854 research outputs found
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions
In recent years, the current Internet has experienced an unexpected paradigm
shift in the usage model, which has pushed researchers towards the design of
the Information-Centric Networking (ICN) paradigm as a possible replacement of
the existing architecture. Even though both Academia and Industry have
investigated the feasibility and effectiveness of ICN, achieving the complete
replacement of the Internet Protocol (IP) is a challenging task.
Some research groups have already addressed the coexistence by designing
their own architectures, but none of those is the final solution to move
towards the future Internet considering the unaltered state of the networking.
To design such architecture, the research community needs now a comprehensive
overview of the existing solutions that have so far addressed the coexistence.
The purpose of this paper is to reach this goal by providing the first
comprehensive survey and classification of the coexistence architectures
according to their features (i.e., deployment approach, deployment scenarios,
addressed coexistence requirements and architecture or technology used) and
evaluation parameters (i.e., challenges emerging during the deployment and the
runtime behaviour of an architecture). We believe that this paper will finally
fill the gap required for moving towards the design of the final coexistence
architecture.Comment: 23 pages, 16 figures, 3 table
Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking
Information-centric networking proposals attract much attention in the
ongoing search for a future communication paradigm of the Internet. Replacing
the host-to-host connectivity by a data-oriented publish/subscribe service
eases content distribution and authentication by concept, while eliminating
threats from unwanted traffic at an end host as are common in today's Internet.
However, current approaches to content routing heavily rely on data-driven
protocol events and thereby introduce a strong coupling of the control to the
data plane in the underlying routing infrastructure. In this paper, threats to
the stability and security of the content distribution system are analyzed in
theory and practical experiments. We derive relations between state resources
and the performance of routers and demonstrate how this coupling can be misused
in practice. We discuss new attack vectors present in its current state of
development, as well as possibilities and limitations to mitigate them.Comment: 15 page
Network layer solutions for a content-centric internet
Nowadays most people exploit the Internet to get contents such as web pages, music or video files. These users only value “what” they download and are not interested about “where” content is actually stored. The IP layer does the opposite and cares about the “where” and not about the “what”. This contrast between the actual usage of the Internet and the service offered by the IP layer is deemed to be the source of several problems concerning usability, performance, security and mobility issues. To overcome this contrast, research on the Future Internet is exploring novel so-called content-centric architectures, where the network layer directly provides users with contents, instead of providing communication channels between hosts. In this paper, we identify the main functionalities of a content-centric network (CONET), we discuss pros and cons of literature proposals for an innovative, content-centric network layer and we draw our conclusions, stating some general requirements that, in our opinion, a CONET should satisfy
HoPP: Robust and Resilient Publish-Subscribe for an Information-Centric Internet of Things
This paper revisits NDN deployment in the IoT with a special focus on the
interaction of sensors and actuators. Such scenarios require high
responsiveness and limited control state at the constrained nodes. We argue
that the NDN request-response pattern which prevents data push is vital for IoT
networks. We contribute HoP-and-Pull (HoPP), a robust publish-subscribe scheme
for typical IoT scenarios that targets IoT networks consisting of hundreds of
resource constrained devices at intermittent connectivity. Our approach limits
the FIB tables to a minimum and naturally supports mobility, temporary network
partitioning, data aggregation and near real-time reactivity. We experimentally
evaluate the protocol in a real-world deployment using the IoT-Lab testbed with
varying numbers of constrained devices, each wirelessly interconnected via IEEE
802.15.4 LowPANs. Implementations are built on CCN-lite with RIOT and support
experiments using various single- and multi-hop scenarios
Securing Information-Centric Networking without negating Middleboxes
Information-Centric Networking is a promising networking paradigm that
overcomes many of the limitations of current networking architectures. Various
research efforts investigate solutions for securing ICN. Nevertheless, most of
these solutions relax security requirements in favor of network performance. In
particular, they weaken end-user privacy and the architecture's tolerance to
security breaches in order to support middleboxes that offer services such as
caching and content replication. In this paper, we adapt TLS, a widely used
security standard, to an ICN context. We design solutions that allow session
reuse and migration among multiple stakeholders and we propose an extension
that allows authorized middleboxes to lawfully and transparently intercept
secured communications.Comment: 8th IFIP International Conference on New Technologies, Mobility &
Security, IFIP, 201
Experiments with Subversion Over OpenNetInf and CCNx
We describe experiences and insights from adapting the Subversion version control system to use the network service of two information-centric networking (ICN) prototypes: OpenNetInf and CCNx. The evaluation is done using a local collaboration scenario, common in our own project work where a group of people meet and share documents through a Subversion repository.
The measurements show a performance benefit already with two clients in some of the studied scenarios, despite being done on un-optimised research prototypes. The conclusion is that ICN clearly is beneficial also for non mass-distribution applications
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey
Internet usage has changed from its first design. Hence, the current Internet
must cope with some limitations, including performance degradation,
availability of IP addresses, and multiple security and privacy issues.
Nevertheless, to unsettle the current Internet's network layer i.e., Internet
Protocol with ICN is a challenging, expensive task. It also requires worldwide
coordination among Internet Service Providers , backbone, and Autonomous
Services. Additionally, history showed that technology changes e.g., from 3G to
4G, from IPv4 to IPv6 are not immediate, and usually, the replacement includes
a long coexistence period between the old and new technology. Similarly, we
believe that the process of replacement of the current Internet will surely
transition through the coexistence of IP and ICN. Although the tremendous
amount of security and privacy issues of the current Internet taught us the
importance of securely designing the architectures, only a few of the proposed
architectures place the security-by-design. Therefore, this article aims to
provide the first comprehensive Security and Privacy analysis of the
state-of-the-art coexistence architectures. Additionally, it yields a
horizontal comparison of security and privacy among three deployment approaches
of IP and ICN protocol i.e., overlay, underlay, and hybrid and a vertical
comparison among ten considered security and privacy features. As a result of
our analysis, emerges that most of the architectures utterly fail to provide
several SP features including data and traffic flow confidentiality,
availability and communication anonymity. We believe this article draws a
picture of the secure combination of current and future protocol stacks during
the coexistence phase that the Internet will definitely walk across
Incrementando as redes centradas à informaçãopara uma internet das coisas baseada em nomes
The way we use the Internet has been evolving since its origins. Nowadays,
users are more interested in accessing contents and services with high demands
in terms of bandwidth, security and mobility. This evolution has triggered
the emergence of novel networking architectures targeting current, as
well as future, utilisation demands. Information-Centric Networking (ICN) is a
prominent example of these novel architectures that moves away from the current
host-centric communications and centres its networking functions around
content.
Parallel to this, new utilisation scenarios in which smart devices interact with
one another, as well as with other networked elements, have emerged to constitute
what we know as the Internet of Things (IoT). IoT is expected to have
a significant impact on both the economy and society. However, fostering the
widespread adoption of IoT requires many challenges to be overcome. Despite
recent developments, several issues concerning the deployment of IPbased
IoT solutions on a large scale are still open.
The fact that IoT is focused on data and information rather than on point-topoint
communications suggests the adoption of solutions relying on ICN architectures.
In this context, this work explores the ground concepts of ICN
to develop a comprehensive vision of the principal requirements that should
be met by an IoT-oriented ICN architecture. This vision is complemented with
solutions to fundamental issues for the adoption of an ICN-based IoT. First,
to ensure the freshness of the information while retaining the advantages of
ICN’s in-network caching mechanisms. Second, to enable discovery functionalities
in both local and large-scale domains. The proposed mechanisms are
evaluated through both simulation and prototyping approaches, with results
showcasing the feasibility of their adoption. Moreover, the outcomes of this
work contribute to the development of new compelling concepts towards a
full-fledged Named Network of Things.A forma como usamos a Internet tem vindo a evoluir desde a sua criação.
Atualmente, os utilizadores estão mais interessados em aceder a conteúdos
e serviços, com elevados requisitos em termos de largura de banda, segurança
e mobilidade. Esta evolução desencadeou o desenvolvimento de novas
arquiteturas de rede, visando os atuais, bem como os futuros, requisitos de
utilização. As Redes Centradas à Informação (Information-Centric Networking
- ICN) são um exemplo proeminente destas novas arquiteturas que, em vez
de seguirem um modelo de comunicação centrado nos dispositivos terminais,
centram as suas funções de rede em torno do próprio conteúdo.
Paralelamente, novos cenários de utilização onde dispositivos inteligentes interagem
entre si, e com outros elementos de rede, têm vindo a aparecer e
constituem o que hoje conhecemos como a Internet das Coisas (Internet of
Things - IoT ). É esperado que a IoT tenha um impacto significativo na economia
e na sociedade. No entanto, promover a adoção em massa da IoT ainda
requer que muitos desafios sejam superados. Apesar dos desenvolvimentos
recentes, vários problemas relacionados com a adoção em larga escala de
soluções de IoT baseadas no protocolo IP estão em aberto.
O facto da IoT estar focada em dados e informação, em vez de comunicações
ponto-a-ponto, sugere a adoção de soluções baseadas em arquiteturas
ICN. Neste sentido, este trabalho explora os conceitos base destas soluções
para desenvolver uma visão completa dos principais requisitos que devem ser
satisfeitos por uma solução IoT baseada na arquitetura de rede ICN. Esta visão
é complementada com soluções para problemas cruciais para a adoção
de uma IoT baseada em ICN. Em primeiro lugar, assegurar que a informação
seja atualizada e, ao mesmo tempo, manter as vantagens do armazenamento
intrínseco em elementos de rede das arquiteturas ICN. Em segundo lugar,
permitir as funcionalidades de descoberta não só em domínios locais, mas
também em domínios de larga-escala. Os mecanismos propostos são avaliados
através de simulações e prototipagem, com os resultados a demonstrarem
a viabilidade da sua adoção. Para além disso, os resultados deste
trabalho contribuem para o desenvolvimento de conceitos sólidos em direção
a uma verdadeira Internet das Coisas baseada em Nomes.Programa Doutoral em Telecomunicaçõe
- …