233 research outputs found
Securing Information-Centric Networking without negating Middleboxes
Information-Centric Networking is a promising networking paradigm that
overcomes many of the limitations of current networking architectures. Various
research efforts investigate solutions for securing ICN. Nevertheless, most of
these solutions relax security requirements in favor of network performance. In
particular, they weaken end-user privacy and the architecture's tolerance to
security breaches in order to support middleboxes that offer services such as
caching and content replication. In this paper, we adapt TLS, a widely used
security standard, to an ICN context. We design solutions that allow session
reuse and migration among multiple stakeholders and we propose an extension
that allows authorized middleboxes to lawfully and transparently intercept
secured communications.Comment: 8th IFIP International Conference on New Technologies, Mobility &
Security, IFIP, 201
Efficient Proactive Caching for Supporting Seamless Mobility
We present a distributed proactive caching approach that exploits user
mobility information to decide where to proactively cache data to support
seamless mobility, while efficiently utilizing cache storage using a congestion
pricing scheme. The proposed approach is applicable to the case where objects
have different sizes and to a two-level cache hierarchy, for both of which the
proactive caching problem is hard. Additionally, our modeling framework
considers the case where the delay is independent of the requested data object
size and the case where the delay is a function of the object size. Our
evaluation results show how various system parameters influence the delay gains
of the proposed approach, which achieves robust and good performance relative
to an oracle and an optimal scheme for a flat cache structure.Comment: 10 pages, 9 figure
CoAP over ICN
The Constrained Application Protocol (CoAP) is a specialized Web transfer
protocol for resource-oriented applications intended to run on constrained
devices, typically part of the Internet of Things. In this paper we leverage
Information-Centric Networking (ICN), deployed within the domain of a network
provider that interconnects, in addition to other terminals, CoAP endpoints in
order to provide enhanced CoAP services. We present various CoAP-specific
communication scenarios and discuss how ICN can provide benefits to both
network providers and CoAP applications, even though the latter are not aware
of the existence of ICN. In particular, the use of ICN results in smaller state
management complexity at CoAP endpoints, simpler implementation at CoAP
endpoints, and less communication overhead in the network.Comment: Proc. of the 8th IFIP International Conference on New Technologies,
Mobility and Security (NTMS), Larnaca, Cyprus, November, 201
What's inside a node? Malicious IPFS nodes under the magnifying glass
InterPlanetary File System~(IPFS) is one of the most promising decentralized
off-chain storage mechanisms, particularly relevant for blockchains, aiming to
store the content forever, thus it is crucial to understand its composition,
deduce actor intent and investigate its operation and impact. Beyond the
network functionality that IPFS offers, assessing the quality of nodes, i.e.
analysing and categorising node software and data, is essential to mitigate
possible risks and exploitation of IPFS. To this end, in this work we took
three daily snapshots of IPFS nodes within a month and analysed each node (by
IP address) individually, using threat intelligence feeds. The above enabled us
to quantify the number of potentially malicious and/or abused nodes. The
outcomes lead us to consider using a filter to isolate malicious nodes from the
network, an approach we implemented as a prototype and used for assessment of
effectiveness.Comment: To appear at the 38th International Conference on ICT Systems
Security and Privacy Protection (IFIP SEC 2023
- …