{"title":"GitSync","authors":"Xinyu Ma, Lixia Zhang","doi":"10.1145/3460417.3483372","DOIUrl":"https://doi.org/10.1145/3460417.3483372","url":null,"abstract":"Git is designed as a distributed version control system which has been widely used. However, most of the existing projects use a workflow where developers have to synchronize with a central server. This poster explores the possibility of a truly distributed git platform, dubbed GitSync, by making git run over Named-data Networking (NDN). GitSync runs a peer-to-peer protocol to get rid of central servers, therefore enabling higher availability when not all users are connected to cloud all the time. Therefore GitSync eliminates single point of failure and can continue operation over unstable connectivity and network partition.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116206094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute-based encryption for named data networking","authors":"A. Lenin, Peeter Laud","doi":"10.1145/3460417.3483371","DOIUrl":"https://doi.org/10.1145/3460417.3483371","url":null,"abstract":"We compare and discuss the applicability and trade-offs of different attribute-based encryption (ABE) schemes to the possible use-cases of content-centric networking requiring end-to-end encryption of data with fine-grained access control, where the nature of content producers and consumers may vary, as well as the required expressivity of policies. We also report on the choice and implementation of an ABE scheme, as well as the overheads associated with its use.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132258983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Teng Liang, Zhongda Xia, Guoming Tang, Yu Zhang, Beichuan Zhang
{"title":"NDN in large LEO satellite constellations: a case of consumer mobility support","authors":"Teng Liang, Zhongda Xia, Guoming Tang, Yu Zhang, Beichuan Zhang","doi":"10.1145/3460417.3482970","DOIUrl":"https://doi.org/10.1145/3460417.3482970","url":null,"abstract":"Large low Earth orbit (LEO) satellite constellations are intended to provide global low-latency high-bandwidth Internet connectivity. Due to their large scale and high mobility nature, networking is a big challenge. In this paper, we investigate applying Named Data Networking (NDN) to this scenario. Specifically, we discuss that NDN's architectural benefits, such as adaptive forwarding, in-network caching, off-the-grid communication, data mule service, in-network/edge computing, mobility support, and data-centric security, make it a promising candidate. Moreover, we focus on studying NDN's consumer mobility support. Specifically, NDN's in-network Interest retransmission can quickly react to satellite handovers. However, we make an observation that Interest routing paths before and after satellite handover may not overlap, hence underusing NDN's in-network caching. Therefore, we direct retransmitted Interests due to handovers to the previous connected satellite via forwarding hint. Simulation results show that the studied approaches can decently improve the consumers' performance and reduce the network traffic, achieving better consumer mobility support.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128689902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vision: information-centric dataflow: re-imagining reactive distributed computing","authors":"D. Kutscher, Laura Al Wardani, T. M. R. Gias","doi":"10.1145/3460417.3482975","DOIUrl":"https://doi.org/10.1145/3460417.3482975","url":null,"abstract":"This paper describes an Information-Centric Dataflow system that is based on name-based access to computation results, NDN PSync dataset synchronization for enabling consuming compute functions to learn about updates and for coordinating the set of compute functions in a distributed Dataflow pipeline. We describe how relevant Dataflow concepts can be mapped to ICN and how data-sharing, data availability and scalability can be improved compared to state-of-the-art systems. We also provide a specification of an application-independent namespace design and report on our experience with a first prototype implementation.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114569778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junji Takemasa, Ryoma Yamada, Y. Koizumi, T. Hasegawa
{"title":"ccnGen: a high-speed generator of bidirectional CCN traffic using a programmable switch","authors":"Junji Takemasa, Ryoma Yamada, Y. Koizumi, T. Hasegawa","doi":"10.1145/3460417.3483373","DOIUrl":"https://doi.org/10.1145/3460417.3483373","url":null,"abstract":"This paper designs ccnGen, which generates request-response bidirectional CCN traffic, using a programmable switch. A prototype implementation demonstrates that one pipeline of the switch ASIC generates Interest packets of 232 64-byte names randomly with a uniform distribution and another one replies to the Interest packets by sending Content Object packets with the requested names at 1.6 Tbps speed.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FLARE: federated active learning assisted by naming for responding to emergencies","authors":"Viyom Mittal, Mohammad Jahanian, K. Ramakrishnan","doi":"10.1145/3460417.3482978","DOIUrl":"https://doi.org/10.1145/3460417.3482978","url":null,"abstract":"During disasters, it is critical to deliver emergency information to appropriate first responders. Name-based information delivery provides efficient, timely dissemination of relevant content to first responder teams assigned to different incident response roles. People increasingly depend on social media for communicating vital information, using free-form text. Thus, a method that delivers these social media posts to the right first responders can significantly improve outcomes. In this paper, we propose FLARE, a framework using 'Social Media Engines' (SMEs) to map social media posts (SMPs), such as tweets, to the right names. SMEs perform natural language processing-based classification and exploit several machine learning capabilities, in an online real-time manner. To reduce the manual labeling effort required for learning during the disaster, we leverage active learning, complemented by dispatchers with specific domain-knowledge performing limited labeling. We also leverage federated learning across various public-safety departments with specialized knowledge to handle notifications related to their roles in a cooperative manner. We implement three different classifiers: for incident relevance, organization, and fine-grained role prediction. Each class is associated with a specific subset of the namespace graph. The novelty of our system is the integration of the namespace with federated active learning and inference procedures to identify and deliver vital SMPs to the right first responders in a distributed multi-organization environment, in real-time. Our experiments using real-world data, including tweets generated by citizens during the wildfires in California in 2018, show our approach outperforming both a simple keyword-based classification and several existing NLP-based classification techniques.