A layered naming architecture for the internet
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Accountable internet protocol (aip)
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Arguments for an information-centric internetworking architecture
ACM SIGCOMM Computer Communication Review
Host-oblivious security for content-based networks
Proceedings of the 5th International Conference on Future Internet Technologies
Secure naming in information-centric networks
Proceedings of the Re-Architecting the Internet Workshop
Naming in content-oriented architectures
Proceedings of the ACM SIGCOMM workshop on Information-centric networking
On preserving privacy in content-oriented networks
Proceedings of the ACM SIGCOMM workshop on Information-centric networking
MobilityFirst future internet architecture project
AINTEC '11 Proceedings of the 7th Asian Internet Engineering Conference
Towards name-based trust and security for content-centric network
ICNP '11 Proceedings of the 2011 19th IEEE International Conference on Network Protocols
XIA: efficient support for evolvable internetworking
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Cache "less for more" in information-centric networks
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I
Transport-layer issues in information centric networks
Proceedings of the second edition of the ICN workshop on Information-centric networking
Privacy risks in named data networking: what is the cost of performance?
ACM SIGCOMM Computer Communication Review
Hi-index | 0.00 |
In recently proposed information centric networks (ICN), a user issues "interest" packets to retrieve contents from network by names. Once fetched from origin servers, "data" packets are replicated and cached in all routers along routing and forwarding paths, thus allowing further interests by other users to be fulfilled quickly. However, the way ICN caching works poses a great privacy risk: the time difference between responses for an interest of cached and uncached content can be used as an indicator to infer whether or not a near-by user has previously requested the same content as that requested by an adversary. This work introduces the extent to which the problem is applicable in ICN and provides several solutions that try to strike a balance between their cost and benefits, and raise the bar for the adversary to apply such attack.