期刊文献+

新一代互联网NDN面临的挑战及脆弱性分析 被引量:3

Challenges and vulnerabilities analysis of Next-Generation Internet:NDN
原文传递
导出
摘要 下一代互联网体系结构成为近两年研究的热点方向,命名数据网络(Named Data Networking,NDN)作为其中一个最具潜力的典型架构,正在成为新一代互联网体系架构热门候选对象,它是美国NSF支持的FIA研究项目的重要组成部分。文中主要通过跟踪NDN研究进展,分析其体系架构和安全机制,总结了NDN所面临的挑战,对近期研究中一系列最新成果,包括实验及其结果,分析了NDN的脆弱性,并对NDN未来发展前景进行了探讨。 The next generation of internet structure has becoming a hot topic during recent two years. As one of the most promising typical structure, NDN(Named Data Networking)is becoming the popular candidate of the new generation of internet structure, and it's the important part of project FIA supported by American NSF. This article is aimed at analyzing the NDN's structure and security mechanism and concluding the challenges faced by it through tracking the research progress. This article also pays attention on a series of findings of NDN's recent researches, analyses its vulnerabilities, and discusses its future development prospects.
出处 《信息安全与通信保密》 2014年第3期123-127,共5页 Information Security and Communications Privacy
关键词 命名数据网络 安全机制 挑战 脆弱性 Naming data networking safety mechanism challenges vulnerability
  • 相关文献

参考文献11

  • 1谢高岗,张玉军,李振宇,孙毅,谢应科,李忠诚,刘韵洁.未来互联网体系结构研究综述[J].计算机学报,2012,35(6):1109-1119. 被引量:77
  • 2徐恪,朱敏,林闯.互联网体系结构评估模型、机制及方法研究综述[J].计算机学报,2012,35(10):1985-2006. 被引量:30
  • 3JACOBSON V,BURKE J,ESTRIN D. Named Data Networking(NDN) Project 2012-2013 Annual Report[OL].http://named-data.net/ wp-content/uploads/2013/10/ndn-annualreport,2013.
  • 4WANG L,HOQUE A,YI C. OSPFN:An OSPF Based Routing Protocol for Named Data Networking[R].University of Memphis and University of Arizona,2012.14.
  • 5HAMDANE B,SERHROUCHNI A,FADLALLAH A. Named-Data Security Scheme for Named Data Networking[A].Tunis,Tunisia,2012.2-3.
  • 6吴建平,李星,刘莹.下一代互联网体系结构研究现状和发展趋势[J].中兴通讯技术,2011,17(2):10-14. 被引量:35
  • 7黄斌,毛健彪,何俊峰,孙志刚.DCS:一种实现NDN内容缓存的新方法[J].小型微型计算机系统,2013,34(9):1984-1987. 被引量:2
  • 8CHAABANE A,DE Cristofaro E,KAAFAR M A. Privacy in Content-Oriented Networking:Threats and Countermeasures[J].ACM Sigcomm Computer Communication Review,2013,(03):26-33.
  • 9WANG K,CHEN J,ZHOU H. Modeling denial-ofservice Against Pending Interest Table in Named Data Networking[J/OL].INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS,2013.12.
  • 10GASTI P,TSUDIK G,UZUN E. DoS & DDoS in Named-Data Networking[A].IEEE,2013.1-7.

二级参考文献24

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 4WROCLAWSKI J. GENI: Global Environment for Network Innovations [R/OL]. [2011-01-12]. Using the Component and Aggregate Abstractions in the GENI Architecture, GDD-06-42(2006-12-19). http://www.geni, net.
  • 5FIND[EB/OL]. [2011-01-12]. http://www. nets-find.net/.
  • 6FIRE: Future Internet Research and Experimentation [EB/OL]. [2011-01-12]. http: //cordis.e uropa.eu/fp7/ict/fire/.
  • 7OpenFlow [E B/OL]. [2011-01 - 12]. http:// www.open flowswitch.org/.
  • 8CERF Vl DAVIE B, GREENBERG A, ET AL, FIND OBSERVER PANEL REPORT [EB/OL]. [2009-04-09]. HTTP://WWW. NETS - FIN D. N ET/FIND_REPORT FINAL.PDF.
  • 9NAMED DATA NETWORKING (NDN) [EB/ OL]. [2011-01-12]. HTTP://WVkhN. NAM E D - DATA.N ET/.
  • 10MOBILITYFIRST [EB/OL]. [2011-01-12]. HTTP://MOBILITYFIRST.WINLAB.RUTGERS. EDU/.

共引文献137

同被引文献18

  • 1RAVINDRAN R,LO S,ZHANG Xin-wen,et al.Supporting Seamless Mobility in Named Data Networking[C]∥IEEE International Conference on Communications,2012:5 854-5 869.
  • 2JIANG Xiao-ke,BI Jun,WANG You,et al.A Content Provider Mobility Solution of Named Data Networking[C]∥IEEE International Conference on Network Protocols,2012,13(1):1-2.
  • 3JIANG Xiao-ke,BI Jun,WANG You.What Benefits Does NDN Have in Supporting Mobility[C]∥IEEE Symposium on Computers and Communications,2014:1-6.
  • 4LEE J,KIM D,JANG M W,et al.Proxy-based Mobility Management Scheme in Mobile Content Centric Networking(CCN)Environments[C]∥IEEE International Conference on Consumer Electronics,2011,10(11):595-596.
  • 5HERMANS F,NGAI E.Mobile Sources in an InformationCentric Network with Hierarchical Names:An Indirection Approach[C]∥SNCNW,2011.
  • 6KIM D H,KIM J H,KIM Y S.Mobility Support in Content Centric Networks[C]∥ACM ICN Workshop,2012:13-18.
  • 7ZHU Zhen-kai,AFANASYEV A,ZHANG Li-xia.A New Perspective on Mobility Support[C]∥NDN,Technical Report NDN-0013,2013.
  • 8冯勇,梁浩.车载自组织网络中一种有效的匿名认证方法[J].计算机工程与应用,2010,46(23):126-128. 被引量:10
  • 9吴建平,李星,刘莹.下一代互联网体系结构研究现状和发展趋势[J].中兴通讯技术,2011,17(2):10-14. 被引量:35
  • 10贾诗炜,闫实,彭木根.分层异构无线网络理论性能研究和优化设计[J].移动通信,2014,38(9):17-22. 被引量:2

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部