Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2016
An overview of architectural and security considerations for named data networking (NDN)
MEDES: Proceedings of the 8th International Conference on Management of Digital EcoSystemsPages 52–57https://doi.org/10.1145/3012071.3012092The Internet of Things (IoT) is an emerging architecture that seeks to interconnect all of the "things" we use on a daily basis. Whereas the Internet originated as a way to connect traditional computing devices in order to share information, IoT ...
- posterSeptember 2015
Revisiting Countermeasures Against NDN Interest Flooding
ACM-ICN '15: Proceedings of the 2nd ACM Conference on Information-Centric NetworkingPages 195–196https://doi.org/10.1145/2810156.2812604Interest flooding has been identified as a major threat for the NDN infrastructure. Since then several approaches have been proposed to identify and to mitigate this attack. In this paper, we (a) classify nine existing countermeasures and (b) compare ...
- research-articleJune 2014
Interest cash: an application-based countermeasure against interest flooding for dynamic content in named data networking
CFI '14: Proceedings of The Ninth International Conference on Future Internet TechnologiesArticle No.: 2, Pages 1–6https://doi.org/10.1145/2619287.2619298As a design of information-centric network architecture, Named Data Networking (NDN) provides content-based security. The signature binding the name with the content is the key point of content-based security in NDN. However, signing a content will ...