information centric networking
Recently Published Documents


TOTAL DOCUMENTS

509
(FIVE YEARS 170)

H-INDEX

32
(FIVE YEARS 8)

Electronics ◽  
2021 ◽  
Vol 10 (23) ◽  
pp. 3002
Author(s):  
Bo Li ◽  
Jinlin Wang ◽  
Xiaoyong Zhu ◽  
Jiali You ◽  
Linlin Hu

Many information-centric services have emerged, such as IPTV and video conferencing. These services put a lot of demands on scalable multicast communication. However, traditional IP multicast has low adoption because of its poor scalability. Therefore, some stateless multicast methods were proposed, which encapsulate the destination’s information into the packet header without requiring routers to maintain the multicast forwarding state. However, stateless multicast also faces some problems, such as ingress router overload, high forwarding overhead, packet redundancy, etc. In addition, most multicast methods cannot optimize the multicast tree because the multicast flow is simply forwarded along the shortest path tree from the source to receivers. This paper proposes an Adaptive Hierarchical Hybrid Multicast (AHHM) based on Information-Centric Networking. To balance the forwarding states and forwarding overhead, AHHM is designed as a two-layer structure, in which the upper layer establishes a stateful main tree and the lower layer establishes several stateless sub trees. The router on the main tree is defined as the multicast join node (MJN), and AHHM uses the Name Resolution System to maintain the mapping between each multicast group name and corresponding MJNs. To optimize the multicast transmission path, we designed the minimum cost selection strategy for users to select the appropriate MJN to join. Simulation results show that compared with Source-Specific Multicast (SSM) and Bit Index Explicit Replication (BIER), AHHM can not only reduce the multicast forwarding states but also reduce the control overhead and link load.


2021 ◽  
Author(s):  
J. Hong ◽  
T. You ◽  
L. Dong ◽  
C. Westphal ◽  
B. Ohlman

Author(s):  
Nour El Houda Fethellah ◽  
Hafida Bouziane ◽  
Abdallah Chouarfia

The Information Centric Networking ICN architectures are proposed to overcome the problems of the actual internet architecture. One of the main straight points of the ICN architectures is the in-network caching. The ICN performance is influenced by efficiency of the adopted caching strategy which manages the contents in the network and decides where caching them. However, the major issue which faces the caching strategies in the ICN architectures is the strategic election of the cache routers to store the data through its delivery path. This will reduce congestion, optimize the distance between the consumers and the required data furthermore improve latency and alleviate the viral load on the servers.  In this paper, we propose a new efficient caching strategy for the Named Data Networking architecture NDN named NECS which is the most promising architecture between all the ICN architectures. The proposed strategy reduces the traffic redundancy, eliminates the useless replication of contents and improves the replay time for users due to the strategic position of cache routers. Besides, we evaluate the performance of this proposed strategy and we compare it with three other NDN caching strategies, using the simulator network environment NdnSIM. On the basis of the simulations carried out, we obtained interesting and convincing results.


2021 ◽  
Author(s):  
C. Gündoğan ◽  
T. Schmidt ◽  
M. Wählisch ◽  
C. Scherb ◽  
C. Marxer ◽  
...  

2021 ◽  
Vol 13 (10) ◽  
pp. 262
Author(s):  
Jia Shi ◽  
Xuewen Zeng ◽  
Yang Li

Standalone Name Resolution (SNR) is an essential component of many Information-Centric Networking (ICN) infrastructures that maps and stores the mappings of IDs and locators. The delivery of data can be realized only when the name resolution process is completed correctly. It also makes the SNR become the key target of network attackers. In this paper, our research focuses on the more covert and complex Content Pollution Attack (CPA). By continuously sending invalid content to the network at a low speed, attackers will consume a lot of the resources and time of the SNR system, resulting in a serious increase in the resolution delay of normal users and further cache pollution in ICN. It is difficult to be quickly detected because the characteristics of attack are inconspicuous. To address the challenge, a register access control scheme for an SNR system based on a malicious user blacklist query is proposed. A neighbor voting algorithm is designed to discover possible attacks in the network quickly and build a blacklist of malicious users reasonably. Users on the blacklist will be restricted from accessing the ICN network during the registration phase with the resolution system. Incentives and punishments for network users are introduced to automate responses about the potential malicious behavior reports. Our scheme is more efficient as users do not have to wait for an additional system component to perform operations. In addition, our algorithm can better solve the collusion problem in the voting process when compared with the others. We experimentally evaluate our protocol to demonstrate that the probability of successful collusion attack can be reduced to less than 0.1 when the attacker ratio is 0.5.


2021 ◽  
Author(s):  
Md Washik Al Azad ◽  
Susmit Shannigrahi ◽  
Nicholas Stergiou ◽  
Francisco R. Ortega ◽  
Spyridon Mastorakis

Sign in / Sign up

Export Citation Format

Share Document