blob: 462713209418f3f436612f2e53dec9081bcac6ca [file] [log] [blame]
Alexander Afanasyev4cd50e32013-04-22 18:32:31 -07001ndnSIM research papers
2======================
3
4Here is a list of ndnSIM-related papers. If you want your paper to appear in this list, please send an email to our mailing list or to us directly.
5
6General papers about ndnSIM
7---------------------------
8
9.. note::
Spyridon Mastorakisaf09eac2018-02-22 11:25:26 -080010 if you refer to ndnSIM in a published work, please cite the following papers, not just the ndnSIM website.
11
12**For ndnSIM >= 2.0:**
13
14- **S. Mastorakis, A. Afanasyev, and L. Zhang, "On the Evolution of ndnSIM: an Open-Source Simulator for NDN Experimentation," ACM SIGCOMM Computer Communication Review (CCR), July 2017** (`PDF <https://ccronline.sigcomm.org/wp-content/uploads/2017/08/sigcomm-ccr-final112-full-letter.pdf>`__, `BibTex <http://web.cs.ucla.edu/~mastorakis/bibtex-ndnsim>`__)
15
16 As a proposed Internet architecture, Named Data Networking (NDN) takes a
17 fundamental departure from today's TCP/IP architecture, thus requiring extensive
18 experimentation and evaluation. To facilitate such experimentation, we have developed
19 ndnSIM, an open-source NDN simulator based on the NS-3 simulation framework. Since its
20 first release in 2012, ndnSIM has gone through five years of active development and
21 integration with the NDN prototype implementations, and has become a popular platform
22 used by hundreds of researchers around the world. This paper presents an overview of the
23 ndnSIM design, the ndnSIM development process, the design tradeoffs, and the reasons
24 behind the design decisions. We also share with the community a number of lessons we
25 have learned in the process.
Alexander Afanasyev4cd50e32013-04-22 18:32:31 -070026
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -080027- **S. Mastorakis, A. Afanasyev, I. Moiseenko, and L. Zhang, "ndnSIM 2.0: A new version of the NDN simulator for NS-3," NDN, Technical Report NDN-0028, 2015** (`PDF <http://named-data.net/techreport/ndn-0028-1-ndnsim-v2.pdf>`__, `BibTex <http://lasr.cs.ucla.edu/afanasyev/bibwiki/bibtex/399>`__)
Alexander Afanasyev3fba2882013-07-13 15:43:10 -070028
Spyridon Mastorakisffe25862015-02-03 16:21:28 -080029 The fundamental departure of the Named-Data Networking (NDN) communication paradigm from the IP
30 principles requires extensive evaluation through experimentation, and simulation is a necessary
31 tool to enable the experimentation at scale. We released the first version of ndnSIM, an open
32 source NS-3-based NDN simulator, back in June 2012. Since then, ndnSIM has undergone
33 substantial development resulting in ndnSIM 2.0, which was released in January 2015. This paper
34 reports the design and features of this new simulator version. The goal of the new release is
35 to match the simulation platform to the latest advancements of NDN research. Therefore, it uses
36 the ndn-cxx library (NDN C++ library with eXperimental eXtensions) and the NDN Forwarding Daemon
37 (NFD) to enable experiments with real code in a simulation environment.
38
Spyridon Mastorakisaf09eac2018-02-22 11:25:26 -080039**For ndnSIM 1.0:**
40
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -080041- **A. Afanasyev, I. Moiseenko, and L. Zhang, "ndnSIM: NDN simulator for NS-3," NDN, Technical Report NDN-0005, 2012** (`PDF <http://named-data.net/wp-content/uploads/TRndnsim.pdf>`__, `BibTex <http://lasr.cs.ucla.edu/afanasyev/bibwiki/bibtex/367>`__)
Spyridon Mastorakisffe25862015-02-03 16:21:28 -080042
43 Named Data Networking (NDN) is a newly proposed Internet architecture. NDN retains the
44 Internet's hourglass architecture but evolves the thin waist. Instead of pushing data to
45 specific locations, NDN retrieves data by name. On one hand, this simple change allows NDN
46 networks to use almost all of the Internet's well tested engineering properties to solve not
47 only IP's communication problems but also digital distribution and control problems. On the
48 other hand, a distribution architecture differs in fundamental ways from a point-to-point
49 communication architecture of today's Internet and raises many new research challenges.
50 Simulation can serve as a flexible tool to examine and evaluate various aspects of this new
51 architecture. To provide the research community at large with a common simulation platform, we
52 have developed an open source NS-3 based simulator, ndnSIM, which faithfully implemented the
53 basic components of a NDN network in a modular way. This paper provides an overview of ndnSIM.
Alexander Afanasyev6ed9f502013-07-19 17:48:35 -070054
Alexander Afanasyev4cd50e32013-04-22 18:32:31 -070055
56Research papers that use ndnSIM
57-------------------------------
58
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -080059#. **L. Wang, A. Afanasyev, R. Kuntz, R. Vuyyuru, R. Wakikawa, and L. Zhang, "Rapid Traffic Information Dissemination Using Named Data," in Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications (NoM'12), Hilton Head Island, South Carolina, June 2012, pp. 7–12.** (`PDF <http://lasr.cs.ucla.edu/afanasyev/data/files/Wang/nom.pdf>`__, `BibTex <http://lasr.cs.ucla.edu/afanasyev/bibwiki/bibtex/365>`__, `simulation code <https://github.com/cawka/ndnSIM-nom-rapid-car2car>`__)
Alexander Afanasyev2230d862013-07-04 10:45:26 -070060
Alexander Afanasyev6ed9f502013-07-19 17:48:35 -070061 Our previous work applied the Named Data Networking approach to vehicle-to-vehicle (V2V) communications and developed a simple design for traffic information dissemination applications. This paper uses simulations to evaluate the feasibility of the design as described in [1].
62 Our results show that data names can greatly facilitate the forwarding process for Interest and data packets.
Alexander Afanasyev3fba2882013-07-13 15:43:10 -070063 With adequate vehicle density, data can propagate over long distances robustly at tens of kilometers per second and a requester can retrieve the desired traffic information 10km away in a matter of seconds.
Alexander Afanasyev4cd50e32013-04-22 18:32:31 -070064
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -080065#. **Z. Zhu, C. Bian, A. Afanasyev, V. Jacobson, and L. Zhang, "Chronos: Serverless Multi-User Chat Over NDN," NDN, Technical Report NDN-0008, 2012.** (`PDF <http://named-data.net/techreport/TR008-chronos.pdf>`__, `BibTex <http://lasr.cs.ucla.edu/afanasyev/bibwiki/bibtex/371>`__)
Alexander Afanasyev3fba2882013-07-13 15:43:10 -070066
Alexander Afanasyev4cd50e32013-04-22 18:32:31 -070067 Multi-user applications are commonly implemented using a centralized server.
68 This paper presents a new design for multi-user chat applications (Chronos) that works in a distributed, serverless fashion over Named Data Networking.
69 In Chronos, all participants share their views by exchanging the cryptographic digests of the chat room data set.
70 A newly generated message causes a change of the digest at the message originator, which leads to retrieving the new data by all other participants in an efficient way and resynchronization of chat room views.
71 Chronos does not have a single point of failure and eliminates traffic concentration problem of server-based implementations.
72 We use simulations to evaluate and compare Chronos with a traditional server-based chat room implementation.
73 Our results demonstrate Chronos' robustness and efficiency in data dissemination.
74 Chronos' approach of replacing centralized servers by distributed data synchronization can be applied to a variety of distributed applications to simplify design and ease deployment.
75
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -080076#. **M. Vahlenkamp, "Threats on Information-Centric Networking", Hamburg University of Applied Sciences, Technical Report, 2012.** (`PDF <http://inet.cpt.haw-hamburg.de/teaching/ws-2012-13/master-projekt/markus-vahlenkamp_seminar.pdf>`__)
Alexander Afanasyev3fba2882013-07-13 15:43:10 -070077
Alexander Afanasyevfc9d9e12013-08-10 14:17:49 -070078 The ICN approach aims for reflecting these changes in usage of the Internet and is thus dragging content awareness into the network, for instance to let the network itself decide where to acquire requested data from and thereby utilize content caches to increase the data dissemination efficiency. All this is backed by the use of the publish/subscribe paradigm that is utilised to announce content availability and request its delivery. Since the ICN paradigm is entirely different from todays Internet, new challenges arise within the area of network security. NDN/CCNx, as the most popular ICN approach, claims to solve a couple of different security flaws which the actual Internet is suffering from. This raises the questions of which vulnerabilities still exist and if maybe new issues arise.
Alexander Afanasyev3fba2882013-07-13 15:43:10 -070079
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -080080#. **C. Yi, A. Afanasyev, I. Moiseenko, L. Wang, B. Zhang, and L. Zhang, "A Case for Stateful Forwarding Plane," Computer Communications, vol. 36, no. 7, pp. 779–791, 2013. ISSN 0140-3664** (`PDF <http://lasr.cs.ucla.edu/afanasyev/data/files/Yi/comcom-stateful-forwarding.pdf>`__, `BibTex <http://lasr.cs.ucla.edu/afanasyev/bibwiki/bibtex/380>`__, `simulation code <https://github.com/cawka/ndnSIM-comcom-stateful-fw>`__)
Alexander Afanasyev3fba2882013-07-13 15:43:10 -070081
Alexander Afanasyev6ed9f502013-07-19 17:48:35 -070082 In Named Data Networking (NDN), packets carry data names instead of source and destination addresses.
Alexander Afanasyev3fba2882013-07-13 15:43:10 -070083 This paradigm shift leads to a new network forwarding plane: data consumers send *Interest* packets to request desired data, routers forward Interest packets and maintain the state of all pending Interests, which is then used to guide *Data* packets back to the consumers.
84 Maintaining the pending Interest state, together with the two-way Interest and Data exchange, enables NDN routers' *forwarding* process to measure performance of different paths, quickly detect failures and retry alternative paths.
85 In this paper we describe an initial design of NDN's forwarding plane and evaluate its data delivery performance under adverse conditions.
Alexander Afanasyev6ed9f502013-07-19 17:48:35 -070086 Our results show that this stateful forwarding plane can successfully circumvent prefix hijackers, avoid failed links, and utilize multiple paths to mitigate congestion.
