skip to main content
10.1145/3012071.3012092acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
research-article

An overview of architectural and security considerations for named data networking (NDN)

Published: 01 November 2016 Publication History

Abstract

The Internet of Things (IoT) is an emerging architecture that seeks to interconnect all of the "things" we use on a daily basis. Whereas the Internet originated as a way to connect traditional computing devices in order to share information, IoT includes everything from automobiles to appliances to buildings. As networks and devices become more diverse and disparate in their communication methods and interfaces, traditional host-to host technologies such as Internet Protocol (IP) are challenged to provide the level of data exchange and security needed to operate in this new network paradigm. Named Data Networking (NDN) is a developing Internet architecture that can help implement the IoT paradigm in a more efficient and secure manner. This paper introduces the NDN architecture in comparison to the traditional IP-based architecture and discusses several security concepts pertaining to NDN that make this a powerful technology for implementing the Internet of Things.

References

[1]
D. Freet, R. Agrawal and J. Walker, "Open Source Cloud Management Platforms and Hypervisor Technologies: A Review and Comparison," Proceedings of the IEEE Region 3 South East Conference (SoutheastCon, 2016), 2016.
[2]
D. Freet, R. Agrawal, S. John and J. Walker, "Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS," Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems, pp. 148--155, 2015.
[3]
V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Briggs and R. Braynard, "Networking Named Content," Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pp. 1--12, 2009.
[4]
B. Adamson, C. Bormann, M. Handley and J. Macker, "Multicast Negative-Acknowledgement (NACK) Building Blocks (No. RFC 5401)," 2008.
[5]
P. Gasti, G. Tsudik, E. Uzun and L. Zhang, "DoS and DDoS in named data networking," 2013 22nd International Conference on Computer Communication and Networks (ICCCN), no. IEEE, 2013.
[6]
H. Dai, Y. Wang, J. Fan and B. Liu, "Mitigate ddos attacks in ndn by interest traceback," Computer Communications Workshops (INFOCOM WKSHPS) 2013 IEEE Conference, pp. 381--386, 2013.
[7]
A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun and L. Zhang, "Interest Flooding Attack and Countermeasures in Named Data Networking," Proceedings of IFIP Networking, pp. 1--9, 2013.
[8]
W. Shang, A. Bannis, T. Liang, Z. Wang, Y. Yu, A. Afanasyev, J. Thompson, J. Burke, B. Zhang and L. Zhang, "Named Data Networking of Things," 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 117--128, 2016.
[9]
D. Smetters and V. Jacobson, "Securing network content," PARC Technical Report, 2009.
[10]
A. Compagno, M. Conti, P. Gasti and G. Tsudik, "Poseidon: Mitigating interest flooding DDoS attacks in named data networking," Local Computer Networks (LCN), 2013 IEEE 38th Conference, pp. 630--638, 2013.
[11]
C. Yi, L. Afanasyev, B. Wang and L. Zhang, "Adaptive forwarding in named data networking," CCR, vol. 42, no. 3, pp. 62--67, 2012.
[12]
K. Udaya, T. Varadaharajan and V. Varadaharajan, "A practical method to counteract denial of service attacks," Proceedings of the 26th Australasian computer science conference, vol. 16, pp. 275--284, 2003.
[13]
S. Savage, D. Wetherall, A. Karlin and T. Anderson, "Practical network support for ip traceback," Proceedings of ACM SIGCOMM'00, pp. 295--306, 2000.
[14]
V. Thing, M. Sloman and N. Dulay, "Non-intrusive ip traceback for ddos attacks," Proceedings of ACM ASIACCS'07, 2007.
[15]
M. Amadeo, C. Campolo, A. Iera and A. Molinaro, "Named data networking for IoT: an architectural perspective," Networks and Communications (EuCNC), 2014 European Conference on. IEEE, pp. 1--5, 2014.
[16]
W. Shang, Q. Ding, A. Marianantoni, J. Burke and L. Zhang, "Securing building management systems using named data networking," IEEE Network, vol. 28, no. 3, pp. 50--56, 2014.
[17]
M. Amadeo, C. Campolo and A. Molinaro, "Forwarding strategies in named data wireless ad hoc networks: Design and evaluation," Journal of Network and Computer Applications, vol. 50, pp. 14--158, 2015.
[18]
Y. Lu, B. Zhou, L. Tung, M. Gerla, A. Ramesh and L. Nagaraja, "Energy-efficient content retrieval in mobile cloud," ACM SIGCOMM Workshop on Mobile cloud computing MCC '13, 2013.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MEDES: Proceedings of the 8th International Conference on Management of Digital EcoSystems
November 2016
243 pages
ISBN:9781450342674
DOI:10.1145/3012071
© 2016 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DoS
  2. IP
  3. IoT
  4. NDN
  5. architecture
  6. countermeasures
  7. interest flooding
  8. internet protocol
  9. named data networking
  10. network security
  11. wireless

Qualifiers

  • Research-article

Conference

MEDES'16

Acceptance Rates

Overall Acceptance Rate 267 of 682 submissions, 39%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media