Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      05 July 2023, Volume 38 Issue 3
    Article

    INFORMATION CENTRIC NETWORKS AND ITS SECURITY CHALLENGES
    Aravinda Thejas Chandra, Dr Rajashekara Murthy
    Journal of Data Acquisition and Processing, 2023, 38 (3): 5160-5183 . 

    Abstract

    An new networking discipline called "information centric networking" (ICN) has the power to completely alter how the Internet functions. ICNs allow users to immediately access content from anywhere on the network, regardless of its physical location, by identifying each item of information by its name instead by the destination host to which it will be routed over the network. This makes ICN networks more scalable, secure, and efficient. However, since ICN infrastructure is still a relatively new technology, it faces several security challenges. These include the threat of privacy breach, spoofing, distributed denial-of-service attacks, and the inadequate authentication protocol. To ensure that ICN networks' full potential be realised, these security issues will need to be resolved. The delivery of content within a network, as opposed to a specific device, is the main goal of information centric networking (ICN), communications architecture. By letting the network to use content as the fundamental unit of transport rather than the conventional end-points, this developing network architecture seeks to enhance the existing Internet routing model. The purpose of ICN is to offer an improved and more secure framework for the delivery of content over the Internet. An Information Centric Network (ICN) is an architecture that utilizes an indexed structure for the dynamic distribution of digital content. This structure allows nodes within the network to send and query for content based on user-defined keywords and topics, rather than relying solely on the IP addresses of network endpoints. This approach provides a more efficient and reliable method of content delivery, as it becomes easier to locate, route, and deliver digital content irrespective of its source or destination. Security is an essential component for any network and is especially important for Information Centric Networks because the increased complexity of the network structure introduces new attack surfaces and an increased reliance on caching. Attacks like denial-of-service attacks, cache poisoning, packet replay, and other forms of malicious behaviour are among the security difficulties faced by ICNs. More security measures are required to protect against these types of attacks, including mechanisms such as encryption, authentication, and authorization. Additionally, secure content distribution needs to be established in order to prevent malicious entities from accessing or altering content data. As networks complexity continues to increase and more data is digitized, security needs to remain a top priority in order to protect the integrity of networks, services, and content.

    Keyword

    Information-Centric Networking, Security, Challenges, Data, Internet, Performance


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved