Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 오희국 | - |
dc.date.accessioned | 2019-12-05T02:36:45Z | - |
dc.date.available | 2019-12-05T02:36:45Z | - |
dc.date.issued | 2019-07 | - |
dc.identifier.citation | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, v. 96, Page. 538-551 | en_US |
dc.identifier.issn | 0167-739X | - |
dc.identifier.issn | 1872-7115 | - |
dc.identifier.uri | https://www.sciencedirect.com/science/article/pii/S0167739X18316431 | - |
dc.identifier.uri | https://repository.hanyang.ac.kr/handle/20.500.11754/117406 | - |
dc.description.abstract | Named Data Networking (NDN) is a new paradigm for the future Internet infrastructure based on routable named data. The NDN infrastructure consists of a new component called strategy layer. The strategy layer allows for dynamically selecting network interfaces taking into account network conditions such as delay to forward Interest messages toward a provider. However, defining proper criteria for selecting the best possible paths to forward Interest messages is challenging in this network because different parameters and conditions conflict one another when choosing the best interfaces. Moreover, in NDN, data can be retrieved from different sources. However, to the best of our knowledge, the previous forwarding strategy methods that can estimate from which path the valid data can be fetched have not considered an attacker who tries to inject fake data with the same name as valid data. Therefore, in this paper, we take a holistic, adaptive forwarding approach that takes into account various metrics: bandwidth, load, delay, and reliability. Especially, we propose a reliability metric that defines which path is more stable and reliable to retrieve legitimate data. Our evaluation demonstrates that the proposed method enables reliable message delivery against potential attackers that inject invalid data, in addition, our method introduces marginal delay compared with the conventional forwarding methods in NDN. (C) 2019 Elsevier B.V. All rights reserved. | en_US |
dc.description.sponsorship | This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No.2018-0-00269, A research on safe and convenient big data processing methods). This work was also supported by the MSIT (Ministry of Science and ICT), Korea, under the 1TRC (Information Technology Research Center) support program (IITP-2018-2014-1-00636) supervised by the IITP (Institute for Information & communications Technology Promotion). | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | ELSEVIER SCIENCE BV | en_US |
dc.subject | Named Data Networking (NDN) | en_US |
dc.subject | Information-Centric Network (ICN) | en_US |
dc.subject | Strategy layer | en_US |
dc.subject | Reliable | en_US |
dc.subject | Forwarding approach | en_US |
dc.subject | Invalid data | en_US |
dc.title | A reliable adaptive forwarding approach in named data networking | en_US |
dc.type | Article | en_US |
dc.relation.volume | 96 | - |
dc.identifier.doi | 10.1016/j.future.2018.12.049 | - |
dc.relation.page | 538-551 | - |
dc.relation.journal | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | - |
dc.contributor.googleauthor | Rezaeifar, Zeinab | - |
dc.contributor.googleauthor | Wang, Jian | - |
dc.contributor.googleauthor | Oh, Heekuck | - |
dc.contributor.googleauthor | Lee, Suk-Bok | - |
dc.contributor.googleauthor | Hur, Junbeom | - |
dc.relation.code | 2019038698 | - |
dc.sector.campus | E | - |
dc.sector.daehak | COLLEGE OF COMPUTING[E] | - |
dc.sector.department | DIVISION OF COMPUTER SCIENCE | - |
dc.identifier.pid | hkoh | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.