Visible to the public A Security Framework for ICN Traffic Management

TitleA Security Framework for ICN Traffic Management
Publication TypeConference Paper
Year of Publication2018
AuthorsAbdAllah, E. G., Zulkernine, M., Hassanein, H. S.
Conference Name2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
Date Publishedaug
ISBN Number978-1-5386-7518-2
KeywordsAccess Control, access control component, authorisation, Autonomic Security, composability, Computer architecture, Computer crime, computer network security, content popularities, data integrity, data objects, data privacy, framework components, ICN, ICN architectures, ICN attacks, ICN communication model, ICN traffic management, information centric networking, Internet, legitimate users, privacy, privacy component, pubcrawl, resilience, Resiliency, Routing, security framework, security solutions, Traffic Management
Abstract

Information Centric Networking (ICN) changed the communication model from host-based to content-based to cope with the high volume of traffic due to the rapidly increasing number of users, data objects, devices, and applications. ICN communication model requires new security solutions that will be integrated with ICN architectures. In this paper, we present a security framework to manage ICN traffic by detecting, preventing, and responding to ICN attacks. The framework consists of three components: availability, access control, and privacy. The availability component ensures that contents are available for legitimate users. The access control component allows only legitimate users to get restrictedaccess contents. The privacy component prevents attackers from knowing content popularities or user requests. We also show our specific solutions as examples of the framework components.

URLhttps://ieeexplore.ieee.org/document/8511870
DOI10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00027
Citation Keyabdallah_security_2018