143 research outputs found

    Internames: a name-to-name principle for the future Internet

    Full text link
    We propose Internames, an architectural framework in which names are used to identify all entities involved in communication: contents, users, devices, logical as well as physical points involved in the communication, and services. By not having a static binding between the name of a communication entity and its current location, we allow entities to be mobile, enable them to be reached by any of a number of basic communication primitives, enable communication to span networks with different technologies and allow for disconnected operation. Furthermore, with the ability to communicate between names, the communication path can be dynamically bound to any of a number of end-points, and the end-points themselves could change as needed. A key benefit of our architecture is its ability to accommodate gradual migration from the current IP infrastructure to a future that may be a ubiquitous Information Centric Network. Basic building blocks of Internames are: i) a name-based Application Programming Interface; ii) a separation of identifiers (names) and locators; iii) a powerful Name Resolution Service (NRS) that dynamically maps names to locators, as a function of time/location/context/service; iv) a built-in capacity of evolution, allowing a transparent migration from current networks and the ability to include as particular cases current specific architectures. To achieve this vision, shared by many other researchers, we exploit and expand on Information Centric Networking principles, extending ICN functionality beyond content retrieval, easing send-to-name and push services, and allowing to use names also to route data in the return path. A key role in this architecture is played by the NRS, which allows for the co-existence of multiple network "realms", including current IP and non-IP networks, glued together by a name-to-name overarching communication primitive.Comment: 6 page

    A Taxonomy of Information-Centric Networking Architectures based on Data Routing and Name Resolution Approaches

    Get PDF
    This study presents a vast coverage of current Information-Centric Network (ICN) submission by evaluating eight distinct and popular routing and name resolution approaches. Internet build-up and initial deposition were based on a host-driven approach. With the increasing demands for mediadriven data flooding the cost of the Internet, a new semantic and paradigm shift was envisioned known as ICN. InformationCentrism is an approach that partly dissociates the host dependencies by referring to contents by unique identifiers called name. However, to benefit from the content network, forwarding, naming and routing, among other issues are still in its developmental stages. The taxonomy serves as a basis for research directions, challenges, implementation and future studies for standardizing the ICN routing and naming. Routing and Name Resolution were themed in categories of strategies, contributions, issues and drawbacks. The major findings of this paper are providing a classification and review of the data routing and name resolutions approaches that are proposed on eight ICN architectures; presenting drawback areas in the selected architectures; and finally highlighting some challenges of ICN routing for the ICN research community vending

    Review of name resolution and data routing for information centric networking

    Get PDF
    Information Centric Networking (ICN) a future Internet, presents a new paradigm by shifting the current network to the modern network protocols. Its goal, to improve the traditional network operations by enabling ICN packet routing and forwarding based on names.This shift will bring advantages, but at the same time, it is leading to a big challenge on routing approaches to implement ICN nodes. Routing approaches must use special techniques to publish messages to all the network nodes.Flooding approach is an easy and stateless, however, results in control overhead, depending on the network size.Moreover, designing, implementing, and evaluating routing approaches with higher capacity is really a key challenge in the overall ICN research area, because the state of ICN brings a significant cost; both in packet processing and router storage.Many approaches were proposed in the literatures over these years for the efficient control of forwarding on the network.This paper provides a classification and review of the routing mechanisms that are proposed on six ICN architectures.A summary in tabular form and a comparative study of these six architectures is also given in the paper as well as few open research challenges are highlighted

