Browse > Article
http://dx.doi.org/10.9709/JKSS.2017.26.1.021

A novel architecture of CCN for better security and applicability  

Sharma, Aashis (Ncell Pvt. Ltd.)
Kim, Yun Seon (Handong Global University, Graduate School of Global Development & Entrepreneurship)
Abstract
Information Centric Networking is changing the way how content is being transmitted. The shift from IP and host based networking towards content based networking scenario is growing day by day. Many researches have been done about different frameworks of ICN. Caching is an important part of ICN and many researchers have also proposed different ways for caching the data. With caching of data in intermediate devices like the network devices as well the user devices in some cases, the issue of content security as well as the role of the content producer becomes a major concern. A modified ICN architecture based on the current Content Centric Networking (CCN) model is presented in the paper. The architecture mainly focuses on involving the content producer in content delivery in the real time. The proposed architecture provides better security aspects for the CCN architecture. Apart from security the paper will also consider the issue of applicability of CCN architecture to replace the TCP/IP based architecture. The efficiency of the proposed architecture is compared with the previous CCN architecture based on the response time for a content delivery which shows very comparable level of efficiency. The paper than analyzes different beneficial aspects of the proposed architecture over the current architecture.
Keywords
Information Centric Networking; Content Centric Networking; security; applicability; content producer;
Citations & Related Records
연도 인용수 순위
  • Reference
1 "IRTF Information-Centric Networking Research Group (ICNRG)". Irtf.org. N.p., 2016. Web. 17 Aug. 2016.
2 Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., & Braynard, R. L. (2009, December). Networking named content. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (pp. 1-12). ACM.
3 Sourlas, V., Flegkas, P., & Tassiulas, L. (2014). A novel cache aware routing scheme for Information-Centric Networks. Computer Networks, 59, 44-61. http://dx.doi.org/10.1016/j.bjp.2013.12.002   DOI
4 Trossen, D., Sarela, M., & Sollins, K. (2010). Arguments for an information-centric internetworking architecture. ACM SIGCOMM Computer Communication Review, 40(2), 26-33   DOI
5 Rexford, J., & Dovrolis, C. (2010). Future Internet architecture: clean-slate versus evolutionary research. Communications of the ACM, 53(9), 36-40.   DOI
6 Cheriton, D. R., & Gritter, M. (2000). TRIAD: A new next-generation Internet architecture.
7 Baccala, B. (2002). Data Oriented Networking.
8 Arianfar, S., Nikander, P., & Ott, J. (2010, June). Packet-level caching for information-centric networking. In ACM SIGCOMM, ReArch Workshop.
9 Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., & Braynard, R. L. (2009, December). Networking named content. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (pp. 1-12). ACM.?
10 Koponen, T., Chawla, M., Chun, B. G., Ermolinskiy, A., Kim, K. H., Shenker, S., & Stoica, I. (2007, August). A data-oriented (and beyond) network architecture. In ACM SIGCOMM Computer Communication Review (Vol. 37, No. 4, pp. 181-192). ACM.?   DOI
11 Ahlgren, B., D'ambrosio, M., Dannewitz, C., Eriksson, A., Golic, J., Gr?nvall, B., ... & M?kel?, J. (2010). Second netinf architecture description. 4WARD EU FP7 Project, Deliverable D-6.2 v2. 0.
12 Adamic, L. A., & Huberman, B. A. (2002). Zipf's law and the Internet. Glottometrics, 3(1), 143-150.
13 Sugiyama, K., Hatano, K., & Yoshikawa, M. (2004, May). Adaptive web search based on user profile constructed without any effort from users. In Proceedings of the 13th international conference on World Wide Web (pp. 675-684). ACM.
14 Kaushik, P. (2016). Tomorrow's Internet: A World of Hyper-Personalized Tribes?. WIRED. Retrieved 4 September 2016, from https://www.wired.com/insights/2014/03/todays-internet-world-hyperpersonalized-tribes/
15 Hu, Y. Performance-based Pricing Models in Online Advertising. SSRN Electronic Journal. http://dx.doi.org/10.2139/ssrn.501082   DOI
16 CCNx$\mid$PARC's implementation of content-centric networking. (2016). Ccnx.org. Retrieved 30 June 2016, from http://www.ccnx.org/
17 Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., & Wilcox, J. (2011, November). Information-centric networking: seeing the forest for the trees. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks (p. 1). ACM.
18 Afanasyev, A., Moiseenko, I., & Zhang, L. (2012). ndnSIM: NDN simulator for NS-3. University of California, Los Angeles, Tech. Rep.
19 Chiocchetti, R., Rossi, D., & Rossini, G. (2013, June). ccnsim: An highly scalable ccn simulator. In 2013 IEEE International Conference on Communications (ICC) (pp. 2309-2314). IEEE..
20 Nikolaos Vastardis Personal Webpage. (2016). Privateessex.ac.uk. Retrieved 30 June 2016, from http://privatewww.essex.ac.uk/-nvasta/ICNSim.htm
21 Rossi, D., & Rossini, G. (2011). Caching performance of content centric networks under multi-path routing (and more). Relat?rio t?cnico, Telecom ParisTech.
22 Rossini, G. & Rossi, D. (2013). Evaluating CCN multi-path interest forwarding strategies. Computer Communications, 36(7), 771-778. http://dx.doi.org/10.1016/j.comcom.2013.01.008   DOI
23 Conti, M., Gasti, P., & Teoli, M. (2013). A lightweight mechanism for detection of cache pollution attacks in Named Data Networking. Computer Networks, 57(16), 3178-3191.   DOI
24 Udugama, A. (2015). Enhanced Forwarding Strategies in Information Centric Networking (Doctoral dissertation, Faculty of Physics and Electrical Engineering, University of Bremen).
25 Arianfar, S., Nikander, P., & Ott, J. (2010, November). On content-centric router design and implications. In Proceedings of the Re-Architecting the Internet Workshop (p. 5). ACM.
26 Ahlgren, B., Dannewitz, C., Imbrenda, C., Kutscher, D., & Ohlman, B. (2012). A survey of informationcentric networking. IEEE Communications Magazine, 50(7), 26-36.   DOI
27 Lagutin, D., Visala, K., & Tarkoma, S. (2010). Publish/Subscribe for Internet: PSIRP Perspective. Future internet assembly, 84.
28 Ain, M., Trossen, D., Nikander, P., Tarkoma, S., Visala, K., Rimey, K., ... & Kj?llman, J. (2009). D2. 3-architecture definition, component descriptions, and requirements. Deliverable, PSIRP 7th FP EUfunded project.
29 Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., & Braynard, R. L. (2009, December). Networking named content. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (pp. 1-12). ACM.
30 Tourani, R., Mick, T., Misra, S., & Panwar, G. (2016). Security, Privacy, and Access Control in Information-Centric Networking: A Survey. arXiv preprint arXiv:1603.03409.
31 Akhshabi, S., & Dovrolis, C. (2013). The evolution of layered protocol stacks leads to an hourglassshaped architecture. In Dynamics On and Of Complex Networks, Volume 2 (pp. 55-88). Springer New York.
32 Vasilakos, A., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal Of Network And Computer Applications, 52, 1-10. http://dx.doi.org/10.1016/j.jnca.2015.02.001   DOI
33 Almeida, F. L. F., & Louren?o, J. M. (2012). Information centric networks-design issues, principles and approaches. International Journal of Latest Trends in Computing, 3(3). ?
34 Zhang, X., Chang, K., Xiong, H., Wen, Y., Shi, G., & Wang, G. (2011, October). Towards name-based trust and security for content-centric network. In 2011 19th IEEE International Conference on Network Protocols (pp. 1-6). IEEE.
35 Rossini D, Rossi D. A dive into the caching performance of content centric networking. Technical report, Telecom ParisTech; 2011.
36 Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H. Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications, ser. SIGCOMM '01; 2001.
37 Misra, S., Tourani, R., & Majd, N. E. (2013, August). Secure content delivery in informationcentric networks: Design, implementation, and analyses. In Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking (pp. 73-78). ACM.
38 Lauinger, T., Laoutaris, N., Rodriguez, P., Strufe, T., Biersack, E., & Kirda, E. (2012). Privacy implications of ubiquitous caching in named data networking architectures. Technical report, TRiSecLab-0812-001, iSecLab.
39 Muscariello, L., Carofiglio, G., & Gallo, M. (2011, August). Bandwidth and storage sharing performance in information centric networking. In Proceedings of the ACM SIGCOMM workshop on Informationcentric networking (pp. 26-31). ACM.
40 Udugama, A. (2015). Enhanced Forwarding Strategies in Information Centric Networking (Pd.D). University of Bremen.