Design of security scheme to protect information-centric networks

Named Data Networking (NDN) is a newly proposed next-generation Internet architecture that uses the name of data to forward and route the packet. As a potential candidate for future internet architecture, it is crucial to address the security and privacy issues in NDN. NDN is vulnerable to a new typ...

Full description

Bibliographic Details
Main Author: Jiang, Huiying
Other Authors: Ma Maode
Format: Final Year Project (FYP)
Language:English
Published: Nanyang Technological University 2021
Subjects:
Online Access:https://hdl.handle.net/10356/149334
_version_ 1826110911458312192
author Jiang, Huiying
author2 Ma Maode
author_facet Ma Maode
Jiang, Huiying
author_sort Jiang, Huiying
collection NTU
description Named Data Networking (NDN) is a newly proposed next-generation Internet architecture that uses the name of data to forward and route the packet. As a potential candidate for future internet architecture, it is crucial to address the security and privacy issues in NDN. NDN is vulnerable to a new type of Distributed Denial of Service (DDoS) attacks called Interest Flooding Attack (IFA). The attackers can send a massive amount of Interest requests to overwhelm the PIT, resulting in network disruption for legitimate users. This report proposes Binary Tree Based IFA Detection and Fair Interface Mitigation Scheme (BFI) to protect NDN from IFA. The scheme allows each NDN router to use binary trees to detect IFA and mitigates IFA by limiting the number of Interest requests forwarded from the contaminated routers. The evaluation through simulations shows that BFI can quickly and accurately identify and respond to IFA in NDN.
first_indexed 2024-10-01T02:42:15Z
format Final Year Project (FYP)
id ntu-10356/149334
institution Nanyang Technological University
language English
last_indexed 2024-10-01T02:42:15Z
publishDate 2021
publisher Nanyang Technological University
record_format dspace
spelling ntu-10356/1493342023-07-07T18:10:51Z Design of security scheme to protect information-centric networks Jiang, Huiying Ma Maode School of Electrical and Electronic Engineering EMDMa@ntu.edu.sg Engineering::Electrical and electronic engineering Named Data Networking (NDN) is a newly proposed next-generation Internet architecture that uses the name of data to forward and route the packet. As a potential candidate for future internet architecture, it is crucial to address the security and privacy issues in NDN. NDN is vulnerable to a new type of Distributed Denial of Service (DDoS) attacks called Interest Flooding Attack (IFA). The attackers can send a massive amount of Interest requests to overwhelm the PIT, resulting in network disruption for legitimate users. This report proposes Binary Tree Based IFA Detection and Fair Interface Mitigation Scheme (BFI) to protect NDN from IFA. The scheme allows each NDN router to use binary trees to detect IFA and mitigates IFA by limiting the number of Interest requests forwarded from the contaminated routers. The evaluation through simulations shows that BFI can quickly and accurately identify and respond to IFA in NDN. Bachelor of Engineering (Electrical and Electronic Engineering) 2021-05-30T08:04:53Z 2021-05-30T08:04:53Z 2021 Final Year Project (FYP) Jiang, H. (2021). Design of security scheme to protect information-centric networks. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/149334 https://hdl.handle.net/10356/149334 en P3055-192 application/pdf Nanyang Technological University
spellingShingle Engineering::Electrical and electronic engineering
Jiang, Huiying
Design of security scheme to protect information-centric networks
title Design of security scheme to protect information-centric networks
title_full Design of security scheme to protect information-centric networks
title_fullStr Design of security scheme to protect information-centric networks
title_full_unstemmed Design of security scheme to protect information-centric networks
title_short Design of security scheme to protect information-centric networks
title_sort design of security scheme to protect information centric networks
topic Engineering::Electrical and electronic engineering
url https://hdl.handle.net/10356/149334
work_keys_str_mv AT jianghuiying designofsecurityschemetoprotectinformationcentricnetworks