    A distributed source locator model for name resolution in named data network

    Get PDF
    Recently, the number of devices that are connected to the Internet had been significantly increased with much more expected increment in the future. ICN is a new concept for future Internet that has been developed, many projects within the ICN concept are being researched and NDN in one of them. The purpose of this research is to design distribution source locator for Name Resolution System to avoid the point of failure that may occur if there is only a central system and implemented this new model in NDN architecture to guarantee findings of any object in the network instead of looking for data hop by hop. This research employs the Design Research Methodology (DRM) and introduces its main stages according to the nature of this research. The conceptual model had been designed based on the previous study of NRS in other ICN projects, and according to Chord model in the distributed hash table (DHT). The huge amount of data and unfixed name length in NDN architecture are the main points that must be taken into consideration in order to produce an efficient NRS for NDN. Furthermore, such system simplifies the distributing of the data that correspond to it. NDN is a new project under ICN concept and it is still under research with many issues that is needed to be solved, also there is no real component to work on NDN and all work had been done based on simulation environment. Since the present research focuses on distributing the source locator for NRS, the major contribution of this study is to provide a guaranteed way to find the data object in NDN architecture and to improve the scalability issues in the network. This will support the data routing and transfer between the node and reduce the overall exchanged traffic. This permits the development of solving one of the major open issues in NDN architecture and thus aids in supporting the deployment of the new Internet concept base on the ICN networks. It will thus help users to transfer data reliably and more efficiently. The major contributions of this study include the design of a new Distributed Source Locator (DSL) for Name Resolution. Other contributions are the way of distributing the hash tables for better and faster data lookup, on the other hand, this distribution gives the users the privilege to specify the data levels which results in an increment in the data security of the network. All these would contribute toward the maximized utilization of network resources

    A survey on future internet security architectures

    Get PDF

    Understanding tradeoffs in incremental deployment of new network architectures

    Full text link
    Despite the plethora of incremental deployment mechanisms proposed, rapid adoption of new network-layer protocols and architectures remains difficult as reflected by the widespread lack of IPv6 traffic on the Internet. We show that all de-ployment mechanisms must address four key questions: How to select an egress from the source network, how to select an ingress into the destination network, how to reach that egress, and how to reach that ingress. By creating a de-sign space that maps all existing mechanisms by how they answer these questions, we identify the lack of existing mech-anisms in part of this design space and propose two novel approaches: the “4ID ” and the “Smart 4ID”. The 4ID mech-anism utilizes new data plane technology to flexibly decide when to encapsulate packets at forwarding time. The Smart 4ID mechanism additionally adopts an SDN-style control plane to intelligently pick ingress/egress pairs based on a wider view of the local network. We implement these mech-anisms along with two widely used IPv6 deployment mech-anisms and conduct wide-area deployment experiments over PlanetLab. We conclude that Smart 4ID provide better overall performance and failure semantics, and that inno-vations in the data plane and control plane enable straight-forward incremental deployment

    Enhanching Security in the Future Cyber Physical Systems

    Get PDF
    Cyber Physical System (CPS) is a system where cyber and physical components work in a complex co-ordination to provide better performance. By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of a CPS. In this dissertation, security measures for different types of attacks/ faults in two CPSs, water supply system (WSS) and smart grid system, are presented. In this context, I also present my study on energy management in Smart Grid. The techniques for detecting attacks/faults in both WSS and Smart grid system adopt Kalman Filter (KF) and χ2 detector. The χ2 -detector can detect myriad of system fault- s/attacks such as Denial of Service (DoS) attack, short term and long term random attacks. However, the study shows that the χ2 -detector is unable to detect the intelligent False Data Injection attack (FDI). To overcome this limitation, I present a Euclidean detector for smart grid which can effectively detect such injection attacks. Along with detecting attack/faults I also present the isolation of the attacked/faulty nodes for smart grid. For isolation the Gen- eralized Observer Scheme (GOS) implementing Kalman Filter is used. As GOS is effective in isolating attacks/faults on a single sensor, it is unable to isolate simultaneous attacks/faults on multiple sensors. To address this issue, an Iterative Observer Scheme (IOS) is presented which is able to detect attack on multiple sensors. Since network is an integral part of the future CPSs, I also present a scheme for pre- serving privacy in the future Internet architecture, namely MobilityFirst architecture. The proposed scheme, called Anonymity in MobilityFirst (AMF), utilizes the three-tiered ap- proach to effectively exploit the inherent properties of MF Network such as Globally Unique Flat Identifier (GUID) and Global Name Resolution Service (GNRS) to provide anonymity to the users. While employing new proposed schemes in exchanging of keys between different tiers of routers to alleviate trust issues, the proposed scheme uses multiple routers in each tier to avoid collaboration amongst the routers in the three tiers to expose the end users
    corecore