File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Can we make a cake and eat it too? a discussion of ICN security and privacy

TitleCan we make a cake and eat it too? a discussion of ICN security and privacy
Authors
KeywordsSecurity and Privacy
Information-Centric Networking
Issue Date2017
Citation
Computer Communication Review, 2017, v. 47, n. 1, p. 49-54 How to Cite?
AbstractIn recent years, Information-centric Networking (ICN) has received much attention from both academic and industry participants. ICN offers data-centric inter-networking that is radically different from today's host-based IP networks. Security and privacy features on today's Internet were originally not present and have been incrementally retrofitted over the last 35 years. As such, these issues have become increasingly important as ICN technology gradually matures towards real-world deployment. Thus, while ICN-based architectures (e.g., NDN, CCNx, etc.) are still evolving, it is both timely and important to explore ICN security and privacy issues as well as devise and assess possible mitigation techniques. This report documents the highlights and outcomes of the Dagstuhl Seminar 16251 on "Information-centric Networking and Security." The goal of which was to bring together researchers to discuss and address security and privacy issues particular to ICN-based architectures. Upon finishing the three-day workshop, the outlook of ICN is still unclear. Many unsolved and ill-addressed problems remain, such as namespace and identity management, object security and forward secrecy, and privacy. Regardless of the fate of ICN, one thing is certain: much more research and practical experience with these systems is needed to make progress towards solving these arduous problems.
Persistent Identifierhttp://hdl.handle.net/10722/281459
ISSN
2023 Impact Factor: 2.2
2023 SCImago Journal Rankings: 0.876
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorNgai, Edith-
dc.contributor.authorOhlman, Borje-
dc.contributor.authorTsudik, Gene-
dc.contributor.authorUzun, Ersin-
dc.contributor.authorWahlisch, Matthias-
dc.contributor.authorWood, Christopher A.-
dc.date.accessioned2020-03-13T10:37:55Z-
dc.date.available2020-03-13T10:37:55Z-
dc.date.issued2017-
dc.identifier.citationComputer Communication Review, 2017, v. 47, n. 1, p. 49-54-
dc.identifier.issn0146-4833-
dc.identifier.urihttp://hdl.handle.net/10722/281459-
dc.description.abstractIn recent years, Information-centric Networking (ICN) has received much attention from both academic and industry participants. ICN offers data-centric inter-networking that is radically different from today's host-based IP networks. Security and privacy features on today's Internet were originally not present and have been incrementally retrofitted over the last 35 years. As such, these issues have become increasingly important as ICN technology gradually matures towards real-world deployment. Thus, while ICN-based architectures (e.g., NDN, CCNx, etc.) are still evolving, it is both timely and important to explore ICN security and privacy issues as well as devise and assess possible mitigation techniques. This report documents the highlights and outcomes of the Dagstuhl Seminar 16251 on "Information-centric Networking and Security." The goal of which was to bring together researchers to discuss and address security and privacy issues particular to ICN-based architectures. Upon finishing the three-day workshop, the outlook of ICN is still unclear. Many unsolved and ill-addressed problems remain, such as namespace and identity management, object security and forward secrecy, and privacy. Regardless of the fate of ICN, one thing is certain: much more research and practical experience with these systems is needed to make progress towards solving these arduous problems.-
dc.languageeng-
dc.relation.ispartofComputer Communication Review-
dc.subjectSecurity and Privacy-
dc.subjectInformation-Centric Networking-
dc.titleCan we make a cake and eat it too? a discussion of ICN security and privacy-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1145/3041027.3041034-
dc.identifier.scopuseid_2-s2.0-85010782577-
dc.identifier.volume47-
dc.identifier.issue1-
dc.identifier.spage49-
dc.identifier.epage54-
dc.identifier.eissn1943-5819-
dc.identifier.isiWOS:000395418500006-
dc.identifier.issnl0146-4833-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats