Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A reliable adaptive forwarding approach in named data networking

Authors
Rezaeifar, ZeinabWang, JianOh, HeekuckLee, Suk-BokHur, Junbeom
Issue Date
7월-2019
Publisher
ELSEVIER SCIENCE BV
Keywords
Named Data Networking (NDN); Information-Centric Network (ICN); Strategy layer; Reliable; Forwarding approach; Invalid data
Citation
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, v.96, pp.538 - 551
Indexed
SCIE
SCOPUS
Journal Title
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
Volume
96
Start Page
538
End Page
551
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/64213
DOI
10.1016/j.future.2018.12.049
ISSN
0167-739X
Abstract
Named Data Networking (NDN) is a new paradigm for the future Internet infrastructure based on routable named data. The NDN infrastructure consists of a new component called strategy layer. The strategy layer allows for dynamically selecting network interfaces taking into account network conditions such as delay to forward Interest messages toward a provider. However, defining proper criteria for selecting the best possible paths to forward Interest messages is challenging in this network because different parameters and conditions conflict one another when choosing the best interfaces. Moreover, in NDN, data can be retrieved from different sources. However, to the best of our knowledge, the previous forwarding strategy methods that can estimate from which path the valid data can be fetched have not considered an attacker who tries to inject fake data with the same name as valid data. Therefore, in this paper, we take a holistic, adaptive forwarding approach that takes into account various metrics: bandwidth, load, delay, and reliability. Especially, we propose a reliability metric that defines which path is more stable and reliable to retrieve legitimate data. Our evaluation demonstrates that the proposed method enables reliable message delivery against potential attackers that inject invalid data, in addition, our method introduces marginal delay compared with the conventional forwarding methods in NDN. (C) 2019 Elsevier B.V. All rights reserved.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE