Security, privacy, and access control in information-centric networking: A survey
Information-centric networking (ICN) replaces the widely used host-centric networking
paradigm in communication networks (eg, Internet and mobile ad hoc networks) with an …
paradigm in communication networks (eg, Internet and mobile ad hoc networks) with an …
Named data networking: a survey
Internet was developed as a packet data network where users and data sources (server)
with specific IP addresses interacted over a pre-established communication channel. This …
with specific IP addresses interacted over a pre-established communication channel. This …
A survey of Internet of Things communication using ICN: A use case perspective
Abstract Internet of Things (IoT) has gained extensive attention from industry and academia
alike in past decade. The connectivity of each and every piece of technology in the …
alike in past decade. The connectivity of each and every piece of technology in the …
Securing ICN-based UAV ad hoc networks with blockchain
Named data networking (NDN) enables fast and efficient content dissemination in mission-
critical unmanned aerial vehicle ad hoc networks (UAANETs); however, its in-network …
critical unmanned aerial vehicle ad hoc networks (UAANETs); however, its in-network …
A content poisoning attack detection and prevention system in vehicular named data networking
Named data networking (NDN) is gaining momentum in vehicular ad hoc networks
(VANETs) thanks to its robust network architecture. However, vehicular NDN (VNDN) faces …
(VANETs) thanks to its robust network architecture. However, vehicular NDN (VNDN) faces …
A lightweight identity-based signature scheme for mitigation of content poisoning attack in named data networking with internet of things
Named Data Networking (NDN) is one of the future envisioned networking paradigm used to
provide fast and efficient content dissemination with interest-based content retrieval, name …
provide fast and efficient content dissemination with interest-based content retrieval, name …
A survey on security attacks and intrusion detection mechanisms in named data networking
Despite the highly secure content sharing and the optimized forwarding mechanism, the
content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities …
content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities …
Blockchain-based cache poisoning security protection and privacy-aware access control in NDN vehicular edge computing networks
Recent advances in artificial intelligence, big data, mobile edge computing and embedded
systems have successfully driven the emergence and adoption of smart vehicles and vehicle …
systems have successfully driven the emergence and adoption of smart vehicles and vehicle …
Mitigating poisoned content with forwarding strategy
S DiBenedetto, C Papadopoulos - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
Content poisoning attacks are a significant problem in Information Centric Networks (ICN),
such as Named Data Networking. In a content poisoning attack, an attacker injects bogus …
such as Named Data Networking. In a content poisoning attack, an attacker injects bogus …
Security and integrity attacks in named data networking: a survey
The notion of Information-Centric Networking (ICN) specifies a new communication model
that emphasis on the content exchanged rather than the devices connected. ICN …
that emphasis on the content exchanged rather than the devices connected. ICN …