Abstract

The selected articles cover topics including security mechanisms overview for named data networking (NDN), security for an edge named function environment, secure NDN with attribute- based cryptography and software-defined networking (SDN), content protection for NDN, and the design of a security monitoring plane in NDN. Over the last few decades, the sum of all forms of video data has grown explosively and is expected to reach 90 percent of all Internet traffic in the near future. Meanwhile, new applications, such as the Internet of Things (IoT), augmented reality, and automatic driving, are emerging as the major trends for the next evolution of the digital society, resulting in the generation and sharing of vast amounts of data. The existing Internet-based technologies, such as peer-to-peer networks, content distribution networks, and cloud computing, will be unable to handle such large amounts of data and provide the necessary quality of service (QoS) to the applications. In this context, information-centric networking (ICN), characterized by name-based data retrieval and in-network data caching, has emerged as a promising candidate for future networks. It provides access to named data as first-order network service, providing a built-in mechanism for data provenance and greater potential for optimizing forwarding behavior compared to the traditional host-centric communication systems — the Internet today.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.