File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/3041027.3041034
- Scopus: eid_2-s2.0-85010782577
- WOS: WOS:000395418500006
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Can we make a cake and eat it too? a discussion of ICN security and privacy
Title | Can we make a cake and eat it too? a discussion of ICN security and privacy |
---|---|
Authors | |
Keywords | Security and Privacy Information-Centric Networking |
Issue Date | 2017 |
Citation | Computer Communication Review, 2017, v. 47, n. 1, p. 49-54 How to Cite? |
Abstract | In recent years, Information-centric Networking (ICN) has received much attention from both academic and industry participants. ICN offers data-centric inter-networking that is radically different from today's host-based IP networks. Security and privacy features on today's Internet were originally not present and have been incrementally retrofitted over the last 35 years. As such, these issues have become increasingly important as ICN technology gradually matures towards real-world deployment. Thus, while ICN-based architectures (e.g., NDN, CCNx, etc.) are still evolving, it is both timely and important to explore ICN security and privacy issues as well as devise and assess possible mitigation techniques. This report documents the highlights and outcomes of the Dagstuhl Seminar 16251 on "Information-centric Networking and Security." The goal of which was to bring together researchers to discuss and address security and privacy issues particular to ICN-based architectures. Upon finishing the three-day workshop, the outlook of ICN is still unclear. Many unsolved and ill-addressed problems remain, such as namespace and identity management, object security and forward secrecy, and privacy. Regardless of the fate of ICN, one thing is certain: much more research and practical experience with these systems is needed to make progress towards solving these arduous problems. |
Persistent Identifier | http://hdl.handle.net/10722/281459 |
ISSN | 2023 Impact Factor: 2.2 2023 SCImago Journal Rankings: 0.876 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ngai, Edith | - |
dc.contributor.author | Ohlman, Borje | - |
dc.contributor.author | Tsudik, Gene | - |
dc.contributor.author | Uzun, Ersin | - |
dc.contributor.author | Wahlisch, Matthias | - |
dc.contributor.author | Wood, Christopher A. | - |
dc.date.accessioned | 2020-03-13T10:37:55Z | - |
dc.date.available | 2020-03-13T10:37:55Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | Computer Communication Review, 2017, v. 47, n. 1, p. 49-54 | - |
dc.identifier.issn | 0146-4833 | - |
dc.identifier.uri | http://hdl.handle.net/10722/281459 | - |
dc.description.abstract | In recent years, Information-centric Networking (ICN) has received much attention from both academic and industry participants. ICN offers data-centric inter-networking that is radically different from today's host-based IP networks. Security and privacy features on today's Internet were originally not present and have been incrementally retrofitted over the last 35 years. As such, these issues have become increasingly important as ICN technology gradually matures towards real-world deployment. Thus, while ICN-based architectures (e.g., NDN, CCNx, etc.) are still evolving, it is both timely and important to explore ICN security and privacy issues as well as devise and assess possible mitigation techniques. This report documents the highlights and outcomes of the Dagstuhl Seminar 16251 on "Information-centric Networking and Security." The goal of which was to bring together researchers to discuss and address security and privacy issues particular to ICN-based architectures. Upon finishing the three-day workshop, the outlook of ICN is still unclear. Many unsolved and ill-addressed problems remain, such as namespace and identity management, object security and forward secrecy, and privacy. Regardless of the fate of ICN, one thing is certain: much more research and practical experience with these systems is needed to make progress towards solving these arduous problems. | - |
dc.language | eng | - |
dc.relation.ispartof | Computer Communication Review | - |
dc.subject | Security and Privacy | - |
dc.subject | Information-Centric Networking | - |
dc.title | Can we make a cake and eat it too? a discussion of ICN security and privacy | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/3041027.3041034 | - |
dc.identifier.scopus | eid_2-s2.0-85010782577 | - |
dc.identifier.volume | 47 | - |
dc.identifier.issue | 1 | - |
dc.identifier.spage | 49 | - |
dc.identifier.epage | 54 | - |
dc.identifier.eissn | 1943-5819 | - |
dc.identifier.isi | WOS:000395418500006 | - |
dc.identifier.issnl | 0146-4833 | - |