Alexander Afanasyev3fba2882013-07-13 15:43:10 -070087 We also compare NDN's performance with that of IP-based solutions to highlight the advantages of a stateful forwarding plane.
88
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -080089#. **A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang, "Interest Flooding Attack and Countermeasures in Named Data Networking," in Proc. of IFIP Networking 2013, May 2013.** (`PDF <http://lasr.cs.ucla.edu/afanasyev/data/files/Afanasyev/ifip-interest-flooding-ndn.pdf>`__, `BibTex <http://lasr.cs.ucla.edu/afanasyev/bibwiki/bibtex/381>`__, `simulation code <https://github.com/cawka/ndnSIM-ddos-interest-flooding>`__)
Alexander Afanasyev3fba2882013-07-13 15:43:10 -070090
Alexander Afanasyev6ed9f502013-07-19 17:48:35 -070091 Distributed Denial of Service (DDoS) attacks are an ongoing problem in today's Internet, where packets from a large number of compromised hosts thwart the paths to the victim site and/or overload the victim machines.
92 In a newly proposed future Internet architecture, Named Data Networking (NDN), end users request desired data by sending Interest packets, and the network delivers Data packets upon request only, effectively eliminating many existing DDoS attacks.
93 However, an NDN network can be subject to a new type of DDoS attack, namely Interest packet flooding.
Alexander Afanasyev3fba2882013-07-13 15:43:10 -070094 In this paper we investigate effective solutions to mitigate Interest flooding.
95 We show that NDN's inherent properties of storing per packet state on each router and maintaining flow balance (i.e., one Interest packet retrieves at most one Data packet) provides the basis for effective DDoS mitigation algorithms.
96 Our evaluation through simulations shows that the solution can quickly and effectively respond and mitigate Interest flooding.
97
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -080098#. **B. Zhou, C. Wu, X. Hong, and M. Jiang, "Algorithms for Distributed Programmable Controllers", Technical Report, March 2013.** (`PDF <http://hong.cs.ua.edu/DCP-techReport-March2013.pdf>`__)
Alexander Afanasyev3fba2882013-07-13 15:43:10 -070099
Alexander Afanasyevfc9d9e12013-08-10 14:17:49 -0700100 A few works on SDN (Software-Defined Networking) like those in Onix improve programmability of the distributed network control.
101 The asynchronism and Byzantine issues of the control challenge the re-configurability of the service that is to safely program the control in atomic so as to avoid the transient control issues like the routing loops and black holes.
102 We propose two important algorithms of the distributed control to enable the programmability: (1) the reconfiguration primitive allows the network control of the services being able to safely react to an external event; and (2) the reuse primitive allows the control states of a service being accessible for all services. We give concepts and algorithms of two primitives.
103 In addition, we provide the concrete cases of the current approaches for ICN (Information-Centric Networking) and CDN (Content Distribution Networks) for quests of the reconfigurability and programmability.
Alexander Afanasyev6ed9f502013-07-19 17:48:35 -0700104 Then, we evaluate the performance of ICN in both simulation and the PlanetLab testbed.
105 The evaluation results show that the layer improves the lowers 19.6% of the Interest delays in the ICN that is heavily congested and lowers 97% delays in the PlanetLab with 9 nodes on usual case.
Alexander Afanasyev3fba2882013-07-13 15:43:10 -0700106 In addition, the evaluation of CDN on the PlanetLab shows that it reduces 81% request delay on usual case.
107
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800108#. **M. Tortelli, L. A. Grieco, and G. Boggia, "Performance Assessment of Routing Strategies in Named Data Networking", in Proc. of GTTI 2013 Session on Telecommunication Networks, 2013** (`PDF <http://www.gtti.it/GTTI13/papers/Tortelli_et_al_GTTI2013.pdf>`__)
Alexander Afanasyev3fba2882013-07-13 15:43:10 -0700109
Alexander Afanasyevfc9d9e12013-08-10 14:17:49 -0700110 Information Centric Networking (ICN) architectures are currently being investigated to orient the Future Internet towards a content centric paradigm, thus allowing the provisioning of more secure, efficient, and scalable services.
Alexander Afanasyev6ed9f502013-07-19 17:48:35 -0700111 In this work, we focus on the Named Data Networking (NDN) proposal to analyze the impact of several routing and forwarding strategies, which play a fundamental role in ICN.
112 In particular, thanks to the recently devised ns-3 based NDN simulator, namely ndnSIM, we conduce an extensive simulation campaign using the GEANT topology as a core network.
Alexander Afanasyevfc9d9e12013-08-10 14:17:49 -0700113 We monitor different distinctive metrics, such as file download time, server load reduction, hit ratio, hit distance, and communication overhead, in different topologies and traffic conditions.
114 Simulation results show that the election of a single best forwarding strategy is a difficult task.
115 Indeed, the pros and cons of each strategy are heavily influenced by the popularity distribution of contents, which, in turn, affects the effectiveness of the distributed caching mechanisms typically used in the NDN architecture.
