Information-Centric Networking in Wireless Environments: Security Risks and Challenges

03/02/2021
by   Boubakr Nour, et al.
0

Information-Centric Networking (ICN) has emerged as a paradigm to cope with the lack of built-in security primitives and efficient mechanisms for content distribution of today's Internet. However, deploying ICN in a wireless environment poses a different set of challenges compared to a wired environment, especially when it comes to security. In this paper, we present the security issues that may arise and the attacks that may occur from different points of view when ICN is deployed in wireless environments. The discussed attacks may target both applications and the ICN network itself by exploiting elements of the ICN architecture, such as content names and in-network content caches. Furthermore, we discuss potential solutions to the presented issues and countermeasures to the presented attacks. Finally, we identify future research opportunities and directions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/08/2020

Access Control Mechanisms in Named Data Networks: A Comprehensive Survey

Information-Centric Networking (ICN) has recently emerged as a prominent...
research
06/02/2020

LogDos: A Novel Logging-based DDoS Prevention Mechanism in Path Identifier-Based Information Centric Networks

Information Centric Networks (ICNs) have emerged in recent years as a ne...
research
09/17/2023

Statement: The Metaverse as an Information-Centric Network

This paper discusses challenges and opportunities of considering the Met...
research
10/26/2018

Content Protection in Named Data Networking: Challenges and Potential Solutions

Information-Centric Networks (ICN) are promising alternatives to current...
research
07/05/2022

Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions

The exploding rate of multimedia publishing in our networked society has...
research
03/14/2019

Exploiting Information Centric Networking to federate NoSQL Spatial Databases

This paper explores methodologies, challenges and expected advantages re...

Please sign up or login with your details

Forgot password? Click here to reset