A trust-based method for mitigating cache poisoning in Name Data Networking
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rezaeifar, Zeinab | - |
dc.contributor.author | Wang, Jian | - |
dc.contributor.author | Oh, Heekuck | - |
dc.date.accessioned | 2021-06-22T12:21:13Z | - |
dc.date.available | 2021-06-22T12:21:13Z | - |
dc.date.created | 2021-01-21 | - |
dc.date.issued | 2018-02 | - |
dc.identifier.issn | 1084-8045 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/6761 | - |
dc.description.abstract | Mitigating Cache poisoning in Name Data Networking (NDN) can significantly improve the effect of ubiquitous data caching, which is a prominent feature in NDN. However, since verification signatures cannot be practical in the network routers, finding a suitable method to mitigate cache poisoning in NDN routers is a challenge. Therefore, in this paper, the proposed method tries to identify invalid contents by the defined parameters: popularity, negative feedback and credibility. Then, with combining these three metrics, the trust model is presented to estimate the validity of each content. Moreover, the proposed method creates an incentive among users to exchange trusted contents. Finally, the evaluation results indicate the effectiveness of the proposed method to detect invalid contents as compared to previous methods. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD | - |
dc.title | A trust-based method for mitigating cache poisoning in Name Data Networking | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Oh, Heekuck | - |
dc.identifier.doi | 10.1016/j.jnca.2017.12.013 | - |
dc.identifier.scopusid | 2-s2.0-85040021630 | - |
dc.identifier.wosid | 000425573500009 | - |
dc.identifier.bibliographicCitation | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.104, pp.117 - 132 | - |
dc.relation.isPartOf | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | - |
dc.citation.title | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | - |
dc.citation.volume | 104 | - |
dc.citation.startPage | 117 | - |
dc.citation.endPage | 132 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | POLLUTION ATTACKS | - |
dc.subject.keywordAuthor | Named Data Networking (NDN) | - |
dc.subject.keywordAuthor | Ubiquitous data caching | - |
dc.subject.keywordAuthor | Cache poisoning | - |
dc.subject.keywordAuthor | Trust-based method | - |
dc.identifier.url | https://www.sciencedirect.com/science/article/pii/S1084804517304046?via%3Dihub | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.