195 research outputs found

    On Constructing Persistent Identifiers with Persistent Resolution Targets

    Get PDF
    Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintenance-free PIDs using content-centric network technology and overlay networks. For proving the validity of the presented approach, the Handle PID System is used in conjunction with Magnet Link access information encoding, state-of-the-art decentralized data distribution with BitTorrent, and Named Data Networking (NDN) as location-independent data access technology for networks. Contrasting existing approaches, no green-field implementation of PID or major modifications of the Handle System is required to enable location-independent data dissemination with maintenance-free PIDs.Comment: Published IEEE paper of the FedCSIS 2016 (SoFAST-WS'16) conference, 11.-14. September 2016, Gdansk, Poland. Also available online: http://ieeexplore.ieee.org/document/7733372

    Securing the Internet of Things Communication Using Named Data Networking Approaches

    Get PDF
    The rapid advancement in sensors and their use in devices has led to the drastic increase of Internet-of-Things (IoT) device applications and usage. A fundamental requirement of an IoT-enabled ecosystem is the device’s ability to communicate with other devices, humans etc. IoT devices are usually highly resource constrained and come with varying capabilities and features. Hence, a host-based communication approach defined by the TCP/IP architecture relying on securing the communication channel between the hosts displays drawbacks especially when working in a highly chaotic environment (common with IoT applications). The discrepancies between requirements of the application and the network supporting the communication demands for a fundamental change in securing the communication in IoT applications. This research along with identifying the fundamental security problems in IoT device lifecycle in the context of secure communication also explores the use of a data-centric approach advocated by a modern architecture called Named Data Networking (NDN). The use of NDN modifies the basis of communication and security by defining data-centric security where the data chunks are secured directly and retrieved using specialized requests in a pull-based approach. This work also identifies the advantages of using semantically-rich names as the basis for IoT communication in the current client-driven environment and reinforces it with best-practices from the existing host-based approaches for such networks. We present in this thesis a number of solutions built to automate and securely onboard IoT devices; encryption, decryption and access control solutions based on semantically rich names and attribute-based schemes. We also provide the design details of solutions to sup- port trustworthy and conditionally private communication among highly resource constrained devices through specialized signing techniques and automated certificate generation and distribution with minimal use of the network resources. We also explore the design solutions for rapid trust establishment and vertically securing communication in applications including smart-grid operations and vehicular communication along with automated and lightweight certificate generation and management techniques. Through all these design details and exploration, we identify the applicability of the data-centric security techniques presented by NDN in securing IoT communication and address the shortcoming of the existing approaches in this area

    Digital Signature Security in Data Communication

    Full text link
    Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack from irresponsible parties are using steganography, cryptography or also use digital signatures. Digital signatures could be one of solution where the authenticity of the message will be verified to prove that the received message is the original message without any change, Ong-Schnorr-Shamir is the algorithm are used in this research and the experiment are perform on the digital signature scheme and the hidden channel scheme.Comment: 6 pages, Paper presented at the International Conference on Education and Technology (ICEduTech2017), Novotel Hotel, Balikpapan, Indonesi

    Networking Group Content: RESTful Multiparty Access to a Data-centric Web of Things

    Full text link
    Content replication to many destinations is a common use case in the Internet of Things (IoT). The deployment of IP multicast has proven inefficient, though, due to its lack of layer-2 support by common IoT radio technologies and its synchronous end-to-end transmission, which is highly susceptible to interference. Information-centric networking (ICN) introduced hop-wise multi-party dissemination of cacheable content, which has proven valuable in particular for low-power lossy networking regimes. Even NDN, however, the most prominent ICN protocol, suffers from a lack of deployment. In this paper, we explore how multiparty content distribution in an information-centric Web of Things (WoT) can be built on CoAP. We augment the CoAP proxy by request aggregation and response replication functions, which together with proxy caches enable asynchronous group communication. In a further step, we integrate content object security with OSCORE into the CoAP multicast proxy system, which enables ubiquitous caching of certified authentic content. In our evaluation, we compare NDN with different deployment models of CoAP, including our data-centric approach in realistic testbed experiments. Our findings indicate that multiparty content distribution based on CoAP proxies performs equally well as NDN, while remaining fully compatible with the established IoT protocol world of CoAP on the Internet

    Conhecimento da mobilidade do consumidor em redes centradas em informação

    Get PDF
    Mobile data traffic is expanding significantly since the surge and evolution of wireless communication technologies, leading to the design and implementation of different types of mobile networks. Information Centric Network paradigms have been pointed as an alternative to bypass the restrictions imposed by the traditional IP Networks, such as the one imposed by the mobility of its users. Despite their potential advantages regarding mobile wireless environments, several significant research challenges remain to be addressed, more specifically the communication damage due to handover, causing loss of packets. The scope of this dissertation is the development of NDN-based mechanisms with support for Consumer mobility in two different communication approaches: single content request and publish-subscribe. The proposed schemes address a remote mobility predictor entity, whose purpose is to monitor and anticipate trajectories, while compelling the infrastructure to adjust to the new paths, resulting in an efficient way to manage the consumers’ mobility with the purpose of attaining a better quality of service to users. The implementation and evaluation of the proposed schemes were performed using ndnSIM, through functional and non-functional scenarios. The latter uses real traces of urban mobility and connectivity. The obtained results show that the proposed solution far surpasses the native NDN workflow and the traditional publish-subscribe solutions with respect to content delivery ratio and network overhead.O tráfego de dados móveis tem vindo a crescer significativamente, sobretudo devido à evolução das tecnologias de comunicação sem fios, o que tem vindo a implicar o desenho e implementação de novos e diferentes tipos de redes móveis. Os paradigmas de redes centradas em informação têm sido apontados como uma alternativa para contornar as restrições impostas pelas redes tradicionais IP, nomeadamente a mobilidade dos seus utilizadores. Apesar das potenciais vantagens em relação aos ambientes móveis sem fios, vários desafios de investigação ainda necessitam de ser resolvidos, mais especificamente aqueles relacionados com o processo de handover dos seus utilizadores móveis, levando por vezes à perda de informação. Esta dissertação tem como objetivo o desenvolvimento de mecanismos de suporte à mobilidade do Consumidor para redes ICN, utilizando duas abordagens distintas de comunicação: solicitação única de conteúdo e o modelo publish − subscribe. Os esquemas propostos exploram uma entidade remota de previsão de mobilidade, cujo objetivo é monitorizar e antecipar eventuais trajetórias de posição dos utilizadores móveis, obrigando a infraestrutura a ajustar-se aos novos caminhos do consumidor, resultando numa forma eficiente de gestão de mobilidade dos utilizadores com o objetivo de garantir uma melhor qualidade de serviço. A implementação e avaliação dos esquemas propostos foi realizada utilizando o ndnSIM, em cenários funcionais e não funcionais. Estes últimos utilizam registos reais de mobilidade e conetividade urbana. Os resultados obtidos mostram que a solução proposta ultrapassa significativamenta a versão nativa do NDN e as soluções tradicionais de publish − subscribe, considerando a taxa de entrega de conteúdos e sobrecarga da rede.Mestrado em Engenharia de Computadores e Telemátic

    Recent advances in information-centric networking based internet of things (ICN-IoT)

    Get PDF
    Information-Centric Networking (ICN) is being realized as a promising approach to accomplish the shortcomings of current IP-address based networking. ICN models are based on naming the content to get rid of address-space scarcity, accessing the content via name-based-routing, caching the content at intermediate nodes to provide reliable, efficient data delivery and self-certifying contents to ensure better security. Obvious benefits of ICN in terms of fast and efficient data delivery and improved reliability raises ICN as highly promising networking model for Internet of Things (IoTs) like environments. IoT aims to connect anyone and/or anything at any time by any path on any place. From last decade, IoTs attracts both industry and research communities. IoTs is an emerging research field and still in its infancy. Thus, this paper presents the potential of ICN for IoTs by providing state-of-the-art literature survey. We discuss briefly the feasibility of ICN features and their models (and architectures) in the context of IoT. Subsequently, we present a comprehensive survey on ICN based caching, naming, security and mobility approaches for IoTs with appropriate classification. Furthermore, we present operating systems (OS) and simulation tools for ICN-IoT. Finally, we provide important research challenges and issues faced by ICN for IoTs

    Encaminhamento baseado no contexto em ICNs móveis

    Get PDF
    Over the last couple of decades, vehicular ad hoc networks (VANETs) have been at the forefront of research, yet still are afflicted by high network fragmentation, due to their continuous node mobility and geographical dispersion. To address these concerns, a new paradigm was proposed - Information-Centric Networks(ICN), whose focus is the delivery of Content based on names, being ideal to attend to high latency environments. However, the main proposed solutions for content delivery in ICNs do not take into account the type of content nor the various available communication interfaces in each point of the network, a factor which can be deciding in mobile networks. The scope of this dissertation lies on the use of ICNs concepts for the delivery of both urgent and non-urgent information in urban mobile environments. In order to do so, a context-based forwarding strategy was proposed, with a very clear goal: to take advantage of both packet names and Data, and node's neighborhood analysis in order to successfully deliver content into the network in the shortest period of time, and without worsening network congestion. The design, implementation and validation of the proposed strategy was performed using the ndnSIM platform simulator along with real mobility traces from communication infrastructure of the Porto city. The results show that the proposed context-based forwarding strategy for mobile ICN presents a clear improvement in performance in terms of delivery, while maintaining network overhead at a constant. Furthermore, by means of better pathing and through cooperation with caching mechanisms, lower transmission delays can be attained.Nas últimas décadas, as redes veiculares ad hoc (VANETs) estiveram na vanguarda da pesquisa, mas continuam a ser afetadas por alta fragmentação na rede, devido à mobilidade contínua dos nós e a sua dispersão geográfica. Para abordar estes problemas, um novo paradigma foi proposto - Redes Centradas na Informação (ICN), cujo foco é a entrega de Conteúdo com base em nomes, sendo ideal para atender ambientes de alta latência. No entanto, as principais soluções propostas para entrega de conteúdo em ICNs não têm em conta o tipo de conteúdo nem as várias interfaces de comunicação disponíveis em cada ponto da rede, fator que pode ser determinante em redes móveis. O objetivo desta dissertação reside no uso dos conceitos de ICNs para a entrega de informações urgentes e não urgentes em ambientes móveis urbanos. Para isso, foi proposta uma estratégia de encaminhamento baseada em contexto, com um objetivo muito claro: tirar proveito do nome e dados dos pacotes, e da análise de vizinhança dos nós, com vista em fornecer com êxito o conteúdo para a rede no menor período de tempo e sem piorar o congestionamento da rede. O desenho, implementação e validação da estratégia proposta foram realizados usando o simulador ndnSIM, juntamente com traces reais de mobilidade da infraestrutura de comunicação da cidade do Porto. Os resultados mostram que a estratégia de encaminhamento baseada em contexto proposta para o ICN móvel apresenta uma clara melhoria no desempenho em termos de entrega, mantendo a carga da rede constante. Além disso, através da escolha de melhores caminhos e através da cooperação com mecanismos de armazenamento em cache, é possível alcançar atrasos de transmissão mais baixos.Mestrado em Engenharia de Computadores e Telemátic
    corecore