Abstract

The Information centric networks (ICN) transforms the focal point of current Internet paradigm to data centric approach from host centric approach by allowing content driven forwarding and in-network caching mechanisms. Though NDN (Named data networking) paradigm of ICN assures a secure content communication, it is vulnerable to different attacks by the malicious nodes. To minimize the hazards from compromised nodes and to improve the network security, the remaining nodes should transparently receive information about such nodes. This will restrict the forwarding strategy to exploit these malicious nodes for forwarding interest and content as well. Our protocol introduces a dynamic model for prediction of trust in order to evaluate the node trust. Proposed approach observes the historical behaviors of node and uses extended fuzzy logic rules for the prediction of future behaviors to evaluate the node’s trust value. This prediction model is incorporated within the trust based forwarding mechanism that aims to forward interest through secure and shortest path. The extensive simulation study has been carried out to analyze the protocol performance in ns-3 driven ndnSIM-2.0 simulator for performance metrics such as data discovery latency, packet delivery ratio, network overhead, detection ratio and cache hit ratio. When we integrate our trust joint forwarding strategy to state-of-the-art protocols, their performance is significantly improved up to approximately 10-35% against stated performance measures for realistic network topology.

Keywords

Routing, Forwarding, Information centric networks, Security, Trust, CTJIF-ICN,

Downloads

Download data is not yet available.

