首页 > 最新文献

Proceedings of the 4th ACM Conference on Information-Centric Networking最新文献

英文 中文
Improved content addressability through relational data modeling and in-network processing elements 通过关系数据建模和网络内处理元素改进了内容的可寻址性
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3125735
Claudio Marxer, C. Tschudin
Recent realizations of the ICN principle organize content in a hierarchical namespace. We argue that this addressing mode has shortcomings because a single document could be part of several data collections. For instance, Joe's record of his New York Marathon run might be published as a content object with the name /repo/events/NYmarathon/record1234 but would also fit into /repo/users/Joe/record1234. Even further, the content of documents can be very multifaceted such that not all details -e.g. spacial coordinates, timestamps, rankings- can be made available on the name surface. In this paper we show that CCN-style networks enriched with active elements, i.e. content processing/producing entities, can overcome these problems. Exemplarily, we adopt relational data modeling concepts to organize named data and deploy Named Function Networking to implement content addressability which goes beyond the scope of pure, i.e. passive, CCN.
ICN原则的最新实现将内容组织在分层命名空间中。我们认为这种寻址模式有缺点,因为单个文档可能是多个数据集合的一部分。例如,Joe的纽约马拉松比赛记录可以作为名称为/repo/events/NYmarathon/record1234的内容对象发布,但也可以放到/repo/users/Joe/record1234中。此外,文档的内容可能非常多面,因此并非所有细节(例如空间坐标、时间戳、排名)都可以在名称表面上显示。在本文中,我们展示了富含活动元素(即内容处理/生产实体)的ccn风格网络可以克服这些问题。例如,我们采用关系数据建模概念来组织命名数据,并部署命名功能网络来实现超越纯(即被动)CCN范围的内容可寻址性。
{"title":"Improved content addressability through relational data modeling and in-network processing elements","authors":"Claudio Marxer, C. Tschudin","doi":"10.1145/3125719.3125735","DOIUrl":"https://doi.org/10.1145/3125719.3125735","url":null,"abstract":"Recent realizations of the ICN principle organize content in a hierarchical namespace. We argue that this addressing mode has shortcomings because a single document could be part of several data collections. For instance, Joe's record of his New York Marathon run might be published as a content object with the name /repo/events/NYmarathon/record1234 but would also fit into /repo/users/Joe/record1234. Even further, the content of documents can be very multifaceted such that not all details -e.g. spacial coordinates, timestamps, rankings- can be made available on the name surface. In this paper we show that CCN-style networks enriched with active elements, i.e. content processing/producing entities, can overcome these problems. Exemplarily, we adopt relational data modeling concepts to organize named data and deploy Named Function Networking to implement content addressability which goes beyond the scope of pure, i.e. passive, CCN.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126337511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The need for a name to MAC address mapping in NDN: towards quantifying the resource gain NDN中名称到MAC地址映射的需求:对资源增益的量化
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3125737
Peter Kietzmann, Cenk Gündoğan, T. Schmidt, O. Hahm, Matthias Wählisch
In this paper, we start from two observations. First, many application scenarios that benefit from ICN involve battery driven nodes connected via shared media. Second, current link layer technologies are completely ICN agnostic, which prevents filtering of ICN packets at the device driver level. Consequently, any ICN packet, Interest as well as Data, is processed by the CPU. This sacrifices local system resources and disregards link layer support functions such as wireless retransmission. We argue for a mapping of names to MAC addresses to efficiently handle ICN packets, and explore dynamic face-based mapping schemes. We analyze the impact of this link-layer adaptation in real-world experiments and quantitatively compare different configurations. Our findings on resource consumption, and reliability on constrained devices indicate significant gains in larger networks.
