首页 > 最新文献

Proceedings of the 4th ACM Conference on Information-Centric Networking最新文献

英文 中文
Demo: named-data networking in opportunistic network 演示:机会网络中的命名数据组网
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3132107
Seweryn Dynerowicz, P. Mendes
This document describes the demo of our NDN-Opp framework which brings Named-Data Networking to Opportunistic Networks. Our implementation attempts to leverage all communication opportunities, supports intermittently connected device-to-device communication links and push models. We are also experimenting with acknowledgement mechanisms and connection-less transfer of packets.
本文档描述了我们的NDN-Opp框架的演示,该框架将命名数据网络引入机会网络。我们的实现尝试利用所有通信机会,支持间歇连接的设备到设备通信链接和推送模型。我们还在试验确认机制和无连接的数据包传输。
{"title":"Demo: named-data networking in opportunistic network","authors":"Seweryn Dynerowicz, P. Mendes","doi":"10.1145/3125719.3132107","DOIUrl":"https://doi.org/10.1145/3125719.3132107","url":null,"abstract":"This document describes the demo of our NDN-Opp framework which brings Named-Data Networking to Opportunistic Networks. Our implementation attempts to leverage all communication opportunities, supports intermittently connected device-to-device communication links and push models. We are also experimenting with acknowledgement mechanisms and connection-less transfer of packets.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125217647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
When encryption is not enough: privacy attacks in content-centric networking 当加密还不够时:以内容为中心的网络中的隐私攻击
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3125723
Cesar Ghali, G. Tsudik, Christopher A. Wood
Content-Centric Networking (CCN) is a network architecture for transferring named content from producers to consumers upon request. The name-to-content binding is cryptographically enforced with a digital signature generated by the producer. Thus, content integrity and origin authenticity are core features of CCN. In contrast, content confidentiality and privacy are left to the applications. The typically advocated approach for protecting sensitive content is to use encryption, i.e., restrict access to those who have appropriate decryption key(s). Moreover, content is typically encrypted once for identical requests, meaning that many consumers obtain the same encrypted content. From a privacy perspective, this is a step backwards from the "secure channel" approach in today's IP-based Internet, e.g., TLS or IPSec. In this paper, we assess the privacy pitfalls of this approach, particularly, when the adversary learns some auxiliary information about popularity of certain plaintext content. Merely by observing (or learning) the frequency of requested content, the adversary can learn which encrypted corresponds to which plaintext data. We evaluate this attack using a custom CCN simulator and show that even moderately accurate popularity information suffices for accurate mapping. We also show how the adversary can exploit caches to learn content popularity information. The adversary needs to know the content namespace in order to succeed. Our results show that encryption-based access control is insufficient for privacy in CCN. More extensive counter-measures (such as namespace restrictions and content replication) are needed to mitigate the attack.
内容中心网络(content - centric Networking, CCN)是一种网络体系结构,用于根据要求将命名内容从生产者传输到消费者。名称到内容的绑定是用生产者生成的数字签名加密执行的。因此,内容完整性和来源真实性是CCN的核心特征。相比之下,内容保密性和隐私性留给应用程序。通常提倡的保护敏感内容的方法是使用加密,即限制那些拥有适当解密密钥的人访问。此外,对于相同的请求,内容通常只加密一次,这意味着许多消费者获得相同的加密内容。从隐私的角度来看,这是对当今基于ip的Internet(例如TLS或IPSec)中的“安全通道”方法的倒退。在本文中,我们评估了这种方法的隐私陷阱,特别是当攻击者了解到一些关于某些明文内容流行程度的辅助信息时。仅仅通过观察(或学习)请求内容的频率,攻击者就可以了解哪种加密对应于哪种明文数据。我们使用自定义CCN模拟器评估这种攻击,并表明即使是中等准确的流行度信息也足以进行准确的映射。我们还展示了攻击者如何利用缓存来学习内容流行度信息。攻击者需要知道内容名称空间才能成功。我们的研究结果表明,基于加密的访问控制不足以保护CCN中的隐私。需要更广泛的对策(如名称空间限制和内容复制)来减轻攻击。
{"title":"When encryption is not enough: privacy attacks in content-centric networking","authors":"Cesar Ghali, G. Tsudik, Christopher A. Wood","doi":"10.1145/3125719.3125723","DOIUrl":"https://doi.org/10.1145/3125719.3125723","url":null,"abstract":"Content-Centric Networking (CCN) is a network architecture for transferring named content from producers to consumers upon request. The name-to-content binding is cryptographically enforced with a digital signature generated by the producer. Thus, content integrity and origin authenticity are core features of CCN. In contrast, content confidentiality and privacy are left to the applications. The typically advocated approach for protecting sensitive content is to use encryption, i.e., restrict access to those who have appropriate decryption key(s). Moreover, content is typically encrypted once for identical requests, meaning that many consumers obtain the same encrypted content. From a privacy perspective, this is a step backwards from the \"secure channel\" approach in today's IP-based Internet, e.g., TLS or IPSec. In this paper, we assess the privacy pitfalls of this approach, particularly, when the adversary learns some auxiliary information about popularity of certain plaintext content. Merely by observing (or learning) the frequency of requested content, the adversary can learn which encrypted corresponds to which plaintext data. We evaluate this attack using a custom CCN simulator and show that even moderately accurate popularity information suffices for accurate mapping. We also show how the adversary can exploit caches to learn content popularity information. The adversary needs to know the content namespace in order to succeed. Our results show that encryption-based access control is insufficient for privacy in CCN. More extensive counter-measures (such as namespace restrictions and content replication) are needed to mitigate the attack.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132873791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
ICN personalized global-scale testbed using GTS 使用GTS的ICN个性化全球规模测试平台
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3132095
J. Benedetto, M. Arumaithurai, Xiaoming Fu
The demonstration presented in this document aims to show how to use the GÉANT Testbed Service (GTS) to create personalized global-scale ICN testbeds. The demonstration will illustrate to the audience how to easily define network topologies and deploy ICN experiments based on both NDN and CICN implementations. Additionally, it will show how using GTS in combination with vICN, the orchestration and management service from the CICN project, most of the tasks necessary for an ICN deployments can be automatized, speeding up the configuration of ICN experiments. As use-case scenarios, other than sample applications from NDN and CICN, we will deploy an implementation of the SAID protocol developed from CICN code.
本文档中的演示旨在展示如何使用GÉANT测试平台服务(GTS)来创建个性化的全球规模ICN测试平台。演示将向观众展示如何轻松定义网络拓扑和部署基于NDN和CICN实现的ICN实验。此外,它将展示如何使用GTS与vICN(来自CICN项目的编排和管理服务)相结合,ICN部署所需的大多数任务都可以自动化,从而加快ICN实验的配置。作为用例场景,除了来自NDN和CICN的示例应用程序之外,我们将部署从CICN代码开发的SAID协议的实现。
{"title":"ICN personalized global-scale testbed using GTS","authors":"J. Benedetto, M. Arumaithurai, Xiaoming Fu","doi":"10.1145/3125719.3132095","DOIUrl":"https://doi.org/10.1145/3125719.3132095","url":null,"abstract":"The demonstration presented in this document aims to show how to use the GÉANT Testbed Service (GTS) to create personalized global-scale ICN testbeds. The demonstration will illustrate to the audience how to easily define network topologies and deploy ICN experiments based on both NDN and CICN implementations. Additionally, it will show how using GTS in combination with vICN, the orchestration and management service from the CICN project, most of the tasks necessary for an ICN deployments can be automatized, speeding up the configuration of ICN experiments. As use-case scenarios, other than sample applications from NDN and CICN, we will deploy an implementation of the SAID protocol developed from CICN code.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122640894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Request aggregation: the good, the bad, and the ugly 请求聚合:好的、坏的和丑陋的
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3132110
Gaurav Panwar, R. Tourani, S. Misra, Abderrahmen Mtibaa
Request aggregation is a fundamental feature of named data networking (NDN). This feature aims to improve consumers' quality of experience and reduce network traffic by reducing content retrieval latency and eliminating redundant communication, respectively. However, the negative aspects of request aggregation have not been studied. In this paper, we inspect different facets of request aggregation and introduce one of its harmful behavior, which can create an implicit Denial of Service (iDoS) vulnerability.
请求聚合是命名数据网络(NDN)的一个基本特性。该特性旨在通过减少内容检索延迟和消除冗余通信来提高消费者的体验质量和减少网络流量。然而,请求聚合的负面影响尚未得到研究。在本文中,我们考察了请求聚合的不同方面,并介绍了它的一种有害行为,它可以产生隐式拒绝服务(dos)漏洞。
{"title":"Request aggregation: the good, the bad, and the ugly","authors":"Gaurav Panwar, R. Tourani, S. Misra, Abderrahmen Mtibaa","doi":"10.1145/3125719.3132110","DOIUrl":"https://doi.org/10.1145/3125719.3132110","url":null,"abstract":"Request aggregation is a fundamental feature of named data networking (NDN). This feature aims to improve consumers' quality of experience and reduce network traffic by reducing content retrieval latency and eliminating redundant communication, respectively. However, the negative aspects of request aggregation have not been studied. In this paper, we inspect different facets of request aggregation and introduce one of its harmful behavior, which can create an implicit Denial of Service (iDoS) vulnerability.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133365203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ICN-based edge service deployment in challenged networks 挑战网络中基于icn的边缘业务部署
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3132096
Christos-Alexandros Sarros, Adisorn Lertsinsrubtavee, Carlos Molina-Jiménez, Konstantinos Prasopoulos, Sotirios Diamantopoulos, D. Vardalis, A. Sathiaseelan
In this demo we present a NDN-based approach to deploy dockerised services closer to end-users when the network is impaired. We further increase resiliency, employing DTN to tunnel traffic between intermittently connected NDN nodes.
在这个演示中,我们展示了一种基于ndn的方法,当网络受损时,可以在离最终用户更近的地方部署dockerised服务。我们进一步提高弹性,采用DTN在间歇性连接的NDN节点之间传输隧道流量。
{"title":"ICN-based edge service deployment in challenged networks","authors":"Christos-Alexandros Sarros, Adisorn Lertsinsrubtavee, Carlos Molina-Jiménez, Konstantinos Prasopoulos, Sotirios Diamantopoulos, D. Vardalis, A. Sathiaseelan","doi":"10.1145/3125719.3132096","DOIUrl":"https://doi.org/10.1145/3125719.3132096","url":null,"abstract":"In this demo we present a NDN-based approach to deploy dockerised services closer to end-users when the network is impaired. We further increase resiliency, employing DTN to tunnel traffic between intermittently connected NDN nodes.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122104898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Now@: content sharing application over NDN 现在@:NDN上的内容共享应用
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3132109
Omar Aponte, P. Mendes
Sharing content has become part of our lives; Twitter for instance, is one of the most popular application in this area with millions of users in the entire world. At the same time, in the recent years, Named-Data Networking has become a promising network infrastructure, with continuous growth and collaborating teams that are working on it. In this paper we describe Now@, aiming to increase the impact of NDN near the end user with an Android application that allows them to exchange data based on their interests. To achieve this goal, we have developed Now@ based on synchronization of data. Now@ can operate on top of NFD Android allowing data exchange via wireless Internet and on top of NDN-Opp allowing data to be exchanged even in the presence of intermittent connectivity.
分享内容已经成为我们生活的一部分;例如,Twitter是该领域最受欢迎的应用程序之一,在全世界拥有数百万用户。与此同时,近年来,命名数据网络已经成为一个有前途的网络基础设施,不断增长和协作团队正在为此工作。在本文中,我们描述了Now@,旨在通过Android应用程序增加NDN对最终用户的影响,该应用程序允许他们根据自己的兴趣交换数据。为了实现这一目标,我们开发了基于数据同步的Now@。现在@可以在NFD Android上运行,允许通过无线互联网进行数据交换,也可以在NDN-Opp上运行,即使在间歇性连接的情况下也可以交换数据。
{"title":"Now@: content sharing application over NDN","authors":"Omar Aponte, P. Mendes","doi":"10.1145/3125719.3132109","DOIUrl":"https://doi.org/10.1145/3125719.3132109","url":null,"abstract":"Sharing content has become part of our lives; Twitter for instance, is one of the most popular application in this area with millions of users in the entire world. At the same time, in the recent years, Named-Data Networking has become a promising network infrastructure, with continuous growth and collaborating teams that are working on it. In this paper we describe Now@, aiming to increase the impact of NDN near the end user with an Android application that allows them to exchange data based on their interests. To achieve this goal, we have developed Now@ based on synchronization of data. Now@ can operate on top of NFD Android allowing data exchange via wireless Internet and on top of NDN-Opp allowing data to be exchanged even in the presence of intermittent connectivity.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121228489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A unified data structure of name lookup for NDN data plane 统一的NDN数据平面名称查找数据结构
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3132103
Miaomiao Liu, Tian Song, Yating Yang, Beichuan Zhang
NDN data plane relays name-based packets by maintaining three tables: Content Store, Pending Interest Table and Forwarding Information Base. The three tables require similar but different schemes to be matched and updated in a nearly per-packet fashion, thus individual data structure is required for each table. In this work, we propose a unified data structure of name lookup for all three tables, namely CTrie, aiming at reducing the computational cost from three pipelined lookup rounds down to one unified round. CTrie extends the original Patricia trie to a combinational trie structure built from both component-based and byte-based hierarchical names. We compared CTrie with other approaches in speed and memory. The results show that CTrie runs 3.2 times faster and consumes about 38% memory than the current ones in terms of the whole data plane. CTrie fits for all application scenarios of NDN and especially well for IoT like lightweight-deployed scenarios.
NDN数据平面通过维护三个表(Content Store、Pending Interest Table和Forwarding Information Base)来转发基于名称的报文。这三个表需要以几乎每个数据包的方式匹配和更新相似但不同的模式,因此每个表都需要单独的数据结构。在这项工作中,我们提出了一个统一的名称查找数据结构,即CTrie,旨在将计算成本从三个流水线查找轮询减少到一个统一的轮询。CTrie将原来的Patricia trie扩展为基于组件和基于字节的层次结构名称构建的组合trie结构。我们将CTrie与其他方法在速度和内存方面进行了比较。结果表明,就整个数据平面而言,CTrie的运行速度比当前快3.2倍,消耗的内存约为38%。CTrie适用于NDN的所有应用场景,尤其适用于物联网(如轻量部署场景)。
{"title":"A unified data structure of name lookup for NDN data plane","authors":"Miaomiao Liu, Tian Song, Yating Yang, Beichuan Zhang","doi":"10.1145/3125719.3132103","DOIUrl":"https://doi.org/10.1145/3125719.3132103","url":null,"abstract":"NDN data plane relays name-based packets by maintaining three tables: Content Store, Pending Interest Table and Forwarding Information Base. The three tables require similar but different schemes to be matched and updated in a nearly per-packet fashion, thus individual data structure is required for each table. In this work, we propose a unified data structure of name lookup for all three tables, namely CTrie, aiming at reducing the computational cost from three pipelined lookup rounds down to one unified round. CTrie extends the original Patricia trie to a combinational trie structure built from both component-based and byte-based hierarchical names. We compared CTrie with other approaches in speed and memory. The results show that CTrie runs 3.2 times faster and consumes about 38% memory than the current ones in terms of the whole data plane. CTrie fits for all application scenarios of NDN and especially well for IoT like lightweight-deployed scenarios.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126980775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Virtualized ICN (vICN): towards a unified network virtualization framework for ICN experimentation 虚拟化ICN (vICN):为ICN实验提供统一的网络虚拟化框架
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3125726
M. Sardara, L. Muscariello, J. Augé, Marcel Enguehard, Alberto Compagno, G. Carofiglio
To assess the feasibility and potential for deployment of new networking paradigms such as ICN, being able to carry out large scale experimentation and tests in real operational networks is crucial. Various platforms have been developed by the research community to support design and evaluation of specific aspects of ICN architecture. Most of them provide ICN-dedicated, small scale or application-specific environments and ad-hoc testing tools, non reusable in other contexts nor in real-world IP deployments. The goal of this paper is to contribute vICN (virtualized ICN), a unified open-source framework for network configuration and management that uses recent progresses in resource isolation and virtualization techniques. It offers a single, flexible and scalable platform to serve different purposes, ranging from reproducible large-scale research experimentation, to demonstrations with emulated and/or physical devices and network resources and to real deployments of ICN in existing IP networks. In the paper, we describe the rationale for vICN and its components, highlighting programmability, scalability and reliability as its core principles. Illustration of vICN properties is provided through concrete examples.
