Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A trust-based method for mitigating cache poisoning in Name Data Networking

Full metadata record
DC Field Value Language
dc.contributor.authorRezaeifar, Zeinab-
dc.contributor.authorWang, Jian-
dc.contributor.authorOh, Heekuck-
dc.date.accessioned2021-06-22T12:21:13Z-
dc.date.available2021-06-22T12:21:13Z-
dc.date.created2021-01-21-
dc.date.issued2018-02-
dc.identifier.issn1084-8045-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/6761-
dc.description.abstractMitigating Cache poisoning in Name Data Networking (NDN) can significantly improve the effect of ubiquitous data caching, which is a prominent feature in NDN. However, since verification signatures cannot be practical in the network routers, finding a suitable method to mitigate cache poisoning in NDN routers is a challenge. Therefore, in this paper, the proposed method tries to identify invalid contents by the defined parameters: popularity, negative feedback and credibility. Then, with combining these three metrics, the trust model is presented to estimate the validity of each content. Moreover, the proposed method creates an incentive among users to exchange trusted contents. Finally, the evaluation results indicate the effectiveness of the proposed method to detect invalid contents as compared to previous methods.-
dc.language영어-
dc.language.isoen-
dc.publisherACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD-
dc.titleA trust-based method for mitigating cache poisoning in Name Data Networking-
dc.typeArticle-
dc.contributor.affiliatedAuthorOh, Heekuck-
dc.identifier.doi10.1016/j.jnca.2017.12.013-
dc.identifier.scopusid2-s2.0-85040021630-
dc.identifier.wosid000425573500009-
dc.identifier.bibliographicCitationJOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.104, pp.117 - 132-
dc.relation.isPartOfJOURNAL OF NETWORK AND COMPUTER APPLICATIONS-
dc.citation.titleJOURNAL OF NETWORK AND COMPUTER APPLICATIONS-
dc.citation.volume104-
dc.citation.startPage117-
dc.citation.endPage132-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Interdisciplinary Applications-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusPOLLUTION ATTACKS-
dc.subject.keywordAuthorNamed Data Networking (NDN)-
dc.subject.keywordAuthorUbiquitous data caching-
dc.subject.keywordAuthorCache poisoning-
dc.subject.keywordAuthorTrust-based method-
dc.identifier.urlhttps://www.sciencedirect.com/science/article/pii/S1084804517304046?via%3Dihub-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Oh, Hee kuck photo

Oh, Hee kuck
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE