Font Size: a A A

Research On Privacy Security In Information-Centric Networking

Posted on:2016-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:M F GaoFull Text:PDF
GTID:2348330488974013Subject:Information security
Abstract/Summary:PDF Full Text Request
Nowadays, Internet has become ubiquitous in our daily life, with a significant percentage of people's activities relying on it. According to Cisco Visual Networking Index 2013, the global IP video traffic will reach 79 percent of global consumer traffic by the year 2017. Faced with the rapid proliferation of video traffic on the Internet, ICP/IP architecture can not meet people's needs. In order to solve the problems in current network, many international research institutions have joined in the team of designing the next generation Internet architecture. Information Centric Networking(ICN) has more advantages over other future Internet architectures. ICN architecture is different from TCP/IP in nature. In ICN, named data, rather than a named host or an IP address, is of the first priorityAlthough ICN brings a large of benefits, some security problems also emerge. Security is an important reason why the existing internet architecture is becoming insufficient. The existing security issues have been solved, but new attacks will emerge. There is not a whole solution. The “security” is one of major components in ICN, which secures the content rather than the path. In this paper, we present a complete description for security attacks in ICN and propose a solution to time analysis attack.The main contents of this paper are as follows:1. In this paper, we analyze the problems in the traditional IP network architecture and introduce the research background and significance of ICN. Then we detail the existing ICN research projects and their technologies. ICN architecture can be summarized as five areas: publishment and sudscription of content, content name, content resolution and routing, content caching and content security. So we introduce roughly several typical ICN research projects in term of the five areas.2. We classify ICN attacks into four categories: naming, routing, caching, and other miscellaneous related attacks. This classification depends on the attacker's main target. All attack scenarios mentioned are given detailed description. We also summarize the proposed solutions to these attacks in recent years.3. This paper studies the time analysis attack and presents a protection scheme for router cache privacy in ICN. We build a dynamic credit score for each user based on their behaviors. We determine users' credit score by using signatures of some abnomal behaviors. When a user's bahavior matches with a signature, his credit score will decrease. We determine the hidden snooper by users' credit score. When a snooper tries to request a content that is flagged as private by the content's source, the router generates a random delay to simulate a network delay before sending the content to the snooper. Finally we compare our scheme with other related work, and conclude our scheme can protect cache privacy more efficiently.
Keywords/Search Tags:Information Centric Networking, Credit Mechanism, Privacy Protection, Caching
PDF Full Text Request
Related items