{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:51:39Z","timestamp":1760241099077,"version":"build-2065373602"},"reference-count":47,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2019,11,18]],"date-time":"2019-11-18T00:00:00Z","timestamp":1574035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Greek State Scholarships Foundation (IKY)","award":["2018-050-0502-12352"],"award-info":[{"award-number":["2018-050-0502-12352"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Information-Centric Networking (ICN) has arisen as an architectural solution that responds to the needs of today\u2019s overloaded Internet, departing from the traditional host-centric access paradigm. In this paper we focus on Named Data Networking (NDN), the most prominent ICN architecture. In the NDN framework, disseminated content is at the core of the design and providing trusted content is essential. In this paper, we provide an overview of reputation-based trust approaches, present their design trade-offs and argue that these approaches can consolidate NDN trust and security by working complementary to the existing credential-based schemes. Finally, we discuss future research directions and challenges.<\/jats:p>","DOI":"10.3390\/fi11110241","type":"journal-article","created":{"date-parts":[[2019,11,18]],"date-time":"2019-11-18T04:31:10Z","timestamp":1574051470000},"page":"241","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Reputation-Based Trust Approaches in Named Data Networking"],"prefix":"10.3390","volume":"11","author":[{"given":"Ioanna Angeliki","family":"Kapetanidou","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Democritus University of Thrace, 67100 Xanthi, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8247-7640","authenticated-orcid":false,"given":"Christos-Alexandros","family":"Sarros","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Democritus University of Thrace, 67100 Xanthi, Greece"}]},{"given":"Vassilis","family":"Tsaoussidis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Democritus University of Thrace, 67100 Xanthi, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2019,11,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ruohomaa, S., and Kutvonen, L. (2005, January 23\u201326). Trust management survey. Proceedings of the International Conference on Trust Management, Paris, France.","DOI":"10.1007\/11429760_6"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/2656877.2656887","article-title":"Named data networking","volume":"44","author":"Zhang","year":"2014","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-2005-13107","article-title":"Reputation-based trust management","volume":"13","author":"Shmatikov","year":"2005","journal-title":"J. Comput. Secur."},{"key":"ref_4","first-page":"10","article-title":"An integration of reputation-based and policy-based trust management","volume":"2","author":"Bonatti","year":"2007","journal-title":"Networks"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/MCOM.2018.1700325","article-title":"Connecting the edges: A universal, mobile-centric, and opportunistic communications architecture","volume":"56","author":"Sarros","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Mosko, M., Solis, I., and Wood, C.A. (2019, November 06). Content-Centric Networking (CCNx) Semantics. Available online: https:\/\/datatracker.ietf.org\/doc\/rfc8569\/?include_text=1.","DOI":"10.17487\/RFC8569"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Shang, W., Bannis, A., Liang, T., Wang, Z., Yu, Y., Afanasyev, A., Thompson, J., Burke, J., Zhang, B., and Zhang, L. (2016, January 4\u20138). Named data networking of things. Proceedings of the 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), Berlin, Germany.","DOI":"10.1109\/IoTDI.2015.44"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Amadeo, M., Campolo, C., Iera, A., and Molinaro, A. (2014, January 23\u201326). Named data networking for IoT: An architectural perspective. Proceedings of the 2014 European Conference on Networks and Communications (EuCNC), Bologna, Italy.","DOI":"10.1109\/EuCNC.2014.6882665"},{"key":"ref_9","unstructured":"Koutrouli, E., and Tsalgatidou, A. (November, January 30). Reputation-based trust systems for p2p applications: Design issues and comparison framework. Proceedings of International Conference on Trust, Privacy and Security in Digital Business, Markham, ON, Canada."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","article-title":"Review on computational trust and reputation models","volume":"24","author":"Sabater","year":"2005","journal-title":"Artif. Intell. Rev."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","article-title":"Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities","volume":"16","author":"Xiong","year":"2004","journal-title":"IEEE Trans. Know. Data Eng."