References

  1. A. Djama, B. Djamaa, M. R. Senouci, Information-centric networking solutions for the Internet of Things: A systematic mapping review. Computer Communications, 159, (2020) 37-59. https://doi.org/10.1016/j.comcom.2020.05.003
  2. M. Aggarwal, K. Nilay, K. Yadav, Survey of named data networks: Future of Internet. International Journal of Information Technology, 9(2), (2017) 197-207. https://doi.org/10.1007/s41870-017-0014-y
  3. G. Xylomenos, C.N. Ververidis, V.A. Siris, N. Fotiou, C. Tsilopoulos, X. Vasilakos, K.V. Katsaros, G.C. Polyzos, A survey of information-centric networking research. IEEE communications surveys & tutorials, 16(2), (2013) 1024-1049. https://doi.org/10.1109/SURV.2013.070813.00063
  4. C. Marxer, C. Tschudin, (2017) Schematized Access Control for Data Cubes and Trees. in: Proceedings of the 4th ACM Conference on Information-Centric Networking, (2017) 170–175. https://doi.org/10.1145/3125719.3125736
  5. E.J. Chang, P.K. Hussain, P.S. Dillon, Fuzzy nature of trust and dynamic trust modelling in service-oriented environments. Proceedings of the ACM Workshop on Secure Web Services, (2005) 75–83. https://doi.org/10.1145/1103022.1103036
  6. F.G. Marmol, G.M. Perez, Security Threats Scenarios in Trust and Reputation Models for Distributed Systems. computers & security, 28(7), (2009) 545–556. https://doi.org/10.1016/j.cose.2009.05.005
  7. M. Pearce, S. Zeadally, R. Hunt, Virtualization: Issues, Security Threats, and Solutions. ACM Computing Surveys (CSUR), 45(2), (2013) 1-39. https://doi.org/10.1145/2431211.2431216
  8. K. Delvadia, N. Dutta, G. Ghinea, (2019) An efficient routing strategy for information centric networks. IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Goa, India. https://doi.org/10.1109/ANTS47819.2019.9118123
  9. K. Delvadia, N. Dutta, R. Jadeja, CCJRF-ICN: A Novel Mechanism for Coadjuvant Caching Joint Request Forwarding in Information Centric Networks. in IEEE Access, 9, (2021) 84134-84155. https://doi.org/10.1109/ACCESS.2021.3087558
  10. B. Nour, K. Sharif, F. Li, Y. Wang, Security and Privacy Challenges in Information-Centric Wireless Internet of Things Networks. IEEE Security & Privacy, 18(2), (2019) 35-45. https://doi.org/10.1109/MSEC.2019.2925337
  11. B. Nour, K. Sharif, F. Li, S. Yang, H. Moungla, Y.Wang, ICN Publisher-Subscriber Models: Challenges and Group-based Communication. IEEE Network, 33(6), (2019) 156-163. https://doi.org/10.1109/MNET.2019.1800551
  12. Z. Zhang, Y. Yu, H. Zhang, E. Newberry, S. Mastorakis, Y. Li, A. Afanasyev, L. Zhang, An Overview of Security Support in Named Data Networking. IEEE Communications Magazine, 56(11), (2018) 62–68. https://doi.org/10.1109/MCOM.2018.1701147
  13. Y. Yu, Y. Li, X. Du, R. Chen, B. Yang, Content Protection in Named Data Networking: Challenges and Potential Solutions. IEEE Communications Magazine, 56(11), (2018) 82–87. https://doi.org/10.1109/MCOM.2018.1701086
  14. Z. Zhang, A. Afanasyev, L. Zhang, NDNCERT: Universal Usable Trust Management for NDN. in: Proceedings of the 4th ACM Conference on Information-Centric Networking, (2017) 178–179. https://doi.org/10.1145/3125719.3132090
  15. K. Xue, P. He, X. Zhang, Q. Xia, D.S. Wei, H. Yue, F. Wu, A secure, efficient, and accountable edge-based access control framework for information centric networks. IEEE/ACM Transactions on Networking, 27(23), (2019) 1220-1233. https://doi.org/10.1109/TNET.2019.2914189
  16. T.Y. Youn, J. Kim, S.C. Seo, Efficient Data Delivery in Content-Centric Network with Stronger Privacy of Publisher. International Conference on Information Networking (ICOIN), IEEE, Korea. https://doi.org/10.1109/ICOIN50884.2021.9333982
  17. M. Bilal, S. Pack, Secure distribution of protected content in information-centric networking. IEEE Systems Journal, 14(2), (2020) 1921–1932. https://doi.org/10.1109/JSYST.2019.2931813
  18. G. Rathee, A. Sharma, R. Kumar, F. Ahmad, R. Iqbal, A trust management scheme to secure mobile information centric networks. Computer Communications, 151, (2020) 66–75. https://doi.org/10.1016/j.comcom.2019.12.024
  19. W. Fang, M. Xu, C. Zhu, W. Han, W. Zhang, J.J. Rodrigues, FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things. IEEE Access, 7, (2019) 13476–13485. https://doi.org/10.1109/ACCESS.2019.2892712
  20. Z. Yang, X. Li, L. Wei, C. Zhang, C. Gu, (2020) SGX-ICN: A Secure and Privacy-Preserving Information-Centric Networking with SGX Enclaves. International Conference on Hot Information-Centric Networking (HotICN), Anhui, China. https://doi.org/10.1109/HotICN50779.2020.9350832
  21. X. Wang, X. Chen, X. Wang, Secure vehicular data communication in Named Data Networking. Digital Communications and Networks, 9(1), (2023) 203-210. https://doi.org/10.1016/j.dcan.2022.05.022
  22. P. García-Teodoro, J. Camacho, G. Maciá-Fernández, J.A. Gómez-Hernández, V.J. López-Marín, A novel zero-trust network access control scheme based on the security profile of devices and users. Computer Networks, 212, (2022) 109068. https://doi.org/10.1016/j.comnet.2022.109068
  23. A. Mabrouk, A. Naja, Intrusion detection game for ubiquitous security in vehicular networks: A signaling game-based approach. Computer Networks, 225, (2023) 109649. https://doi.org/10.1016/j.comnet.2023.109649
  24. Mahin Mohammadi, Reza Rawassizadeh, Abbas Sheikh Taheri, A consumer-centered security framework for sharing health data in social networks. Journal of Information Security and Applications 69, (2022) 103303. https://doi.org/10.1016/j.jisa.2022.103303
  25. Y. Lu, C. Wang, M. Yue, Z. Wu, Consumer-source authentication with conditional anonymity in information-centric networking. Information Sciences, 624, (2023) 378-394. https://doi.org/10.1016/j.ins.2022.12.051
  26. D. Kondo, V. Vassiliades, T. Silverston, H. Tode, T. Asami, The named data networking flow filter: Towards improved security over information leakage attacks. Computer Networks, 173, (2020) 107187. https://doi.org/10.1016/j.comnet.2020.107187
  27. J. Zhou, J. Luo, J. Wang, L. Deng, Cache Pollution Prevention Mechanism Based on Deep Reinforcement Learning in NDN. Journal of Communications and Information Networks, 6(1), (2021) 91-100. https://doi.org/10.23919/JCIN.2021.9387728
  28. V. Rani, K.N. Mallikaarjunan, J. Dharani, (2021) Exploiting Queue-driven Cache Replacement Technique for Thwarting Pollution Attack in ICN. IEEE International Conference on Computing Communication and Networking Technologies (ICCCNT), IEEE, India. https://doi.org/10.1109/ICCCNT51525.2021.9579599
  29. N. Laoutaris, H. Che, I. Stavrakakis, The LCD interconnection of LRU caches and its analysis. Performance Evaluation, 63(7), (2006) 609-634. https://doi.org/10.1016/j.peva.2005.05.003
  30. Y. He, Y. Zhu, Y. Ni, J. Shi, N. Zhu, A caching strategy in content centric networks based on node's importance. Information Technology Journal, 13(3), (2014) 588-592. https://doi.org/10.3923/itj.2014.588.592
  31. W.K. Chai, D. He, I. Psaras, G. Pavlou, Cache `less for more' in information-centric networks (extended version). Computer Communications, 36(7), (2013) 758-770. https://doi.org/10.1016/j.comcom.2013.01.007
  32. I. Psaras, W.K. Chai, G. Pavlou, Probabilistic in-network caching for information-centric networks. Proceedings of the second edition of the ICN workshop on Information-centric networking, (2012) 55-60. https://doi.org/10.1145/2342488.2342501
  33. K. Thar, N.H. Tran, S. Ullah, T.Z. Oo, C.S. Hong, Online caching and cooperative forwarding in information centric networking. IEEE Access, 6, (2018) 59679-59694. https://doi.org/10.1109/ACCESS.2018.2884913
  34. X. Hu, S. Zheng, G. Zhang, L. Zhao, G. Cheng, J. Gong, R. Li, an on demand off-path cache exploration based multipath forwarding strategy. Computer Networks, 166, (2020) 107032. https://doi.org/10.1016/j.comnet.2019.107032
  35. R. Chiocchetti, D. Rossi, G. Rossini, CcnSim: An highly scalable CCN simulator. 2013 IEEE International Conference on Communications (ICC), (2013) 2309-2314. https://doi.org/10.1109/ICC.2013.6654874