{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T23:49:55Z","timestamp":1773013795551,"version":"3.50.1"},"reference-count":139,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"vor","delay-in-days":303,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>The rapid evolution of technology has revealed the limitations of host\u2010centric or IP address\u2013based networks. To overcome these limitations, a new communication paradigm has emerged: the information\u2010centric networking (ICN), which focuses on content (data) regardless of its location in the network. This new vision of networking addresses issues such as security and address space limitations inherent in the traditional IP address\u2010centric paradigm. Unlike its predecessor, ICN is based on content naming rather than IP addresses. ICN offers advantages such as improved quality of service, reduced data delivery time, enhanced data availability, and strengthened security. However, with these benefits come new vulnerabilities, particularly in content naming and caching. It is, therefore, crucial to understand the attacks specific to ICN. In this study, we first present an overview of the two network paradigms and fundamental security concepts, then, examine the various attacks in the ICN paradigm. We propose a taxonomy of these attacks and outline future research directions to address emerging security challenges.<\/jats:p>","DOI":"10.1049\/ise2\/5178335","type":"journal-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T12:22:19Z","timestamp":1761913339000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Thorough Review of Security in Information\u2010Centric Networking"],"prefix":"10.1049","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5660-0660","authenticated-orcid":false,"given":"Ado Adamou Abba","family":"Ari","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4078-5944","authenticated-orcid":false,"given":"Youssoufa Hara","family":"Soukolsou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3649-6802","authenticated-orcid":false,"given":"Sammy Salim Daissinta","family":"Baidi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6765-5488","authenticated-orcid":false,"given":"Moussa","family":"Aboubakar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5135-8972","authenticated-orcid":false,"given":"Nabila","family":"Labraoui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2987-8821","authenticated-orcid":false,"given":"Alidou","family":"Mohamadou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9560-1196","authenticated-orcid":false,"given":"Ousmane","family":"Thiare","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"265","published-online":{"date-parts":[[2025,10,31]]},"reference":[{"key":"e_1_2_14_1_2","doi-asserted-by":"crossref","unstructured":"HewettR.andKijsanayothinP. Host-Centric Model Checking for Network Vulnerability Analysis 2008 Annual Computer Security Applications Conference (ACSAC) 2008 IEEE 225\u2013234.","DOI":"10.1109\/ACSAC.2008.15"},{"key":"e_1_2_14_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106957"},{"key":"e_1_2_14_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894816"},{"key":"e_1_2_14_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00063"},{"key":"e_1_2_14_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113228"},{"key":"e_1_2_14_6_2","unstructured":"KutscherD. Rfc 7927: Information-Centric Networking (icn) Research Challenges 2016 https:\/\/tools.ietf."