Alexander Afanasyev3fba2882013-07-13 15:43:10 -0700116
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800117#. **S. Seo, J.-M. Kang, A. Leon-Garcia, Y. Han, and J. W.-K. Hong, "Secure and Efficient Context Data Collection using Content-Centric Networking", in Proc. of International Workshop on Smart Communication Protocols and Algorithms (SCPA), 2013** (`PDF <http://dpnm.postech.ac.kr/papers/SCPA/13/sesise/scpa13.pdf>`__)
Alexander Afanasyev3fba2882013-07-13 15:43:10 -0700118
Alexander Afanasyev6ed9f502013-07-19 17:48:35 -0700119 Context data collection is a fundamental and important process for realizing context-aware recommender or personalization systems.
120 The existing context data collection approaches are based-on traditional TCP/IP that has several disadvantages such as lack of mobility and security.
Alexander Afanasyevfc9d9e12013-08-10 14:17:49 -0700121 On the other hand, Content-Centric Networking (CCN) provides advantages in terms of mobility, security, and bandwidth efficiency compared to TCP/IP.
122 In this paper, we propose a secure and efficient context data collection and provision approach based on CCN.
Alexander Afanasyev3fba2882013-07-13 15:43:10 -0700123 Simulation results show that this approach can reduce bandwidth consumption by 52.7%–98.9% in comparison to a TCP/IP-based one.
Alexander Afanasyev6ed9f502013-07-19 17:48:35 -0700124
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800125#. **J. Ran, N. Lv, D. Zhang, Y. Ma, and Z. Xie, "On Performance of Cache Policies in Named Data Networking", in International Conference on Advanced Computer Science and Electronics Information (ICACSEI 2013), 2013** (`PDF <http://www.atlantis-press.com/php/download_paper.php?id=7640>`__)
Alexander Afanasyev6ed9f502013-07-19 17:48:35 -0700126
127 Named Data Network (NDN) is gaining increasingly concerns, as an important direction of the future Internet architecture research centered on content.
128 Content caching has played a key role in NDN.
129 Existing cache replacement policies like Least Frequently Used (LFU) and Least Recently Used (LRU) have failed to make full use of the popularity of contents, which leads to a low cache efficiency in the dynamic network.
130 In order to make the best use of content popularity in the cache strategy, this paper has proposed a cache replacement policy based on content popularity (CCP), and designed the data structure format and replacement algorithm.
131 For fully studying and analyzing the performance of different cache policies in NDN in terms of network throughput, server load and cache hit ratio, we have done a lot of simulations to show how they will improve the network.
132 The simulation results show that our proposed CCP can significantly decrease the server load with a higher cache hit ratio and increase the network capacity at the same time compared with LRU and LFU.
133 And the average throughput is reduced significantly by nearly 47% in comparison to that of the case without in-networking caching.
134 Moreover, it also shows the performance under different sizes of content store.
135 The effectiveness of the CCP strategy is proved during the simulation.
Alexander Afanasyeve63a7c12013-07-30 11:25:50 -0700136
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800137#. **M. Wahlisch, T.C. Schmidt, and M. Vahlenkamp, "Backscatter from the Data Plane--Threats to Stability and Security in Information-Centric Network Infrastructure", in Computer Networks, 2013** (`DOI 10.1016/j.comnet.2013.07.009 <http://dx.doi.org/10.1016/j.comnet.2013.07.009>`__)
Alexander Afanasyeve63a7c12013-07-30 11:25:50 -0700138
139 Information-centric networking (ICN) raises data objects to first class routable entities in the network and changes the Internet paradigm from host-centric connectivity to data-oriented delivery.
140 However, current approaches to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure.
141 In this paper, threats to the stability and security of the content distribution system are analyzed in theory, simulations, and practical experiments.
142 We derive relations between state resources and the performance of routers, and demonstrate how this coupling can be misused in practice.
143 We further show how state-based forwarding tends to degrade by decorrelating resources.
144 We identify intrinsic attack vectors present in current content-centric routing, as well as possibilities and limitations to mitigate them.
145 Our overall findings suggest that major architectural refinements are required prior to global ICN deployment in the real world.
Alexander Afanasyev819eb772013-08-25 20:55:27 -0700146
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800147#. **Xiaoke Jiang and Jun Bi, "Technical Report: Named Content Delivery Network", 2013** (`PDF <http://netarchlab.tsinghua.edu.cn/~shock/THU-NetArchLab-ICN-TR-nCDN-20130730.pdf>`__)
Alexander Afanasyev819eb772013-08-25 20:55:27 -0700148
149 CDN (Content Delivery Network) focuses on delivering requested data to users, no matter where the data comes from; but the fundamental goal of IP is to connect hosts.
150 The essential mismatching leads to complexity and inefficiency.
151 More specifically,
152 1) CDN has to build components to map what to where, which is resource consuming;
153 2) CDN has to monitor real-time network state on the application layer, which is complex and not accurate.
154 In contrast, NDN (Named Data Networking), provides the information and function that traditional CDN devotes a great deal of effort to achieve, since NDN routes by name, its routing plane holds the "what", information of content distribution, and its stateful forwarding plane can detect and adapt to dynamic of the Internet.
155 Thus this work enhances current CDN with NDN, here dubbed Named Content Delivery Network, or nCDN.
156 In nCDN, CDN itself focuses on services such as accounting, data analysis etc; NDN runs over IP and takes charge of content routing and delivery.
157 nCDN is more adaptive to the dynamic of the Internet and improves the performance, especially in a scenario where content copies are hosted in several hosts.
158 nCDN makes it easier to implement optimization solutions and CDN Interconnecting. Our simulations demonstrate that nCDN is better than traditional CDN on almost all aspects, including the scalability, reliability, and QoS.
159
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800160#. **Xiaoke Jiang, Jun Bi, Youchao Wang, and You Wang, "Interest Set Mechanism to Improve the Transport of Named Data Networking", in proceedings of ACM SIGCOMM13 (poster), Hongkong, China, 2013** (`PDF <http://netarchlab.tsinghua.edu.cn/~junbi/SIGCOMM2013-1.pdf>`__)
Alexander Afanasyev819eb772013-08-25 20:55:27 -0700161
Alexander Afanasyeva8e339c2014-07-09 21:48:30 -0700162 Named Data Networking (NDN) is currently a hot research topic promising to be one of the most advanced developments in future Internet architectures.
163 Researches have built real software systems over NDN which work on specified scenarios.
164 In this paper, we proposal an new mechanism which aggregate similar Interest packets to improve the efficient of transport of NDN.
165 Firstly we prove the optimal chunk size which simultaneously minimize the latency and maximize the valid payload ratio during a complete data acquiring process.
166 That's why we aggregate the Interest packet but not increase the size of Data packet.
Alexander Afanasyev819eb772013-08-25 20:55:27 -0700167 Secondly we introduce the Interest Set mechanism that which is able to maintain a conversational "channel" between the data consumer and provider to cover the space and time uncertainty of data packet generating and at the same time reduces the number of FIB lookups and compresses the PIT.
168
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800169#. **Z. Zhu and A. Afanasyev, "Let's ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking," in Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Goettingen, Germany, October 2013** (`PDF <http://lasr.cs.ucla.edu/afanasyev/data/files/Zhu/chronosync-icnp2013.pdf>`__)
Alexander Afanasyev819eb772013-08-25 20:55:27 -0700170
Alexander Afanasyeva8e339c2014-07-09 21:48:30 -0700171 In supporting many distributed applications, such as group text messaging, file sharing, and joint editing, a basic requirement is the efficient and robust synchronization of knowledge about the dataset such as text messages, changes to the shared folder, or document edits.
172 We propose ChronoSync protocol, which exploits the features of the Named Data Networking architecture to efficiently synchronize the state of a dataset among a distributed group of users.
Alexander Afanasyev819eb772013-08-25 20:55:27 -0700173 Using appropriate naming rules, ChronoSync summarizes the state of a dataset in a condensed cryptographic digest form and exchange it among the distributed parties.
Alexander Afanasyeva8e339c2014-07-09 21:48:30 -0700174 Differences of the dataset can be inferred from the digests and disseminated efficiently to all parties.
Alexander Afanasyev819eb772013-08-25 20:55:27 -0700175 With the complete and up-to-date knowledge of the dataset changes, applications can decide whether or when to fetch which pieces of the data.
176 We implemented ChronoSync as a C++ library and developed two distributed application prototypes based on it.
177 We show through simulations that ChronoSync is effective and efficient in synchronization dataset state, and is robust against packet losses and network partitions.
Alexander Afanasyevd16b50c2013-08-26 08:16:54 -0700178
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800179#. **Y. Wang, N. Rozhnova, A. Narayanan, D. Oran, and I. Rhee, "An improved hop-by-hop interest shaper for congestion control in named data networking". In Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking, 2013** (`PDF <http://conferences.sigcomm.org/sigcomm/2013/papers/icn/p55.pdf>`__)
Alexander Afanasyevd16b50c2013-08-26 08:16:54 -0700180
Alexander Afanasyeva8e339c2014-07-09 21:48:30 -0700181 Hop-by-hop interest shaping has been proposed as a viable congestion control mechanism in Named Data Networking (NDN).
182 Interest shaping exploits the strict receiver-driven traffc pattern and the symmetric bidirectional forwarding in NDN to control the returning data rate.
183 In this paper, we point out that both interests and contents contribute to congestion and their interdependence must be considered in any interest shaping algorithm.
184 We first analyze this issue mathematically by formulating it as an optimization problem to obtain the optimal shaping rate.
185 Then a practical interest shaping algorithm is proposed to achieve high link utilization without congestive data loss.
186 We further note that flow differentiation in NDN is complicated and design our scheme independently of traffc flows.
187 We demonstrate our hopby-hop interest shaper in conjunction with simple AdditiveIncrease-Multiplicative-Decrease (AIMD) clients using the ns3-based NDN simulator (ndnSIM).
Alexander Afanasyevd16b50c2013-08-26 08:16:54 -0700188 Our results show that the proposed shaping algorithm can effectively control congestion and achieve near-optimal throughput.
Alexander Afanasyev6283f302013-09-05 20:42:31 -0700189
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800190#. **S. Arianfar, P. Sarolahti, and J. Ott, "Deadline-based Resource Management for Information-Centric Networks". In Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking, 2013** (`doi 10.1145/2491224.2491226 <http://dx.doi.org/10.1145/2491224.2491226>`__)
Alexander Afanasyev6283f302013-09-05 20:42:31 -0700191
192 Unlike in traditional IP-based end-to-end network sessions, in information-centric networks the data source may change during a communication session.
193 Therefore the response time to subsequent data requests may vary significantly depending on whether data comes from nearby cache, or a distant source.
Alexander Afanasyeva8e339c2014-07-09 21:48:30 -0700194 This is a complication for designing resource management, reliability and other algorithms, that traditionally use RTT measurements for determining when data is considered lost and should be retransmitted (along with related congestion control adjustments).
195 This paper discusses a different approach for designing resource management in information-centric networks: data packets are assigned with a lifetime, that is used as a basis for scheduling and resource management in the network, and for congestion control and retransmission logic at the end hosts.
Alexander Afanasyev6283f302013-09-05 20:42:31 -0700196 We demonstrate an initial evaluation of this approach based on ns-3 simulations on CCN framework
Alexander Afanasyevf5a0bf22013-09-16 11:28:22 -0700197
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800198#. **M. Conti, P. Gasti, M. Teoli, "A lightweight mechanism for detection of cache pollution attacks in Named Data Networking". Computer Networks, 2013** (`doi 10.1016/j.comnet.2013.07.034 <http://dx.doi.org/10.1016/j.comnet.2013.07.034>`__)
Alexander Afanasyevf5a0bf22013-09-16 11:28:22 -0700199
Alexander Afanasyeva8e339c2014-07-09 21:48:30 -0700200 Content-Centric Networking (CCN) is an emerging paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure.
Alexander Afanasyevf5a0bf22013-09-16 11:28:22 -0700201 In CCN, named content---rather than addressable hosts---becomes a first-class entity.
202 Content is therefore decoupled from its location.
203 This allows, among other things, the implementation of ubiquitous caching.
Alexander Afanasyeva8e339c2014-07-09 21:48:30 -0700204
Alexander Afanasyevf5a0bf22013-09-16 11:28:22 -0700205 Named-Data Networking (NDN) is a prominent example of CCN.
206 In NDN, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content.
207 This makes NDN a good architecture for efficient large scale content distribution.
208 However, reliance on caching allows an adversary to perform attacks that are very effective and relatively easy to implement.
209 Such attacks include cache poisoning (i.e., introducing malicious content into caches) and cache pollution (i.e., disrupting cache locality).
Alexander Afanasyeva8e339c2014-07-09 21:48:30 -0700210
Alexander Afanasyevf5a0bf22013-09-16 11:28:22 -0700211 This paper focuses on cache pollution attacks, where the adversary’s goal is to disrupt cache locality to increase link utilization and cache misses for honest consumers.
212 We show, via simulations, that such attacks can be implemented in NDN using limited resources, and that their effectiveness is not limited to small topologies.
213 We then illustrate that existing proactive countermeasures are ineffective against realistic adversaries. Finally, we introduce a new technique for detecting pollution attacks.
214 Our technique detects high and low rate attacks on different topologies with high accuracy.
215
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800216#. **G. Mauri and G. Verticale, "Distributing key revocation status in Named Data Networking". Advances in Communication Networking, pages 310–313. Springer, 2013** (`doi 10.1007/978-3-642-40552-5_31 <http://dx.doi.org/10.1007/978-3-642-40552-5_31>`__)
Alexander Afanasyevf5a0bf22013-09-16 11:28:22 -0700217
Alexander Afanasyeva8e339c2014-07-09 21:48:30 -0700218 Content Centric Networking (CCN) is a new network paradigm designed to satisfy user needs considering the growth of data demand.
219 Named Data Networking (NDN) is a research project that is developing the future Internet architecture using the principles behind CCN.
220 In this novel architecture, the contents are addressed by their name and not by their location.
221 Thus, the attention is shifted from user to content, resulting in a caching network that is more efficient and flexible than an IP network for content distribution and management with beneficial effects on timely delivery.
222 In NDN, the content objects are divided into chunks, each digitally signed by its producer, and most papers assume that verification is made only by the content consumer.
223 In order to perform signature verification, a node needs the signer’s key, which can be easily retrieved by issuing a standard interest message.
224 Although content verification at the end node prevents disruptive attacks in which false data is delivered to applications, the verification of key validity is also necessary.
Alexander Afanasyevf5a0bf22013-09-16 11:28:22 -0700225 Otherwise, false data would be cached and forwarded instead of correct data resulting in a denial of service and paving the way for more sophisticated attacks.
