scispace - formally typeset
Proceedings ArticleDOI

Cache Pollution Prevention Mechanism Based on Cache Partition in V-NDN

Reads0
Chats0
TLDR
Experiments show that the cache partition mechanism can effectively resist the attack of cache pollution, and the number of Interest packets requested by normal users in the whole network has also been greatly reduced, which greatly reduces the traffic within the network.
Abstract
The information-centric networking, which aims to solve the demand for distributing a large amount of content on the Internet, has proved to be a promising example for various network solutions, such as the Vehicular ad-hoc network (VANET). However, some problems are introduced when the named data networking is combined with V-NDN, such as the cache pollution. In order to solve the cache pollution attack, we propose a mechanism based on cache partition, which divides the cache of nodes into two parts and stores the content of different popularity respectively. We monitor the interest packets received by each node and get the corresponding popularity of each content. According to the popularity of the content, the content is stored in the corresponding cache. In addition, when the popularity of the content changes, we add the name of the content to the monitoring list to determine whether it is an attack content. This paper simulates the cache partition mechanism under different request frequencies and different forwarding strategies. The experimental results show that the average hit rate of node cache can be increased by 14% and the user request delay can be reduced by 30% when the node is attacked. At the same time, the number of Interest packets requested by normal users in the whole network has also been greatly reduced, which greatly reduces the traffic within the network. Experiments show that the cache partition mechanism can effectively resist the attack of cache pollution.

read more

Citations
More filters
Journal ArticleDOI

A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking

TL;DR: In this paper , the authors provide a taxonomy of intrusion detection systems in NDNs, together with a review of the significant research works up to the present time, and a classification of the proposed systems according to the taxonomy.
Journal ArticleDOI

Exploiting Non-Cooperative Game Against Cache Pollution Attack in Vehicular Content Centric Network

TL;DR: In this article , the authors proposed a detection and defense scheme for cache pollution attack in VANETs by adopting game theory and proved the nonexistence of pure strategy Nash equilibrium in the attacker and defender game, and proposed a normal form game model with complete information and an extensive Bayesian form game with incomplete information.
Journal ArticleDOI

On the realization of VANET using named data networking: On improvement of VANET using NDN‐based routing, caching, and security

TL;DR: In this paper , the authors present a survey of the state-of-the-art on the developments in place, in order to leverage the characteristics of NDN in VANET.
Journal ArticleDOI

IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity

TL;DR: In this paper , the authors proposed a new parameter for the detection of cache pollution attack, which is based on the number of distinct users requesting interest packets for a content over a period of time.
Proceedings ArticleDOI

Multi-feature content popularity prediction algorithm based on GRU-Attention in V-NDN

Min Feng, +2 more
TL;DR: In this paper , a multi-feature content popularity prediction algorithm based on the attention mechanism and GRU (GRU-Attention) model is proposed to predict the future popularity of content.
References
More filters
Journal ArticleDOI

A survey of information-centric networking

TL;DR: This work compares and discusses design choices and features of proposed ICN architectures, focusing on the following main components: named data objects, naming and security, API, routing and transport, and caching.
Journal ArticleDOI

Information centric network: Research challenges and opportunities

TL;DR: This survey focuses on the current progress of the research work in Information Centric Network, and investigates various key aspects such as naming and routing schemes, in-network caching policies, etc., and highlights the benefit of implementing ICN, open research issues and new interests in this domain.
Posted Content

Security, Privacy, and Access Control in Information-Centric Networking: A Survey

TL;DR: In this article, the authors survey the existing literature in security and privacy sub-space in ICN and explore three broad areas: security threats, privacy risks, and access control enforcement mechanisms.
Journal ArticleDOI

Security, Privacy, and Access Control in Information-Centric Networking: A Survey

TL;DR: In this article, the authors survey the existing literature in security and privacy in ICN and present open questions, and explore three broad areas: 1) security threats, 2) privacy risks, and 3) access control enforcement mechanisms.
Journal ArticleDOI

A lightweight mechanism for detection of cache pollution attacks in Named Data Networking

TL;DR: This paper focuses on cache pollution attacks, where the adversary's goal is to disrupt cache locality to increase link utilization and cache misses for honest consumers, and illustrates that existing proactive countermeasures are ineffective against realistic adversaries.
Related Papers (5)