Security, privacy, and access control in information-centric networking: A survey

R Tourani, S Misra, T Mick… - … communications surveys & …, 2017 - ieeexplore.ieee.org
Information-centric networking (ICN) replaces the widely used host-centric networking
paradigm in communication networks (eg, Internet and mobile ad hoc networks) with an …

Named data networking: a survey

D Saxena, V Raychoudhury, N Suri, C Becker… - Computer Science …, 2016 - Elsevier
Internet was developed as a packet data network where users and data sources (server)
with specific IP addresses interacted over a pre-established communication channel. This …

A survey of Internet of Things communication using ICN: A use case perspective

B Nour, K Sharif, F Li, S Biswas, H Moungla… - Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) has gained extensive attention from industry and academia
alike in past decade. The connectivity of each and every piece of technology in the …

Securing ICN-based UAV ad hoc networks with blockchain

K Lei, Q Zhang, J Lou, B Bai… - IEEE Communications …, 2019 - ieeexplore.ieee.org
Named data networking (NDN) enables fast and efficient content dissemination in mission-
critical unmanned aerial vehicle ad hoc networks (UAANETs); however, its in-network …

A content poisoning attack detection and prevention system in vehicular named data networking

AH Magsi, LV Yovita, A Ghulam, G Muhammad, Z Ali - Sustainability, 2023 - mdpi.com
Named data networking (NDN) is gaining momentum in vehicular ad hoc networks
(VANETs) thanks to its robust network architecture. However, vehicular NDN (VNDN) faces …

A lightweight identity-based signature scheme for mitigation of content poisoning attack in named data networking with internet of things

SS Ullah, I Ullah, H Khattak, MA Khan, M Adnan… - IEEE …, 2020 - ieeexplore.ieee.org
Named Data Networking (NDN) is one of the future envisioned networking paradigm used to
provide fast and efficient content dissemination with interest-based content retrieval, name …

A survey on security attacks and intrusion detection mechanisms in named data networking

A Hidouri, N Hajlaoui, H Touati, M Hadded… - Computers, 2022 - mdpi.com
Despite the highly secure content sharing and the optimized forwarding mechanism, the
content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities …

Blockchain-based cache poisoning security protection and privacy-aware access control in NDN vehicular edge computing networks

K Lei, J Fang, Q Zhang, J Lou, M Du, J Huang… - Journal of Grid …, 2020 - Springer
Recent advances in artificial intelligence, big data, mobile edge computing and embedded
systems have successfully driven the emergence and adoption of smart vehicles and vehicle …

Mitigating poisoned content with forwarding strategy

S DiBenedetto, C Papadopoulos - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
Content poisoning attacks are a significant problem in Information Centric Networks (ICN),
such as Named Data Networking. In a content poisoning attack, an attacker injects bogus …

Security and integrity attacks in named data networking: a survey

MSM Shah, YB Leau, M Anbar, AA Bin-Salem - IEEE Access, 2023 - ieeexplore.ieee.org
The notion of Information-Centric Networking (ICN) specifies a new communication model
that emphasis on the content exchanged rather than the devices connected. ICN …