Access Control Mechanisms in Named Data Networks

2021 ◽  
Vol 54 (3) ◽  
pp. 1-35
Author(s):  
Boubakr Nour ◽  
Hakima Khelifi ◽  
Rasheed Hussain ◽  
Spyridon Mastorakis ◽  
Hassine Moungla

Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC . Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.

Author(s):  
Juliana Freitag Borin ◽  
Nelson L.S. da Fonseca

Although the IEEE 802.16 standard, popularly known as WiMAX, defines the framework to support real-time and bandwidth demanding applications, traffic control mechanisms, such as admission control and scheduling mechanisms, are left to be defined by proprietary solutions. In line with that, both industry and academia have been working on novel and efficient mechanisms for Quality of Service provisioning in 802.16 networks. This chapter provides the background necessary to understand the scheduling and the admission control problems in IEEE 802.16 networks. Moreover, it gives a comprehensive survey on recent developments on algorithms for these mechanisms as well as future research directions.


2017 ◽  
Vol 23 (2) ◽  
pp. 170-190 ◽  
Author(s):  
Matteo Cristofaro

Purpose The purpose of this paper is to investigate the historical advancements attained on the bounded rationality concept in management research, considering the key influencing discoveries in related fields. Understanding the cross-fertilization that has occurred is the first step to go beyond the current knowledge on bounded rationality and to face its challenges. Design/methodology/approach The adopted method is historical. This research approach helps to explain the evolution of a widespread concept in a scientific field and, particularly, to identify the parallel influencing advancements made in related domains. Findings Investigation of the irrational forces of human reasoning is at the centre of today’s research agenda on rationality in organizations, claiming to be an extension of the original bounded rationality concept. In this regard, scholars should commit themselves to build a more holistic approach to the investigation of human rationality, conjointly applying socio-biological and behavioural perspectives to explain the real behaviour of people in organizations and society. This reconnection will also help to overcome the inner limits of some “fashion of the month” streams that have yet to demonstrate their contribution. Originality/value This is the first study that offers an overall historical evolution of the bounded rationality concept which considers both management research and developments in related fields. The historically educed lessons learned are at the basis of the concluding recommendations for future research.


2020 ◽  
pp. 13-39
Author(s):  
Mona Mohamed ◽  

The proliferation of the smart and sensing devices in the field of communicating networks support in to develop the so-called Internet of Things (IoT). IoT considers a new paradigm for evolutionary of internet connectivity. IoT refers to connect objects around the real world with the Internet to accomplish the common goals and monitor these objects via wire/wireless communications. It plays a large and important role in human life through its use in many applications of human interest. Through using a variety of enabling wireless technologies as Wireless Sensor Networks (WSN), Radio Frequency Identification (RFID), Near Filed Communication (NFC), and barcode in the applications. These technologies will support IoT to transform the internet into a fully integrated future internet. This paper attempts to provide a comprehensive survey of the available literature related to IoT technologies and its applications in many areas of modern-day living. Identify the trend and directions of future research in IoT applications, depend on a comprehensive literature review and the discussion of the achievements of the researchers.


2016 ◽  
Vol 16 (1) ◽  
pp. 19-38 ◽  
Author(s):  
P. G. Shynu ◽  
K. John Singh

Abstract Cloud computing has emerged as the most dominant computational paradigm in recent times. There are tremendous benefits for enterprises adopting cloud technologies. It provides resources and services on demand, pay-as-you go basis. This includes infrastructure, platform and software services. But there are still a number of security threats and challenges associated with utilizing cloud computing. A proper access control is the fundamental security requirement in any cloud environment, to avoid unauthorized access to the cloud systems. As cloud computing supports multi-tenancy and has a various categories of users with different sets of security requirements, traditional access control models and policies cannot be used. This paper discusses on various access control models used for cloud environment and presents a detailed requirement analysis for developing an access control, specifically for the cloud. A comprehensive study on various security problems associated with outsourced data on the cloud and their existing solutions are also described, with the future research directions.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Hakima Khelifi ◽  
Senlin Luo ◽  
Boubakr Nour ◽  
Sayed Chhattan Shah

A tremendous amount of content and information are exchanging in a vehicular environment between vehicles, roadside units, and the Internet. This information aims to improve the driving experience and human safety. Due to the VANET’s properties and application characteristics, the security becomes an essential aspect and a more challenging task. On the contrary, named data networking has been proposed as a future Internet architecture that may improve the network performance, enhance content access and dissemination, and decrease the communication delay. NDN uses a clean design based on content names and Interest-Data exchange model. In this paper, we focus on the vehicular named data networking environment, targeting the security attacks and privacy issues. We present a state of the art of existing VANET attacks and how NDN can deal with them. We classified these attacks based on the NDN perspective. Furthermore, we define various challenges and issues faced by NDN-based VANET and highlight future research directions that should be addressed by the research community.


Electronics ◽  
2021 ◽  
Vol 10 (10) ◽  
pp. 1171
Author(s):  
Abdullah Al-Noman Patwary ◽  
Ranesh Kumar Naha ◽  
Saurabh Garg ◽  
Sudheer Kumar Battula ◽  
Md Anwarul Kaium Patwary ◽  
...  

Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. Hence, the security of Fog devices is a major concern that should come into consideration. Therefore, to provide the necessary security for Fog devices, there is a need to understand what the security concerns are with regards to Fog. All aspects of Fog security, which have not been covered by other literature works, need to be identified and aggregated. On the other hand, privacy preservation for user’s data in Fog devices and application data processed in Fog devices is another concern. To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing. In this paper, a survey along with a taxonomy is proposed, which presents an overview of existing security concerns in the context of the Fog computing paradigm. Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed.


Sensors ◽  
2019 ◽  
Vol 19 (3) ◽  
pp. 702 ◽  
Author(s):  
Vitor Jorge ◽  
Roger Granada ◽  
Renan Maidana ◽  
Darlan Jurak ◽  
Guilherme Heck ◽  
...  

Disaster robotics has become a research area in its own right, with several reported cases of successful robot deployment in actual disaster scenarios. Most of these disaster deployments use aerial, ground, or underwater robotic platforms. However, the research involving autonomous boats or Unmanned Surface Vehicles (USVs) for Disaster Management (DM) is currently spread across several publications, with varying degrees of depth, and focusing on more than one unmanned vehicle—usually under the umbrella of Unmanned Marine Vessels (UMV). Therefore, the current importance of USVs for the DM process in its different phases is not clear. This paper presents the first comprehensive survey about the applications and roles of USVs for DM, as far as we know. This work demonstrates that there are few current deployments in disaster scenarios, with most of the research in the area focusing on the technological aspects of USV hardware and software, such as Guidance Navigation and Control, and not focusing on their actual importance for DM. Finally, to guide future research, this paper also summarizes our own contributions, the lessons learned, guidelines, and research gaps.


Symmetry ◽  
2020 ◽  
Vol 12 (10) ◽  
pp. 1663
Author(s):  
Adam Ibrahim Abdi ◽  
Fathy Elbouraey Eassa ◽  
Kamal Jambi ◽  
Khalid Almarhabi ◽  
Abdullah Saad AL-Malaise AL-Ghamdi

The Internet of Things paradigm is growing rapidly. In fact, controlling this massive growth of IoT globally raises new security and privacy issues. The traditional access control mechanisms provide security to IoT systems such as DAC (discretionary access control) and mandatory access control (MAC). However, these mechanisms are based on central authority management, which raises some issues such as absence of scalability, single point of failure, and lack of privacy. Recently, the decentralized and immutable nature of blockchain technology integrated with access control can help to overcome privacy and security issues in the IoT. This paper presents a review of different access control mechanisms in IoT systems. We present a comparison table of reviewed access control mechanisms. The mechanisms’ scalability, distribution, security, user-centric, privacy and policy enforcing are compared. In addition, we provide access control classifications. Finally, we highlight challenges and future research directions in developing decentralized access control mechanisms for IoT systems.


Author(s):  
Sasha Harris-Lovett ◽  
Kara L. Nelson ◽  
Paloma Beamer ◽  
Heather N. Bischel ◽  
Aaron Bivins ◽  
...  

Wastewater surveillance for the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) is an emerging approach to help identify the risk of a coronavirus disease (COVID-19) outbreak. This tool can contribute to public health surveillance at both community (wastewater treatment system) and institutional (e.g., colleges, prisons, and nursing homes) scales. This paper explores the successes, challenges, and lessons learned from initial wastewater surveillance efforts at colleges and university systems to inform future research, development and implementation. We present the experiences of 25 college and university systems in the United States that monitored campus wastewater for SARS-CoV-2 during the fall 2020 academic period. We describe the broad range of approaches, findings, resources, and impacts from these initial efforts. These institutions range in size, social and political geographies, and include both public and private institutions. Our analysis suggests that wastewater monitoring at colleges requires consideration of local information needs, sewage infrastructure, resources for sampling and analysis, college and community dynamics, approaches to interpretation and communication of results, and follow-up actions. Most colleges reported that a learning process of experimentation, evaluation, and adaptation was key to progress. This process requires ongoing collaboration among diverse stakeholders including decision-makers, researchers, faculty, facilities staff, students, and community members.


2021 ◽  
Vol 54 (4) ◽  
pp. 1-34
Author(s):  
Pengzhen Ren ◽  
Yun Xiao ◽  
Xiaojun Chang ◽  
Po-yao Huang ◽  
Zhihui Li ◽  
...  

Deep learning has made substantial breakthroughs in many fields due to its powerful automatic representation capabilities. It has been proven that neural architecture design is crucial to the feature representation of data and the final performance. However, the design of the neural architecture heavily relies on the researchers’ prior knowledge and experience. And due to the limitations of humans’ inherent knowledge, it is difficult for people to jump out of their original thinking paradigm and design an optimal model. Therefore, an intuitive idea would be to reduce human intervention as much as possible and let the algorithm automatically design the neural architecture. Neural Architecture Search ( NAS ) is just such a revolutionary algorithm, and the related research work is complicated and rich. Therefore, a comprehensive and systematic survey on the NAS is essential. Previously related surveys have begun to classify existing work mainly based on the key components of NAS: search space, search strategy, and evaluation strategy. While this classification method is more intuitive, it is difficult for readers to grasp the challenges and the landmark work involved. Therefore, in this survey, we provide a new perspective: beginning with an overview of the characteristics of the earliest NAS algorithms, summarizing the problems in these early NAS algorithms, and then providing solutions for subsequent related research work. In addition, we conduct a detailed and comprehensive analysis, comparison, and summary of these works. Finally, we provide some possible future research directions.


Sign in / Sign up

Export Citation Format

Share Document