Mitigating content poisoning attacks in named data networking: a survey of recent solutions, limitations, challenges and future research directions

被引:0
作者
Ullah, Syed Sajid [1 ]
Hussain, Saddam [2 ]
Ali, Ihsan [3 ]
Khattak, Hizbullah [4 ]
Mastorakis, Spyridon [5 ]
机构
[1] Univ Agder UiA, Dept Informat & Commun Technol, N-4898 Grimstad, Norway
[2] Univ Brunei Darussalam, Sch Digital Sci, Jalan Tungku Link, BE-1410 Gadong, Brunei
[3] Southeast Missouri State Univ, Dept Comp Sci, One Univ Plaza, Cape Girardeau, MO 63701 USA
[4] Hazara Univ Mansehra, Dept Informat Technol, Mansehra 21120, KPK, Pakistan
[5] Univ Notre Dame, Coll Engn, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
关键词
Named Data Networking; Content Poisoning Attack; Survey; INFORMATION-CENTRIC NETWORKING; SECURITY ATTACKS; INTERNET; IOT;
D O I
10.1007/s10462-024-10994-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Named Data Networking (NDN) is one of the capable applicants for the future Internet architecture, where communications focus on content rather than providing content. NDN implements Information-Centric Networking (ICN) with its unique node structure and significant characteristics such as built-in mobility support, multicast support, and efficient content distribution to end-users. It has several key features, including inherent security, that protect the content rather than the communication channel. Despite the good features that NDN provides, it is nonetheless vulnerable to a variety of attacks, the most critical of them is the Content Poisoning Attack (CPA). In this survey, the existing solutions presented for the prevention of CPA in the NDN paradigm have been critically analyzed. Furthermore, we also compared the suggested schemes based on latency, communication overhead, and security. In addition, we have also shown the possibility of other possible NDN attacks on the suggested schemes. Finally, we adds some open research challanges.
引用
收藏
页数:41
相关论文
共 103 条
  • [1] 4WARD project, About us
  • [2] Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey
    Aamir, Muhammad
    Zaidi, Syed Mustafa Ali
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (11) : 2037 - 2059
  • [3] A Survey of Security Attacks in Information-Centric Networking
    AbdAllah, Eslam G.
    Hassanein, Hossam S.
    Zulkernine, Mohammad
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) : 1441 - 1454
  • [4] Abed M, 2023, Big Data Mining and Analytics
  • [5] Afanasyev A, 2014, NFD Developer's Guide Technical Report NDN-0021
  • [6] Afanasyev A, 2018, IEEE MILIT COMMUN C, P858
  • [7] Anonymous Federated Learning via Named-Data Networking
    Agiollo, Andrea
    Bardhi, Enkeleda
    Conti, Mauro
    Dal Fabbro, Nicolo
    Lazzeretti, Riccardo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 152 : 288 - 303
  • [8] Ahlgren B., 2010, Second NetInf Architecture Description
  • [9] A Survey of Information-Centric Networking
    Ahlgren, Bengt
    Dannewitz, Christian
    Imbrenda, Claudio
    Kutscher, Dirk
    Ohlman, Boerje
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (07) : 26 - 36
  • [10] Named Data Networking for Software Defined Vehicular Networks
    Ahmed, Syed Hassan
    Bouk, Safdar Hussain
    Kim, Dongkyun
    Rawat, Danda B.
    Song, Houbing
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (08) : 60 - 66