为了评估部署ICN等新网络范例的可行性和潜力,能够在实际运营网络中进行大规模实验和测试至关重要。研究团体已经开发了各种平台来支持ICN架构的特定方面的设计和评估。它们中的大多数提供专用于icn的小规模或特定于应用程序的环境和临时测试工具,这些工具在其他上下文或实际IP部署中都不可重用。本文的目标是贡献vICN(虚拟化ICN),这是一个统一的开源框架,用于网络配置和管理,它使用了资源隔离和虚拟化技术的最新进展。它提供了一个单一的、灵活的和可扩展的平台,以服务于不同的目的,从可重复的大规模研究实验,到模拟和/或物理设备和网络资源的演示,以及在现有IP网络中实际部署ICN。在本文中,我们描述了vICN及其组件的基本原理,强调可编程性,可扩展性和可靠性是其核心原则。通过具体实例说明了vICN的性质。
{"title":"Virtualized ICN (vICN): towards a unified network virtualization framework for ICN experimentation","authors":"M. Sardara, L. Muscariello, J. Augé, Marcel Enguehard, Alberto Compagno, G. Carofiglio","doi":"10.1145/3125719.3125726","DOIUrl":"https://doi.org/10.1145/3125719.3125726","url":null,"abstract":"To assess the feasibility and potential for deployment of new networking paradigms such as ICN, being able to carry out large scale experimentation and tests in real operational networks is crucial. Various platforms have been developed by the research community to support design and evaluation of specific aspects of ICN architecture. Most of them provide ICN-dedicated, small scale or application-specific environments and ad-hoc testing tools, non reusable in other contexts nor in real-world IP deployments. The goal of this paper is to contribute vICN (virtualized ICN), a unified open-source framework for network configuration and management that uses recent progresses in resource isolation and virtualization techniques. It offers a single, flexible and scalable platform to serve different purposes, ranging from reproducible large-scale research experimentation, to demonstrations with emulated and/or physical devices and network resources and to real deployments of ICN in existing IP networks. In the paper, we describe the rationale for vICN and its components, highlighting programmability, scalability and reliability as its core principles. Illustration of vICN properties is provided through concrete examples.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127399377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
NDN-trace: a path tracing utility for named data networking NDN-trace:用于命名数据网络的路径跟踪工具
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3125738
S. Khoussi, Davide Pesavento, L. Benmohamed, A. Battou
In this paper we propose NDN-Trace, a path tracing utility to determine the characteristics of the available paths to reach a given name prefix in NDN-based networks. While the traceroute tool in IP networks is based on an iterative process, with each iteration incrementally traversing more hops along the path to the target, we adopt a non-iterative approach, with the tracing process done at the application layer. Our design supports multi-path tracing that can be used to trace paths to NDN forwarding nodes, applications, or content store caches, while providing path information (node identifiers and round-trip times), as well as optional metrics such as those related to content stores. NDN-Trace leverages NDN's native Interest/Data exchange and does not require changes to NDN forwarding. We present a C++ implementation of our design, and show experimental results that demonstrate its capabilities. We also discuss open issues and future work, including an approach to implement path tracing within the NDN forwarder itself.
