CTJIF-ICN: A Coadjuvant Trust Joint Interest Forwarding Mechanism in Information Centric Networks

Authors

  • Krishna Delvadia Department of Computer Engineering, Shree Swami Atmanand Saraswati Institute of Technology, Surat, Gujarat- 395006, India. Author https://orcid.org/0000-0002-6781-7512
  • Nitul Dutta Department of Computer Engineering, SRM University, Amaravati, Andhra Pradesh-522502, India. Author

DOI:

https://doi.org/10.54392/irjmt2422

Keywords:

Routing, Forwarding, Information centric networks, Security, Trust, CTJIF-ICN

Abstract

The Information centric networks (ICN) transforms the focal point of current Internet paradigm to data centric approach from host centric approach by allowing content driven forwarding and in-network caching mechanisms. Though NDN (Named data networking) paradigm of ICN assures a secure content communication, it is vulnerable to different attacks by the malicious nodes. To minimize the hazards from compromised nodes and to improve the network security, the remaining nodes should transparently receive information about such nodes. This will restrict the forwarding strategy to exploit these malicious nodes for forwarding interest and content as well. Our protocol introduces a dynamic model for prediction of trust in order to evaluate the node trust. Proposed approach observes the historical behaviors of node and uses extended fuzzy logic rules for the prediction of future behaviors to evaluate the node’s trust value. This prediction model is incorporated within the trust based forwarding mechanism that aims to forward interest through secure and shortest path. The extensive simulation study has been carried out to analyze the protocol performance in ns-3 driven ndnSIM-2.0 simulator for performance metrics such as data discovery latency, packet delivery ratio, network overhead, detection ratio and cache hit ratio. When we integrate our trust joint forwarding strategy to state-of-the-art protocols, their performance is significantly improved up to approximately 10-35% against stated performance measures for realistic network topology.

References

A. Djama, B. Djamaa, M. R. Senouci, Information-centric networking solutions for the Internet of Things: A systematic mapping review. Computer Communications, 159, (2020) 37-59. https://doi.org/10.1016/j.comcom.2020.05.003

M. Aggarwal, K. Nilay, K. Yadav, Survey of named data networks: Future of Internet. International Journal of Information Technology, 9(2), (2017) 197-207. https://doi.org/10.1007/s41870-017-0014-y

G. Xylomenos, C.N. Ververidis, V.A. Siris, N. Fotiou, C. Tsilopoulos, X. Vasilakos, K.V. Katsaros, G.C. Polyzos, A survey of information-centric networking research. IEEE communications surveys & tutorials, 16(2), (2013) 1024-1049. https://doi.org/10.1109/SURV.2013.070813.00063

C. Marxer, C. Tschudin, (2017) Schematized Access Control for Data Cubes and Trees. in: Proceedings of the 4th ACM Conference on Information-Centric Networking, (2017) 170–175. https://doi.org/10.1145/3125719.3125736

E.J. Chang, P.K. Hussain, P.S. Dillon, Fuzzy nature of trust and dynamic trust modelling in service-oriented environments. Proceedings of the ACM Workshop on Secure Web Services, (2005) 75–83. https://doi.org/10.1145/1103022.1103036

F.G. Marmol, G.M. Perez, Security Threats Scenarios in Trust and Reputation Models for Distributed Systems. computers & security, 28(7), (2009) 545–556. https://doi.org/10.1016/j.cose.2009.05.005

M. Pearce, S. Zeadally, R. Hunt, Virtualization: Issues, Security Threats, and Solutions. ACM Computing Surveys (CSUR), 45(2), (2013) 1-39. https://doi.org/10.1145/2431211.2431216

K. Delvadia, N. Dutta, G. Ghinea, (2019) An efficient routing strategy for information centric networks. IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Goa, India. https://doi.org/10.1109/ANTS47819.2019.9118123

K. Delvadia, N. Dutta, R. Jadeja, CCJRF-ICN: A Novel Mechanism for Coadjuvant Caching Joint Request Forwarding in Information Centric Networks. in IEEE Access, 9, (2021) 84134-84155. https://doi.org/10.1109/ACCESS.2021.3087558

B. Nour, K. Sharif, F. Li, Y. Wang, Security and Privacy Challenges in Information-Centric Wireless Internet of Things Networks. IEEE Security & Privacy, 18(2), (2019) 35-45. https://doi.org/10.1109/MSEC.2019.2925337

B. Nour, K. Sharif, F. Li, S. Yang, H. Moungla, Y.Wang, ICN Publisher-Subscriber Models: Challenges and Group-based Communication. IEEE Network, 33(6), (2019) 156-163. https://doi.org/10.1109/MNET.2019.1800551

Z. Zhang, Y. Yu, H. Zhang, E. Newberry, S. Mastorakis, Y. Li, A. Afanasyev, L. Zhang, An Overview of Security Support in Named Data Networking. IEEE Communications Magazine, 56(11), (2018) 62–68. https://doi.org/10.1109/MCOM.2018.1701147

Y. Yu, Y. Li, X. Du, R. Chen, B. Yang, Content Protection in Named Data Networking: Challenges and Potential Solutions. IEEE Communications Magazine, 56(11), (2018) 82–87. https://doi.org/10.1109/MCOM.2018.1701086

Z. Zhang, A. Afanasyev, L. Zhang, NDNCERT: Universal Usable Trust Management for NDN. in: Proceedings of the 4th ACM Conference on Information-Centric Networking, (2017) 178–179. https://doi.org/10.1145/3125719.3132090

K. Xue, P. He, X. Zhang, Q. Xia, D.S. Wei, H. Yue, F. Wu, A secure, efficient, and accountable edge-based access control framework for information centric networks. IEEE/ACM Transactions on Networking, 27(23), (2019) 1220-1233. https://doi.org/10.1109/TNET.2019.2914189

T.Y. Youn, J. Kim, S.C. Seo, Efficient Data Delivery in Content-Centric Network with Stronger Privacy of Publisher. International Conference on Information Networking (ICOIN), IEEE, Korea. https://doi.org/10.1109/ICOIN50884.2021.9333982

M. Bilal, S. Pack, Secure distribution of protected content in information-centric networking. IEEE Systems Journal, 14(2), (2020) 1921–1932. https://doi.org/10.1109/JSYST.2019.2931813

G. Rathee, A. Sharma, R. Kumar, F. Ahmad, R. Iqbal, A trust management scheme to secure mobile information centric networks. Computer Communications, 151, (2020) 66–75. https://doi.org/10.1016/j.comcom.2019.12.024

W. Fang, M. Xu, C. Zhu, W. Han, W. Zhang, J.J. Rodrigues, FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things. IEEE Access, 7, (2019) 13476–13485. https://doi.org/10.1109/ACCESS.2019.2892712

Z. Yang, X. Li, L. Wei, C. Zhang, C. Gu, (2020) SGX-ICN: A Secure and Privacy-Preserving Information-Centric Networking with SGX Enclaves. International Conference on Hot Information-Centric Networking (HotICN), Anhui, China. https://doi.org/10.1109/HotICN50779.2020.9350832

X. Wang, X. Chen, X. Wang, Secure vehicular data communication in Named Data Networking. Digital Communications and Networks, 9(1), (2023) 203-210. https://doi.org/10.1016/j.dcan.2022.05.022

P. García-Teodoro, J. Camacho, G. Maciá-Fernández, J.A. Gómez-Hernández, V.J. López-Marín, A novel zero-trust network access control scheme based on the security profile of devices and users. Computer Networks, 212, (2022) 109068. https://doi.org/10.1016/j.comnet.2022.109068

A. Mabrouk, A. Naja, Intrusion detection game for ubiquitous security in vehicular networks: A signaling game-based approach. Computer Networks, 225, (2023) 109649. https://doi.org/10.1016/j.comnet.2023.109649

Mahin Mohammadi, Reza Rawassizadeh, Abbas Sheikh Taheri, A consumer-centered security framework for sharing health data in social networks. Journal of Information Security and Applications 69, (2022) 103303. https://doi.org/10.1016/j.jisa.2022.103303

Y. Lu, C. Wang, M. Yue, Z. Wu, Consumer-source authentication with conditional anonymity in information-centric networking. Information Sciences, 624, (2023) 378-394. https://doi.org/10.1016/j.ins.2022.12.051

D. Kondo, V. Vassiliades, T. Silverston, H. Tode, T. Asami, The named data networking flow filter: Towards improved security over information leakage attacks. Computer Networks, 173, (2020) 107187. https://doi.org/10.1016/j.comnet.2020.107187

J. Zhou, J. Luo, J. Wang, L. Deng, Cache Pollution Prevention Mechanism Based on Deep Reinforcement Learning in NDN. Journal of Communications and Information Networks, 6(1), (2021) 91-100. https://doi.org/10.23919/JCIN.2021.9387728

V. Rani, K.N. Mallikaarjunan, J. Dharani, (2021) Exploiting Queue-driven Cache Replacement Technique for Thwarting Pollution Attack in ICN. IEEE International Conference on Computing Communication and Networking Technologies (ICCCNT), IEEE, India. https://doi.org/10.1109/ICCCNT51525.2021.9579599

N. Laoutaris, H. Che, I. Stavrakakis, The LCD interconnection of LRU caches and its analysis. Performance Evaluation, 63(7), (2006) 609-634. https://doi.org/10.1016/j.peva.2005.05.003

Y. He, Y. Zhu, Y. Ni, J. Shi, N. Zhu, A caching strategy in content centric networks based on node's importance. Information Technology Journal, 13(3), (2014) 588-592. https://doi.org/10.3923/itj.2014.588.592

W.K. Chai, D. He, I. Psaras, G. Pavlou, Cache `less for more' in information-centric networks (extended version). Computer Communications, 36(7), (2013) 758-770. https://doi.org/10.1016/j.comcom.2013.01.007

I. Psaras, W.K. Chai, G. Pavlou, Probabilistic in-network caching for information-centric networks. Proceedings of the second edition of the ICN workshop on Information-centric networking, (2012) 55-60. https://doi.org/10.1145/2342488.2342501

K. Thar, N.H. Tran, S. Ullah, T.Z. Oo, C.S. Hong, Online caching and cooperative forwarding in information centric networking. IEEE Access, 6, (2018) 59679-59694. https://doi.org/10.1109/ACCESS.2018.2884913

X. Hu, S. Zheng, G. Zhang, L. Zhao, G. Cheng, J. Gong, R. Li, an on demand off-path cache exploration based multipath forwarding strategy. Computer Networks, 166, (2020) 107032. https://doi.org/10.1016/j.comnet.2019.107032

R. Chiocchetti, D. Rossi, G. Rossini, CcnSim: An highly scalable CCN simulator. 2013 IEEE International Conference on Communications (ICC), (2013) 2309-2314. https://doi.org/10.1109/ICC.2013.6654874

Downloads

Published

2024-02-10

How to Cite

Delvadia, K. and Dutta, N. (2024) “CTJIF-ICN: A Coadjuvant Trust Joint Interest Forwarding Mechanism in Information Centric Networks”, International Research Journal of Multidisciplinary Technovation, 6(2), pp. 12–33. doi:10.54392/irjmt2422.