Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
101
result(s) for
"NDN"
Sort by:
Context-Aware Naming and Forwarding in NDN-Based VANETs
by
Rehman, Muhammad Atif Ur
,
Zafar, Waseeq Ul Islam
,
Jabeen, Farhana
in
Autonomous vehicles
,
Communication
,
context-aware naming
2021
Vehicular ad-hoc network (VANET) is a technology that allows ubiquitous mobility to mobile users. Inter-vehicle communication is an integral component of intelligent transportation systems that enables a wide variety of applications where vehicles interact and cooperate with each other, from safety applications to non-safety applications. VANETs applications have different needs (e.g., latency, reliability, delivery priorities, etc.) in terms of delivery effectiveness. In the last decade, named data networking (NDN) gained the attention of the research community for effective content retrieval and dissemination in mobile environments such as VANETs. In NDN, the content’s name has a vital role in storing and retrieving the content effectively and efficiently. In NDN-based VANETs, adaptive content dissemination solutions must be introduced that can make decisions related to forwarding, cache management, etc., based on context information represented by a content name. In this context, our main contributions are two-fold: (i) we present the hierarchical context-aware content-naming (CACN) scheme for NDN-based VANETs that enables naming the safety and non-safety applications, and (ii) we present a decentralized context-aware notification (DCN) protocol that broadcasts event notification information for awareness within the application-based geographical area. Simulation results show that the proposed DCN protocol succeeds in achieving reduced transmissions, bandwidth, and energy compared to existing critical contents dissemination protocols.
Journal Article
A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking
by
Hajlaoui, Nasreddine
,
Hadded, Mohamed
,
Hidouri, Abdelhak
in
Access control
,
Analysis
,
Artificial intelligence
2022
Despite the highly secure content sharing and the optimized forwarding mechanism, the content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities that can be exploited to reduce the efficiency of such architecture. Malicious attacks in NDN have become more sophisticated and the foremost challenge is to identify unknown and obfuscated malware, as the malware authors use different evasion techniques for information concealing to prevent detection by an Intrusion Detection System (IDS). For the most part, NDN faces immense negative impacts from attacks such as Cache Pollution Attacks (CPA), Cache Privacy Attacks, Cache Poisoning Attacks, and Interest Flooding Attacks (IFA), that target different security components, including availability, integrity, and confidentiality. This poses a critical challenge to the design of IDS in NDN. This paper provides the latest taxonomy, together with a review of the significant research works on IDSs up to the present time, and a classification of the proposed systems according to the taxonomy. It provides a structured and comprehensive overview of the existing IDSs so that a researcher can create an even better mechanism for the previously mentioned attacks. This paper discusses the limits of the techniques applied to design IDSs with recent findings that can be further exploited in order to optimize those detection and mitigation mechanisms.
Journal Article
Context-Aware Pending Interest Table Management Scheme for NDN-Based VANETs
by
Abdul, Wadood
,
Rehman, Muhammad Atif Ur
,
Zafar, Waseeq Ul Islam
in
Communication
,
context-aware naming
,
Fatalities
2022
In terms of delivery effectiveness, Vehicular Adhoc NETworks (VANETs) applications have multiple, possibly conflicting, and disparate needs (e.g., latency, reliability, and delivery priorities). Named Data Networking (NDN) has attracted the attention of the research community for effective content retrieval and dissemination in mobile environments such as VANETs. A vehicle in a VANET application is heavily reliant on information about the content, network, and application, which can be obtained from a variety of sources. The information gathered can be used as context to make better decisions. While it is difficult to obtain the necessary context information at the IP network layer, the emergence of NDN is changing the tide. The Pending Information Table (PIT) is an important player in NDN data retrieval. PIT size is the bottleneck due to the limited opportunities provided by current memory technologies. PIT overflow results in service disruptions as new Interest messages cannot be added to PIT. Adaptive, context-aware PIT entry management solutions must be introduced to NDN-based VANETs for effective content dissemination. In this context, our main contribution is a decentralised, context-aware PIT entry management (CPITEM) protocol. The simulation results show that the proposed CPITEM protocol achieves lower Interest Satisfaction Delay and effective PIT utilization based on context when compared to existing PIT entry replacement protocols.
Journal Article
A Trusted Lightweight Communication Strategy for Flying Named Data Networking
by
Bouk, Safdar Hussain
,
Barka, Ezedin
,
Hussain, Rasheed
in
Communication
,
energy efficiency
,
FANET
2018
Flying Ad hoc Network (FANET) is a new resource-constrained breed and instantiation of Mobile Ad hoc Network (MANET) employing Unmanned Aerial Vehicles (UAVs) as communicating nodes. These latter follow a predefined path called ’mission’ to provide a wide range of applications/services. Without loss of generality, the services and applications offered by the FANET are based on data/content delivery in various forms such as, but not limited to, pictures, video, status, warnings, and so on. Therefore, a content-centric communication mechanism such as Information Centric Networking (ICN) is essential for FANET. ICN addresses the problems of classical TCP/IP-based Internet. To this end, Content-centric networking (CCN), and Named Data Networking (NDN) are two of the most famous and widely-adapted implementations of ICN due to their intrinsic security mechanism and Interest/Data-based communication. To ensure data security, a signature on the contents is appended to each response/data packet in transit. However, trusted communication is of paramount importance and currently lacks in NDN-driven communication. To fill the gaps, in this paper, we propose a novel trust-aware Monitor-based communication architecture for Flying Named Data Networking (FNDN). We first select the monitors based on their trust and stability, which then become responsible for the interest packets dissemination to avoid broadcast storm problem. Once the interest reaches data producer, the data comes back to the requester through the shortest and most trusted path (which is also the same path through which the interest packet arrived at the producer). Simultaneously, the intermediate UAVs choose whether to check the data authenticity or not, following their subjective belief on its producer’s behavior and thus-forth reducing the computation complexity and delay. Simulation results show that our proposal can sustain the vanilla NDN security levels exceeding the 80% dishonesty detection ratio while reducing the generated end-to-end delay to less than 1 s in the worst case and reducing the average consumed energy by more than two times.
Journal Article
Blockchain Private File Storage-Sharing Method Based on IPFS
2022
Under the current national network environment, anyone can participate in publishing. As an important information resource, knowledge files reflect the workload of publishers. Moreover, high-quality knowledge files can promote the progress of society. However, pirated inferior files have the opposite effect. At present, most organizations use centralized servers to centrally manage the knowledge files released by users. In addition, it is necessary to introduce an untrusted third party to examine and encrypt the contents of files, which leads to an opaque process of file storage transactions, tampering with intellectual copyright, and the inability to have consistent systems of file management among institutions due to the lack of uniform standards for the same intellectual files. The purpose of this paper is to ensure the safe storage of knowledge files on the one hand and to realize efficient sharing of copyrighted files on the other hand. Therefore, this paper combines NDN (Named Data Network) technology with a distributed blockchain and an Interplanetary File System (IPFS) and proposes a blockchain knowledge file storage and sharing method based on an NDN. The method uses the NDN itself for the file content signature and encryption, thereby separating the file security and transmission process. At the same time, the method uses a flexible NDN reverse path forwarding and routing strategy, combining an IPFS private storage network to improve the safety of the encrypted data storage security. Finally, the method takes advantage of all participating nodes consensus and shares files in the synchronized blockchain to ensure traceability. This paper introduces the structure and principles of the method and describes the process of file upload and transfer. Finally, the performance of the method is compared and evaluated, and the advantages and disadvantages of the method and the future research direction are summarized.
Journal Article
FSCN: a novel forwarding method based on Shannon entropy and COPRAS decision process in named data networking
by
Beheshti, Zahra
,
Barekatain, Behrang
,
Hendesi, Faramarz
in
Bandwidths
,
Compilers
,
Computer Science
2023
The appropriate output interface (forwarding) has recently emerged as a key challenge affecting the performance of Named Data Networking (NDN). Regarding this matter, a novel strategy is presented based on the COPRAS (Complex Proportional Assessment) Decision-Making Process with the dynamic weighting of Shannon’s entropy called FSCN for transmitting request packets through the optimal output interface. The essential parameters identified in the suggested approach such as bandwidth, delay, and the number of hops can be dynamically weighted using the Shannon entropy technique and conditions. Then, the interfaces are scored using the COPRAS method, and the suitable output interface is ascertained. The advantages of the proposed method include considering influential criteria to characterize the path’s performance and the dynamic weighting of criteria. The simulation outcomes in ndnSIM demonstrated enhancements in critical parameters, including interest throughput, satisfaction ratio, packet drop, and delivery time when compared to similar approaches.
Journal Article
Hierarchical, Attribute and Hash-Based Naming and Forwarding Aided Smart Campus of Things
2023
In order to provide universal ability to access information and communication among Internet-connected devices, the Sustainable Internet of Things (IoT) is on a mission to bring all objects or devices under one roof. Future Internet architecture, especially Information-Centric Networking (ICN), can easily handle the connectivity offered and information created by the massive amount of devices to make it as sustainable IoT applications. Named Data Networking (NDN), one of the several future Internet designs that employ ICN as its foundation, shows promise. NDN integration with IoT-based applications gives solutions to numerous problems. However, this fusion makes accessing the IoT content easier, provided that an effective naming scheme is created to execute this operation. In this work, we build an innovative NDN-based naming scheme (NDN–NS) and put it into practise for consumer, producer, and content routers using our own secure forwarding schemes (NDN–NFS). Due to its scalability, heterogeneity, and security needs, IoT-based Smart Campus (IoT-SC) scenarios are taken into consideration for design and evaluation. We give a complete activity list based on NDN–NS that is split into two communication models (PusH Type Communication (PHTC) and PulL Type Communication (PLTC)) that can be applied to any IoT application. In terms of interest satisfaction rate (ISR), delay, and number of transmissions, we compare the NDN–NFS to legacy NDN. The outcomes demonstrate that NDN–NFS outperforms classic NDN in terms of performance and efficiency.
Journal Article
A Scalable Solution for Node Mobility Problems in NDN-Based Massive LEO Constellations
by
López Ardao, José Carlos
,
Herrería Alonso, Sergio
,
Suárez González, Andrés
in
Bridge/routers
,
Communication
,
Communications equipment
2026
In recent years, there has been increasing investment in the deployment of massive commercial Low Earth Orbit (LEO) constellations to provide global Internet connectivity. These constellations, now equipped with inter-satellite links, can serve as low-latency Internet backbones, requiring LEO satellites to act not only as access nodes for ground stations, but also as in-orbit core routers. Due to their high velocity and the resulting frequent handovers of ground gateways, LEO networks highly stress mobility procedures at both the sender and receiver endpoints. On the other hand, a growing trend in networking is the use of technologies based on the Information Centric Networking (ICN) paradigm for servicing IoT networks and sensor networks in general, as its addressing, storage, and security mechanisms are usually a good match for IoT needs. Furthermore, ICN networks possess additional characteristics that are beneficial for the massive LEO scenario. For instance, the mobility of the receiver is helped by the inherent data-forwarding procedures in their architectures. However, the mobility of the senders remains an open problem. This paper proposes a comprehensive solution to the mobility problem for massive LEO constellations using the Named-Data Networking (NDN) architecture, as it is probably the most mature ICN proposal. Our solution includes a scalable method to relate content to ground gateways and a way to address traffic to the gateway that does not require cooperation from the network routing algorithm. Moreover, our solution works without requiring modifications to the actual NDN protocol itself, so it is easy to test and deploy. Our results indicate that, for long enough handover lengths, traffic losses are negligible even for ground stations with just one satellite in sight.
Journal Article
Disaster Management System Aided by Named Data Network of Things: Architecture, Design, and Analysis
by
Ahmed, Syed Hassan
,
Majeed, Muhammad Faran
,
Shah, Sayed Chhattan
in
Beacon Alert Message
,
Disaster Management System
,
Push-Support
2018
Disasters are the uncertain calamities which within no time can change the situation quite drastically. They not only affect the system’s infrastructure but can also put an adverse effect on human life. A large chunk of the IP-based Internet of Things (IoT) schemes tackle disasters such as fire, earthquake, and flood. Moreover, recently proposed Named Data Networking (NDN) architecture exhibited promising results for IoT as compare to IP-based approaches. Therefore to tackle disaster management system (DMS), it is needed to explore it through NDN architecture and this is the main motivation behind this work. In this research, a NDN based IoT-DMS (fire disaster) architecture is proposed, named as NDN-DISCA. In NDN-DISCA, NDN producer pushes emergency content towards nearby consumers. To provide push support, Beacon Alert Message (BAM) is created using fixed sequence number. NDN-DISCA is simulated in ndnSIM considering the disaster scenario of IoT-based smart campus (SC). From results, it is found that NDN-DISCA exhibits minimal delay and improved throughput when compared to the legacy NDN and existing PUSH schemes.
Journal Article
In-network caching in information-centric networks for different applications: A survey
2023
Information-Centric Networks (ICNs) have become a promising paradigm for the future Internet instead of host-based communication. In this network, content-oriented data and in-network caching are two key properties, which have brought tremendous benefits to many challenging networks by improving the distribution and retrieval of content. The content is cached along the reversed delivery path, on-path caching and off-path caching. Generally, the existing caching approaches in Information-Centric Networks mainly consider the key characteristics of the content (to decide which content is to be cached), the network (to determine the appropriate time for caching), the nodes (to determine where content should reside), etc. This paper presents a comprehensive survey of in-network caching of ICN schemes (also known as ICN-based caching) in many network applications. Thus, a detailed analysis of the existing caching approaches in several network applications, such as MANET, VANET, IoT, and WSN, is given. This survey also provides a taxonomy for caching policies according to some feature-based approaches and highlights the trends and evaluation problems in these areas. Finally, the challenging research directions in different applications are also pointed out in this subject.
Journal Article