Table of Content

Open Access iconOpen Access

ARTICLE

RETRACTED: Mitigating Content Caching Attack in NDN

Zhiqiang Ruan1,*, Haibo Luo1, Wenzhong Lin1, Jie Wang2

Department of Computer Science, Minjiang University, Wenxian Road No.1, Fuzhou, Fujian, 350108, China.
Department of Computer Science, University of Massachusetts Lowell, One University Avenue, Lowell, M. A., 01854, USA.

* Corresponding Author: Zhiqiang Ruan. Email: email.

Computers, Materials & Continua 2018, 56(3), 483-499. https://doi.org/ 10.3970/cmc.2018.03687

Abstract

Content caching is a core component in Named Data Networking (NDN), where content is cached in routers and served for future requests. However, the adversary can launch verification attack by placing poisoned data into the network with a legitimate name and allow the routers in the delivery path to frequently identify the content. Since NDN employs digital signature on each piece of content, verifying all content will exhaust routers’ computational resources due to the massive data in the network. In this paper, we propose a selective verification scheme upon the contents that are hit in the content store and allow the contents that are not actually served to be unverified. We also consider the redundant verification of popular content and incorporated in our design to lessen the re-accessing overhead. Analysis and performance results show that the proposed scheme can greatly mitigate the risk of content verification attacks and save the computational resources of relay nodes.

Keywords


Cite This Article

APA Style
Ruan, Z., Luo, H., Lin, W., Wang, J. (2018). RETRACTED: mitigating content caching attack in NDN. Computers, Materials & Continua, 56(3), 483-499. https://doi.org/ 10.3970/cmc.2018.03687
Vancouver Style
Ruan Z, Luo H, Lin W, Wang J. RETRACTED: mitigating content caching attack in NDN. Comput Mater Contin. 2018;56(3):483-499 https://doi.org/ 10.3970/cmc.2018.03687
IEEE Style
Z. Ruan, H. Luo, W. Lin, and J. Wang "RETRACTED: Mitigating Content Caching Attack in NDN," Comput. Mater. Contin., vol. 56, no. 3, pp. 483-499. 2018. https://doi.org/ 10.3970/cmc.2018.03687



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1914

    View

  • 983

    Download

  • 0

    Like

Related articles

Share Link