在本文中,我们从两个观察开始。首先,得益于ICN的许多应用场景涉及通过共享媒体连接的电池驱动节点。其次,当前的链路层技术是完全ICN不可知的,这阻止了在设备驱动程序级别过滤ICN数据包。因此,任何ICN数据包,兴趣和数据,都由CPU处理。这牺牲了本地系统资源,并且忽略了链路层支持功能,例如无线重传。我们主张将名称映射到MAC地址,以有效地处理ICN数据包,并探索动态的基于人脸的映射方案。我们在现实世界的实验中分析了这种链路层适应的影响,并定量地比较了不同的配置。我们在资源消耗和受限设备上的可靠性方面的研究结果表明,在大型网络中有显著的收益。
{"title":"The need for a name to MAC address mapping in NDN: towards quantifying the resource gain","authors":"Peter Kietzmann, Cenk Gündoğan, T. Schmidt, O. Hahm, Matthias Wählisch","doi":"10.1145/3125719.3125737","DOIUrl":"https://doi.org/10.1145/3125719.3125737","url":null,"abstract":"In this paper, we start from two observations. First, many application scenarios that benefit from ICN involve battery driven nodes connected via shared media. Second, current link layer technologies are completely ICN agnostic, which prevents filtering of ICN packets at the device driver level. Consequently, any ICN packet, Interest as well as Data, is processed by the CPU. This sacrifices local system resources and disregards link layer support functions such as wireless retransmission. We argue for a mapping of names to MAC addresses to efficiently handle ICN packets, and explore dynamic face-based mapping schemes. We analyze the impact of this link-layer adaptation in real-world experiments and quantitatively compare different configurations. Our findings on resource consumption, and reliability on constrained devices indicate significant gains in larger networks.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"109 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120910866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Near loop-free routing: increasing path choices with stateful forwarding 近无环路路由:增加有状态转发的路径选择
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3132098
K. Schneider, Beichuan Zhang, Lan Wang, Lixia Zhang
When splitting traffic for one destination among multiple paths, the employed paths should be loop-free, lest they waste network resources, and the involved routers should be given a high path choice, that is, a high number of potential nexthops. In IP networks this requires the use of a loop-free routing protocol, which limits the achievable path choice. Here we show that, in NDN, we can increase the path choice by combining a Near Loop-free Routing protocol (NLR) with on-demand loop removal at the forwarding layer. NLR routers 1) exclude the incoming face from forwarding, 2) use certain heuristics to minimize routing loops, and 3) remove any remaining loops at the forwarding plane. NLR achieves a higher path choice and path quality than current alternatives, while keeping computation complexity low.
当将一个目的地的流量分散到多条路径时,所使用的路径应该是无环路的,以免浪费网络资源,并且应该给路由器提供高路径选择,即潜在的下一站的数量。在IP网络中,这需要使用无环路路由协议,这限制了可实现的路径选择。在这里,我们表明,在NDN中,我们可以通过在转发层结合近无环路路由协议(NLR)和按需环路去除来增加路径选择。NLR路由器1)从转发中排除入站面,2)使用一定的启发式方法最小化路由环路,3)删除转发平面上的任何剩余环路。NLR在保持较低计算复杂度的同时,实现了比现有替代算法更高的路径选择和路径质量。
{"title":"Near loop-free routing: increasing path choices with stateful forwarding","authors":"K. Schneider, Beichuan Zhang, Lan Wang, Lixia Zhang","doi":"10.1145/3125719.3132098","DOIUrl":"https://doi.org/10.1145/3125719.3132098","url":null,"abstract":"When splitting traffic for one destination among multiple paths, the employed paths should be loop-free, lest they waste network resources, and the involved routers should be given a high path choice, that is, a high number of potential nexthops. In IP networks this requires the use of a loop-free routing protocol, which limits the achievable path choice. Here we show that, in NDN, we can increase the path choice by combining a Near Loop-free Routing protocol (NLR) with on-demand loop removal at the forwarding layer. NLR routers 1) exclude the incoming face from forwarding, 2) use certain heuristics to minimize routing loops, and 3) remove any remaining loops at the forwarding plane. NLR achieves a higher path choice and path quality than current alternatives, while keeping computation complexity low.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124502947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
NAC: name-based access control in named data networking NAC:命名数据组网中基于名称的访问控制
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3132102
Zhiyi Zhang, Yingdi Yu, A. Afanasyev, J. Burke, Lixia Zhang
As a proposed Internet architecture, Named Data Networking must provide effective security support: data authenticity, confidentiality, and availability. This poster focuses on supporting data confidentiality via encryption. The main challenge is to provide an easy-to-use key management mechanism that ensures only authorized parties are given the access to protected data. We describe the design of name-based access control (NAC) which provides automated key management by developing systematic naming conventions for both data and cryptographic keys. We also discuss an enhanced version of NAC that leverages attribute-based encryption mechanisms (NAC-ABE) to improve the flexibility of data access control and reduce communication, storage, and processing overheads.
作为一种被提议的Internet架构,命名数据网络必须提供有效的安全支持:数据真实性、机密性和可用性。这张海报的重点是通过加密支持数据机密性。主要的挑战是提供一种易于使用的密钥管理机制,以确保只有授权方才能访问受保护的数据。我们描述了基于名称的访问控制(NAC)的设计,它通过为数据密钥和加密密钥开发系统的命名约定来提供自动密钥管理。我们还讨论了NAC的增强版本,它利用基于属性的加密机制(NAC- abe)来提高数据访问控制的灵活性,并减少通信、存储和处理开销。
{"title":"NAC: name-based access control in named data networking","authors":"Zhiyi Zhang, Yingdi Yu, A. Afanasyev, J. Burke, Lixia Zhang","doi":"10.1145/3125719.3132102","DOIUrl":"https://doi.org/10.1145/3125719.3132102","url":null,"abstract":"As a proposed Internet architecture, Named Data Networking must provide effective security support: data authenticity, confidentiality, and availability. This poster focuses on supporting data confidentiality via encryption. The main challenge is to provide an easy-to-use key management mechanism that ensures only authorized parties are given the access to protected data. We describe the design of name-based access control (NAC) which provides automated key management by developing systematic naming conventions for both data and cryptographic keys. We also discuss an enhanced version of NAC that leverages attribute-based encryption mechanisms (NAC-ABE) to improve the flexibility of data access control and reduce communication, storage, and processing overheads.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121375806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Realizing a virtual private network using named data networking 利用命名数据网络实现虚拟专用网
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3125720
C. Partridge, S. Nelson, D. Kong
An approach to creating secure virtual private networks for the Named Data Networking (NDN) protocol suite is described. It encrypts and encapsulates NDN packets from higher security domains and places them as the payload in unencrypted NDN packets, much as IPsec encapsulates encrypted IP datagrams in unencrypted IP datagrams. We then leverage the well-known properties of the IP-in-IP approach, taken by IPsec in tunnel mode, to understand the strengths and weaknesses of the proposed NDN-in-NDN approach.
描述了一种为命名数据网络(NDN)协议套件创建安全虚拟专用网络的方法。它对来自高安全域的NDN报文进行加密和封装,并将其作为负载放在未加密的NDN报文中,就像IPsec将加密的IP数据报封装在未加密的IP数据报中一样。然后,我们利用IPsec在隧道模式下采用的IP-in-IP方法的众所周知的特性,来了解所提出的NDN-in-NDN方法的优点和缺点。
{"title":"Realizing a virtual private network using named data networking","authors":"C. Partridge, S. Nelson, D. Kong","doi":"10.1145/3125719.3125720","DOIUrl":"https://doi.org/10.1145/3125719.3125720","url":null,"abstract":"An approach to creating secure virtual private networks for the Named Data Networking (NDN) protocol suite is described. It encrypts and encapsulates NDN packets from higher security domains and places them as the payload in unencrypted NDN packets, much as IPsec encapsulates encrypted IP datagrams in unencrypted IP datagrams. We then leverage the well-known properties of the IP-in-IP approach, taken by IPsec in tunnel mode, to understand the strengths and weaknesses of the proposed NDN-in-NDN approach.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122469998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Anonymous authentication and pseudonym-renewal for VANET in NDN NDN中VANET的匿名认证与假名更新
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3132111
Muktadir Chowdhury, Ashlesh Gawande, Lan Wang
Secure deployment of a vehicular network depends on the network's trust establishment and privacy-preserving capability. In this paper, we propose a scheme for anonymous pseudonym-renewal and pseudonymous authentication for vehicular ad-hoc networks over a data-centric Internet architecture called Named Data networking (NDN). We incorporated our design in a traffic information sharing demo application and deployed it on Raspberry Pi-based miniature cars for evaluation.
车载网络的安全部署取决于网络的信任建立和隐私保护能力。在本文中,我们提出了一种基于以数据为中心的命名数据网络(NDN)架构的车载自组织网络匿名假名更新和假名认证方案。我们将我们的设计整合到交通信息共享演示应用程序中,并将其部署在基于树莓派的微型汽车上进行评估。
{"title":"Anonymous authentication and pseudonym-renewal for VANET in NDN","authors":"Muktadir Chowdhury, Ashlesh Gawande, Lan Wang","doi":"10.1145/3125719.3132111","DOIUrl":"https://doi.org/10.1145/3125719.3132111","url":null,"abstract":"Secure deployment of a vehicular network depends on the network's trust establishment and privacy-preserving capability. In this paper, we propose a scheme for anonymous pseudonym-renewal and pseudonymous authentication for vehicular ad-hoc networks over a data-centric Internet architecture called Named Data networking (NDN). We incorporated our design in a traffic information sharing demo application and deployed it on Raspberry Pi-based miniature cars for evaluation.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122773164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Demo: NDN-based IoT robotics 演示:基于ndn的物联网机器人
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3132097
Loïc Dauphin, E. Baccelli, C. Adjih, Hauke Petersen
In this paper, we demonstrate how NDN can be used as network primitive on low-cost robots with the Robot Operating System (ROS).
在本文中,我们演示了如何将NDN用作具有机器人操作系统(ROS)的低成本机器人的网络原语。
{"title":"Demo: NDN-based IoT robotics","authors":"Loïc Dauphin, E. Baccelli, C. Adjih, Hauke Petersen","doi":"10.1145/3125719.3132097","DOIUrl":"https://doi.org/10.1145/3125719.3132097","url":null,"abstract":"In this paper, we demonstrate how NDN can be used as network primitive on low-cost robots with the Robot Operating System (ROS).","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122980849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Facilitating ICN deployment with an extended openflow protocol 通过扩展的openflow协议促进ICN部署
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3125729
P. Zuraniewski, Niels L. M. van Adrichem, D. Ravesteijn, W. IJntema, C. Papadopoulos, Chengyu Fan
Named-Data Networking (NDN) is proposed as an approach to evolve the Internet infrastructure from a host- to an information-centric (ICN) approach, which is better suited to the current usage of the Internet. However, the deployment of a global NDN-based Internet is still a long way out of reach. The most likely scenario for a global NDN network will be the one based on NDN 'islands' or domains, where interior forwarding and routing of packets is based on NDN principles. The interconnection of NDN domains involves human configuration to set up IP tunnels, implying an unscalable, tedious and error-prone process resulting in static configuration incapable of reacting to ad-hoc requirements or network changes. Leveraging the flexibility of Software-Defined Networking (SDN) can solve aforementioned problems. Due to its dynamic nature, SDN can automatically recognize an NDN service and instruct switches to set up the configuration for actual service deployment. Such a solution significantly eases the deployment of NDN networks. In this paper, we propose a hybrid solution where we combine Software-Defined Networking, more specifically OpenFlow, and eBPF to perform control plane configuration and data plane programmability respectively, to realize connectivity within and across NDN domains. To do so, we have designed eBPF filters that match on NDN traffic, extended the OpenFlow protocol to configure switch data planes with these match filters and enhanced an OpenFlow switch to act accordingly. Our OpenFlow controller written for Ryu performs routing on NDN names and configures switches correspondingly. Additionally, our controller detects NDN domains and sets up IP tunnels between them. Our evaluation shows that our proof-of-concept on, among others, the SciNet testbed autoconfigures an NDN network, successfully providing end-to-end NDN network functionality across multiple domains.