},{"key":"e_1_2_14_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym12071113"},{"key":"e_1_2_14_8_2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4998"},{"key":"e_1_2_14_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-021-00867-7"},{"key":"e_1_2_14_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3399669"},{"key":"e_1_2_14_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2285-3_50"},{"key":"e_1_2_14_12_2","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2019918763"},{"key":"e_1_2_14_13_2","doi-asserted-by":"crossref","unstructured":"PatelA. R. AzadiS. BabaeeM. H. MollaeiN. PatelK. L. andMehtaD. R. Significance of Robotics in Manufacturing Energy Goods and Transport Sector in Internet of Things (iot) Paradigm 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA) 2018 IEEE 1\u20134.","DOI":"10.1109\/ICCUBEA.2018.8697488"},{"key":"e_1_2_14_14_2","first-page":"349","volume-title":"Smart Environmental Monitoring Based on IoT: Architecture, Issues, and Challenges","author":"Srivastava M.","year":"2021"},{"key":"e_1_2_14_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2007.893939"},{"key":"e_1_2_14_16_2","doi-asserted-by":"crossref","unstructured":"GastiP. TsudikG. UzunE. andZhangL. DoS and DDoS in Named Data Networking 2013 22nd International Conference on Computer Communication and Networks (ICCCN) 2013 IEEE 1\u20137.","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"e_1_2_14_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2392629"},{"key":"e_1_2_14_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749508"},{"key":"e_1_2_14_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2873343"},{"key":"e_1_2_14_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2925337"},{"key":"e_1_2_14_21_2","first-page":"736","article-title":"Security Attacks in Information-Centric Networking","volume":"9","author":"Tejaswini V. P. E. C.","journal-title":"International Journal of Management, Technology And Engineering"},{"key":"e_1_2_14_22_2","article-title":"Survey Based on Security Aware Caching Scheme for IoT Based Information Centric Networking","volume":"8","author":"Sakthivanitha M.","year":"2021","journal-title":"EAI Endorsed Transactions on Energy Web"},{"key":"e_1_2_14_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000245"},{"key":"e_1_2_14_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3223667"},{"key":"e_1_2_14_25_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi15120392"},{"key":"e_1_2_14_26_2","first-page":"26","article-title":"Security Scheme in Information-Centric Network (ICN)","volume":"2","author":"Iliyasu M. U.","year":"2023","journal-title":"Harvard International Journal of Engineering Research and Technology"},{"key":"e_1_2_14_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23802-9_9"},{"key":"e_1_2_14_28_2","unstructured":"KelseyR.andHuiJ. Multicast Protocol for Low-Power and Lossy Networks (MPL) 2016."},{"key":"e_1_2_14_29_2","doi-asserted-by":"crossref","unstructured":"WinterT. ThubertP. andBrandtA. et al.RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks 2012 6550 1\u2013157 https:\/\/doi.org\/10.17487\/rfc6550.","DOI":"10.17487\/rfc6552"},{"key":"e_1_2_14_30_2","doi-asserted-by":"crossref","unstructured":"SelanderG. MattssonJ. PalombiniF. andSeitzL. Object Security for Constrained Restful Environments (oscore) 2019 Work in Progresshttps:\/\/doi.org\/10.17487\/RFC8613.","DOI":"10.17487\/RFC8613"},{"key":"e_1_2_14_31_2","doi-asserted-by":"crossref","unstructured":"ShelbyZ. HartkeK. andBormannC. The Constrained Application Protocol (CoAP) 2014.","DOI":"10.17487\/rfc7252"},{"key":"e_1_2_14_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7518-7_2"},{"key":"e_1_2_14_33_2","unstructured":"MulliganG. WilliamsC. andHuoD. Mobility Considerations for 6LoWPAN 2010 Internet Engineering Task Force Internet-Draft draft-williams-6lowpan-mob-03."},{"key":"e_1_2_14_34_2","doi-asserted-by":"crossref","unstructured":"AhlgrenB. D\u2019AmbrosioM. andMarchisioM. et al.Design Considerations for a Network of Information Proceedings of the 2008 ACM CoNEXT Conference 2008 ACM 1\u20136 https:\/\/doi.org\/10.1145\/1544012.1544078 2-s2.0-70350757796.","DOI":"10.1145\/1544012.1544078"},{"key":"e_1_2_14_35_2","doi-asserted-by":"crossref","unstructured":"KoponenT. ChawlaM. andChunB. G. et al.A Data-Oriented (and Beyond) Network Architecture Proceedings of the 2007 Conference on Applications Technologies Architectures and Protocols for Computer Communications 2007 ACM 181\u2013192 https:\/\/doi.org\/10.1145\/1282380.","DOI":"10.1145\/1282380.1282402"},{"key":"e_1_2_14_36_2","doi-asserted-by":"crossref","unstructured":"TarkomaS. AinM. andVisalaK. The Publish\/Subscribe Internet Routing Paradigm (PSIRP): Designing the Future Internet Architecture 2009 102\u2013111.","DOI":"10.3233\/978-1-60750-007-0-102"},{"key":"e_1_2_14_37_2","doi-asserted-by":"crossref","unstructured":"JacobsonV. SmettersD. K. ThorntonJ. D. PlassM. F. BriggsN. H. andBraynardR. L. Networking Named Content Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies 2009 ACM 1\u201312 https:\/\/doi.org\/10.1145\/1658939.","DOI":"10.1145\/1658939.1658941"},{"key":"e_1_2_14_38_2","first-page":"1","volume-title":"Developing Information Networking Further: From PSIRP to PURSUIT","author":"Fotiou N.","year":"2010"},{"key":"e_1_2_14_39_2","doi-asserted-by":"publisher","DOI":"10.17148\/IJARCCE.2014.31055"},{"key":"e_1_2_14_40_2","volume-title":"A Scalable Deployable NAT-Based Internet Architecture","author":"Cheriton D. R.","year":"2000"},{"key":"e_1_2_14_41_2","doi-asserted-by":"crossref","unstructured":"ChoiS. KimK. KimS. andBhR. Threat of DoS by Interest Flooding Attack in Content-Centric Networking The International Conference on Information Networking 2013 (ICOIN) 2013 IEEE 315\u2013319.","DOI":"10.1109\/ICOIN.2013.6496396"},{"key":"e_1_2_14_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0066-9_2"},{"key":"e_1_2_14_43_2","doi-asserted-by":"crossref","unstructured":"GoldmanA. D. UluagacA. S. andCopelandJ. A. Cryptographically-Curated File System (CCFS): Secure Inter-Operable and Easily Implementable Information-Centric Networking 39th Annual IEEE Conference on Local Computer Networks 2014 IEEE 142\u2013149.","DOI":"10.1109\/LCN.2014.6925766"},{"key":"e_1_2_14_44_2","doi-asserted-by":"crossref","unstructured":"HamdaneB. SerhrouchniA. FadlallahA. andEl FatmiS. G. Named-Data Security Scheme for Named Data Networking 2012 Third International Conference on The Network of the Future (NOF) 2012 IEEE 1\u20136.","DOI":"10.1109\/NOF.2012.6464002"},{"key":"e_1_2_14_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2616359"},{"key":"e_1_2_14_46_2","doi-asserted-by":"crossref","unstructured":"HahmO. BaccelliE. SchmidtT. C. W\u00e4hlischM. AdjihC. andMassouli\u00e9L. Low-Power Internet of Things with NDN & Cooperative Caching ICN \u201917: Proceedings of the 4th ACM Conference on Information-Centric Networking 2017 ACM 98\u2013108 https:\/\/doi.org\/10.1145\/3125719.","DOI":"10.1145\/3125719.3125732"},{"key":"e_1_2_14_47_2","doi-asserted-by":"crossref","unstructured":"QuevedoJ. CorujoD. andAguiarR. A Case for ICN usage in IoT Environments 2014 IEEE Global Communications Conference 2014 IEEE 2770\u20132775.","DOI":"10.1109\/GLOCOM.2014.7037227"},{"key":"e_1_2_14_48_2","doi-asserted-by":"crossref","unstructured":"MordjanaY. SenouciM. R. andMelloukA. Performance Analysis of Caching and Forwarding Strategies in Content Centric Networking GLOBECOM 2017 - 2017 IEEE Global Communications Conference 2017 IEEE 1\u20136.","DOI":"10.1109\/GLOCOM.2017.8254124"},{"key":"e_1_2_14_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"key":"e_1_2_14_50_2","doi-asserted-by":"crossref","unstructured":"AfanasyevA. YiC. WangL. ZhangB. andZhangL. SNAMP: Secure Namespace Mapping to Scale NDN Forwarding 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2015 IEEE 281\u2013286.","DOI":"10.1109\/INFCOMW.2015.7179398"},{"key":"e_1_2_14_51_2","first-page":"23","volume-title":"Multipath Forwarding in Named Data Networking: Flow, Fairness, and Context-Awareness","author":"Bouacherine A.","year":"2016"},{"key":"e_1_2_14_52_2","unstructured":"ShangW. YuY. DromsR. andZhangL. Challenges in IoT Networking via TCP\/IP Architecture 2016."},{"key":"e_1_2_14_53_2","unstructured":"G\u00fcndoganC. SchmidtT. W\u00e4hlischM. ScherbC. MarxerC. andTschudinC. ICN Adaptation to LowPAN Networks (ICN LoWPAN) 2018."},{"key":"e_1_2_14_54_2","unstructured":"RahmanA. TrossenD. KutscherD. andRavindranR. Deployment Considerations for Information-Centric Networking (ICN) 2018 Internet-Draft draft-irtf-icnrg-deployment-guidelines-03."},{"key":"e_1_2_14_55_2","unstructured":"RavindranR. ZhangY. andGriecoL. et al.Design Considerations for Applying ICN to IOT 2018 Internet Engineering Task Force Internet-Draft draft-irtf-icnrg-icniot-02."},{"key":"e_1_2_14_56_2","unstructured":"ZhangY. RaychadhuriD. RavindranR. andWangG. ICN Based Architecture for IoT 2013."},{"key":"e_1_2_14_57_2","doi-asserted-by":"crossref","unstructured":"TysonG. KauneS. MilesS. El-KhatibY. MautheA. andTaweelA. A Trace-Driven Analysis of Caching in Content-Centric Networks 2012 21st International Conference on Computer Communications and Networks (ICCCN) 2012 IEEE 1\u20137.","DOI":"10.1109\/ICCCN.2012.6289181"},{"key":"e_1_2_14_58_2","doi-asserted-by":"crossref","unstructured":"TysonG. SastryN. RimacI. CuevasR. andMautheA. A Survey of Mobility in Information-Centric Networks: Challenges and Research Directions NoM \u201912: Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design - Architecture Algorithms and Applications 2012 ACM 1\u20136 https:\/\/doi.org\/10.1145\/2248361.","DOI":"10.1145\/2248361.2248363"},{"key":"e_1_2_14_59_2","unstructured":"LeeJ.andPackS. Mobility Management in Future Wireless Networks: Past Present and Future 2013 IEEE WCNC Tutorial."},{"key":"e_1_2_14_60_2","doi-asserted-by":"crossref","unstructured":"VarvelloM. RimacI. LeeU. GreenwaldL. andHiltV. On the Design of Content-Centric MANETs 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services 2011 IEEE 1\u20138.","DOI":"10.1109\/WONS.2011.5720195"},{"key":"e_1_2_14_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593277"},{"key":"e_1_2_14_62_2","doi-asserted-by":"crossref","unstructured":"TysonG. BighamJ. andBodaneseE. Towards an Information-Centric Delay-Tolerant Network 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2013 IEEE 387\u2013392.","DOI":"10.1109\/INFCOMW.2013.6970723"},{"key":"e_1_2_14_63_2","volume-title":"A Survey of Information-Centric Networking (draft)","author":"Ahlgren B.","year":"2011"},{"key":"e_1_2_14_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/2500501"},{"key":"e_1_2_14_65_2","doi-asserted-by":"crossref","unstructured":"YovitaL. V.andSyambasN. R. Content Storage Effect on the Named Data Network Traffic Load 2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA) 2017 IEEE 1\u20135 https:\/\/doi.org\/10.1109\/TSSA.2017.8272941 2-s2.0-85046254414.","DOI":"10.1109\/TSSA.2017.8272941"},{"key":"e_1_2_14_66_2","unstructured":"JingY. Evaluating Caching Mechanisms in Future Internet Architectures 2016 Massachusetts Institute of Technology PhD thesis."},{"key":"e_1_2_14_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2913677"},{"key":"e_1_2_14_68_2","unstructured":"Update GMDTF Global Mobile Data Traffic Forecast Update 2017 CiscoForecast. pdf."},{"key":"e_1_2_14_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/2412096.2412098"},{"key":"e_1_2_14_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2787609"},{"key":"e_1_2_14_71_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010062"},{"key":"e_1_2_14_72_2","doi-asserted-by":"publisher","DOI":"10.3390\/su12219179"},{"key":"e_1_2_14_73_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.017"},{"key":"e_1_2_14_74_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00280-6"},{"key":"e_1_2_14_75_2","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-07-2014-0173"},{"key":"e_1_2_14_76_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.02.017"},{"key":"e_1_2_14_77_2","doi-asserted-by":"crossref","unstructured":"SoualiK. RahmaouiO. andOuzzifM. An Overview of Traceability: Definitions and Techniques 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt) 2016 IEEE 789\u2013793.","DOI":"10.1109\/CIST.2016.7804995"},{"key":"e_1_2_14_78_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.011"},{"key":"e_1_2_14_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4483667"},{"key":"e_1_2_14_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.060912.00182"},{"key":"e_1_2_14_81_2","doi-asserted-by":"crossref","unstructured":"KatsarosK. V. SainoL. PsarasI. andPavlouG. On Information Exposure through Named Content 10th International Conference on Heterogeneous Networking for Quality Reliability Security and Robustness 2014 IEEE 152\u2013157.","DOI":"10.1109\/QSHINE.2014.6928679"},{"key":"e_1_2_14_82_2","unstructured":"StaisC. DiamantisD. ArethaC. andXylomenosG. VoPSI: Voice Over a Publish-Subscribe Internetwork 2011 Future Network & Mobile Summit Warsaw 2011 IEEE 1\u20138."},{"key":"e_1_2_14_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656888"},{"key":"e_1_2_14_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"e_1_2_14_85_2","unstructured":"CholezT. Introduction to Content-Centric Networking and the CCNx Framework 2012."},{"key":"e_1_2_14_86_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-88-470-1818-1_1"},{"key":"e_1_2_14_87_2","doi-asserted-by":"crossref","unstructured":"BoukS. H. AhmedS. H. andKimD. Hierarchical and Hash-Based Naming Scheme for Vehicular Information Centric Networks 2014 International Conference on Connected Vehicles and Expo (ICCVE) 2014 IEEE 765\u2013766.","DOI":"10.1109\/ICCVE.2014.7297653"},{"key":"e_1_2_14_88_2","unstructured":"EdwallT.andTremblayB. SAIL Project 2011."},{"key":"e_1_2_14_89_2","doi-asserted-by":"crossref","unstructured":"DannewitzC. GolicJ. OhlmanB. andAhlgrenB. Secure Naming for a Network of Information 2010 INFOCOM IEEE Conference on Computer Communications Workshops 2010 IEEE 1\u20136.","DOI":"10.1109\/INFCOMW.2010.5466661"},{"key":"e_1_2_14_90_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.06.004"},{"key":"e_1_2_14_91_2","doi-asserted-by":"crossref","unstructured":"LiF. ChenF. WuJ. andXieH. Longest Prefix Lookup in Named Data Networking: How Fast Can It Be? 2014 9th IEEE International Conference on Networking Architecture and Storage 2014 IEEE 186\u2013190.","DOI":"10.1109\/NAS.2014.36"},{"key":"e_1_2_14_92_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.12.009"},{"key":"e_1_2_14_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/319151"},{"key":"e_1_2_14_94_2","unstructured":"SmettersD.andJacobsonV. Securing Network Content 2009 Citeseer tech. rep."},{"key":"e_1_2_14_95_2","doi-asserted-by":"crossref","unstructured":"GaoY. DengL. KuzmanovicA. andChenY. Internet Cache Pollution Attacks and Countermeasures ICNP \u201906: Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols 2006 IEEE 54\u201364.","DOI":"10.1109\/ICNP.2006.320198"},{"key":"e_1_2_14_96_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.020"},{"key":"e_1_2_14_97_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2018.092101"},{"key":"e_1_2_14_98_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.043"},{"key":"e_1_2_14_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943546"},{"key":"e_1_2_14_100_2","article-title":"Distributed Fault-Tolerant Algorithm for Wireless Sensor Network","volume":"9","author":"Titouna C.","year":"2017","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"e_1_2_14_101_2","doi-asserted-by":"crossref","unstructured":"DaoudL.andRaflaN. Routing Aware and Runtime Detection for Infected Network-on-Chip Routers 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS) 2018 IEEE 