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123498839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust schemas and ICN: key to secure home IoT","authors":"K. Nichols","doi":"10.1145/3460417.3482972","DOIUrl":"https://doi.org/10.1145/3460417.3482972","url":null,"abstract":"Home and business internet of things (IoT) networking presents security challenges that can be addressed using information-centric networking (ICN) to secure information rather than channels. In particular, we leverage ICN's per-packet signing, combined with recent innovations in trust schemas, to construct a strong trust zone. This architecture creates domains governed by a secured trust schema provided to every device during its enrollment together with the device's attribute-based signing cert chain(s). Applications don't need to be rewritten to gain security; a run-time library with an MQTT-like publish/subscribe API uses the provisioned trust schema and certs to construct, sign and ship outgoing publications and to both cryptographically and structurally validate a subscriber's incoming publications. This unique application of trust schemas (Versec) is explained and an example home IoT framework is described where trust schemas express straightforward, homeowner-specific policies that an open-source library enforces at run-time on behalf of security-agnostic applications. Along with the specific innovation in trust management, the platform exploits current and emergent IoT best practices. Utility programs, libraries, and examples are available as an open-source Data-Centric Toolkit.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124386744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cenk Gündoğan, Christian Amsüss, T. Schmidt, Matthias Wählisch
{"title":"Reliable firmware updates for the information-centric internet of things","authors":"Cenk Gündoğan, Christian Amsüss, T. Schmidt, Matthias Wählisch","doi":"10.1145/3460417.3482974","DOIUrl":"https://doi.org/10.1145/3460417.3482974","url":null,"abstract":"Security in the Internet of Things (IoT) requires ways to regularly update firmware in the field. These demands ever increase with new, agile concepts such as security as code and should be considered a regular operation. Hosting massive firmware roll-outs present a crucial challenge for the constrained wireless environment. In this paper, we explore how information-centric networking can ease reliable firmware updates. We start from the recent standards developed by the IETF SUIT working group and contribute a system that allows for a timely discovery of new firmware versions by using cryptographically protected manifest files. Our design enables a cascading firmware roll-out from a gateway towards leaf nodes in a low-power multi-hop network. While a chunking mechanism prepares firmware images for typically low-sized maximum transmission units (MTUs), an early Denial-of-Service (DoS) detection prevents the distribution of tampered or malformed chunks. In experimental evaluations on a real-world IoT testbed, we demonstrate feasible strategies with adaptive bandwidth consumption and a high resilience to connectivity loss when replicating firmware images into the IoT edge.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123829544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tangle centric networking","authors":"Christopher Scherb, Dennis Grewe, C. Tschudin","doi":"10.1145/3460417.3483378","DOIUrl":"https://doi.org/10.1145/3460417.3483378","url":null,"abstract":"Today's Internet is heavily used for multimedia streaming from cloud backends, while the Internet of Things (IoT) challenges the traditional data flow, with high data volumes produced at the network edge. Information Centric Networking (ICN) advocates against a host-centric communication model using content identifiers decoupling content from a location, and therefore, promising for distributed edge computing environments. However, the resulting coupling of data to content identifiers in ICNs introduces new challenges regarding dissemination of large data volumes and services and synchronization across multiple consumers. We present Tangle Centric Networking (TCN) - a decentralized data structure for coordinated distribution of data and services for ICN deployments. TCN simplifies the management of data and service changes and updates them accordingly in network nodes using principles of Tangles. Using simulations, first implementations of TCN show improvements in data discovery as well as less synchronization overhead of large volumes of data compared to a state-of-the-art ICN system.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131358899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NDN-MPS: supporting multiparty authentication over named data networking","authors":"Zhiyi Zhang, Siqi Liu, Randy King, Lixia Zhang","doi":"10.1145/3460417.3482971","DOIUrl":"https://doi.org/10.1145/3460417.3482971","url":null,"abstract":"Modern digitally controlled systems require multiparty authentication to meet the security requirements. This paper describes the design and development of NDN-MPS, an automated solution to support multiparty signing and verification for NDN-enabled applications. NDN-MPS proposes three basic changes to the existing NDN security solutions. First, it introduces a new type of trust schema that supports the semantics for multiparty singing and verification. Second, it extends the NDN signing process design to accommodate multisignature schemes such as BLS signature and to ensure the data consistency across signers. Third, NDN-MPS provides options for different application scenarios to coordinate the joint signing process of multiple signers. We evaluate NDN-MPS by assessing its security properties and measuring its performance. Our results show that NDN-MPS provides resistance against different types of attacks and is practical to be deployed.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126350645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}