{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:45:15Z","timestamp":1767084315826,"version":"3.41.0"},"reference-count":124,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T00:00:00Z","timestamp":1560816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Brazilian Coordination for the Improvement of Higher Education Personnel (CAPES) through a scholarship"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,5,31]]},"abstract":"<jats:p>The Information-Centric Network (ICN) paradigm is a future Internet approach aiming to tackle the Internet architectural problems and inefficiencies, by swapping the main entity of the network architecture from hosts to content items. In ICN, content names play a central role: Each content gets a unique name at the network layer, and this name is used for routing the content over the network. This paradigm change potentially enables a future Internet with better performance, reliability, scalability, and suitability for wireless and mobile communication. It also provides new intrinsic means to deal with some popular attacks on the Internet architecture, such as denial of service. However, this new paradigm also represents new challenges related to security that need to be addressed, to ensure its capability to support current and future Internet requirements. This article surveys and summarizes ongoing research concerning security aspects of ICNs, discussing vulnerabilities, attacks, and proposed solutions to mitigate them. We also discuss open challenges and propose future directions regarding research in ICN security.<\/jats:p>","DOI":"10.1145\/3311888","type":"journal-article","created":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T12:05:38Z","timestamp":1560945938000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Naming Content on the Network Layer"],"prefix":"10.1145","volume":"52","author":[{"given":"Elisa","family":"Mannes","sequence":"first","affiliation":[{"name":"Federal University of Paran\u00e1 State, PR, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2592-3664","authenticated-orcid":false,"given":"Carlos","family":"Maziero","sequence":"additional","affiliation":[{"name":"Federal University of Paran\u00e1 State, PR, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2019,6,18]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2392629"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.12"},{"key":"e_1_2_1_3_1","volume-title":"International Conference on Networking (Networking\u201913)","author":"Afanasyev Alexander","year":"2013","unstructured":"Alexander Afanasyev , Priya Mahadevan , Ilya Moiseenko , Ersin Uzun , and Lixia Zhang . 2013 . Interest flooding attack and countermeasures in named data networking . In International Conference on Networking (Networking\u201913) . IFIP, 1--9. Alexander Afanasyev, Priya Mahadevan, Ilya Moiseenko, Ersin Uzun, and Lixia Zhang. 2013. Interest flooding attack and countermeasures in named data networking. In International Conference on Networking (Networking\u201913). IFIP, 1--9."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179398"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"volume-title":"ACM Conference on Information-Centric Networking (ICN\u201915)","author":"Al-Sheikh Samir","key":"e_1_2_1_6_1","unstructured":"Samir Al-Sheikh , Matthias W\u00e4hlisch , and Thomas C. Schmidt . 2015. Revisiting countermeasures against NDN interest flooding . In ACM Conference on Information-Centric Networking (ICN\u201915) . ACM, 195--196. Samir Al-Sheikh, Matthias W\u00e4hlisch, and Thomas C. Schmidt. 2015. Revisiting countermeasures against NDN interest flooding. In ACM Conference on Information-Centric Networking (ICN\u201915). ACM, 195--196."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2013.5609"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CFIC.2013.6566320"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEEC.2013.6659467"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018589"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384450"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2012.6193505"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11841036_61"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2014.34"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500098.2500102"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2014.7017100"},{"key":"e_1_2_1_18_1","volume-title":"International Conference on Information Networking (ICOIN\u201913)","author":"Choi Seungoh","year":"2013","unstructured":"Seungoh Choi , Kwangsoo Kim , Seongmin Kim , and Byeong hee Roh . 2013 . Threat of DoS by interest flooding attack in content-centric networking . In International Conference on Information Networking (ICOIN\u201913) . IEEE, 315--319. Seungoh Choi, Kwangsoo Kim, Seongmin Kim, and Byeong hee Roh. 2013. Threat of DoS by interest flooding attack in content-centric networking. In International Conference on Information Networking (ICOIN\u201913). IEEE, 315--319."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2001-9402"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28166-7_12"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2013.6761300"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.034"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970722"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466661"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.01.009"},{"key":"e_1_2_1_26_1","volume-title":"Network and Distributed System Security Symposium (NDSS\u201912)","author":"DiBenedetto Steve","year":"2012","unstructured":"Steve DiBenedetto , Paolo Gasti , Gene Tsudik , and Ersin Uzun . 2012 . ANDaNA: Anonymous named data networking application . In Network and Distributed System Security Symposium (NDSS\u201912) . Internet Society. Steve DiBenedetto, Paolo Gasti, Gene Tsudik, and Ersin Uzun. 2012. ANDaNA: Anonymous named data networking application. In Network and Distributed System Security Symposium (NDSS\u201912). Internet Society."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562065"},{"key":"e_1_2_1_28_1","first-page":"14","article-title":"Denial of service in internet protocol network and information centric network: An impediment to network quality of service","volume":"4","author":"Elechi Onyekachi O.","year":"2014","unstructured":"Onyekachi O. Elechi , Joseph S. Igwe , and Elias C. Eze . 2014 . Denial of service in internet protocol network and information centric network: An impediment to network quality of service . Journal of Information Engineering and Applications 4 (2014), 14 -- 24 . Onyekachi O. Elechi, Joseph S. Igwe, and Elias C. Eze. 2014. Denial of service in internet protocol network and information centric network: An impediment to network quality of service. Journal of Information Engineering and Applications 4 (2014), 14--24.","journal-title":"Journal of Information Engineering and Applications"},{"key":"e_1_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Stephen Farrell Dirk Kutscher Christian Dannewitz B\u00f6rje Ohlman Ari Ker\u00e4nen and Phillip Hallam-Baker. 2013. Naming Things with Hashes. RFC 6920.  Stephen Farrell Dirk Kutscher Christian Dannewitz B\u00f6rje Ohlman Ari Ker\u00e4nen and Phillip Hallam-Baker. 2013. Naming Things with Hashes. RFC 6920.","DOI":"10.17487\/rfc6920"},{"volume-title":"Future Internet Symposium (FIS\u201910)","author":"Fotiou Nikos","key":"e_1_2_1_30_1","unstructured":"Nikos Fotiou , Giannis F. Marias , and George C. Polyzos . 2010. Towards a secure rendezvous network for future publish\/subscribe architectures . In Future Internet Symposium (FIS\u201910) . Springer, Berlin, Germany, 49--56. Nikos Fotiou, Giannis F. Marias, and George C. Polyzos. 2010. Towards a secure rendezvous network for future publish\/subscribe architectures. In Future Internet Symposium (FIS\u201910). Springer, Berlin, Germany, 49--56."},{"volume-title":"ACM SIGCOMM Workshop on ICN (ICN\u201912)","author":"Fotiou Nikos","key":"e_1_2_1_31_1","unstructured":"Nikos Fotiou , Giannis F. Marias , and George C. Polyzos . 2012. Access control enforcement delegation for information-centric networking architectures . In ACM SIGCOMM Workshop on ICN (ICN\u201912) . ACM, 85--90. Nikos Fotiou, Giannis F. Marias, and George C. Polyzos. 2012. Access control enforcement delegation for information-centric networking architectures. In ACM SIGCOMM Workshop on ICN (ICN\u201912). ACM, 85--90."},{"volume-title":"Advanced Satellite Multimedia Systems Conference, Signal Processing for Space Communications Workshop (ASMS\/SPSC). IEEE, 1--8.","author":"Fotiou Nikos","key":"e_1_2_1_32_1","unstructured":"Nikos Fotiou , Yannis Thomas , Vasilios A. Siris , and George C. Polyzos . 2014. Security requirements and solutions for integrated satellite-terrestrial information-centric networks . In Advanced Satellite Multimedia Systems Conference, Signal Processing for Space Communications Workshop (ASMS\/SPSC). IEEE, 1--8. Nikos Fotiou, Yannis Thomas, Vasilios A. Siris, and George C. Polyzos. 2014. Security requirements and solutions for integrated satellite-terrestrial information-centric networks. In Advanced Satellite Multimedia Systems Conference, Signal Processing for Space Communications Workshop (ASMS\/SPSC). IEEE, 1--8."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.910"},{"key":"e_1_2_1_34_1","volume-title":"International Conference on Computer Communications and Networks (ICCCN\u201913)","author":"Gasti Paolo","year":"2012","unstructured":"Paolo Gasti , Gene Tsudik , Ersin Uzun , and Lixia Zhang . 2012 . DoS and DDoS in named-data networking . In International Conference on Computer Communications and Networks (ICCCN\u201913) . IEEE, 1--7. Paolo Gasti, Gene Tsudik, Ersin Uzun, and Lixia Zhang. 2012. DoS and DDoS in named-data networking. In International Conference on Computer Communications and Networks (ICCCN\u201913). IEEE, 1--7."},{"key":"e_1_2_1_35_1","unstructured":"Cesar Ghali Ashok Narayanan David Oran and Gene Tsudik. 2014. Secure Fragmentation for Content-Centric Networks. http:\/\/arxiv.org\/abs\/1405.2861.  Cesar Ghali Ashok Narayanan David Oran and Gene Tsudik. 2014. Secure Fragmentation for Content-Centric Networks. http:\/\/arxiv.org\/abs\/1405.2861."},{"volume-title":"ACM Conference on Information-Centric Networking (ICN\u201915)","author":"Ghali Cesar","key":"e_1_2_1_36_1","unstructured":"Cesar Ghali , Marc A. Schlosberg , Gene Tsudik , and Christopher A. Wood . 2015. Interest-based access control for content centric networks . In ACM Conference on Information-Centric Networking (ICN\u201915) . ACM, 147--158. Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, and Christopher A. Wood. 2015. Interest-based access control for content centric networks. In ACM Conference on Information-Centric Networking (ICN\u201915). ACM, 147--158."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677049"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/sent.2014.23014"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677049"},{"key":"e_1_2_1_40_1","first-page":"1","article-title":"Living in a PIT-less world: A case against stateful forwarding in content-centric networking","volume":"1512","author":"Ghali Cesar","year":"2015","unstructured":"Cesar Ghali , Gene Tsudik , Ersin Uzun , and Christopher A. Wood . 2015 . Living in a PIT-less world: A case against stateful forwarding in content-centric networking . ArXiv 1512 , 07755 (2015), 1 -- 10 . http:\/\/arxiv.org\/abs\/1512.07755. Cesar Ghali, Gene Tsudik, Ersin Uzun, and Christopher A. Wood. 2015. Living in a PIT-less world: A case against stateful forwarding in content-centric networking. ArXiv 1512, 07755 (2015), 1--10. http:\/\/arxiv.org\/abs\/1512.07755.","journal-title":"ArXiv"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984373"},{"volume-title":"ACM Conference on Information-Centric Networking (ICN\u201917)","author":"Ghali Cesar","key":"e_1_2_1_42_1","unstructured":"Cesar Ghali , Gene Tsudik , and Christopher A. Wood . 2017. When encryption is not enough: Privacy attacks in content-centric networking . In ACM Conference on Information-Centric Networking (ICN\u201917) . ACM, 1--10. Cesar Ghali, Gene Tsudik, and Christopher A. Wood. 2017. When encryption is not enough: Privacy attacks in content-centric networking. In ACM Conference on Information-Centric Networking (ICN\u201917). ACM, 1--10."},{"key":"e_1_2_1_43_1","volume-title":"International Workshop on Data Privacy Management (DPM\u201912)","author":"Goergen David","year":"2012","unstructured":"David Goergen , Thibault Cholez , J\u00e9r\u00f4me Fran\u00e7ois , and Thomas Engel . 2012 . Security monitoring for content-centric networking . In International Workshop on Data Privacy Management (DPM\u201912) . Springer, 274--286. David Goergen, Thibault Cholez, J\u00e9r\u00f4me Fran\u00e7ois, and Thomas Engel. 2012. Security monitoring for content-centric networking. In International Workshop on Data Privacy Management (DPM\u201912). Springer, 274--286."},{"key":"e_1_2_1_44_1","volume-title":"International Symposium on Integrated Network Management (IM\u201913)","author":"Goergen David","year":"2013","unstructured":"David Goergen , Thibault Cholez , J\u00e9r\u00f4me Fran\u00e7ois , and Thomas Engel . 2013 . A semantic firewall for content-centric networking . In International Symposium on Integrated Network Management (IM\u201913) . IFIP\/IEEE. David Goergen, Thibault Cholez, J\u00e9r\u00f4me Fran\u00e7ois, and Thomas Engel. 2013. A semantic firewall for content-centric networking. In International Symposium on Integrated Network Management (IM\u201913). IFIP\/IEEE."},{"volume-title":"Conference on Local Computer Networks (LCN\u201914)","author":"Goldman Aaron D.","key":"e_1_2_1_45_1","unstructured":"Aaron D. Goldman , A. Selcuk Uluagac , and John A. Copeland . 2014. Cryptographically-curated file system (CCFS): Secure, inter-operable, and easily implementable information-centric networking . In Conference on Local Computer Networks (LCN\u201914) . IEEE, 142--149. Aaron D. Goldman, A. Selcuk Uluagac, and John A. Copeland. 2014. Cryptographically-curated file system (CCFS): Secure, inter-operable, and easily implementable information-centric networking. In Conference on Local Computer Networks (LCN\u201914). IEEE, 142--149."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2013.6649453"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140473"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6952919"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254180"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2012.6464002"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810165"},{"key":"e_1_2_1_52_1","volume-title":"ACM SIGCOMM Workshop on ICN (ICN\u201913)","author":"Ion Mihaela","year":"2013","unstructured":"Mihaela Ion , Jianqing Zhang , and Eve Schooler . 2013 . Toward content-centric privacy in ICN: Attribute-based encryption and routing . In ACM SIGCOMM Workshop on ICN (ICN\u201913) . ACM, 39--40. Mihaela Ion, Jianqing Zhang, and Eve Schooler. 2013. Toward content-centric privacy in ICN: Attribute-based encryption and routing. In ACM SIGCOMM Workshop on ICN (ICN\u201913). ACM, 39--40."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063204"},{"volume-title":"International Conference on Emerging Networking Experiments and Technologies (CoNEXT\u201909)","author":"Jacobson Van","key":"e_1_2_1_54_1","unstructured":"Van Jacobson , Diana K. Smetters , James D. Thornton , Michael F. Plass , Nicholas H. Briggs , and Rebecca L. Braynard . 2009. Networking named content . In International Conference on Emerging Networking Experiments and Technologies (CoNEXT\u201909) . ACM, 1--12. Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, and Rebecca L. Braynard. 2009. Networking named content. In International Conference on Emerging Networking Experiments and Technologies (CoNEXT\u201909). ACM, 1--12."},{"volume-title":"International Conference on Future Internet Technologies (CFI\u201910)","author":"Jeong Jongmin","key":"e_1_2_1_55_1","unstructured":"Jongmin Jeong , Ted \u201c Taekyoung\u201d Kwon, and Yanghee Choi. 2010. Host-oblivious security for content-based networks . In International Conference on Future Internet Technologies (CFI\u201910) . ACM, 35--40. Jongmin Jeong, Ted \u201cTaekyoung\u201d Kwon, and Yanghee Choi. 2010. Host-oblivious security for content-based networks. In International Conference on Future Internet Technologies (CFI\u201910). ACM, 35--40."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5120\/14021-2180"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.01.020"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.08.070"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.11.003"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659651.2659713"},{"key":"e_1_2_1_61_1","volume-title":"International Symposium on Integrated Network Management (IM\u201913)","author":"Khan Sarmad Ullah","year":"2013","unstructured":"Sarmad Ullah Khan , Thibault Cholez , Thomas Engel , and Luciano Lavagno . 2013 . A key management scheme for content centric networking . In International Symposium on Integrated Network Management (IM\u201913) . IFIP\/IEEE, 828--831. Sarmad Ullah Khan, Thibault Cholez, Thomas Engel, and Luciano Lavagno. 2013. A key management scheme for content centric networking. In International Symposium on Integrated Network Management (IM\u201913). IFIP\/IEEE, 828--831."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"volume-title":"IFIP Networking","author":"Kurihara Jun","key":"e_1_2_1_63_1","unstructured":"Jun Kurihara , C. Wood , and Ersin Uzun . 2015. An encryption-based access control framework for content-centric networking . In IFIP Networking . IEEE , 1--9. Jun Kurihara, C. Wood, and Ersin Uzun. 2015. An encryption-based access control framework for content-centric networking. In IFIP Networking. IEEE, 1--9."},{"key":"e_1_2_1_64_1","unstructured":"Dirk Kutscher Suyong Eum Kostas Pentikousis Ioannis Psaras Daniel Corujo Damien Saucez Thomas Schmidt and Matthias W\u00e4hlisch. 2016. Information-Centric Networking (ICN) Research Challenges. RFC 7927.  Dirk Kutscher Suyong Eum Kostas Pentikousis Ioannis Psaras Daniel Corujo Damien Saucez Thomas Schmidt and Matthias W\u00e4hlisch. 2016. Information-Centric Networking (ICN) Research Challenges. RFC 7927."},{"key":"e_1_2_1_65_1","unstructured":"Tobias Lauinger. 2010. Security and Scalability of Content-Centric Networking. Master\u2019s thesis. Eurecom Sophia-Antipolis France and Technische Universit\u00e4t Darmstadt Germany.  Tobias Lauinger. 2010. Security and Scalability of Content-Centric Networking. Master\u2019s thesis. Eurecom Sophia-Antipolis France and Technische Universit\u00e4t Darmstadt Germany."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2378956.2378966"},{"key":"e_1_2_1_68_1","volume-title":"Yingdi Yu, Lan Wang, Beichuan Zhang, and Lixia Zhang.","author":"Lehman Vince","year":"2016","unstructured":"Vince Lehman , AKM Mahmudul Hoque , Yingdi Yu, Lan Wang, Beichuan Zhang, and Lixia Zhang. 2016 . A Secure Link State Routing Protocol for NDN. Technical Report NDN-0037. NDN. Retrieved from http:\/\/named-data.net\/techreports.html. Vince Lehman, AKM Mahmudul Hoque, Yingdi Yu, Lan Wang, Beichuan Zhang, and Lixia Zhang. 2016. A Secure Link State Routing Protocol for NDN. Technical Report NDN-0037. NDN. Retrieved from http:\/\/named-data.net\/techreports.html."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997508"},{"key":"e_1_2_1_71_1","first-page":"1","article-title":"Mandatory content access control for privacy protection in information centric networks","volume":"99","author":"Li Qi","year":"2015","unstructured":"Qi Li , Ravi Sandhu , Xinwen Zhang , and Mingwei Xu . 2015 . Mandatory content access control for privacy protection in information centric networks . IEEE Transactions on Dependable and Secure Computing PP , 99 (2015), 1 -- 13 . Qi Li, Ravi Sandhu, Xinwen Zhang, and Mingwei Xu. 2015. Mandatory content access control for privacy protection in information centric networks. IEEE Transactions on Dependable and Secure Computing PP, 99 (2015), 1--13.","journal-title":"IEEE Transactions on Dependable and Secure Computing PP"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2365742"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.06.003"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/MedHocNet.2013.6767402"},{"volume-title":"ACM Conference on Information-centric Networking (ICN\u201914)","author":"Mahadevan Priya","key":"e_1_2_1_75_1","unstructured":"Priya Mahadevan , Ersin Uzun , Spencer Sevilla , and J. J. Garcia-Luna-Aceves . 2014. CCN-KRS: A key resolution service for CCN . In ACM Conference on Information-centric Networking (ICN\u201914) . ACM, 97--106. Priya Mahadevan, Ersin Uzun, Spencer Sevilla, and J. J. Garcia-Luna-Aceves. 2014. CCN-KRS: A key resolution service for CCN. In ACM Conference on Information-centric Networking (ICN\u201914). ACM, 97--106."},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.010"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405632"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502840"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2013.32"},{"volume-title":"From Active Data Management to Event-based Systems and More","author":"Mattern Friedemann","key":"e_1_2_1_81_1","unstructured":"Friedemann Mattern and Christian Floerkemeier . 2010. From the internet of computers to the internet of things . In From Active Data Management to Event-based Systems and More . Springer , Heildelberg, Germany , 242--259. Friedemann Mattern and Christian Floerkemeier. 2010. From the internet of computers to the internet of things. In From Active Data Management to Event-based Systems and More. Springer, Heildelberg, Germany, 242--259."},{"key":"e_1_2_1_82_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Communication Networking","author":"Mauri Giulia","unstructured":"Giulia Mauri and Giacomo Verticale . 2013. Distributing key revocation status in named data networking . In Advances in Communication Networking . Lecture Notes in Computer Science , Vol. 8115 . Springer , Chemnitz, Germany , 310--313. Giulia Mauri and Giacomo Verticale. 2013. Distributing key revocation status in named data networking. In Advances in Communication Networking. Lecture Notes in Computer Science, Vol. 8115. Springer, Chemnitz, Germany, 310--313."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2014.6814040"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491228"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2382592"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382305"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140299"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368571"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60033-8_26"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2012.6387155"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2722"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018596"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733673"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUT.2009.5405676"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167358"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2014.6925826"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.simutools.2014.254630"},{"volume-title":"Sandvine global Internet Phenomena Report: 1H","year":"2014","key":"e_1_2_1_99_1","unstructured":"Sandvine. 2014. Sandvine global Internet Phenomena Report: 1H 2014 . Retrieved from https:\/\/www.sandvine.com\/downloads\/general\/global-internet-phenomena\/2014\/1h-2014-global-internet-phenomena-report.pdf. Sandvine. 2014. Sandvine global Internet Phenomena Report: 1H 2014. Retrieved from https:\/\/www.sandvine.com\/downloads\/general\/global-internet-phenomena\/2014\/1h-2014-global-internet-phenomena-report.pdf."},{"key":"e_1_2_1_100_1","volume-title":"Liars and Outliers: Enabling the Trust that Society Needs to Thrive","author":"Schneier Bruce","unstructured":"Bruce Schneier . 2012. Liars and Outliers: Enabling the Trust that Society Needs to Thrive ( 1 st ed.). Wiley , New York NY . Bruce Schneier. 2012. Liars and Outliers: Enabling the Trust that Society Needs to Thrive (1st ed.). Wiley, New York NY.","edition":"1"},{"key":"e_1_2_1_101_1","volume-title":"Consumer Communications and Networking Conference (CCNC\u201914)","author":"Seo Seog Chung","year":"2014","unstructured":"Seog Chung Seo , Taehong Kim , and MyeongWuk Jang . 2014 . A privacy-preserving approach in content centric networks . In Consumer Communications and Networking Conference (CCNC\u201914) . IEEE, 866--871. Seog Chung Seo, Taehong Kim, and MyeongWuk Jang. 2014. A privacy-preserving approach in content centric networks. In Consumer Communications and Networking Conference (CCNC\u201914). IEEE, 866--871."},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijins.v1i2.467"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2014.6992077"},{"key":"e_1_2_1_105_1","volume-title":"ACM Conference on Information-centric Networking (ICN\u201914)","author":"Tortelli Michele","year":"2014","unstructured":"Michele Tortelli , Dario Rossi , Gennaro Boggia , and Luigi Alfredo Grieco . 2014 . Cross-comparison of ICN software tools . In ACM Conference on Information-centric Networking (ICN\u201914) . ACM, 197--198. Michele Tortelli, Dario Rossi, Gennaro Boggia, and Luigi Alfredo Grieco. 2014. Cross-comparison of ICN software tools. In ACM Conference on Information-centric Networking (ICN\u201914). ACM, 197--198."},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810171"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749508"},{"volume-title":"Consumer Communications and Networking Conference (CCNC\u201914)","author":"Tsudik Gene","key":"e_1_2_1_108_1","unstructured":"Gene Tsudik , Ersin Uzun , and Christopher A. Wood . 2014. AC3N: An API and service for anonymous communication in content-centric networking . In Consumer Communications and Networking Conference (CCNC\u201914) . IEEE, 858--865. Gene Tsudik, Ersin Uzun, and Christopher A. Wood. 2014. AC3N: An API and service for anonymous communication in content-centric networking. In Consumer Communications and Networking Conference (CCNC\u201914). IEEE, 858--865."},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516932"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491225"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.009"},{"key":"e_1_2_1_112_1","volume-title":"International Conference on Networking (IFIP Networking\u201913)","author":"W\u00e4hlisch Matthias","year":"2013","unstructured":"Matthias W\u00e4hlisch , Thomas C. Schmidt , and Markus Vahlenkamp . 