775\u2013778.","DOI":"10.1109\/MWSCAS.2018.8623972"},{"key":"e_1_2_14_102_2","doi-asserted-by":"crossref","unstructured":"DaoudL.andRaflaN. Analysis of Black Hole Router Attack in Network-on-Chip 2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS) 2019 IEEE 69\u201372.","DOI":"10.1109\/MWSCAS.2019.8884979"},{"key":"e_1_2_14_103_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.001"},{"key":"e_1_2_14_104_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0160"},{"key":"e_1_2_14_105_2","doi-asserted-by":"crossref","unstructured":"KimD. NamS. BiJ. andYeomI. Efficient Content Verification in Named Data Networking ACM-ICN \u201915: Proceedings of the 2nd ACM Conference on Information-Centric Networki 2015 ACM 109\u2013116 https:\/\/doi.org\/10.1145\/2810156.","DOI":"10.1145\/2810156.2810165"},{"key":"e_1_2_14_106_2","doi-asserted-by":"crossref","unstructured":"WongW.andNikanderP. Secure Naming in Information-Centric Networks ReARCH \u201910: Proceedings of the Re-Architecting the Internet Workshop 2010 ACM 1\u20136 https:\/\/doi.org\/10.1145\/1921233.","DOI":"10.1145\/1921233.1921248"},{"key":"e_1_2_14_107_2","unstructured":"MoskowitzR. NikanderP. JokelaP. andHendersonT. Host Identity Protocol 2008 tech. rep. RFC 5201."},{"key":"e_1_2_14_108_2","unstructured":"Berners-LeeT. Universal Resource Identifiers in www 1994."},{"key":"e_1_2_14_109_2","doi-asserted-by":"crossref","unstructured":"ChenJ. XingG. CuiM. HuoH. andHouR. Isolation Forest Based Interest Flooding Attack Detection Mechanism in NDN 2019 2nd International Conference on Hot Information-Centric Networking (HotICN) 2019 IEEE 58\u201362.","DOI":"10.1109\/HotICN48464.2019.9063205"},{"key":"e_1_2_14_110_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi11110232"},{"key":"e_1_2_14_111_2","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"e_1_2_14_112_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"e_1_2_14_113_2","doi-asserted-by":"crossref","unstructured":"FotiouN. XylomenosG. andPolyzosG. C. Securing Information-Centric Networking without Negating Middleboxes 2016 8th IFIP International Conference on New Technologies 2016 IEEE 1\u20135.","DOI":"10.1109\/NTMS.2016.7792475"},{"key":"e_1_2_14_114_2","doi-asserted-by":"crossref","unstructured":"FotiouN.andPolyzosG. C. Securing Content Sharing Over ICN ACM-ICN \u201916: Proceedings of the 3rd ACM Conference on Information-Centric Networking 2016 ACM 176\u2013185 https:\/\/doi.org\/10.1145\/2984356.","DOI":"10.1145\/2984356.2984376"},{"key":"e_1_2_14_115_2","doi-asserted-by":"crossref","unstructured":"WuD. XuZ. ChenB. andZhangY. What if Routers Are malicious? Mitigating Content Poisoning Attack in NDN 2016 IEEE Trustcom\/BigDataSE\/ISPA 2016 IEEE 481\u2013488.","DOI":"10.1109\/TrustCom.2016.0100"},{"key":"e_1_2_14_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2931813"},{"key":"e_1_2_14_117_2","doi-asserted-by":"crossref","unstructured":"GhaliC. TsudikG. andUzunE. et al.Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking 2014.","DOI":"10.14722\/sent.2014.23014"},{"key":"e_1_2_14_118_2","doi-asserted-by":"crossref","unstructured":"CuiW. LiY. XinY. andLiuC. Feedback-Based Content Poisoning Mitigation in Named Data Networking 2018 IEEE Symposium on Computers and Communications (ISCC) 2018 IEEE 759\u2013765.","DOI":"10.1109\/ISCC.2018.8538609"},{"key":"e_1_2_14_119_2","doi-asserted-by":"crossref","unstructured":"SrinivasanS.andMazumdarA. P. Mitigating Content Poisoning in Content Centric Network: A Lightweight Approach 2019 10th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2019 IEEE 1\u20136.","DOI":"10.1109\/ICCCNT45670.2019.8944392"},{"key":"e_1_2_14_120_2","doi-asserted-by":"crossref","unstructured":"ParkH. WidjajaI. andLeeH. Detection of Cache Pollution Attacks Using Randomness Checks 2012 IEEE International Conference on Communications (ICC) 2012 IEEE 1096\u20131100.","DOI":"10.1109\/ICC.2012.6363885"},{"key":"e_1_2_14_121_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.01.020"},{"key":"e_1_2_14_122_2","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52356"},{"key":"e_1_2_14_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2008.081176"},{"key":"e_1_2_14_124_2","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(85)90192-2"},{"key":"e_1_2_14_125_2","volume-title":"Detection of Abrupt Changes: Theory and Application","author":"Basseville M.","year":"1993"},{"key":"e_1_2_14_126_2","doi-asserted-by":"publisher","DOI":"10.1109\/21.256541"},{"key":"e_1_2_14_127_2","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592592"},{"key":"e_1_2_14_128_2","doi-asserted-by":"crossref","unstructured":"AlzahraniB. A. ReedM. J. andVassilakisV. G. Resistance Against Brute-Force Attacks on Stateless Forwarding in Information Centric Networking 2015 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS) 2015 IEEE 209\u2013210.","DOI":"10.1109\/ANCS.2015.7110136"},{"key":"e_1_2_14_129_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4138516"},{"key":"e_1_2_14_130_2","first-page":"84","volume-title":"Countermeasures for Mitigating ICN Routing Related DDoS Attacks","author":"AbdAllah E. G.","year":"2014"},{"key":"e_1_2_14_131_2","doi-asserted-by":"crossref","unstructured":"RaniP. V. RaviN. ShalinieS. M. PariventhanP. andRajkumarK. Fuzzy Based Congestion-Aware Secure (FuCaS) Route Selection in ICN 2018 9th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2018 IEEE 1\u20137.","DOI":"10.1109\/ICCCNT.2018.8494121"},{"key":"e_1_2_14_132_2","doi-asserted-by":"crossref","unstructured":"VirgilioM. MarchettoG. andSistoR. PIT Overload Analysis in Content Centric Networks ICN \u201913: Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking 2013 ACM 67\u201372 https:\/\/doi.org\/10.1145\/2491224.","DOI":"10.1145\/2491224.2491225"},{"key":"e_1_2_14_133_2","unstructured":"WangL. HoqueA. YiC. AlyyanA. andZhangB. OSPFN: An OSPF Based Routing Protocol for Named Data Networking 2012 tech. rep. Technical Report NDN-0003."},{"key":"e_1_2_14_134_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2914189"},{"key":"e_1_2_14_135_2","doi-asserted-by":"crossref","unstructured":"SuksomboonK. TagamiA. BasuA. andKuriharaJ. In-Device Proxy Re-Encryption Service for Information-Centric Networking Access Control 2018 IEEE 43rd Conference on Local Computer Networks (LCN) 2018 IEEE 303\u2013306.","DOI":"10.1109\/LCN.2018.8638129"},{"key":"e_1_2_14_136_2","doi-asserted-by":"crossref","unstructured":"RibeiroI. RochaA. AlbuquerqueC. andGuimaraesF. On the Possibility of Mitigating Content Pollution in Content-Centric Networking 39th Annual IEEE Conference on Local Computer Networks 2014 IEEE 498\u2013501.","DOI":"10.1109\/LCN.2014.6925826"},{"key":"e_1_2_14_137_2","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.33"},{"key":"e_1_2_14_138_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.04.024"},{"key":"e_1_2_14_139_2","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2015EBP3347"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ise2\/5178335","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/ise2\/5178335","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ise2\/5178335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T22:35:02Z","timestamp":1773009302000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/ise2\/5178335"}},"subtitle":[],"editor":[{"given":"Jiwei","family":"Tian","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":139,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/ise2\/5178335"],"URL":"https:\/\/doi.org\/10.1049\/ise2\/5178335","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"value":"1751-8709","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-07-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-26","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5178335"}}