Security and Privacy Analysis of National Science Foundation Future Internet Architectures

被引:25
作者
Ambrosin, Moreno [1 ]
Compagno, Alberto [2 ]
Conti, Mauro [1 ]
Ghali, Cesar [3 ]
Tsudik, Gene [3 ]
机构
[1] Univ Padua, Dept Math, I-35121 Padua, Italy
[2] Univ Roma La Sapienza, Dept Comp Sci, I-00198 Rome, Italy
[3] Univ Calif Irvine, Dept Comp Sci, Irvine, CA 92697 USA
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2018年 / 20卷 / 02期
基金
欧盟地平线“2020”; 美国国家科学基金会;
关键词
Network security; privacy; trust; future Internet architectures; POLLUTION ATTACKS; SERVICE; NETWORK; RESILIENCE;
D O I
10.1109/COMST.2018.2798280
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet protocol (IP) is the lifeblood of the modern Internet. Its simplicity and universality have fueled the unprecedented and lasting global success of the current Internet. Nonetheless, some limitations of IP have been emerging in recent years. Furthermore, starting in mid-1990s, the advent of mobility, wirelessness, and the Web substantially shifted Internet usage and communication paradigms. This accentuated long-term concerns about the current Internet architecture and prompted interest in alternative designs. The U.S. National Science Foundation (NSF) has been one of the key supporters of efforts to design a set of candidate next-generation Internet architectures. As a prominent design requirement, NSF emphasized "security and privacy by design" in order to avoid the long and unhappy history of incremental patching and retrofitting that characterizes the current Internet architecture. To this end, as a result of a competitive process, four prominent research projects were funded by the NSF in 2010: nebula, named-data networking, MobilityFirst, and expressive Internet architecture. This paper provides a comprehensive and neutral analysis of salient security and privacy features (and issues) in these NSF-funded future Internet architectures. Prior surveys on future Internet architectures provide a limited, or even no, comparison on security and privacy features. In addition, this paper also compares the four candidate designs with the current IP-based architecture and discusses similarities, differences, and possible improvements.
引用
收藏
页码:1418 / 1442
页数:25
相关论文
共 131 条
  • [1] Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey
    Aamir, Muhammad
    Zaidi, Syed Mustafa Ali
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (11) : 2037 - 2059
  • [2] A Survey of Security Attacks in Information-Centric Networking
    AbdAllah, Eslam G.
    Hassanein, Hossam S.
    Zulkernine, Mohammad
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) : 1441 - 1454
  • [3] Abley J., 2006, 4786 RFC IETF
  • [4] Abley J., 2010, 5855 RFC IETF
  • [5] Afanasyev A., 2013, 2013 IFIP NETW C, P1
  • [6] Afanasyev A., 2015, NDN0004 U CAL LOS AN
  • [7] A Survey of Information-Centric Networking
    Ahlgren, Bengt
    Dannewitz, Christian
    Imbrenda, Claudio
    Kutscher, Dirk
    Ohlman, Boerje
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (07) : 26 - 36
  • [8] The Evolution of Layered Protocol Stacks Leads to an Hourglass-Shaped Architecture
    Akhshabi, Saamer
    Dovrolis, Constantine
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (04) : 206 - 217
  • [9] DNS amplification attack revisited
    Anagnostopoulos, Marios
    Kambourakis, Georgios
    Kopanos, Panagiotis
    Louloudakis, Georgios
    Gritzalis, Stefanos
    [J]. COMPUTERS & SECURITY, 2013, 39 : 475 - 485
  • [10] Preventing Internet denial-of-service with capabilities
    Anderson, T
    Roscoe, T
    Wetherall, D
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (01) : 39 - 44