Security and Privacy Analysis of National Science Foundation Future Internet Architectures

被引:25
作者
Ambrosin, Moreno [1 ]
Compagno, Alberto [2 ]
Conti, Mauro [1 ]
Ghali, Cesar [3 ]
Tsudik, Gene [3 ]
机构
[1] Univ Padua, Dept Math, I-35121 Padua, Italy
[2] Univ Roma La Sapienza, Dept Comp Sci, I-00198 Rome, Italy
[3] Univ Calif Irvine, Dept Comp Sci, Irvine, CA 92697 USA
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2018年 / 20卷 / 02期
基金
欧盟地平线“2020”; 美国国家科学基金会;
关键词
Network security; privacy; trust; future Internet architectures; POLLUTION ATTACKS; SERVICE; NETWORK; RESILIENCE;
D O I
10.1109/COMST.2018.2798280
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet protocol (IP) is the lifeblood of the modern Internet. Its simplicity and universality have fueled the unprecedented and lasting global success of the current Internet. Nonetheless, some limitations of IP have been emerging in recent years. Furthermore, starting in mid-1990s, the advent of mobility, wirelessness, and the Web substantially shifted Internet usage and communication paradigms. This accentuated long-term concerns about the current Internet architecture and prompted interest in alternative designs. The U.S. National Science Foundation (NSF) has been one of the key supporters of efforts to design a set of candidate next-generation Internet architectures. As a prominent design requirement, NSF emphasized "security and privacy by design" in order to avoid the long and unhappy history of incremental patching and retrofitting that characterizes the current Internet architecture. To this end, as a result of a competitive process, four prominent research projects were funded by the NSF in 2010: nebula, named-data networking, MobilityFirst, and expressive Internet architecture. This paper provides a comprehensive and neutral analysis of salient security and privacy features (and issues) in these NSF-funded future Internet architectures. Prior surveys on future Internet architectures provide a limited, or even no, comparison on security and privacy features. In addition, this paper also compares the four candidate designs with the current IP-based architecture and discusses similarities, differences, and possible improvements.
引用
收藏
页码:1418 / 1442
页数:25
相关论文
共 131 条
  • [91] Naous J., 2012, NETWORK SECURITY VIA
  • [92] Naous Jad., 2011, Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies, page, P30
  • [93] XIA: Architecting a More Trustworthy and Evolvable Internet
    Naylor, David
    Mukerjee, Matthew K.
    Agyapong, Patrick
    Grandl, Robert
    Kang, Ruogu
    Machado, Michel
    Brown, Stephanie
    Doucette, Cody
    Hsiao, Hsu-Chun
    Han, Dongsu
    Kim, Tiffany Hyun-Jin
    Lim, Hyeontaek
    Ovon, Carol
    Zhou, Dong
    Lee, Soo Bum
    Lin, Yue-Hsun
    Stuart, Colleen
    Barrett, Daniel
    Akella, Aditya
    Andersen, David
    Byers, John
    Dabbish, Laura
    Kaminsky, Michael
    Kiesler, Sara
    Peha, Jon
    Perrig, Adrian
    Seshan, Srini
    Sirbu, Marvin
    Steenkiste, Peter
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (03) : 50 - 57
  • [94] Nelson S.C., 2011, Proceedings of the sixth international workshop on MobiArch, P19
  • [95] Nordstrom Erik, 2012, 9 USENIX S NETWORKED, P85
  • [96] NSF, 2014, NSF FUT INT ARCH PRO
  • [97] Nugraha B., 2014, P ITU KAL AC C LIV C, P233
  • [98] A Survey of the Research on Future Internet Architectures
    Pan, Jianli
    Paul, Subharthi
    Jain, Raj
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (07) : 26 - 36
  • [99] Enhancing DNS resilience against denial of service attacks
    Pappas, Vasileios
    Massey, Dan
    Zhang, Lixia
    [J]. 37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, : 450 - +
  • [100] One Tunnel is (Often) Enough
    Peter, Simon
    Javed, Umar
    Zhang, Qiao
    Woos, Doug
    Anderson, Thomas
    Krishnamurthy, Arvind
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (04) : 99 - 110