Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Access Control Mechanisms in Named Data Networks: A Comprehensive Survey

Published: 17 April 2021 Publication History
  • Get Citation Alerts
  • Abstract

    Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC. Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.

    References

    [1]
    2008. 4WARD. Retrieved from http://www.4ward-project.eu/.
    [2]
    2010. FP7 SAIL Project. Retrieved from http://www.sail-project.eu/.
    [3]
    2019. Type-Length-Value (TLV) Encoding. Retrieved from https://named-data.net/doc/NDN-packet-spec/current/tlv.html.
    [4]
    Eslam G. AbdAllah, Hossam S. Hassanein, and Mohammad Zulkernine. 2015. A survey of security attacks in information-centric networking. IEEE Commun. Surv. Tutor. 17, 3 (2015), 1441--1454.
    [5]
    Ibrahim Abdullahi, Suki Arif, and Suhaidi Hassan. 2015. Survey on caching approaches in information centric networking. J. Netw. Comput. Applic. 56 (2015), 48--59.
    [6]
    Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, and Borje Ohlman. 2012. A survey of information-centric networking. IEEE Commun. Mag. 50, 7 (2012).
    [7]
    Syed Hassan Ahmed, Safdar Hussain Bouk, Dongkyun Kim, Danda B. Rawat, and Houbing Song. 2017. Named data networking for software defined vehicular networks. IEEE Commun. Mag. 55, 8 (2017), 60--66.
    [8]
    Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash. 2015. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17, 4 (2015), 2347--2376.
    [9]
    Moreno Ambrosin, Alberto Compagno, Mauro Conti, Cesar Ghali, and Gene Tsudik. 2018. Security and privacy analysis of national science foundation future internet architectures. IEEE Commun. Surv. Tutor. 20, 2 (2018), 1418--1442.
    [10]
    Md Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, Raouf Boutaba, and Bertrand Mathieu. 2012. A survey of naming and routing in information-centric networks. IEEE Commun. Mag. 50, 12 (2012).
    [11]
    Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, and Rabah Attia. 2018. PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Comput. Netw. 133 (2018), 141--156.
    [12]
    Ahmed Benmoussa, Abdou el Karim Tahari, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Abderrahmane Lakas, Rasheed Hussain, and Farhan Ahmad. 2020. MSIDN: Mitigation of sophisticated interest flooding-based DDoS attacks in named data networking. Fut. Gen. Comput. Syst. 107 (2020), 293--306.
    [13]
    Cesar Bernardini, Samuel Marchal, Muhammad Rizwan Asghar, and Bruno Crispo. 2019. PrivICN: Privacy-preserving content retrieval in information-centric networking. Comput. Netw. 149 (2019), 13--28.
    [14]
    Chaoyi Bian, Zhenkai Zhu, Alexander Afanasyev, Ersin Uzun, and Lixia Zhang. 2013. Deploying Key Management on NDN Testbed. Named Data Networking Project. Technical Report NDN-0009. UCLA, Peking University and PARC.
    [15]
    Joakim Borgh, Edith Ngai, Börje Ohlman, and Adeel Mohammad Malik. 2017. Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context. In Global Internet of Things Summit (GIoTS’17). IEEE, 1--6.
    [16]
    Safdar Hussain Bouk, Syed Hassan Ahmed, Rasheed Hussain, and Yongsoon Eun. 2018. Named data networking’s intrinsic cyber-resilience for vehicular CPS. IEEE Access 6 (2018), 60570--60585.
    [17]
    Rihab Boussada, Balkis Hamdane, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. 2019. PP-NDNoT: On preserving privacy in IoT-based E-health systems over NDN. In IEEE Wireless Communications and Networking Conference (WCNC’19). IEEE, 1--6.
    [18]
    Johannes Buchmann, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, and Elena Klintsevich. 2006. CMSS--An improved Merkle signature scheme. In International Conference on Cryptology in India. Springer, 349--363.
    [19]
    Denis Butin. 2017. Hash-based signatures: State of play. IEEE Sec.& Priv. 15, 4 (2017), 37--43.
    [20]
    Abdelberi Chaabane, Emiliano De Cristofaro, Mohamed Ali Kaafar, and Ersin Uzun. 2013. Privacy in content-oriented networking: Threats and countermeasures. ACM SIGCOMM Comput. Commun. Rev. 43, 3 (2013), 25--33.
    [21]
    Kevin Chan, Bongjun Ko, Spyridon Mastorakis, Alexander Afanasyev, and Lixia Zhang. 2017. Fuzzy interest forwarding. In Asian Internet Engineering Conference (AINTEC’17). ACM, 31--37.
    [22]
    Tao Chen, Kai Lei, and Kuai Xu. 2014. An encryption and probability based access control model for named data networking. In IEEE International Performance Computing and Communications Conference (IPCCC’14). IEEE, 1--8.
    [23]
    Jaeyoung Choi, Jinyoung Han, Eunsang Cho, Ted Kwon, and Yanghee Choi. 2011. A survey on content-oriented networking for efficient content delivery. IEEE Commun. Mag. 49, 3 (2011), 121--127.
    [24]
    Roan Simões da Silva and Sergio Donizetti Zorzo. 2015. An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges. In IEEE Consumer Communications and Networking Conference (CCNC’15). IEEE, 128--133.
    [25]
    Pedro de-las Heras-Quirós, Eva M. Castro, Wentao Shang, Yingdi Yu, Spyridon Mastorakis, Alexander Afanasyev, and Lixia Zhang. 2017. The Design of RoundSync Protocol. Technical Report. Technical Report NDN-0048, NDN. UCLA, Peking University and PARC.
    [26]
    Ikram Ud Din, Suhaidi Hassan, Ahmad Almogren, Farrukh Ayub, and Mohsen Guizani. 2019. PUC: Packet update caching for energy efficient IoT-based information-centric networking. Fut. Gen. Comput. Syst. (2019).
    [27]
    Ikram Ud Din, Suhaidi Hassan, Muhammad Khurram Khan, Mohsen Guizani, Osman Ghazali, and Adib Habbal. 2018. Caching in information-centric networking: Strategies, challenges, and future research directions. IEEE Commun. Surv. Tutor. 20, 2 (2018), 1443--1474.
    [28]
    Chao Fang, F. Richard Yu, Tao Huang, Jiang Liu, and Yunjie Liu. 2015. A survey of green information-centric networking: Research issues and challenges. IEEE Commun. Surv. Tutor. 17, 3 (2015), 1455--1472.
    [29]
    Yuan Fei, Huibiao Zhu, and Phan Cong Vinh. 2020. Security analysis of the access control solution of NDN using BAN logic. Mob. Netw. Applic. (2020), 1--12.
    [30]
    Tao Feng and Jiaqi Guo. 2018. A new access control system based on CP-ABE in named data networking. IJ Netw. Sec. 20, 4 (2018), 710--720.
    [31]
    Nikos Fotiou and Bander A. Alzahrani. 2018. Rendezvous-based access control for information-centric architectures. Int. J. Netw. Manag. 28, 1 (2018), e2007.
    [32]
    Nikos Fotiou, Giannis F. Marias, and George C. Polyzos. 2012. Access control enforcement delegation for information-centric networking architectures. ACM SIGCOMM Comput. Commun. Rev. 42, 4 (2012), 497--502.
    [33]
    Nikos Fotiou, Pekka Nikander, Dirk Trossen, and George C Polyzos. 2010. Developing information networking further: From PSIRP to PURSUIT. In Conference on Broadband. Springer, 1--13.
    [34]
    Nikos Fotiou and George C. Polyzos. 2016. Decentralized name-based security for content distribution using blockchains. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’16). IEEE, 415--420.
    [35]
    Wenliang Fu, Hila Ben Abraham, and Patrick Crowley. 2015. Synchronizing namespaces with invertible bloom filters. In ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS’15). IEEE, 123--134.
    [36]
    Wenliang Fu, Hila Ben Abraham, and Patrick Crowley. 2014. iSync: A high performance and scalable data synchronization protocol for named data networking. In ACM Conference on Information-centric Networking. 181--182.
    [37]
    G. Garcia, A. Beben, F. J. Ramon, A. Maeso, I. Psaras, G. Pavlou, et al. 2011. COMET: Content mediator architecture for content-aware networks. In Future Network Mobile Summit.
    [38]
    Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, and Christopher A. Wood. 2015. Interest-based access control for content centric networks. In ACM Conference on Information-centric Networking. ACM, 147--156.
    [39]
    Cesar Ghali, Gene Tsudik, and Ersin Uzun. 2019. In content we trust: Network-layer trust in content-centric networking. IEEE/ACM Trans. Netw. 27, 5 (2019), 1787--1800.
    [40]
    Cesar Ghali, Gene Tsudik, and Christopher A. Wood. 2017. When encryption is not enough: Privacy attacks in content-centric networking. In ACM Conference on Information-centric Networking. ACM, 1--10.
    [41]
    Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. 2006. Attribute-based encryption for fine-grained access control of encrypted data. In ACM Conference on Computer and Communications Security (CCS’06). ACM, 89--98.
    [42]
    Dennis Grewe, K. P. Pavithra Rao, Sebastian Schildt, Marco Wagner, Dominik Schoop, and Hannes Frey. 2017. EnCIRCLE: Encryption-based access control for information-centric connected vehicles. In International Conference on the Network of the Future (NOF’17). IEEE, 114--119.
    [43]
    Balkis Hamdane and Sihem Guemara El Fatmi. 2015. A credential and encryption based access control solution for named data networking. In IFIP/IEEE International Symposium on Integrated Network Management (IM’15). IEEE, 1234--1237.
    [44]
    Balkis Hamdane, Mounira Msahli, Ahmed Serhrouchni, and Sihem Guemara El Fatmi. 2013. Data-based access control in named data networking. In IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. IEEE, 531--536.
    [45]
    Balkis Hamdane, Ahmed Serhrouchni, and Sihem Guemara El Fatmi. 2013. Access control enforcement in named data networking. In International Conference for Internet Technology and Secured Transactions (ICITST’13). IEEE, 576--581.
    [46]
    Rasheed Hussain, Safdar H. Bouk, Nadeem Javaid, Adil M. Khan, and Jooyoung Lee. 2018. Realization of VANET-based cloud services through named data networking. IEEE Commun. Mag. 56, 8 (2018), 168--175.
    [47]
    Mihaela Ion, Jianqing Zhang, and Eve M. Schooler. 2013. Toward content-centric privacy in ICN: Attribute-based encryption and routing. In ACM SIGCOMM Workshop on Information-centric Networking. ACM, 39--40.
    [48]
    Xiaoke Jiang, Jun Bi, Guoshun Nan, and Zhaogeng Li. 2015. A survey on information-centric networking: Rationales, designs and debates. China Commun. 12, 7 (2015), 1--12.
    [49]
    Yinhao Jiang, Willy Susilo, Yi Mu, and Fuchun Guo. 2018. Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Fut. Gen. Comput. Syst. 78 (2018), 720--729.
    [50]
    Ioanna Angeliki Kapetanidou, Christos-Alexandros Sarros, and Vassilis Tsaoussidis. 2019. Reputation-based trust approaches in named data networking. Fut. Internet 11 (2019), 11--241.
    [51]
    Hakima Khelifi, SenLin Luo, Boubakr Nour, and Hassine Moungla. 2019. A Name-to-Hash encoding scheme for vehicular named data networks. In International Wireless Communications & Mobile Computing Conference (IWCMC’19). IEEE, 1--6.
    [52]
    Hakima Khelifi, SenLin Luo, Boubakr Nour, and Hassine Moungla. 2019. LQCC: A link quality-based congestion control scheme in named data networks. In IEEE Wireless Communications and Networking Conference (WCNC’19). IEEE, 1--6.
    [53]
    Hakima Khelifi, Senlin Luo, Boubakr Nour, and Hassine Moungla. 2019. A QoS-aware cache replacement policy for vehicular named data networks. In IEEE Global Communications Conference (GLOBECOM’19). IEEE, 1--6.
    [54]
    Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla, and Syed Hassan Ahmed. 2018. Reputation-based blockchain for secure NDN caching in vehicular networks. In IEEE Conference on Standards for Communications and Networking (CSCN’18). IEEE, 1--6.
    [55]
    Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla, Yasir Faheem, Rasheed Hussain, and Adlen Ksentini. 2019. Named data networking in vehicular ad hoc networks: State-of-the-art and challenges. IEEE Commun. Surv. Tutor. (2019).
    [56]
    Hakima Khelifi, Senlin Luo, Boubakr Nour, Akrem Sellami, Hassine Moungla, Syed Hassan Ahmed, and Mohsen Guizani. 2019. Bringing deep learning at the edge of information-centric Internet of Things. IEEE Commun. Lett. 23, 1 (2019), 52--55.
    [57]
    Hakima Khelifi, Senlin Luo, Boubakr Nour, Akrem Sellami, Hassine Moungla, and F. Naït-Abdesselam. 2018. An optimized proactive caching scheme based on mobility prediction for vehicular networks. In IEEE Global Communications Conference (GLOBECOM’18). IEEE, 1--6.
    [58]
    Hakima Khelifi, Senlin Luo, Boubakr Nour, and Chhattan Shah Shah. 2018. Security and privacy issues in vehicular named data networks: An overview. Mob. Inf. Syst. 2018 (Sep. 2018), 1--11.
    [59]
    Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, and Ion Stoica. 2007. A data-oriented (and beyond) network architecture. In ACM SIGCOMM Computer Communication Review, Vol. 37. ACM, 181--192.
    [60]
    Michał Król, Spyridon Mastorakis, David Oran, and Dirk Kutscher. 2019. Compute first networking: Distributed computing meets ICN. In ACM Conference on Information-centric Networking. ACM, 67--77.
    [61]
    Jun Kurihara, Kenji Yokota, and Atsushi Tagami. 2016. A consumer-driven access control approach to censorship circumvention in content-centric networking. In ACM Conference on Information-centric Networking. ACM, 186--194.
    [62]
    Jun Kuriharay, Ersin Uzun, and Christopher A. Wood. 2015. An encryption-based access control framework for content-centric networking. In IFIP Networking Conference (IFIP Networking’15). IEEE, 1--9.
    [63]
    Dirk Kutscher, Suyong Eum, Kostas Pentikousis, Ioannis Psaras, Daniel Corujo, Damien Saucez, Thomas C. Schmidt, and Matthias Wählisch. 2016. Information-centric Networking (ICN) Research Challenges. RFC 7927.
    [64]
    Bing Li, Dijiang Huang, Zhijie Wang, and Yan Zhu. 2018. Attribute-based access control for ICN naming scheme. IEEE Trans. Depend. Sec. Comput. 15, 2 (2018), 194--206.
    [65]
    Bing Li, Zhijie Wang, Dijiang Huang, and Yan Zhu. 2014. Toward Privacy-preserving Content Access Control for Information Centric Networking. Technical Report. Arizona State University Tempe Office of Research and Sponsored Project Administration.
    [66]
    Jiguo Li, Qihong Yu, Yichen Zhang, and Jian Shen. 2019. Key-policy attribute-based encryption against continual auxiliary input leakage. Inf. Sci. 470 (2019), 175--188.
    [67]
    Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, and Xiaoming Fu. 2015. LIVE: Lightweight integrity verification and content access control for named data networking. IEEE Trans. Inf. Forens. Sec. 10, 2 (2015), 308--320.
    [68]
    Tianxiang Li, Zhaoning Kong, Spyridon Mastorakis, and Lixia Zhang. 2019. Distributed dataset synchronization in disruptive networks. In IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS’19). IEEE, 428--437.
    [69]
    Tianxiang Li, Spyridon Mastorakis, Xin Xu, Haitao Zhang, and Lixia Zhang. 2018. Data synchronization in ad hoc mobile networks. In 5th ACM Conference on Information-centric Networking. 186--187.
    [70]
    Zhuo Li, Yaping Xu, Beichuan Zhang, Liu Yan, and Kaihua Liu. 2019. Packet forwarding in named data networking requirements and survey of solutions. IEEE Commun. Surv. Tutor. 21, 2 (2019), 1950--1987.
    [71]
    Teng Liang, Ju Pan, and Beichuan Zhang. 2018. NDNizing existing applications: Research issues and experiences. In ACM Conference on Information-centric Networking. ACM, 1--10.
    [72]
    Ningchun Liu, Shuai Gao, and Ningho Hou. 2019. CDAC: A collaborative data access control scheme in named data networking. In International Conference on Hot Information-centric Networking (HotICN’19). IEEE, 44--49.
    [73]
    Roman Lutz. 2016. Security and privacy in future internet architectures-benefits and challenges of content centric networks. arXiv preprint arXiv:1601.01278 (2016).
    [74]
    Qiuyun Lyu, Yizhen Qi, Xiaochen Zhang, Huaping Liu, Qiuhua Wang, and Ning Zheng. 2020. SBAC: A secure blockchain-based access control framework for information-centric networking. J. Netw. Comput. Applic. 149 (2020), 102444.
    [75]
    Manisha Malik, Maitreyee Dutta, and Jorge Granjal. 2019. A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things. IEEE Access 7 (2019), 27443--27464.
    [76]
    Michele Mangili, Fabio Martignon, and Stefano Paraboschi. 2015. A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in content-centric networks. Comput. Netw. 76 (2015), 126--145.
    [77]
    Claudio Marxer, Christopher Scherb, and Christian Tschudin. 2016. Access-controlled in-network processing of named data. In ACM Conference on Information-centric Networking. ACM, 77--82.
    [78]
    Claudio Marxer and Christian Tschudin. 2017. Schematized access control for data cubes and trees. In ACM Conference on Information-centric Networking. ACM, 170--175.
    [79]
    Spyridon Mastorakis, Alexander Afanasyev, Yingdi Yu, and Lixia Zhang. 2017. nTorrent: Peer-to-peer file sharing in named data networking. In International Conference on Computer Communication and Networks (ICCCN’17). IEEE, 1--10.
    [80]
    Spyridon Mastorakis, Peter Gusev, Alexander Afanasyev, and Lixia Zhang. 2018. Real-time data retrieval in named data networking. In IEEE International Conference on Hot Information-centric Networking (HotICN’18). IEEE, 61--66.
    [81]
    Spyridon Mastorakis, Tianxiang Li, and Lixia Zhang. 2020. DAPES: Named data for off-the-grid file sharing with peer-to-peer interactions. arXiv preprint arXiv:2006.01651 (2020).
    [82]
    Spyridon Mastorakis and Abderrahmen Mtibaa. 2019. Towards service discovery and invocation in data-centric edge networks. In IEEE International Conference on Network Protocols (ICNP’19). IEEE, 1--6.
    [83]
    Spyridon Mastorakis, Abderrahmen Mtibaa, Jonathan Lee, and Satyajayant Misra. 2020. ICedge: When edge computing meets information-centric networking. IEEE Internet Things J. 7, 5 (2020), 4203--4217.
    [84]
    Mohamed Nidhal Mejri and Jalel Ben-Othman. 2016. GDVAN: A new greedy behavior attack detection algorithm for VANETs. IEEE Trans. Mob. Comput. 16, 3 (2016), 759--771.
    [85]
    Mohamed Nidhal Mejri, Jalel Ben-Othman, and Mohamed Hamdi. 2014. Survey on VANET security challenges and possible cryptographic solutions. Vehic. Commun. 1, 2 (2014), 53--66.
    [86]
    N. Blefari Melazzi, S. Salsano, A. Detti, G. Tropea, L. Chiariglione, A. Difino et al. 2012. Publish/subscribe over information centric networks: A Standardized approach in CONVERGENCE. In Future Network Mobile Summit.
    [87]
    Satyajayant Misra, Reza Tourani, and Nahid Ebrahimi Majd. 2013. Secure content delivery in information-centric networks: Design, implementation, and analyses. In ACM SIGCOMM Workshop on Information-centric Networking. ACM, 73--78.
    [88]
    Satyajayant Misra, Reza Tourani, Frank Natividad, Travis Mick, Nahid Ebrahimi Majd, and Hong Huang. 2019. AccConF: An access control framework for leveraging in-network cached data in the ICN-enabled wireless edge. IEEE Trans. Depend. Sec. Comput. 16, 1 (2019), 5--17.
    [89]
    Lynda Mokdad, Jalel Ben-Othman, and Anh Tuan Nguyen. 2015. DJAVAN: Detecting jamming attacks in vehicle ad hoc networks. Perf. Eval. 87 (2015), 47--59.
    [90]
    Edith Ngai, Börje Ohlman, Gene Tsudik, Ersin Uzun, Matthias Wählisch, and Christopher A. Wood. 2017. Can we make a cake and eat it too? A discussion of ICN security and privacy. ACM SIGCOMM Comput. Commun. Rev. 47, 1 (2017), 49--54.
    [91]
    B. Nour, K. Sharif, F. Li, S. Biswas, H. Moungla, M. Guizani, and Y. Wang. 2019. A survey of Internet of Things communication using ICN: A use case perspective. Comput. Commun. (2019).
    [92]
    Boubakr Nour, Kashif Sharif, Fan Li, Hakima Khelifi, and Hassine Moungla. 2018. NNCP: A named data network control protocol for IoT applications. In IEEE Conference on Standards for Communications and Networking (CSCN’18). IEEE, 1--6.
    [93]
    Boubakr Nour, Kashif Sharif, Fan Li, and Hassine Moungla. 2017. A distributed ICN-based IoT network architecture: An ambient assisted living application case study. In IEEE Global Communications Conference (GLOBECOM’17). IEEE, 1--6.
    [94]
    Boubakr Nour, Kashif Sharif, Fan Li, Hassine Moungla, Ahmed E. Kamal, and Hossam Afifi. 2018. NCP: A near ICN cache placement scheme for IoT-based traffic class. In IEEE Global Communications Conference (GLOBECOM’18). IEEE, 1--6.
    [95]
    Boubakr Nour, Kashif Sharif, Fan Li, Hassine Moungla, and Yang Liu. 2017. M2HAV: A standardized ICN naming scheme for wireless devices in Internet of Things. In International Conference Wireless Algorithms, Systems, and Applications (WASA’17). Springer International Publishing, 289--301.
    [96]
    Boubakr Nour, K. Sharif, F. Li, H. Moungla, and Y. Liu. 2019. A unified hybrid information-centric naming scheme for IoT applications. Comput. Commun. (Nov. 2019).
    [97]
    Boubakr Nour, Kashif Sharif, Fan Li, and Yu Wang. 2019. Security and privacy challenges in information centric wireless IoT networks. IEEE Sec. Priv. (2019).
    [98]
    Boubakr Nour, Kashif Sharif, Fan Li, Song Yang, Hassine Moungla, and Yu Wang. 2019. ICN publisher-subscriber models: Challenges and group-based communication. IEEE Netw. (2019).
    [99]
    Fabian Oehlmann. 2013. Content-centric networking. Seminar FI & IITM: Netw. Archit. Serv. 43 (2013), 11--18.
    [100]
    Svetlana Ostrovskaya, Oleg Surnin, Rasheed Hussain, Safdar Hussain Bouk, Joo Young Lee, Narges Mehran, Syed Hassan Ahmed, and Abderrahim Benslimane. 2018. Towards multi-metric cache replacement policies in vehicular named data networks. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’18). IEEE, 1--7.
    [101]
    Jianli Pan, Subharthi Paul, and Raj Jain. 2011. A survey of the research on future internet architectures. IEEE Commun. Mag. 49, 7 (2011).
    [102]
    Kostas Pentikousis, Börje Ohlman, Elwyn B. Davies, Spiros Spirou, and Gennaro Boggia. 2016. Information-centric Networking: Evaluation and Security Considerations. RFC 7945.
    [103]
    Lei Pi and Lan Wang. 2018. Secure bootstrapping and access control in NDN-based smart home systems. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’18). IEEE, 1--2.
    [104]
    Akbar Rahman, Dirk Trossen, Dirk Kutscher, and Ravi Ravindran. 2019. Deployment Considerations for Information-centric Networking (ICN). Internet-Draft. Internet Engineering Task Force. Work in Progress.
    [105]
    Sanjeev Kaushik Ramani, Reza Tourani, George Torres, Satyajayant Misra, and Alexander Afanasyev. 2019. NDN-ABS: Attribute-based signature scheme for named data networking. In ACM Conference on Information-centric Networking. 123--133.
    [106]
    P. H. Rettore, G. Maia, L. A. Villas, and A. A. F. Loureiro. 2019. Vehicular data space: The data point of view. IEEE Commun. Surv. Tutor. (2019), 1--1.
    [107]
    Daniel Rezende, Carlos Maziero, and Elisa Mannes. 2018. A distributed online certificate status protocol for named data networks. In ACM Symposium on Applied Computing. ACM, 2102--2108.
    [108]
    Divya Saxena, Vaskar Raychoudhury, Neeraj Suri, Christian Becker, and Jiannong Cao. 2016. Named data networking: A survey. Comput. Sci. Rev. 19 (2016), 15--55.
    [109]
    Anand Seetharam. 2018. On caching and routing in information-centric networks. IEEE Commun. Mag. 56, 3 (2018), 204--209.
    [110]
    Ivan Seskar, Kiran Nagaraja, Sam Nelson, and Dipankar Raychaudhuri. 2011. Mobilityfirst: Future Internet architecture project. In Asian Internet Engineering Conference. ACM.
    [111]
    Masoumeh Shafieinejad and Reihaneh Safavi-Naini. 2017. A post-quantum one time signature using bloom filter. In Conference on Privacy, Security and Trust (PST’17). IEEE, 397--3972.
    [112]
    Wentao Shang, Yingdi Yu, Lijing Wang, Alexander Afanasyev, and Lixia Zhang. 2017. A Survey of Distributed Dataset Synchronization in Named Data Networking. Technical Report. Technical Report NDN-0053, NDN. UCLA, Peking University and PARC.
    [113]
    Susmit Shannigrahi, Chengyu Fan, and Christos Papadopoulos. 2018. SCARI: A strategic caching and reservation protocol for ICN. In the Asian Internet Engineering Conference. ACM, 1--8.
    [114]
    Justine Sherry, Chang Lan, Raluca Ada Popa, and Sylvia Ratnasamy. 2015. Blindbox: Deep packet inspection over encrypted traffic. ACM SIGCOMM Comput. Commun. Rev. 45, 4 (2015), 213--226.
    [115]
    Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu. 2016. Edge computing: Vision and challenges. IEEE Internet Things J. 3, 5 (2016), 637--646.
    [116]
    Sapna Singh. 2012. A trust based approach for secure access control in information centric network. Int. J. Inf. Netw. Sec. 1, 2 (2012), 97.
    [117]
    Junggab Son, Donghyun Kim, Md Zakirul Alam Bhuiyan, Rasheed Hussain, and Heekuck Oh. 2017. A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment. Concurr. Computat.: Pract. Exper. 29, 14 (2017), e3946.
    [118]
    J. Son, D. Kim, R. Hussain, and H. Oh. 2014. Conditional proxy re-encryption for secure big data group sharing in cloud environment. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’14). 541--546.
    [119]
    J. Son, D. Kim, R. Hussain, and H. Oh. 2014. Conditional proxy re-encryption for secure big data group sharing in cloud environment. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’14). 541--546.
    [120]
    Kalika Suksomboon, Atsushi Tagami, Anirban Basu, and Jun Kurihara. 2017. IPRES: In-device proxy re-encryption service for secure ICN. In ACM Conference on Information-centric Networking. ACM, 176--177.
    [121]
    Xiaobin Tan, Zifei Zhou, Cliff Zou, Yukun Niu, and Xin Chen. 2014. Copyright protection in named data networking. In International Conference on Wireless Communications and Signal Processing (WCSP’14). IEEE, 1--6.
    [122]
    Reza Tourani, Travis Mick, Satyajayant Misra, and Gaurav Panwar. 2018. Security, privacy, and access control in information-centric networking: A survey. IEEE Commun. Surv. Tutor. 20, 1 (2018), 566--600.
    [123]
    Christian Tschudin. 2016. Private information retrieval over ICN. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’16). IEEE, 534--539.
    [124]
    Christian Tschudin, Ersin Uzun, and Christopher A. Wood. 2016. Trust in information-centric networking: From theory to practice. In International Conference on Computer Communication and Networks (ICCCN’16). IEEE, 1--9.
    [125]
    Yi-Fan Tseng, Chun-I Fan, and Chin-Yu Wu. 2018. FGAC-NDN: Fine-grained access control for named data networks. IEEE Trans. Netw. Serv. Manag. 16, 1 (2018), 143--152.
    [126]
    Gene Tsudik, Ersin Uzun, and Christopher A. Wood. 2016. AC3N: Anonymous communication in content-centric networking. In IEEE Consumer Communications & Networking Conference (CCNC’16). IEEE, 988--991.
    [127]
    Gareth Tyson, Nishanth Sastry, Ivica Rimac, Ruben Cuevas, and Andreas Mauthe. 2012. A survey of mobility in information-centric networks: Challenges and research directions. In ACM Workshop on Emerging Name-oriented Mobile Networking Design—Architecture, Algorithms, and Applications. 1--6.
    [128]
    Rehmat Ullah, Syed Hassan Ahmed, and Byung-Seo Kim. 2018. Information-centric networking with edge computing for IoT: Research challenges and future directions. IEEE Access 6 (2018), 73465--73488.
    [129]
    Henk C. A. Van Tilborg and Sushil Jajodia. 2014. Encyclopedia of Cryptography and Security. Springer Science & Business Media.
    [130]
    Athanasios V. Vasilakos, Zhe Li, Gwendal Simon, and Wei You. 2015. Information centric network: Research challenges and opportunities. J. Netw. Comput. Applic. 52 (2015), 1--10.
    [131]
    Anna Volkova, Michael Niedermeier, Robert Basmadjian, and Hermann de Meer. 2019. Security challenges in control network protocols: A survey. IEEE Commun. Surv. Tutor. 21, 1 (2019), 619--639.
    [132]
    Licheng Wang, Zonghua Zhang, Mianxiong Dong, Lihua Wang, Zhenfu Cao, and Yixian Yang. 2018. Securing named data networking: Attribute-based encryption and beyond. IEEE Commun. Mag. 56, 11 (2018), 76--81.
    [133]
    Yu Wang, Mingwei Xu, Zhen Feng, Qing Li, and Qi Li. 2014. Session-based access control in information-centric networks: Design and analyses. In IEEE International Performance Computing and Communications Conference (IPCCC’14). IEEE, 1--8.
    [134]
    Christopher A. Wood and Ersin Uzun. 2014. Flexible end-to-end content security in CCN. In IEEE Consumer Communications and Networking Conference (CCNC’14). IEEE, 858--865.
    [135]
    Zhijun Wu, Enzhong Xu, Liang Liu, and Meng Yue. 2019. CHTDS: A CP-ABE access control scheme based on hash table and data segmentation in NDN. In IEEE International Conference on Trust, Security and Privacy in Computing and Communications/IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE’19). IEEE, 843--848.
    [136]
    Zhijun Wu, Yun Zhang, and Enzhong Xu. 2020. Multi-authority revocable access control method based on CP-ABE in NDN. Fut. Internet 12, 1 (2020), 15.
    [137]
    Chengcheng Xu, Shuhui Chen, Jinshu Su, Siu-Ming Yiu, and Lucas C. K. Hui. 2016. A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms. IEEE Commun. Surv. Tutor. 18, 4 (2016), 2991--3029.
    [138]
    Kaiping Xue, Peixuan He, Xiang Zhang, Qiudong Xia, David S. L. Wei, Hao Yue, and Feng Wu. 2019. A secure, efficient, and accountable edge-based access control framework for information centric networks. IEEE/ACM Trans. Netw. 27, 3 (2019), 1220--1233.
    [139]
    George Xylomenos, Christopher N. Ververidis, Vasilios A. Siris, Nikos Fotiou, Christos Tsilopoulos, Xenofon Vasilakos, Konstantinos V. Katsaros, and George C. Polyzos. 2014. A survey of information-centric networking research. IEEE Commun. Surv. Tutor. 16, 2 (2014), 1024--1049.
    [140]
    Haomiao Yang, Xiaofen Wang, Chun Yang, Xin Cong, and You Zhang. 2019. Securing content-centric networks with content-based encryption. J. Netw. Comput. Applic. 128 (2019), 21--32.
    [141]
    Yingdi Yu, Alexander Afanasyev, and Lixia Zhang. 2015. Name-based Access Control. Named Data Networking Project, Technical Report NDN-0034. UCLA, Peking University and PARC.
    [142]
    Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, and Bo Yang. 2018. Content protection in named data networking: Challenges and potential solutions. IEEE Commun. Mag. 56, 11 (2018), 82--87.
    [143]
    Guoqiang Zhang, Yang Li, and Tao Lin. 2013. Caching in information centric networking: A survey. Comput. Netw. 57, 16 (2013), 3128--3141.
    [144]
    Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, Patrick Crowley, Christos Papadopoulos, Lan Wang, Beichuan Zhang, et al. 2014. Named data networking. ACM SIGCOMM Comput. Commun. Rev. 44, 3 (2014), 66--73.
    [145]
    Lixia Zhang, Deborah Estrin, Jeffrey Burke, Van Jacobson, James D. Thornton, Diana K. Smetters, Beichuan Zhang, Gene Tsudik, Dan Massey, and Christos Papadopoulos. 2010. Named Data Networking (NDN) Project. Technical Report NDN-0001, Xerox Palo Alto Research Center-PARC.
    [146]
    Yu Zhang, Zhongda Xia, Spyridon Mastorakis, and Lixia Zhang. 2018. KITE: Producer mobility support in named data networking. In ACM Conference on Information-centric Networking. ACM, 125--136.
    [147]
    Zhiyi Zhang, Yingdi Yu, Alexander Afanasyev, Jeff Burke, and Lixia Zhang. 2017. NAC: Name-based access control in named data networking. In ACM Conference on Information-centric Networking. ACM, 186--187.
    [148]
    Zhiyi Zhang, Yingdi Yu, Haitao Zhang, Eric Newberry, Spyridon Mastorakis, Yanbiao Li, Alexander Afanasyev, and Lixia Zhang. 2018. An overview of security support in named data networking. IEEE Commun. Mag. 56, 11 (2018), 62--68.
    [149]
    Qingji Zheng, Guoqiang Wang, Ravishankar Ravindran, and Aytac Azgin. 2015. Achieving secure and scalable data access control in information-centric networking. In IEEE International Conference on Communications (ICC’15). IEEE, 5367--5373.
    [150]
    Liehuang Zhu, Nassoro M. R. Lwamo, Kashif Sharif, Chang Xu, Xiaojiang Du, Mohsen Guizani, and Fan Li. 2020. T-CAM: Time-based content access control mechanism for ICN subscription systems. Fut. Gen. Comput. Syst. 106 (2020), 607--621.

    Cited By

    View all
    • (2024)Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud ComputingIEEE Transactions on Cloud Computing10.1109/TCC.2024.338612612:2(659-670)Online publication date: Apr-2024
    • (2024)Secure architecture for Industrial Edge of Things(IEoT): A hierarchical perspectiveComputer Networks10.1016/j.comnet.2024.110641251(110641)Online publication date: Sep-2024
    • (2023)A Secure and Optimal Content Validation and Protection Scheme for Information Centric NetworksInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-9717(58-66)Online publication date: 3-May-2023
    • Show More Cited By

    Index Terms

    1. Access Control Mechanisms in Named Data Networks: A Comprehensive Survey

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Computing Surveys
      ACM Computing Surveys  Volume 54, Issue 3
      April 2022
      836 pages
      ISSN:0360-0300
      EISSN:1557-7341
      DOI:10.1145/3461619
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 April 2021
      Accepted: 01 December 2020
      Revised: 01 July 2020
      Received: 01 March 2020
      Published in CSUR Volume 54, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Information-centric networking
      2. access control mechanisms
      3. named data networking
      4. survey

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)117
      • Downloads (Last 6 weeks)13
      Reflects downloads up to 27 Jul 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud ComputingIEEE Transactions on Cloud Computing10.1109/TCC.2024.338612612:2(659-670)Online publication date: Apr-2024
      • (2024)Secure architecture for Industrial Edge of Things(IEoT): A hierarchical perspectiveComputer Networks10.1016/j.comnet.2024.110641251(110641)Online publication date: Sep-2024
      • (2023)A Secure and Optimal Content Validation and Protection Scheme for Information Centric NetworksInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-9717(58-66)Online publication date: 3-May-2023
      • (2023)NACDA: Naming-Based Access Control and Decentralized Authorization for Secure Many-to-Many Data SharingElectronics10.3390/electronics1207165112:7(1651)Online publication date: 31-Mar-2023
      • (2023)Securing Scalable Real-time Multiparty Communications with Hybrid Information-centric NetworkingACM Transactions on Internet Technology10.1145/359358523:2(1-20)Online publication date: 19-May-2023
      • (2023)Two-Way Reliable Forwarding Strategy of RIS Symbiotic Communications for Vehicular Named Data NetworksIEEE Internet of Things Journal10.1109/JIOT.2022.323307410:22(19385-19398)Online publication date: 15-Nov-2023
      • (2023)Ensuring Content Integrity and Confidentiality in Information-Centric Secure Networks2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51644.2023.10060672(810-816)Online publication date: 8-Jan-2023
      • (2023)Security and Integrity Attacks in Named Data Networking: A SurveyIEEE Access10.1109/ACCESS.2023.323873211(7984-8004)Online publication date: 2023
      • (2023)Signing data citations enables data verification and citation persistenceScientific Data10.1038/s41597-023-02230-y10:1Online publication date: 27-Jun-2023
      • (2023)On the ICN-IoT with federated learning integration of communicationFuture Generation Computer Systems10.1016/j.future.2022.08.004138:C(61-88)Online publication date: 1-Jan-2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media