{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T23:34:42Z","timestamp":1772580882852,"version":"3.50.1"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T00:00:00Z","timestamp":1684454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2023,5,31]]},"abstract":"<jats:p>In this article, we consider security aspects of online meeting applications based on protocols such as WebRTC that leverage the Information-centric Networking (ICN) architecture to make the system fundamentally more scalable. If the scalability properties provided by ICN have been proved in recent literature, the security challenges and implications for real-time applications have not been reviewed. We show that this class of applications can benefit from strong security and scalability jointly without any major tradeoff and with significant performance improvements over traditional WebRTC systems. To achieve this goal, some modifications to the current ICN architecture must be implemented in the way integrity and authentication are verified. Extensive performance analysis of the architecture based on the open source implementation of Hybrid-ICN proves that real-time applications can greatly benefit from this novel network architecture in terms of strong security and scalable communications.<\/jats:p>","DOI":"10.1145\/3593585","type":"journal-article","created":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T12:10:16Z","timestamp":1681906216000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Securing Scalable Real-time Multiparty Communications with Hybrid Information-centric Networking"],"prefix":"10.1145","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6143-6076","authenticated-orcid":false,"given":"Luca","family":"Muscariello","sequence":"first","affiliation":[{"name":"Cisco Systems, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4420-3593","authenticated-orcid":false,"given":"Michele","family":"Papalini","sequence":"additional","affiliation":[{"name":"Cisco Systems, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8921-1581","authenticated-orcid":false,"given":"Olivier","family":"Roques","sequence":"additional","affiliation":[{"name":"Cisco Systems, France, and Telecom Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5587-7905","authenticated-orcid":false,"given":"Mauro","family":"Sardara","sequence":"additional","affiliation":[{"name":"Cisco Systems, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7382-9952","authenticated-orcid":false,"given":"Arthur","family":"Tran Van","sequence":"additional","affiliation":[{"name":"Ecole Polytechnique, France, and Cisco Systems, France"}]}],"member":"320","published-online":{"date-parts":[[2023,5,19]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2392629"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.12"},{"key":"e_1_3_1_4_2","first-page":"1","volume-title":"2013 IFIP Networking Conference","author":"Afanasyev Alexander","year":"2013","unstructured":"Alexander Afanasyev, Priya Mahadevan, Ilya Moiseenko, Ersin Uzun, and Lixia Zhang. 2013. Interest flooding attack and countermeasures in Named Data Networking. In 2013 IFIP Networking Conference. 1\u20139."},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3517212.3558080"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2798280"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4568"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800069"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2012.6193505"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357394"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/2500098.2500102"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2812615"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28166-7_12"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2013.6761300"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.034"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.14722\/sent.2014.23014"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677049"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357404"},{"key":"e_1_3_1_20_2","volume-title":"Hybrid Information-centric Networking","author":"(IETF) Internet Engineering Task Force","year":"2021","unstructured":"Internet Engineering Task Force (IETF) (Ed.). 2021. Hybrid Information-centric Networking. https:\/\/datatracker.ietf.org\/doc\/html\/draft-muscariello-intarea-hicn-04."},{"key":"e_1_3_1_21_2","volume-title":"The Messaging Layer Security (MLS) Protocol","author":"(IETF) Internet Engineering Task Force","year":"2021","unstructured":"Internet Engineering Task Force (IETF) (Ed.). 2021. The Messaging Layer Security (MLS) Protocol. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-mls-protocol-12."},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW.2015.7169810"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4302"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4303"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4301"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5510"},{"key":"e_1_3_1_28_2","volume-title":"FDIO HICN","author":"Networks Linux Foundation - Fast Data","year":"2021","unstructured":"Linux Foundation - Fast Data Networks. 2021. FDIO HICN. Technical Report. https:\/\/wiki.fd.io\/view\/HICN."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491228"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2672991"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2382592"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810160"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140299"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442150"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9064"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN49260.2020.9153228"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3267955.3267972"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4949"},{"key":"e_1_3_1_39_2","article-title":"Securing network content","author":"Smetters Diana","year":"2009","unstructured":"Diana Smetters and Van Jacobson. 2009. Securing network content. PARC Technical Report (October2009).","journal-title":"PARC Technical Report"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749508"},{"key":"e_1_3_1_41_2","volume-title":"The Double Ratchet Algorithm","author":"Marlinspike Trevor Perrin (Ed.) and Moxie","year":"2016","unstructured":"Trevor Perrin (Ed.) and Moxie Marlinspike. 2016. The Double Ratchet Algorithm. Technical Paper. https:\/\/signal.org\/docs\/specifications\/doubleratchet\/."},{"key":"e_1_3_1_42_2","volume-title":"File-like ICN Collections (FLIC)","author":"Tschudin Christian","year":"2022","unstructured":"Christian Tschudin, Christopher A. Wood, Marc Mosko, and David R. Oran. 2022. File-like ICN Collections (FLIC). Internet-Draft draft-irtf-icnrg-flic-04. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-irtf-icnrg-flic\/04\/. Work in Progress."},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484542"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.009"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/milcom.2018.8599774"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593585","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3593585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:38:01Z","timestamp":1750178281000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593585"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,19]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,5,31]]}},"alternative-id":["10.1145\/3593585"],"URL":"https:\/\/doi.org\/10.1145\/3593585","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,19]]},"assertion":[{"value":"2022-06-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}