在本文中,我们提出了NDN-Trace,一个路径跟踪工具,用于确定在基于ndn的网络中到达给定名称前缀的可用路径的特征。IP网络中的traceroute工具是基于迭代过程的,每次迭代都会沿着到达目标的路径增量地遍历更多的跃点,而我们采用非迭代方法,在应用层完成跟踪过程。我们的设计支持多路径跟踪,可用于跟踪到NDN转发节点、应用程序或内容存储缓存的路径,同时提供路径信息(节点标识符和往返时间),以及与内容存储相关的可选指标。NDN- trace利用NDN的本地兴趣/数据交换,不需要更改NDN转发。我们给出了我们的设计的c++实现,并给出了实验结果来证明它的功能。我们还讨论了开放的问题和未来的工作,包括在NDN转发器本身内实现路径跟踪的方法。
{"title":"NDN-trace: a path tracing utility for named data networking","authors":"S. Khoussi, Davide Pesavento, L. Benmohamed, A. Battou","doi":"10.1145/3125719.3125738","DOIUrl":"https://doi.org/10.1145/3125719.3125738","url":null,"abstract":"In this paper we propose NDN-Trace, a path tracing utility to determine the characteristics of the available paths to reach a given name prefix in NDN-based networks. While the traceroute tool in IP networks is based on an iterative process, with each iteration incrementally traversing more hops along the path to the target, we adopt a non-iterative approach, with the tracing process done at the application layer. Our design supports multi-path tracing that can be used to trace paths to NDN forwarding nodes, applications, or content store caches, while providing path information (node identifiers and round-trip times), as well as optional metrics such as those related to content stores. NDN-Trace leverages NDN's native Interest/Data exchange and does not require changes to NDN forwarding. We present a C++ implementation of our design, and show experimental results that demonstrate its capabilities. We also discuss open issues and future work, including an approach to implement path tracing within the NDN forwarder itself.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121999941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Schematized access control for data cubes and trees 数据集和树的schem化访问控制
Pub Date : 2017-09-26 DOI: 10.1145/3125719.3125736
Claudio Marxer, C. Tschudin
In classic ICN where delivery of named data cannot be guarded, access control is usually implemented by first encrypting the data and secondly by providing the corresponding data encryption keys (DEKs) to authorized users only: Authorized users will obtain DEKs in encrypted form, wrapped with their public key. This approach has three shortcomings which we address in this paper. (a) Key management is tedious if it has to be done on a per-principle basis, (b) access granularity for single documents should be extended to document collections (e.g. namespace sub-trees) and data cubes (sub-elements within data records), (c) there needs to be support for access right propagation across data aggregation and derivation chains.
在经典的ICN中,命名数据的传递不能被保护,通常通过首先加密数据,然后仅向授权用户提供相应的数据加密密钥(dek)来实现访问控制:授权用户将以加密形式获得dek,并将其与公钥一起包装。这种方法有三个缺点,我们在本文中加以解决。(a)如果必须按原则进行密钥管理,则密钥管理是乏味的;(b)单个文档的访问粒度应扩展到文档集合(例如名称空间子树)和数据立方体(数据记录中的子元素);(c)需要支持跨数据聚合和派生链的访问权限传播。
{"title":"Schematized access control for data cubes and trees","authors":"Claudio Marxer, C. Tschudin","doi":"10.1145/3125719.3125736","DOIUrl":"https://doi.org/10.1145/3125719.3125736","url":null,"abstract":"In classic ICN where delivery of named data cannot be guarded, access control is usually implemented by first encrypting the data and secondly by providing the corresponding data encryption keys (DEKs) to authorized users only: Authorized users will obtain DEKs in encrypted form, wrapped with their public key. This approach has three shortcomings which we address in this paper. (a) Key management is tedious if it has to be done on a per-principle basis, (b) access granularity for single documents should be extended to document collections (e.g. namespace sub-trees) and data cubes (sub-elements within data records), (c) there needs to be support for access right propagation across data aggregation and derivation chains.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125115192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
Proceedings of the 4th ACM Conference on Information-Centric Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1