命名数据网络(NDN)是Internet基础设施从以主机为中心向以信息为中心(ICN)发展的一种更适合当前Internet使用的方法。然而,在全球范围内部署基于ndn的互联网仍有很长的路要走。全球NDN网络最有可能的情况是基于NDN“孤岛”或域,其中内部转发和数据包路由基于NDN原则。NDN域的互连需要人工配置来建立IP隧道,这意味着一个不可扩展、乏味且容易出错的过程,导致静态配置无法对特定需求或网络变化做出反应。利用软件定义网络(SDN)的灵活性可以解决上述问题。由于SDN的动态特性,它可以自动识别NDN业务,并指示交换机为实际业务部署进行配置。这样的解决方案大大简化了NDN网络的部署。在本文中,我们提出了一种混合解决方案,我们将软件定义网络(更具体地说是OpenFlow)和eBPF结合起来,分别执行控制平面配置和数据平面可编程性,以实现NDN域内和跨域的连接。为此,我们设计了匹配NDN流量的eBPF过滤器,扩展了OpenFlow协议,用这些匹配过滤器配置交换机数据平面,并增强了OpenFlow交换机的相应功能。我们为Ryu编写的OpenFlow控制器在NDN名称上执行路由并相应地配置交换机。此外,我们的控制器检测NDN域并在它们之间建立IP隧道。我们的评估表明,我们的概念验证,其中,SciNet测试平台自动配置NDN网络,成功地提供跨多个域的端到端NDN网络功能。
{"title":"Facilitating ICN deployment with an extended openflow protocol","authors":"P. Zuraniewski, Niels L. M. van Adrichem, D. Ravesteijn, W. IJntema, C. Papadopoulos, Chengyu Fan","doi":"10.1145/3125719.3125729","DOIUrl":"https://doi.org/10.1145/3125719.3125729","url":null,"abstract":"Named-Data Networking (NDN) is proposed as an approach to evolve the Internet infrastructure from a host- to an information-centric (ICN) approach, which is better suited to the current usage of the Internet. However, the deployment of a global NDN-based Internet is still a long way out of reach. The most likely scenario for a global NDN network will be the one based on NDN 'islands' or domains, where interior forwarding and routing of packets is based on NDN principles. The interconnection of NDN domains involves human configuration to set up IP tunnels, implying an unscalable, tedious and error-prone process resulting in static configuration incapable of reacting to ad-hoc requirements or network changes. Leveraging the flexibility of Software-Defined Networking (SDN) can solve aforementioned problems. Due to its dynamic nature, SDN can automatically recognize an NDN service and instruct switches to set up the configuration for actual service deployment. Such a solution significantly eases the deployment of NDN networks. In this paper, we propose a hybrid solution where we combine Software-Defined Networking, more specifically OpenFlow, and eBPF to perform control plane configuration and data plane programmability respectively, to realize connectivity within and across NDN domains. To do so, we have designed eBPF filters that match on NDN traffic, extended the OpenFlow protocol to configure switch data planes with these match filters and enhanced an OpenFlow switch to act accordingly. Our OpenFlow controller written for Ryu performs routing on NDN names and configures switches correspondingly. Additionally, our controller detects NDN domains and sets up IP tunnels between them. Our evaluation shows that our proof-of-concept on, among others, the SciNet testbed autoconfigures an NDN network, successfully providing end-to-end NDN network functionality across multiple domains.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"390 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
IPRES: in-device proxy re-encryption service for secure ICN IPRES:安全ICN的设备内代理重加密服务
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3132089
K. Suksomboon, A. Tagami, A. Basu, Jun Kurihara
A key paradigm of Information Centric Networking (ICN) is that the content-based security, privacy and access control are deployed directly in the network layer. However, there is a gap between security in the network and application layers. This creates a vulnerable space for cyber attacks from inside a device. To address this problem, we discuss and present a guideline on ICN access control. Since a semi-trusted proxy has been seen as an advantageous solution for access control and efficiency in content sharing services, we introduce the proxy in a consumer's device and propose an in-device proxy re-encryption service (IPRES) architecture for efficiency in both access control management and resource usage.
