{"title":"An Efficient Opportunistic Routing Protocol for ICN","authors":"M. Kang, D. Seo, Y. Chung","doi":"10.1145/3357150.3357412","DOIUrl":"https://doi.org/10.1145/3357150.3357412","url":null,"abstract":"Opportunistic routing protocols, such as delay tolerant networks (DTN), can be used to enable information centric networking (ICN) in disaster environments. Existing approaches using DTN for ICN suffers from message overhead due to the mobility of sparsely populated mobile nodes and overall performance degradation. We therefore propose an efficient opportunistic routing protocol for ICN to reduce message overhead and improve delivery probability, too. Performance evaluation results thorough simulation show that the proposed protocol has better delivery probability and overhead ratio than conventional protocol.","PeriodicalId":112463,"journal":{"name":"Proceedings of the 6th ACM Conference on Information-Centric Networking","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116085456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanjeev Kaushik Ramani, R. Tourani, George Torres, S. Misra, A. Afanasyev
{"title":"NDN-ABS: Attribute-Based Signature Scheme for Named Data Networking","authors":"Sanjeev Kaushik Ramani, R. Tourani, George Torres, S. Misra, A. Afanasyev","doi":"10.1145/3357150.3357393","DOIUrl":"https://doi.org/10.1145/3357150.3357393","url":null,"abstract":"The Named Data Networking architecture mandates cryptographic signatures of packets at the network layer. Traditional RSA and ECDSA public key signatures require obtaining signer's NDN certificate (and, if needed, the next-level certificates of the trust chain) to validate the signatures. This potentially creates two problems. First, the communication channels must be active in order to retrieve the certificates, which is not always the case in disruptive and ad hoc environments. Second, the certificate identifies the individual producer and thus producer anonymity cannot be guaranteed if necessary. In this paper, we present NDN-ABS, an alternative NDN signatures design based on the attribute-based signatures, to addresses both these problems. With NDN-ABS, data packets can be verified without the need for any network retrieval (provided the trust anchor is pre-configured) and attributes can be designed to only identify application-defined high-level producer anonymity sets, thus ensuring individual producer's anonymity. The paper uses an illustrative smart-campus environment to define and evaluate the design and highlight how the NDN trust schema can manage the validity of NDN-ABS signatures. The paper also discusses performance limitations of ABS and potential ways they can be overcome in a production environment.","PeriodicalId":112463,"journal":{"name":"Proceedings of the 6th ACM Conference on Information-Centric Networking","volume":"8 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132844898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pouyan Fotouhi Tehrani, Luca Keidel, E. Osterweil, J. Schiller, T. Schmidt, Matthias Wählisch
{"title":"NDNSSEC: Namespace Management in NDN with DNSSEC","authors":"Pouyan Fotouhi Tehrani, Luca Keidel, E. Osterweil, J. Schiller, T. Schmidt, Matthias Wählisch","doi":"10.1145/3357150.3357417","DOIUrl":"https://doi.org/10.1145/3357150.3357417","url":null,"abstract":"In this demo, we showcase NDNSSEC. NDNSSEC provides a namespace management solution for named-data networking (NDN) based on the DNS ecosystem and its security extensions. Our prototype allows content consumers to verify the name ownership in commonly used NDN software.","PeriodicalId":112463,"journal":{"name":"Proceedings of the 6th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121929496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensing Content Correlation-aware In-network Caching Scheme at the Edge for Internet of Things","authors":"N. Dinh, Nhu-Ngoc Dao, Younghan Kim","doi":"10.1145/3357150.3357413","DOIUrl":"https://doi.org/10.1145/3357150.3357413","url":null,"abstract":"Existing caching schemes process content objects (COs) individually based on the exact matching without considering the semantic correlation among content objects. We argue that this approach is inefficient in the Internet of Things (IoT) due to the highly redundant nature of IoT device deployments and the data accuracy tolerance of IoT applications. Therefore, the cache of a different CO having a high semantic correlation with another requested one by an application can be reused if the CO meets the data accuracy requirement of the application. In this case, caching both COs is inefficient. This paper extends the concept of cache hit and proposes a caching scheme considering the semantic content correlation of nodes to evaluate, construct, and enable the re-usability of available cached items to serve more diverse requests based on information correlation. For demonstrating its benefits, we implement the proposed scheme on the top of LFU (Least Frequently Used) for IoT data caching at the edge. Obtained experimental results show that the proposed scheme achieves a significant cache hit ratio improvement in comparison with LFU.","PeriodicalId":112463,"journal":{"name":"Proceedings of the 6th ACM Conference on Information-Centric Networking","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122375395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hauke Petersen, Peter Kietzmann, Cenk Gündoğan, T. Schmidt, Matthias Wählisch
{"title":"Bluetooth Mesh under the Microscope: How much ICN is Inside?","authors":"Hauke Petersen, Peter Kietzmann, Cenk Gündoğan, T. Schmidt, Matthias Wählisch","doi":"10.1145/3357150.3357398","DOIUrl":"https://doi.org/10.1145/3357150.3357398","url":null,"abstract":"Bluetooth (BT) mesh is a new mode of BT operation for low-energy devices that offers group-based publish-subscribe as a network service with additional caching capabilities. These features resemble concepts of information-centric networking (ICN), and the analogy to ICN has been repeatedly drawn in the BT community. In this paper, we compare BT mesh with ICN both conceptually and in real-world experiments. We contrast both architectures and their design decisions in detail. Experiments are performed on an IoT testbed using NDN/CCNx and BT mesh on constrained RIOT nodes. Our findings indicate significant differences both in concepts and in real-world performance. Supported by new insights, we identify synergies and sketch a design of a BT-ICN that benefits from both worlds.","PeriodicalId":112463,"journal":{"name":"Proceedings of the 6th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129123602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cenk Gündoğan, Jakob Pfender, M. Frey, T. Schmidt, Felix Shzu-Juraschek, Matthias Wählisch
{"title":"Gain More for Less: The Surprising Benefits of QoS Management in Constrained NDN Networks","authors":"Cenk Gündoğan, Jakob Pfender, M. Frey, T. Schmidt, Felix Shzu-Juraschek, Matthias Wählisch","doi":"10.1145/3357150.3357404","DOIUrl":"https://doi.org/10.1145/3357150.3357404","url":null,"abstract":"Quality of Service (QoS) in the IP world mainly manages forwarding resources, i.e., link capacities and buffer spaces. In addition, Information Centric Networking (ICN) offers resource dimensions such as in-network caches and forwarding state. In constrained wireless networks, these resources are scarce with a potentially high impact due to lossy radio transmission. In this paper, we explore the two basic service qualities (i) prompt and (ii) reliable traffic forwarding for the case of NDN. The resources we take into account are forwarding and queuing priorities, as well as the utilization of caches and of forwarding state space. We treat QoS resources not only in isolation, but correlate their use on local nodes and between network members. Network-wide coordination is based on simple, predefined QoS code points. Our findings indicate that coordinated QoS management in ICN is more than the sum of its parts and exceeds the impact QoS can have in the IP world.","PeriodicalId":112463,"journal":{"name":"Proceedings of the 6th ACM Conference on Information-Centric Networking","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115653801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 6th ACM Conference on Information-Centric Networking","authors":"","doi":"10.1145/3357150","DOIUrl":"https://doi.org/10.1145/3357150","url":null,"abstract":"","PeriodicalId":112463,"journal":{"name":"Proceedings of the 6th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128729462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}