Home   >   CSC-OpenAccess Library   >    Manuscript Information
Security Aspects of the Information Centric Networks Model
Amjad Mahfouth
Pages - 62 - 65     |    Revised - 15-05-2013     |    Published - 30-06-2013
Volume - 7   Issue - 2    |    Publication Date - June 2013  Table of Contents
ICN, Denial of Service, Encryption, Digital Signature.
With development of internet and the enormous growth of contents over networks, that motivated the researchers to proposed new paradigm model called Information Centric Networks ICN , the most features of ICN model is based on the content itself, instead, of the server located the contents over internet. This new model has a lot of challenges such as, mobility of contents, naming, replications, cashing, communications, and the security issue to secure the contents, customer, and providers. In this paper we will focus on ICN Model and propose solutions of security to protect the network elements, since the security is based on the packet itself rather than the host-centric.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 TechRepublic 
5 Scribd 
6 SlideShare 
7 PdfSR 
A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. Shenker. Naming in ContentOriented Architectures. In Proc of SIGCOMM, Workshop on ICN, 2011.
Ali Ghodsi, Teemu Koponen, Barath Raghavan, Scott Shenker, Ankit Singla, Janes Wilcox,Information-Centric Networking. Seeing the Forest for the Trees, Cambridge, MA,USA. copyright 2022, ACM 978-1-4503-1059-8/11/11, 2011.
B. Ahlgren et al., “Second NetInf Architecture Description,” 4WARD EU FP7 Project,Deliverable D-6.2 v2.0, Apr. 2010, FP7-ICT-2007-1-216041- 4WARD / D-6.2,http://www.4ward-project.eu/.
Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, and Börje Ohlman, A Survey of Information-Centric Networking. 0163-6804/12/, 2012 IEEE IEEE Communications Magazine. July 2012.
Cheriton,D. R., & Gritter, M. (2000). TRIAD: A new next-generation Internet architecture.Retrieved from. Available on :http://citeseerx.ist.psu.edu/viewdoc/summary?doi=
CiscoSystems. (2011). Cisco Report for IP Growth for 2011-2016. Internet Report, 1, 3.
D. Smetters and V. Jacobson. Securing Network Content. Technical report, PARC,October 2009.
D. Wendlandt, I. Avramopoulos, D. Andersen, and J. Rexford. Don’t Secure Routing Protocols, Secure Data Delivery. In Proc. of HotNets, 2006.
Dimitrov, V., & Koptchev, V. (2010). PSIRP project – publish-subscribe internet routing paradigm: new ideas for future internet. In Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies (pp. 167–171). New York,NY, USA: ACM. doi:10.1145/1839379.1839409.
Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., & Braynard, R. L.(2009). Networking named content. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (pp. 1–12). New York, NY, USA: ACM.doi:10.1145/1658939.1658941.
Koponen, T., Chawla, M., Chun, B.G., Ermolinskiy, A., Kim, K. H., Shenker, S., & Stoica, I.(2007). A data-oriented (and beyond) network architecture. SIGCOMM Comput. Commun.Rev., 37(4), 181–192. doi:10.1145/1282427.1282402.
M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the Web from DNS. In Proc. of NSDI, 2004.
Dr. Amjad Mahfouth
Computer Information System Al Quds Open Univeristy Tulkarm,00970, Palestine - Palestine