2013 . Lessons from the past: Why data-driven states harm future information-centric networking . In International Conference on Networking (IFIP Networking\u201913) . IEEE, 1--9. Matthias W\u00e4hlisch, Thomas C. Schmidt, and Markus Vahlenkamp. 2013. Lessons from the past: Why data-driven states harm future information-centric networking. In International Conference on Networking (IFIP Networking\u201913). IEEE, 1--9."},{"key":"e_1_2_1_113_1","first-page":"43","article-title":"Content-centric networking: Effect of content caching on mitigating DoS attack","volume":"9","author":"Wang Kai","year":"2012","unstructured":"Kai Wang , Jia Chen , Huachun Zhou , and Yajuan Qin . 2012 . Content-centric networking: Effect of content caching on mitigating DoS attack . International Journal of Computer Science Issues 9 , 6 (2012), 43 -- 52 . Kai Wang, Jia Chen, Huachun Zhou, and Yajuan Qin. 2012. Content-centric networking: Effect of content caching on mitigating DoS attack. International Journal of Computer Science Issues 9, 6 (2012), 43--52.","journal-title":"International Journal of Computer Science Issues"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2618"},{"key":"e_1_2_1_115_1","volume-title":"IEEE International Workshop on Management of Emerging Networks and Services (Globecom). IEEE, 963--968","author":"Wang Kai","year":"2013","unstructured":"Kai Wang , Huachun Zhou , Yajuan Qin , Jia Chen , and Hongke Zhang . 2013 . Decoupling malicious interests from pending interest table to mitigate interest flooding attacks . In IEEE International Workshop on Management of Emerging Networks and Services (Globecom). IEEE, 963--968 . Kai Wang, Huachun Zhou, Yajuan Qin, Jia Chen, and Hongke Zhang. 2013. Decoupling malicious interests from pending interest table to mitigate interest flooding attacks. In IEEE International Workshop on Management of Emerging Networks and Services (Globecom). IEEE, 963--968."},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2014.7017094"},{"volume-title":"Applied Cryptography and Network Security","author":"Wong Walter","key":"e_1_2_1_117_1","unstructured":"Walter Wong and Maur\u00edcio Ferreira Magalh\u00e3es . 2012. Security approaches for information-centric networking . In Applied Cryptography and Network Security . Springer , 76--98. Walter Wong and Maur\u00edcio Ferreira Magalh\u00e3es. 2012. Security approaches for information-centric networking. In Applied Cryptography and Network Security. Springer, 76--98."},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921233.1921248"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6940528"},{"key":"e_1_2_1_120_1","volume-title":"International Conference on Computer Communications (INFOCOM\u201912)","author":"Xie Mengjun","year":"2012","unstructured":"Mengjun Xie , Indra Widjaja , and Haining Wang . 2012 . Enhancing cache robustness for content-centric networking . In International Conference on Computer Communications (INFOCOM\u201912) . IEEE, 2426--2434. Mengjun Xie, Indra Widjaja, and Haining Wang. 2012. Enhancing cache robustness for content-centric networking. In International Conference on Computer Communications (INFOCOM\u201912). IEEE, 2426--2434."},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366286"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.01.005"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810170"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125724"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.007"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6485986"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089053"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/2089016.2089036"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311888","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3311888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:39Z","timestamp":1750199919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311888"}},"subtitle":["A Security Analysis of the Information-Centric Network Model"],"short-title":[],"issued":{"date-parts":[[2019,6,18]]},"references-count":124,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5,31]]}},"alternative-id":["10.1145\/3311888"],"URL":"https:\/\/doi.org\/10.1145\/3311888","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"type":"print","value":"0360-0300"},{"type":"electronic","value":"1557-7341"}],"subject":[],"published":{"date-parts":[[2019,6,18]]},"assertion":[{"value":"2017-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}