A Security Framework for ICN Traffic Management
Title | A Security Framework for ICN Traffic Management |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | AbdAllah, E. G., Zulkernine, M., Hassanein, H. S. |
Conference Name | 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) |
Date Published | aug |
ISBN Number | 978-1-5386-7518-2 |
Keywords | Access Control, access control component, authorisation, Autonomic Security, composability, Computer architecture, Computer crime, computer network security, content popularities, data integrity, data objects, data privacy, framework components, ICN, ICN architectures, ICN attacks, ICN communication model, ICN traffic management, information centric networking, Internet, legitimate users, privacy, privacy component, pubcrawl, resilience, Resiliency, Routing, security framework, security solutions, Traffic Management |
Abstract | Information Centric Networking (ICN) changed the communication model from host-based to content-based to cope with the high volume of traffic due to the rapidly increasing number of users, data objects, devices, and applications. ICN communication model requires new security solutions that will be integrated with ICN architectures. In this paper, we present a security framework to manage ICN traffic by detecting, preventing, and responding to ICN attacks. The framework consists of three components: availability, access control, and privacy. The availability component ensures that contents are available for legitimate users. The access control component allows only legitimate users to get restrictedaccess contents. The privacy component prevents attackers from knowing content popularities or user requests. We also show our specific solutions as examples of the framework components. |
URL | https://ieeexplore.ieee.org/document/8511870 |
DOI | 10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00027 |
Citation Key | abdallah_security_2018 |
- ICN attacks
- Traffic Management
- security solutions
- security framework
- Routing
- Resiliency
- resilience
- pubcrawl
- privacy component
- privacy
- legitimate users
- internet
- information centric networking
- ICN traffic management
- ICN communication model
- Access Control
- ICN architectures
- ICN
- framework components
- data privacy
- data objects
- data integrity
- content popularities
- computer network security
- Computer crime
- computer architecture
- composability
- Autonomic Security
- authorisation
- access control component