File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Defend against Internet censorship in named data networking

TitleDefend against Internet censorship in named data networking
Authors
KeywordsSmart router
Named Data Networking
Internet censorship
Anti-censorship
Proxy server
Issue Date2016
PublisherIEEE.
Citation
The 18th International Conference on Advanced Communications Technology (IEEE/ICACT 2016), PyeongChang, Korea, 31-3 February 2016. In Conference Proceedings, 2016, p. 300-305 How to Cite?
AbstractNamed Data Networking (NDN), as a promising next generation network, has several advantages in scalability, mobility and network efficiency compared with IP-based Internet. These advantages come with the usage of named content, powerful routers and intermediate cache. These, however, make censorship in NDN more easily to deploy. In this paper we give an analysis of the possible censorship techniques in NDN and come up with two most effective attacks: name-watchlist attack and deep packet inspection. Existing solutions against censorship in IP-based network and NDN either cannot defend against both attacks or disable the cache mechanism, thus decrease the network efficiency. We propose a scheme which adopts the idea of proxy web servers and brings in the concept of smart routers to partially persevere the functionality of intermediate cache and improve network performance. Security analysis shows that as long as the consumer can connect to a smart router which performs a second-time disguise of the requested name without going through a compromised smart router, he can retrieve his interested Data packet. Simulation result shows that the usage of smart routers helps mitigate the performance overhead to disguise Interest names and Data content. © 2016 Global IT Research Institute (GiRI).
Persistent Identifierhttp://hdl.handle.net/10722/234887
ISBN

 

DC FieldValueLanguage
dc.contributor.authorCui, X-
dc.contributor.authorTsang, YH-
dc.contributor.authorHui, LCK-
dc.contributor.authorYiu, SM-
dc.contributor.authorLuo, B-
dc.date.accessioned2016-10-14T13:49:53Z-
dc.date.available2016-10-14T13:49:53Z-
dc.date.issued2016-
dc.identifier.citationThe 18th International Conference on Advanced Communications Technology (IEEE/ICACT 2016), PyeongChang, Korea, 31-3 February 2016. In Conference Proceedings, 2016, p. 300-305-
dc.identifier.isbn978-899686506-3-
dc.identifier.urihttp://hdl.handle.net/10722/234887-
dc.description.abstractNamed Data Networking (NDN), as a promising next generation network, has several advantages in scalability, mobility and network efficiency compared with IP-based Internet. These advantages come with the usage of named content, powerful routers and intermediate cache. These, however, make censorship in NDN more easily to deploy. In this paper we give an analysis of the possible censorship techniques in NDN and come up with two most effective attacks: name-watchlist attack and deep packet inspection. Existing solutions against censorship in IP-based network and NDN either cannot defend against both attacks or disable the cache mechanism, thus decrease the network efficiency. We propose a scheme which adopts the idea of proxy web servers and brings in the concept of smart routers to partially persevere the functionality of intermediate cache and improve network performance. Security analysis shows that as long as the consumer can connect to a smart router which performs a second-time disguise of the requested name without going through a compromised smart router, he can retrieve his interested Data packet. Simulation result shows that the usage of smart routers helps mitigate the performance overhead to disguise Interest names and Data content. © 2016 Global IT Research Institute (GiRI).-
dc.languageeng-
dc.publisherIEEE.-
dc.relation.ispartofInternational Conference on Advanced Communication Technology (ICACT) Proceedings-
dc.rightsInternational Conference on Advanced Communication Technology (ICACT) Proceedings. Copyright © IEEE.-
dc.rights©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.-
dc.subjectSmart router-
dc.subjectNamed Data Networking-
dc.subjectInternet censorship-
dc.subjectAnti-censorship-
dc.subjectProxy server-
dc.titleDefend against Internet censorship in named data networking-
dc.typeConference_Paper-
dc.identifier.emailHui, LCK: hui@cs.hku.hk-
dc.identifier.emailYiu, SM: smyiu@cs.hku.hk-
dc.identifier.authorityHui, LCK=rp00120-
dc.identifier.authorityYiu, SM=rp00207-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/ICACT.2016.7423368-
dc.identifier.scopuseid_2-s2.0-84962799652-
dc.identifier.hkuros268874-
dc.identifier.spage300-
dc.identifier.epage305-
dc.publisher.placeUnited States-
dc.customcontrol.immutablesml 161202-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats