File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/ICACT.2016.7423368
- Scopus: eid_2-s2.0-84962799652
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Defend against Internet censorship in named data networking
Title | Defend against Internet censorship in named data networking |
---|---|
Authors | |
Keywords | Smart router Named Data Networking Internet censorship Anti-censorship Proxy server |
Issue Date | 2016 |
Publisher | IEEE. |
Citation | The 18th International Conference on Advanced Communications Technology (IEEE/ICACT 2016), PyeongChang, Korea, 31-3 February 2016. In Conference Proceedings, 2016, p. 300-305 How to Cite? |
Abstract | Named Data Networking (NDN), as a promising next generation network, has several advantages in scalability, mobility and network efficiency compared with IP-based Internet. These advantages come with the usage of named content, powerful routers and intermediate cache. These, however, make censorship in NDN more easily to deploy. In this paper we give an analysis of the possible censorship techniques in NDN and come up with two most effective attacks: name-watchlist attack and deep packet inspection. Existing solutions against censorship in IP-based network and NDN either cannot defend against both attacks or disable the cache mechanism, thus decrease the network efficiency. We propose a scheme which adopts the idea of proxy web servers and brings in the concept of smart routers to partially persevere the functionality of intermediate cache and improve network performance. Security analysis shows that as long as the consumer can connect to a smart router which performs a second-time disguise of the requested name without going through a compromised smart router, he can retrieve his interested Data packet. Simulation result shows that the usage of smart routers helps mitigate the performance overhead to disguise Interest names and Data content. © 2016 Global IT Research Institute (GiRI). |
Persistent Identifier | http://hdl.handle.net/10722/234887 |
ISBN |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cui, X | - |
dc.contributor.author | Tsang, YH | - |
dc.contributor.author | Hui, LCK | - |
dc.contributor.author | Yiu, SM | - |
dc.contributor.author | Luo, B | - |
dc.date.accessioned | 2016-10-14T13:49:53Z | - |
dc.date.available | 2016-10-14T13:49:53Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | The 18th International Conference on Advanced Communications Technology (IEEE/ICACT 2016), PyeongChang, Korea, 31-3 February 2016. In Conference Proceedings, 2016, p. 300-305 | - |
dc.identifier.isbn | 978-899686506-3 | - |
dc.identifier.uri | http://hdl.handle.net/10722/234887 | - |
dc.description.abstract | Named Data Networking (NDN), as a promising next generation network, has several advantages in scalability, mobility and network efficiency compared with IP-based Internet. These advantages come with the usage of named content, powerful routers and intermediate cache. These, however, make censorship in NDN more easily to deploy. In this paper we give an analysis of the possible censorship techniques in NDN and come up with two most effective attacks: name-watchlist attack and deep packet inspection. Existing solutions against censorship in IP-based network and NDN either cannot defend against both attacks or disable the cache mechanism, thus decrease the network efficiency. We propose a scheme which adopts the idea of proxy web servers and brings in the concept of smart routers to partially persevere the functionality of intermediate cache and improve network performance. Security analysis shows that as long as the consumer can connect to a smart router which performs a second-time disguise of the requested name without going through a compromised smart router, he can retrieve his interested Data packet. Simulation result shows that the usage of smart routers helps mitigate the performance overhead to disguise Interest names and Data content. © 2016 Global IT Research Institute (GiRI). | - |
dc.language | eng | - |
dc.publisher | IEEE. | - |
dc.relation.ispartof | International Conference on Advanced Communication Technology (ICACT) Proceedings | - |
dc.rights | International Conference on Advanced Communication Technology (ICACT) Proceedings. Copyright © IEEE. | - |
dc.rights | ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | - |
dc.subject | Smart router | - |
dc.subject | Named Data Networking | - |
dc.subject | Internet censorship | - |
dc.subject | Anti-censorship | - |
dc.subject | Proxy server | - |
dc.title | Defend against Internet censorship in named data networking | - |
dc.type | Conference_Paper | - |
dc.identifier.email | Hui, LCK: hui@cs.hku.hk | - |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | - |
dc.identifier.authority | Hui, LCK=rp00120 | - |
dc.identifier.authority | Yiu, SM=rp00207 | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/ICACT.2016.7423368 | - |
dc.identifier.scopus | eid_2-s2.0-84962799652 | - |
dc.identifier.hkuros | 268874 | - |
dc.identifier.spage | 300 | - |
dc.identifier.epage | 305 | - |
dc.publisher.place | United States | - |
dc.customcontrol.immutable | sml 161202 | - |