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","article-title":"A survey on trust management for mobile ad hoc networks","volume":"13","author":"Cho","year":"2010","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1002\/ett.1413","article-title":"Trust management in wireless sensor networks","volume":"21","author":"Zahariadis","year":"2010","journal-title":"Eur. Trans. Telecommun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MCOM.2018.1701147","article-title":"An overview of security support in named data networking","volume":"56","author":"Zhang","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Afanasyev, A., and Zhang, L. (2017, January 26\u201328). Ndncert: universal usable trust management for ndn. Proceedings of the 4th ACM Conference on Information-Centric Networking, Berlin, Germany.","DOI":"10.1145\/3125719.3132090"},{"key":"ref_16","unstructured":"Yu, Y., Afanasyev, A., Clark, D., Claffy, K., Jacobson, V., and Zhang, L. (October, January 30). Schematizing trust in named data networking. Proceedings of the 2nd ACM Conference on Information-Centric Networking, San Francisco, CA, USA."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/COMST.2017.2749508","article-title":"Security, privacy, and access control in information-centric networking: A survey","volume":"20","author":"Tourani","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Da Silva, R.S., and Zorzo, S.D. (2015, January 9\u201312). An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges. Proceedings of the 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2015.7157958"},{"key":"ref_19","unstructured":"Afanasyev, A., Mahadevan, P., Moiseenko, I., Uzun, E., and Zhang, L. (2013, January 22\u201324). Interest flooding attack and countermeasures in Named Data Networking. Proceedings of the 2013 IFIP Networking Conference, Brooklyn, NY, USA."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Gasti, P., and Tsudik, G. (2018, January 25\u201327). Content-Centric and Named-Data Networking Security: The Good, The Bad and The Rest. Proceedings of the 2018 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), Washington, DC, USA.","DOI":"10.1109\/LANMAN.2018.8475052"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Ghali, C., Tsudik, G., Uzun, E., and Wood, C.A. (August, January 31). Closing the floodgate with stateless content-centric networking. Proceedings of the 2017 26th International Conference on Computer Communication and Networks (ICCCN), Vancouver, BC, Canada.","DOI":"10.1109\/ICCCN.2017.8038367"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ghali, C., Tsudik, G., and Uzun, E. (2014, January 23\u201326). Needle in a haystack: Mitigating content poisoning in named-data networking. Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT), San Diego, CA, USA.","DOI":"10.14722\/sent.2014.23014"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/2677046.2677049","article-title":"Network-layer trust in named-data networking","volume":"44","author":"Ghali","year":"2014","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCOM.2018.1701086","article-title":"Content protection in named data networking: Challenges and potential solutions","volume":"56","author":"Yu","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Ramani, S.K., Tourani, R., Torres, G., Misra, S., and Afanasyev, A. (2019, January 24\u201326). NDN-ABS: Attribute-Based Signature Scheme for Named Data Networking. Proceedings of the 6th ACM Conference on Information-Centric Networking, Macau, China.","DOI":"10.1145\/3357150.3357393"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1145\/2500098.2500106","article-title":"Check before storing: What is the performance price of content integrity verification in LRU caching?","volume":"43","author":"Bianchi","year":"2013","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_27","unstructured":"Gasti, P., Tsudik, G., Uzun, E., and Zhang, L. (2019, November 06). DoS and DDoS in Named-Data Networking. Available online: https:\/\/arxiv.org\/pdf\/1208.0952.pdf."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Wang, Y., Qi, Z., Lei, K., Liu, B., and Tian, C. (2017, January 12\u201314). Preventing bad content dispersal in named data networking. Proceedings of the ACM Turing 50th Celebration Conference-China, Shanghai, China.","DOI":"10.1145\/3063955.3063993"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Shang, W., Thompson, J., Cherkaoui, M., Burkey, J., and Zhang, L. (2013, January 14\u201319). NDN. JS: A javascript client library for named data networking. Proceedings of the 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Turin, Italy.","DOI":"10.1109\/INFCOMW.2013.6970726"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Chen, T., Lei, K., and Xu, K. (2014, January 5\u20137). An encryption and probability based access control model for nameddata networking. Proceedings of the 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA.","DOI":"10.1109\/PCCC.2014.7017100"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Tourani, R., Stubbs, R., and Misra, S. (2018, January 2\u20136). TACTIC: Tag-Based Access ConTrol Framework for the Information- Centric Wireless Edge Networks. Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria.","DOI":"10.1109\/ICDCS.2018.00052"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.jnca.2017.12.013","article-title":"A trust-based method for mitigating cache poisoning in Name Data Networking","volume":"104","author":"Rezaeifar","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Wu, D., Xu, Z., Chen, B., and Zhang, Y. (2016, January 23\u201326). What if routers are malicious? mitigating content poisoning attack in NDN. Proceedings of the 2016 IEEE Trustcom\/BigDataSE\/ISPA, Tianjin, China.","DOI":"10.1109\/TrustCom.2016.0100"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Ntuli, N., and Han, S. (2012, January 15\u201317). Detecting router cache snooping in named data networking. Proceedings of the 2012 International Conference on ICT Convergence (ICTC), Jeju Island, Korea.","DOI":"10.1109\/ICTC.2012.6387155"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Umeda, S., Kamimoto, T., Ohata, Y., and Shigeno, H. (2015, January 20\u201322). Interest flow control method based on user reputation and content name prefixes in named data networking. Proceedings of the 2015 IEEE Trustcom\/BigDataSE\/ ISPA, Helsinki, Finland.","DOI":"10.1109\/Trustcom.2015.438"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.dss.2014.02.002","article-title":"A reference model for reputation systems","volume":"61","author":"Vavilis","year":"2014","journal-title":"Decis. Support Syst."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.jpdc.2014.08.004","article-title":"Reputation systems: A survey and taxonomy","volume":"75","author":"Hendrikx","year":"2015","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_38","unstructured":"Zhang, Q., Yu, T., and Irwin, K. (2019, November 06). A Classification Scheme for Trust Functions in Reputation-Based Trust Management. Available online: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.60.9893&rep=rep1&type=pdf."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Conti, M., Droms, R., Hassan, M., and Valle, S. (2018, January 12\u201315). Qoe degradation attack in dynamic adaptive streaming over icn. Proceedings of the 2018 IEEE 19th International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), Chania, Greece.","DOI":"10.1109\/WoWMoM.2018.8449767"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.comcom.2018.07.033","article-title":"Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN","volume":"129","author":"Conti","year":"2018","journal-title":"Comput. Commun."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Mendes, P., Sofia, R.C., Soares, J., Tsaoussidis, V., Diamantopoulos, S., and Sarros, C. (2018, January 21\u201323). Information-centric routing for opportunistic wireless networks. Proceedings of the 5th ACM Conference on Information-Centric Networking, Boston, MA, USA.","DOI":"10.1145\/3267955.3269011"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Coile\u00e1in, D.\u00d3., and O\u2019Mahony, D. (2014, January 24\u201326). SAVANT: Aggregated feedback and accountability framework for named data networking. Proceedings of the 1st ACM Conference on Information-Centric Networking, Paris, France.","DOI":"10.1145\/2660129.2660165"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Tourani, R., Misra, S., and Mick, T. (2016, January 26\u201328). Application-specific secure gathering of consumer preferences and feedback in ICNs. Proceedings of the 3rd ACM Conference on Information-Centric Networking, Kyoto, Japan.","DOI":"10.1145\/2984356.2984367"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Braun, T., Hilt, V., Hofmann, M., Rimac, I., Steiner, M., and Varvello, M. (2011, January 5\u20139). Service-centric networking. Proceedings of the 2011 IEEE International Conference on Communications Workshops (ICC), Kyoto, Japan.","DOI":"10.1109\/iccw.2011.5963587"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Sathiaseelan, A., Wang, L., Aucinas, A., Tyson, G., and Crowcroft, J. (2015, January 18). Scandex: Service centric networking for challenged decentralised networks. Proceedings of the 2015 Workshop on Do-it-yourself Networking: An Interdisciplinary Approach, Florence, Italy.","DOI":"10.1145\/2753488.2753490"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Sarros, C.A., Lertsinsrubtavee, A., Molina-Jimenez, C., Prasopoulos, K., Diamantopoulos, S., Vardalis, D., and Sathiaseelan, A. (2017, January 26\u201328). ICN-based edge service deployment in challenged networks. Proceedings of the 4th ACM Conference on Information-Centric Networking, Berlin, Germany.","DOI":"10.1145\/3125719.3132096"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Kr\u00f3l, M., Sonnino, A., Al-Bassam, M., Tasiopoulos, A., and Psaras, I. (2019, November 06). Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks. Available online: https:\/\/www.researchgate.net\/publication\/334170419_Proof-of-Prestige_A_Useful_Work_Reward_System_for_Unverifiable_Tasks.","DOI":"10.1109\/BLOC.2019.8751406"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/11\/11\/241\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:35:22Z","timestamp":1760189722000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/11\/11\/241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,18]]},"references-count":47,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2019,11]]}},"alternative-id":["fi11110241"],"URL":"https:\/\/doi.org\/10.3390\/fi11110241","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2019,11,18]]}}}