) is a paradigm shift from current Internet protocol‐address‐ based communication model to content‐oriented model in computer networks. Like …
Abstract Information-centric networking (ICN) raises data objects to first class routable entities in the network and changes the Internet paradigm from host-centric connectivity to …
K Wang, H Zhou, Y Qin, J Chen… - 2013 IEEE Globecom …, 2013 - ieeexplore.ieee.org
Named Data Networking (NDN) is a clean slate Internet paradigm that embeds some security primitives in its original design, which is being considered as one of the promising …
In wireless networks, the Named Data Networking (NDN) architecture maximizes contents' availability throughout multiple network paths based on multicast-based communication …
J Dong, K Wang, W Quan, H Yin - Computers & Security, 2020 - Elsevier
Abstract The Interest Flooding Attack (IFA) has been one of the biggest threats to the Named Data Networking (NDN) paradigm. It is easy to launch but very difficult to mitigate. In this …
TN Nguyen, R Cogranne, G Doyen… - 2015 IEEE international …, 2015 - ieeexplore.ieee.org
With the rapid growth of Internet traffic, new emerging network architectures are under deployment. Those architectures will substitute the current IP/TCP network only if they can …
T Nguyen, HL Mai, G Doyen… - IEEE …, 2018 - ieeexplore.ieee.org
NDN is the most mature proposal of the ICN paradigm, a clean-slate approach for the Future Internet. Although NDN was designed to natively tackle security issues inherent to IP …
Several ongoing research efforts aim to design potential Future Internet Architectures, among which Named-Data Networking (NDN) introduces a shift from the existing host …
S Al-Sheikh, M Wählisch, TC Schmidt - … of the 2nd ACM Conference on …, 2015 - dl.acm.org
Interest flooding has been identified as a major threat for the NDN infrastructure. Since then several approaches have been proposed to identify and to mitigate this attack. In this paper …