信息中心网络(ICN)的一个关键范例是将基于内容的安全、隐私和访问控制直接部署在网络层。然而,在网络层和应用层的安全性之间存在着差距。这为设备内部的网络攻击创造了一个脆弱的空间。为了解决这个问题,我们讨论并提出了一个ICN访问控制指南。由于半可信代理已被视为内容共享服务中访问控制和效率的有利解决方案,因此我们在消费者设备中引入代理,并提出设备内代理重新加密服务(IPRES)架构,以提高访问控制管理和资源使用的效率。
{"title":"IPRES: in-device proxy re-encryption service for secure ICN","authors":"K. Suksomboon, A. Tagami, A. Basu, Jun Kurihara","doi":"10.1145/3125719.3132089","DOIUrl":"https://doi.org/10.1145/3125719.3132089","url":null,"abstract":"A key paradigm of Information Centric Networking (ICN) is that the content-based security, privacy and access control are deployed directly in the network layer. However, there is a gap between security in the network and application layers. This creates a vulnerable space for cyber attacks from inside a device. To address this problem, we discuss and present a guideline on ICN access control. Since a semi-trusted proxy has been seen as an advantageous solution for access control and efficiency in content sharing services, we introduce the proxy in a consumer's device and propose an in-device proxy re-encryption service (IPRES) architecture for efficiency in both access control management and resource usage.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124633527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simple and efficient ICN network virtualization with vICN 简单高效的ICN网络虚拟化与vICN
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3132100
J. Augé, G. Carofiglio, Marcel Enguehard, L. Muscariello, M. Sardara
Information-Centric Networking (ICN) has been proposed as an alternative to IP for future networks such as 5G. To speed up its development and adoption, researchers and engineers require testing tools that are both simple and scalable. In particular, it is crucial to be able to quickly deploy ICN-enabled network topologies in a flexible and efficient manner. In this demonstration, we showcase vICN (virtualized ICN), a platform that enables easy deployment, orchestration and management of ICN networks. vICN uses standard virtualization technologies such as Linux Containers (LXC) and is fully integrated with the CICN suite to enable flexible testing of ICN technologies on general-purpose hardware. Furthermore, it can perform live monitoring and modification of the network. In particular, we use vICN to deploy a simple topology that consists of 9 nodes. We show that vICN bootstraps the topology in about 60s on commodity hardware. We then demonstrate how vICN interacts with the virtualized network and how it can be used for easy experimentation.
信息中心网络(ICN)已被提议作为未来网络(如5G)的替代IP。为了加速其开发和采用,研究人员和工程师需要既简单又可扩展的测试工具。特别是,能够以灵活有效的方式快速部署支持icn的网络拓扑结构至关重要。在这个演示中,我们展示了vICN(虚拟化ICN),一个可以轻松部署、编排和管理ICN网络的平台。vICN使用Linux容器(LXC)等标准虚拟化技术,并与CICN套件完全集成,可以在通用硬件上灵活地测试ICN技术。此外,它还可以对网络进行实时监控和修改。特别地,我们使用vICN来部署一个由9个节点组成的简单拓扑。我们表明,在商用硬件上,vICN在大约60秒内引导拓扑。然后,我们演示了vICN如何与虚拟网络交互,以及如何使用它进行简单的实验。
{"title":"Simple and efficient ICN network virtualization with vICN","authors":"J. Augé, G. Carofiglio, Marcel Enguehard, L. Muscariello, M. Sardara","doi":"10.1145/3125719.3132100","DOIUrl":"https://doi.org/10.1145/3125719.3132100","url":null,"abstract":"Information-Centric Networking (ICN) has been proposed as an alternative to IP for future networks such as 5G. To speed up its development and adoption, researchers and engineers require testing tools that are both simple and scalable. In particular, it is crucial to be able to quickly deploy ICN-enabled network topologies in a flexible and efficient manner. In this demonstration, we showcase vICN (virtualized ICN), a platform that enables easy deployment, orchestration and management of ICN networks. vICN uses standard virtualization technologies such as Linux Containers (LXC) and is fully integrated with the CICN suite to enable flexible testing of ICN technologies on general-purpose hardware. Furthermore, it can perform live monitoring and modification of the network. In particular, we use vICN to deploy a simple topology that consists of 9 nodes. We show that vICN bootstraps the topology in about 60s on commodity hardware. We then demonstrate how vICN interacts with the virtualized network and how it can be used for easy experimentation.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125778884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 4th ACM Conference on Information-Centric Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1