Design of security scheme to protect information-centric networks
Named Data Networking (NDN) is a newly proposed next-generation Internet architecture that uses the name of data to forward and route the packet. As a potential candidate for future internet architecture, it is crucial to address the security and privacy issues in NDN. NDN is vulnerable to a new typ...
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/149334 |
_version_ | 1826110911458312192 |
---|---|
author | Jiang, Huiying |
author2 | Ma Maode |
author_facet | Ma Maode Jiang, Huiying |
author_sort | Jiang, Huiying |
collection | NTU |
description | Named Data Networking (NDN) is a newly proposed next-generation Internet architecture that uses the name of data to forward and route the packet. As a potential candidate for future internet architecture, it is crucial to address the security and privacy issues in NDN. NDN is vulnerable to a new type of Distributed Denial of Service (DDoS) attacks called Interest Flooding Attack (IFA). The attackers can send a massive amount of Interest requests to overwhelm the PIT, resulting in network disruption for legitimate users. This report proposes Binary Tree Based IFA Detection and Fair Interface Mitigation Scheme (BFI) to protect NDN from IFA. The scheme allows each NDN router to use binary trees to detect IFA and mitigates IFA by limiting the number of Interest requests forwarded from the contaminated routers. The evaluation through simulations shows that BFI can quickly and accurately identify and respond to IFA in NDN. |
first_indexed | 2024-10-01T02:42:15Z |
format | Final Year Project (FYP) |
id | ntu-10356/149334 |
institution | Nanyang Technological University |
language | English |
last_indexed | 2024-10-01T02:42:15Z |
publishDate | 2021 |
publisher | Nanyang Technological University |
record_format | dspace |
spelling | ntu-10356/1493342023-07-07T18:10:51Z Design of security scheme to protect information-centric networks Jiang, Huiying Ma Maode School of Electrical and Electronic Engineering EMDMa@ntu.edu.sg Engineering::Electrical and electronic engineering Named Data Networking (NDN) is a newly proposed next-generation Internet architecture that uses the name of data to forward and route the packet. As a potential candidate for future internet architecture, it is crucial to address the security and privacy issues in NDN. NDN is vulnerable to a new type of Distributed Denial of Service (DDoS) attacks called Interest Flooding Attack (IFA). The attackers can send a massive amount of Interest requests to overwhelm the PIT, resulting in network disruption for legitimate users. This report proposes Binary Tree Based IFA Detection and Fair Interface Mitigation Scheme (BFI) to protect NDN from IFA. The scheme allows each NDN router to use binary trees to detect IFA and mitigates IFA by limiting the number of Interest requests forwarded from the contaminated routers. The evaluation through simulations shows that BFI can quickly and accurately identify and respond to IFA in NDN. Bachelor of Engineering (Electrical and Electronic Engineering) 2021-05-30T08:04:53Z 2021-05-30T08:04:53Z 2021 Final Year Project (FYP) Jiang, H. (2021). Design of security scheme to protect information-centric networks. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/149334 https://hdl.handle.net/10356/149334 en P3055-192 application/pdf Nanyang Technological University |
spellingShingle | Engineering::Electrical and electronic engineering Jiang, Huiying Design of security scheme to protect information-centric networks |
title | Design of security scheme to protect information-centric networks |
title_full | Design of security scheme to protect information-centric networks |
title_fullStr | Design of security scheme to protect information-centric networks |
title_full_unstemmed | Design of security scheme to protect information-centric networks |
title_short | Design of security scheme to protect information-centric networks |
title_sort | design of security scheme to protect information centric networks |
topic | Engineering::Electrical and electronic engineering |
url | https://hdl.handle.net/10356/149334 |
work_keys_str_mv | AT jianghuiying designofsecurityschemetoprotectinformationcentricnetworks |