2,386 research outputs found
Securing Information-Centric Networking without negating Middleboxes
Information-Centric Networking is a promising networking paradigm that
overcomes many of the limitations of current networking architectures. Various
research efforts investigate solutions for securing ICN. Nevertheless, most of
these solutions relax security requirements in favor of network performance. In
particular, they weaken end-user privacy and the architecture's tolerance to
security breaches in order to support middleboxes that offer services such as
caching and content replication. In this paper, we adapt TLS, a widely used
security standard, to an ICN context. We design solutions that allow session
reuse and migration among multiple stakeholders and we propose an extension
that allows authorized middleboxes to lawfully and transparently intercept
secured communications.Comment: 8th IFIP International Conference on New Technologies, Mobility &
Security, IFIP, 201
10492 Abstracts Collection -- Information-Centric Networking
From December 5th to 8th 2010, the Dagstuhl Seminar 10492 on "Information-Centric Networking" was held in Schloss Dagstuhl -- Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put
together in this paper. The first section describes the seminar topics and
goals in general. Links to extended abstracts or full papers are provided,
if available
RELIABLE INTERESTS IN INFORMATION-CENTRIC NETWORKING
In an information-centric networking (ICN) environment, an interest may be dropped by a network for any number of reasons. However, if an interest is lost then the corresponding data cannot be received, thereby reducing the performance of a network. Techniques are presented herein that make ICN interests more resilient to potential losses by adding certain state information into an interest payload. That state information may be used to keep track of the previous interests that have been sent by a forwarder face for a specific name. To encode the sequence numbers of the interests that have been previously sent, a first aspect of the presented techniques employs a list of sequence numbers while a second aspect of the presented techniques employs a bitmap. The presented techniques may be used to reduce the possibility that interests are not dropped during transit when using ICN
- …