Proceedings of the 8th ACM Conference on Information-Centric Networking最新文献

筛选
英文 中文
GitSync
Proceedings of the 8th ACM Conference on Information-Centric Networking Pub Date : 2021-09-22 DOI: 10.1145/3460417.3483372
Xinyu Ma, Lixia Zhang
{"title":"GitSync","authors":"Xinyu Ma, Lixia Zhang","doi":"10.1145/3460417.3483372","DOIUrl":"https://doi.org/10.1145/3460417.3483372","url":null,"abstract":"Git is designed as a distributed version control system which has been widely used. However, most of the existing projects use a workflow where developers have to synchronize with a central server. This poster explores the possibility of a truly distributed git platform, dubbed GitSync, by making git run over Named-data Networking (NDN). GitSync runs a peer-to-peer protocol to get rid of central servers, therefore enabling higher availability when not all users are connected to cloud all the time. Therefore GitSync eliminates single point of failure and can continue operation over unstable connectivity and network partition.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116206094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Attribute-based encryption for named data networking 用于命名数据网络的基于属性的加密
Proceedings of the 8th ACM Conference on Information-Centric Networking Pub Date : 2021-09-22 DOI: 10.1145/3460417.3483371
A. Lenin, Peeter Laud
{"title":"Attribute-based encryption for named data networking","authors":"A. Lenin, Peeter Laud","doi":"10.1145/3460417.3483371","DOIUrl":"https://doi.org/10.1145/3460417.3483371","url":null,"abstract":"We compare and discuss the applicability and trade-offs of different attribute-based encryption (ABE) schemes to the possible use-cases of content-centric networking requiring end-to-end encryption of data with fine-grained access control, where the nature of content producers and consumers may vary, as well as the required expressivity of policies. We also report on the choice and implementation of an ABE scheme, as well as the overheads associated with its use.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132258983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NDN in large LEO satellite constellations: a case of consumer mobility support 大型LEO卫星星座中的NDN:消费者移动支持的一个案例
Proceedings of the 8th ACM Conference on Information-Centric Networking Pub Date : 2021-09-22 DOI: 10.1145/3460417.3482970
Teng Liang, Zhongda Xia, Guoming Tang, Yu Zhang, Beichuan Zhang
{"title":"NDN in large LEO satellite constellations: a case of consumer mobility support","authors":"Teng Liang, Zhongda Xia, Guoming Tang, Yu Zhang, Beichuan Zhang","doi":"10.1145/3460417.3482970","DOIUrl":"https://doi.org/10.1145/3460417.3482970","url":null,"abstract":"Large low Earth orbit (LEO) satellite constellations are intended to provide global low-latency high-bandwidth Internet connectivity. Due to their large scale and high mobility nature, networking is a big challenge. In this paper, we investigate applying Named Data Networking (NDN) to this scenario. Specifically, we discuss that NDN's architectural benefits, such as adaptive forwarding, in-network caching, off-the-grid communication, data mule service, in-network/edge computing, mobility support, and data-centric security, make it a promising candidate. Moreover, we focus on studying NDN's consumer mobility support. Specifically, NDN's in-network Interest retransmission can quickly react to satellite handovers. However, we make an observation that Interest routing paths before and after satellite handover may not overlap, hence underusing NDN's in-network caching. Therefore, we direct retransmitted Interests due to handovers to the previous connected satellite via forwarding hint. Simulation results show that the studied approaches can decently improve the consumers' performance and reduce the network traffic, achieving better consumer mobility support.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128689902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Vision: information-centric dataflow: re-imagining reactive distributed computing 愿景:以信息为中心的数据流:重新想象响应式分布式计算
Proceedings of the 8th ACM Conference on Information-Centric Networking Pub Date : 2021-09-22 DOI: 10.1145/3460417.3482975
D. Kutscher, Laura Al Wardani, T. M. R. Gias
{"title":"Vision: information-centric dataflow: re-imagining reactive distributed computing","authors":"D. Kutscher, Laura Al Wardani, T. M. R. Gias","doi":"10.1145/3460417.3482975","DOIUrl":"https://doi.org/10.1145/3460417.3482975","url":null,"abstract":"This paper describes an Information-Centric Dataflow system that is based on name-based access to computation results, NDN PSync dataset synchronization for enabling consuming compute functions to learn about updates and for coordinating the set of compute functions in a distributed Dataflow pipeline. We describe how relevant Dataflow concepts can be mapped to ICN and how data-sharing, data availability and scalability can be improved compared to state-of-the-art systems. We also provide a specification of an application-independent namespace design and report on our experience with a first prototype implementation.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114569778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ccnGen: a high-speed generator of bidirectional CCN traffic using a programmable switch ccnGen:使用可编程开关的双向CCN流量高速发生器
Proceedings of the 8th ACM Conference on Information-Centric Networking Pub Date : 2021-09-22 DOI: 10.1145/3460417.3483373
Junji Takemasa, Ryoma Yamada, Y. Koizumi, T. Hasegawa
{"title":"ccnGen: a high-speed generator of bidirectional CCN traffic using a programmable switch","authors":"Junji Takemasa, Ryoma Yamada, Y. Koizumi, T. Hasegawa","doi":"10.1145/3460417.3483373","DOIUrl":"https://doi.org/10.1145/3460417.3483373","url":null,"abstract":"This paper designs ccnGen, which generates request-response bidirectional CCN traffic, using a programmable switch. A prototype implementation demonstrates that one pipeline of the switch ASIC generates Interest packets of 232 64-byte names randomly with a uniform distribution and another one replies to the Interest packets by sending Content Object packets with the requested names at 1.6 Tbps speed.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FLARE: federated active learning assisted by naming for responding to emergencies FLARE:通过命名辅助的联合主动学习,以响应紧急情况
Proceedings of the 8th ACM Conference on Information-Centric Networking Pub Date : 2021-09-22 DOI: 10.1145/3460417.3482978
Viyom Mittal, Mohammad Jahanian, K. Ramakrishnan
{"title":"FLARE: federated active learning assisted by naming for responding to emergencies","authors":"Viyom Mittal, Mohammad Jahanian, K. Ramakrishnan","doi":"10.1145/3460417.3482978","DOIUrl":"https://doi.org/10.1145/3460417.3482978","url":null,"abstract":"During disasters, it is critical to deliver emergency information to appropriate first responders. Name-based information delivery provides efficient, timely dissemination of relevant content to first responder teams assigned to different incident response roles. People increasingly depend on social media for communicating vital information, using free-form text. Thus, a method that delivers these social media posts to the right first responders can significantly improve outcomes. In this paper, we propose FLARE, a framework using 'Social Media Engines' (SMEs) to map social media posts (SMPs), such as tweets, to the right names. SMEs perform natural language processing-based classification and exploit several machine learning capabilities, in an online real-time manner. To reduce the manual labeling effort required for learning during the disaster, we leverage active learning, complemented by dispatchers with specific domain-knowledge performing limited labeling. We also leverage federated learning across various public-safety departments with specialized knowledge to handle notifications related to their roles in a cooperative manner. We implement three different classifiers: for incident relevance, organization, and fine-grained role prediction. Each class is associated with a specific subset of the namespace graph. The novelty of our system is the integration of the namespace with federated active learning and inference procedures to identify and deliver vital SMPs to the right first responders in a distributed multi-organization environment, in real-time. Our experiments using real-world data, including tweets generated by citizens during the wildfires in California in 2018, show our approach outperforming both a simple keyword-based classification and several existing NLP-based classification techniques.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123498839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trust schemas and ICN: key to secure home IoT 信任模式和ICN:确保家庭物联网安全的关键
Proceedings of the 8th ACM Conference on Information-Centric Networking Pub Date : 2021-09-22 DOI: 10.1145/3460417.3482972
K. Nichols
{"title":"Trust schemas and ICN: key to secure home IoT","authors":"K. Nichols","doi":"10.1145/3460417.3482972","DOIUrl":"https://doi.org/10.1145/3460417.3482972","url":null,"abstract":"Home and business internet of things (IoT) networking presents security challenges that can be addressed using information-centric networking (ICN) to secure information rather than channels. In particular, we leverage ICN's per-packet signing, combined with recent innovations in trust schemas, to construct a strong trust zone. This architecture creates domains governed by a secured trust schema provided to every device during its enrollment together with the device's attribute-based signing cert chain(s). Applications don't need to be rewritten to gain security; a run-time library with an MQTT-like publish/subscribe API uses the provisioned trust schema and certs to construct, sign and ship outgoing publications and to both cryptographically and structurally validate a subscriber's incoming publications. This unique application of trust schemas (Versec) is explained and an example home IoT framework is described where trust schemas express straightforward, homeowner-specific policies that an open-source library enforces at run-time on behalf of security-agnostic applications. Along with the specific innovation in trust management, the platform exploits current and emergent IoT best practices. Utility programs, libraries, and examples are available as an open-source Data-Centric Toolkit.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124386744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Reliable firmware updates for the information-centric internet of things 可靠的固件更新,以信息为中心的物联网
Proceedings of the 8th ACM Conference on Information-Centric Networking Pub Date : 2021-08-21 DOI: 10.1145/3460417.3482974
Cenk Gündoğan, Christian Amsüss, T. Schmidt, Matthias Wählisch
{"title":"Reliable firmware updates for the information-centric internet of things","authors":"Cenk Gündoğan, Christian Amsüss, T. Schmidt, Matthias Wählisch","doi":"10.1145/3460417.3482974","DOIUrl":"https://doi.org/10.1145/3460417.3482974","url":null,"abstract":"Security in the Internet of Things (IoT) requires ways to regularly update firmware in the field. These demands ever increase with new, agile concepts such as security as code and should be considered a regular operation. Hosting massive firmware roll-outs present a crucial challenge for the constrained wireless environment. In this paper, we explore how information-centric networking can ease reliable firmware updates. We start from the recent standards developed by the IETF SUIT working group and contribute a system that allows for a timely discovery of new firmware versions by using cryptographically protected manifest files. Our design enables a cascading firmware roll-out from a gateway towards leaf nodes in a low-power multi-hop network. While a chunking mechanism prepares firmware images for typically low-sized maximum transmission units (MTUs), an early Denial-of-Service (DoS) detection prevents the distribution of tampered or malformed chunks. In experimental evaluations on a real-world IoT testbed, we demonstrate feasible strategies with adaptive bandwidth consumption and a high resilience to connectivity loss when replicating firmware images into the IoT edge.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123829544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tangle centric networking 以缠结为中心的组网
Proceedings of the 8th ACM Conference on Information-Centric Networking Pub Date : 2021-08-15 DOI: 10.1145/3460417.3483378
Christopher Scherb, Dennis Grewe, C. Tschudin
{"title":"Tangle centric networking","authors":"Christopher Scherb, Dennis Grewe, C. Tschudin","doi":"10.1145/3460417.3483378","DOIUrl":"https://doi.org/10.1145/3460417.3483378","url":null,"abstract":"Today's Internet is heavily used for multimedia streaming from cloud backends, while the Internet of Things (IoT) challenges the traditional data flow, with high data volumes produced at the network edge. Information Centric Networking (ICN) advocates against a host-centric communication model using content identifiers decoupling content from a location, and therefore, promising for distributed edge computing environments. However, the resulting coupling of data to content identifiers in ICNs introduces new challenges regarding dissemination of large data volumes and services and synchronization across multiple consumers. We present Tangle Centric Networking (TCN) - a decentralized data structure for coordinated distribution of data and services for ICN deployments. TCN simplifies the management of data and service changes and updates them accordingly in network nodes using principles of Tangles. Using simulations, first implementations of TCN show improvements in data discovery as well as less synchronization overhead of large volumes of data compared to a state-of-the-art ICN system.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131358899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NDN-MPS: supporting multiparty authentication over named data networking NDN-MPS:支持命名数据网络上的多方认证
Proceedings of the 8th ACM Conference on Information-Centric Networking Pub Date : 2021-06-08 DOI: 10.1145/3460417.3482971
Zhiyi Zhang, Siqi Liu, Randy King, Lixia Zhang
{"title":"NDN-MPS: supporting multiparty authentication over named data networking","authors":"Zhiyi Zhang, Siqi Liu, Randy King, Lixia Zhang","doi":"10.1145/3460417.3482971","DOIUrl":"https://doi.org/10.1145/3460417.3482971","url":null,"abstract":"Modern digitally controlled systems require multiparty authentication to meet the security requirements. This paper describes the design and development of NDN-MPS, an automated solution to support multiparty signing and verification for NDN-enabled applications. NDN-MPS proposes three basic changes to the existing NDN security solutions. First, it introduces a new type of trust schema that supports the semantics for multiparty singing and verification. Second, it extends the NDN signing process design to accommodate multisignature schemes such as BLS signature and to ensure the data consistency across signers. Third, NDN-MPS provides options for different application scenarios to coordinate the joint signing process of multiple signers. We evaluate NDN-MPS by assessing its security properties and measuring its performance. Our results show that NDN-MPS provides resistance against different types of attacks and is practical to be deployed.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126350645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信