• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Protecting access privacy of cached contents in information centric networks”, (2013)

by A Mohaisen, X Zhang, M Schuchard, H Xie, Y Kim
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

POSTER: Protecting Access Privacy of Cached Contents in Information Centric Networks∗

by Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim
"... ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...oxplot of the RTT up to each hop (1 to 15, until reaching the origin server) as a ratio of the total RTT to the origin server is shown in Figure 2 (more details on characteristics of this data are in =-=[2]-=-). First, we examine whether an adversary co-located one-hop away from a legitimate user will be able to exploit the timing attack explained earlier to infer whether some contents are being retrieved ...

A Survey of Security Attacks in Information-Centric Networking

by Student Member, IEEE Eslam G Abdallah , Senior Member, IEEE Hossam S Hassanein , Senior Member, IEEE Mohammad Zulkernine
"... Abstract-Information-centric networking (ICN) is a new communication paradigm that focuses on content retrieval from the network regardless of storage location or physical representation of this content. In ICN, securing the content itself is much more important than securing the infrastructure or ..."
Abstract - Add to MetaCart
Abstract-Information-centric networking (ICN) is a new communication paradigm that focuses on content retrieval from the network regardless of storage location or physical representation of this content. In ICN, securing the content itself is much more important than securing the infrastructure or the end-points. To achieve the security goals in this new paradigm, it is crucial to have a comprehensive understanding of the ICN attacks, their classification, and proposed solutions. In this paper, we provide a survey of attacks unique to ICN architectures and other generic attacks that have an impact on ICN. It also provides a taxonomy of these attacks in ICN, which are classified into four main categories: naming, routing, caching, and other miscellaneous related attacks. Further, the paper shows the relation between ICN attacks and unique ICN attributes; ICN attacks and security requirements: confidentiality, integrity, availability, and privacy. Finally, the paper presents the severity levels of ICN attacks and discusses the existing ICN security solutions.
(Show Context)

Citation Context

...ory and processing power that are used to support, maintain and exchange content states. In addition, the infrastructure in ICN relies on the integrity and correctness of content routing, and is therefore threatened by poisonous injections of paths and names [26], [27], [28], [29], [30]. Caching related attacks. Caching is one of the important components in ICN as the performance of the ICN infrastructure is based on receiver driven caching that aims to deliver the closest available copy to a user. Therefore, ICN is vulnerable to all operations that pollute or corrupt the caching system [31], [32], [33]. Miscellaneous attacks. The threats in this category aim to degrade some ICN services and allow an attacker to make unauthorized access. These attacks lead to insufficient or erroneous data distribution [34]. In the following subsections, we describe the attacks, scenarios, and impacts of each one of the four categories. The discussed attacks can also be classified as follows: new attacks in ICN such as bogus announcements and time analysis attacks; legacy attacks in new scenarios and with a greater impact in ICN such as naming and routing related attacks, random and unpopular requests ...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University