Alexander Afanasyeva8e339c2014-07-09 21:48:30 -0700226
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800227#. **W. Drira and F. Filali, "A Pub/Sub extension to NDN for efficient data collection and dissemination in V2X networks". In First International Workshop on Smart Vehicles: Connectivity Technologies and ITS Applications (2014) (SmartVehicles'14), Sydney, Australia, June 2014.** (`PDF <https://drive.google.com/file/d/0B-Qgl9lKNlsXLWRvWllGdElHMTQ>`__)
Alexander Afanasyeva8e339c2014-07-09 21:48:30 -0700228
229 Named Data Networking Networking (NDN) gives more importance to content instead of its location. On the other hand, V2X networks carry a wide variety of content such as events, traffic information and infotainment content. Therefore, NDN native capabilities in terms of caching and multicast can reduce traffic load in V2X networks and consequently decrease congestion risk. However, the communication in NDN is based on a request-response pattern while it is event based in V2X. Thus, this paper extends NDN with a Pub/Sub capability in order to provide an efficient data collection and dissemination in V2X networks. In this paper, we study the limitations of using NDN and the challenges of extending it with Pub/Sub and propose a new protocol that handles V2X characteristics. Simulation results of data dissemination shows that the number of Subscribe messages generated in vehicles present at most the one tenth of the total received Publish messages (TPub) while, in NDN, the number of Interests will be equal to the number of Data messages without considering message losses.
230
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800231#. **W. Drira and F. Filali, "NDN-Q: an NDN query mechanism for efficient V2X data collection in smart cities". In Self-Organizing Wireless Access Networks for Smart City (SWANSITY) part of SECON 2014 (SWANSITY 2014), Singapore, Singapore, June 2014.** (`PDF <https://drive.google.com/file/d/0B-Qgl9lKNlsXZWhwVmtxdUVUNXc>`__)
Alexander Afanasyeva8e339c2014-07-09 21:48:30 -0700232
233 Collecting data from V2X networks is important to monitor, control and manage road traffic. However, efficient collection of the needed data is quite challenging due to vehicles mobility and the tremendous amount of events and data generated. Named Data Networking (NDN), a future internet architecture, gives more importance to content instead of its location. It has some inner capabilities of caching and multicast that can reduce traffic load in V2X networks and consequently decrease congestion risk. The communication in NDN is based on a request-response pattern where a consumer requests a specific content using its associated name. In this paper, an NDN query mechanism is proposed to use dynamic names to collect dynamic data built on the fly in one or many nodes. Then, it is merged and aggregated hop by hop to provide the response cooperatively to the consumer.
Alexander Afanasyeva1497752015-01-10 01:17:19 -0800234
235#. **Marica Amadeo, Claudia Campolo, Antonella Molinaro, Nathalie Mitton. "Named Data
236 Networking: a Natural Design for Data Collection in Wireless Sensor Networks", IFIP Wireless
237 Days 2013, Valencia, Spain.** (`DOI: 10.1109/WD.2013.6686486
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800238 <http://dx.doi.org/10.1109/WD.2013.6686486>`__, `PDF
239 <https://www.academia.edu/attachments/34272952/download_file?st=MTQwNjEzNTQxOSw3OC4xNS4yMC40NSw3NjQ1Nzc%3D&>`__)
Alexander Afanasyeva1497752015-01-10 01:17:19 -0800240
241 Named Data Networking (NDN) is a promising paradigm for the future Internet architecture
242 that also opens new perspectives in the way data can be retrieved in Wireless Sensor
243 Networks (WSNs). In this paper, we explore the potentialities of the NDN paradigm applied
244 to WSNs and propose enhancements to the NDN forwarding strategy by including principles
245 inspired by traditional data-centric routing schemes. Results achieved through the ndnSIM
246 simulator confirm the viability and effectiveness of the proposal.
247
248
249#. **Marica Amadeo, Claudia Campolo, Antonella Molinaro. "Forwarding Strategies in Named Data
250 Wireless Ad hoc Networks: Design and Evaluation", Elsevier Journal of Network and Computer
251 Applications (JNCA), 2014.** (`DOI: 10.1016/j.jnca.2014.06.007
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800252 <http://www.sciencedirect.com/science/article/pii/S1084804514001404>`__, `PDF
253 <https://www.academia.edu/attachments/34272694/download_file?st=MTQwNjEzNTk1Miw3OC4xNS4yMC40NSw3NjQ1Nzc%3D&>`__)
Alexander Afanasyeva1497752015-01-10 01:17:19 -0800254
255 Named Data Networking (NDN) is a promising information-centric architecture for the future
256 Internet that is also gaining momentum in wireless ad hoc networks as an alternative
257 paradigm to traditional IP networking. NDN shares with other information-centric proposals
258 the same innovative concepts, such as named content, name-based routing, and in-network
259 content caching. These principles and the simple and robust communication model, based on
260 Interest and Data packets exchange, make NDN especially appealing for deployment in
261 wireless ad hoc environments, characterized by a broadcast error-prone channel and
262 time-varying topologies. Nevertheless, making NDN-based solutions really effective in ad
263 hoc networks requires rethinking some of the basic NDN forwarding principles to cope with
264 wireless links and node mobility. In this paper, we analyse two classes of forwarding
265 approaches: (i) a minimalist, provider-blind forwarding strategy, only aimed at keeping
266 packet redundancy on the broadcast wireless medium under control, without any knowledge
267 about the neighbourhood and the identity of the content sources; and (ii) a provider-aware
268 strategy, which leverages soft state information about the content sources, piggybacked in
269 Interest and Data packets and locally kept by nodes, to facilitate content retrieval.
270
271 Performance evaluation is carried by means of ndnSIM, the official NDN simulator, that is
272 overhauled for use in realistic wireless ad-hoc environments. Results collected under
273 variable traffic loads and topologies provide insights into the behaviour of both
274 forwarding approaches and help to derive a set of recommendations that are crucial to the
275 successful design of a forwarding strategy for named data ad-hoc wireless networking.
276
277#. **S. Tarnoi, K. Suksomboon, and Y. Ji, "Cooperative Routing for Content-Centric Networking,"
278 IEEE Conference on Local Computer Networks (IEEE LCN), Sydney, Australia, October 2013.**
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800279 (`DOI:10.1109/LCN.2013.6761314 <http://dx.doi.org/10.1109/LCN.2013.6761314>`__)
Alexander Afanasyeva1497752015-01-10 01:17:19 -0800280
281 A typical Forwarding Information Based (FIB) construction in the Content Centric Networking
282 (CCN) architecture relies on the name prefix dissemination following the shortest path
283 manner. However, routing based on the shortest path may not fully exploit the benefits of
284 forwarding and data planes of the CCN architecture since different content requester
285 routers may use disjoint paths to forward their interest packets, even though these packets
286 aim at the same content. To exploit this opportunity, we propose a cooperative routing
287 protocol for CCN, which focuses on a FIB reconstruction based on the content retrieval
288 statistics to improve the in-network caching utilization. A binary linear optimization
289 problem is formulated for calculating the optimal path for the cooperative routing. The
290 simulation results show an improvement in the server load and round-trip time provided by
291 the cooperative routing scheme compared with that of the conventional shortest path routing
292 scheme.
293
294#. **S. Tarnoi, K. Suksomboon, W. Kumwilaisak, and Y. Ji, "Performance of probabilistic caching
295 and cache replacement policies for content-centric networks", IEEE LCN, Edmonton, Canada,
296 September 2014.** (`DOI:10.1109/LCN.2014.6925761
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800297 <http://dx.doi.org/10.1109/LCN.2014.6925761>`__)
Alexander Afanasyeva1497752015-01-10 01:17:19 -0800298
299 The Content-Centric Networking (CCN) architecture exploits a universal caching strategy
300 whose inefficiency has been confirmed by research communities. Various caching schemes have
301 been proposed to overcome some drawbacks of the universal caching strategy but they come
302 with additional complexity and overheads. Besides those sophisticated caching schemes,
303 there is a probabilistic caching scheme that is more efficient than the universal caching
304 strategy and adds a modest complexity to a network. The probabilistic caching scheme was
305 treated as a benchmark and the insights into its behavior have never been studied despite
306 its promising performance and feasibility in practical use. In this paper we study the
307 probabilistic caching scheme by means of computer simulation to explore the behavior of the
308 probabilistic caching scheme when it works with various cache replacement policies. The
309 simulation results show the different behavioral characteristics of the probabilistic
310 caching scheme as a function of the cache replacement policy.
311
312#. **S. Tarnoi, W. Kumwilaisak, and Y. Ji, "Optimal cooperative routing protocol based on
313 prefix popularity for content centric networking", IEEE LCN, Edmonton, Canada, September
Spyridon Mastorakisf34b3192015-02-16 17:42:01 -0800314 2014.** (`DOI:10.1109/LCN.2014.6925805 <http://dx.doi.org/10.1109/LCN.2014.6925805>`__)
Alexander Afanasyeva1497752015-01-10 01:17:19 -0800315
316 This paper presents an optimal cooperative routing protocol (OCRP) for Content Centric
317 Networking (CCN) aiming to improve the in-network cache utilization. The objective of OCRP
318 is to selectively aggregate the multiple flows of interest messages onto the same
319 path. This improves the cache utilization while mitigating the cache contention in the
320 Content Store (CS) of CCN routers on the routing path. The optimal routing path is obtained
321 by binary linear optimization under threes constraints: flow conservation constraint, cache
322 contention mitigating constraint, and path length constraint. Our simulation results of
323 OCRP show the reduction in the server load and round-trip hop distance in comparison to
324 those of the shortest path routing and our previously proposed cooperative routing schemes.
Spyridon Mastorakisef774162015-10-08 22:57:49 -0700325
326#. **Klaus M. Schneider, and Udo R. Krieger, "Beyond Network Selection: Exploiting Access Network
327 Heterogeneity with Named Data Networking", 2nd ACM Conference on Information-Centric
328 Networking, San Francisco, October, 2015** (`DOI: 10.1145/2810156.2810164 <http://dx.doi.org/10.1145/2810156.2810164>`__, `PDF <http://conferences2.sigcomm.org/acm-icn/2015/proceedings/p137-schneider.pdf>`__)
329
330 Today, most mobile devices are equipped with multiple wireless network interfaces, but are
331 constrained to use only one network at the same time. In this paper, we show that using multiple
332 access networks simultaneously can improve user-perceived QoS and cost- effectiveness. We
333 present a system architecture that exploits the adap- tive forwarding plane of Named Data
334 Networking (CCN/NDN) and implement a system prototype based on the NDN Forwarding
335 Daemon (NFD). More specifically, we propose a set of forwarding strate- gies that use
336 fine-grained application requirements together with interfaces estimation techniques for delay,
337 bandwidth, and packet loss. Our simulation results show that our approach can improve QoS
338 and/or reduce access costs in many wireless scenarios.