2,386 research outputs found

    Securing Information-Centric Networking without negating Middleboxes

    Full text link
    Information-Centric Networking is a promising networking paradigm that overcomes many of the limitations of current networking architectures. Various research efforts investigate solutions for securing ICN. Nevertheless, most of these solutions relax security requirements in favor of network performance. In particular, they weaken end-user privacy and the architecture's tolerance to security breaches in order to support middleboxes that offer services such as caching and content replication. In this paper, we adapt TLS, a widely used security standard, to an ICN context. We design solutions that allow session reuse and migration among multiple stakeholders and we propose an extension that allows authorized middleboxes to lawfully and transparently intercept secured communications.Comment: 8th IFIP International Conference on New Technologies, Mobility & Security, IFIP, 201

    10492 Abstracts Collection -- Information-Centric Networking

    Get PDF
    From December 5th to 8th 2010, the Dagstuhl Seminar 10492 on "Information-Centric Networking" was held in Schloss Dagstuhl -- Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available

    RELIABLE INTERESTS IN INFORMATION-CENTRIC NETWORKING

    Get PDF
    In an information-centric networking (ICN) environment, an interest may be dropped by a network for any number of reasons. However, if an interest is lost then the corresponding data cannot be received, thereby reducing the performance of a network. Techniques are presented herein that make ICN interests more resilient to potential losses by adding certain state information into an interest payload. That state information may be used to keep track of the previous interests that have been sent by a forwarder face for a specific name. To encode the sequence numbers of the interests that have been previously sent, a first aspect of the presented techniques employs a list of sequence numbers while a second aspect of the presented techniques employs a bitmap. The presented techniques may be used to reduce the possibility that interests are not dropped during transit when using ICN
    • …
    corecore