Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 오희국 | - |
dc.date.accessioned | 2018-12-18T07:44:14Z | - |
dc.date.available | 2018-12-18T07:44:14Z | - |
dc.date.issued | 2018-02 | - |
dc.identifier.citation | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v. 104, Page. 117-132 | en_US |
dc.identifier.issn | 1084-8045 | - |
dc.identifier.uri | https://www.sciencedirect.com/science/article/pii/S1084804517304046 | - |
dc.identifier.uri | https://repository.hanyang.ac.kr/handle/20.500.11754/80927 | - |
dc.description.abstract | Mitigating Cache poisoning in Name Data Networking (NDN) can significantly improve the effect of ubiquitous data caching, which is a prominent feature in NDN. However, since verification signatures cannot be practical in the network routers, finding a suitable method to mitigate cache poisoning in NDN routers is a challenge. Therefore, in this paper, the proposed method tries to identify invalid contents by the defined parameters: popularity, negative feedback and credibility. Then, with combining these three metrics, the trust model is presented to estimate the validity of each content. Moreover, the proposed method creates an incentive among users to exchange trusted contents. Finally, the evaluation results indicate the effectiveness of the proposed method to detect invalid contents as compared to previous methods. | en_US |
dc.description.sponsorship | This research is supported by the NRF (National Research Foundation of Korea) grant funded by the Korea government MEST (Ministry of Education, Science and Technology) (No. NRF-2015R1D1A1A09058200). | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD | en_US |
dc.subject | Named Data Networking (NDN) | en_US |
dc.subject | Ubiquitous data caching | en_US |
dc.subject | Cache poisoning | en_US |
dc.subject | Trust-based method | en_US |
dc.title | A trust-based method for mitigating cache poisoning in Name Data Networking | en_US |
dc.type | Article | en_US |
dc.relation.volume | 104 | - |
dc.identifier.doi | 10.1016/j.jnca.2017.12.013 | - |
dc.relation.page | 117-132 | - |
dc.relation.journal | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | - |
dc.contributor.googleauthor | Rezaeifar, Zeinab | - |
dc.contributor.googleauthor | Wang, Jian | - |
dc.contributor.googleauthor | Oh, Heekuck | - |
dc.relation.code | 2018006936 | - |
dc.sector.campus | E | - |
dc.sector.daehak | COLLEGE OF COMPUTING[E] | - |
dc.sector.department | DIVISION OF COMPUTER SCIENCE | - |
dc.identifier.pid | hkoh | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.