Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Security Aspects of the Information Centric Networks Model
Amjad Mahfouth
Pages - 62 - 65     |    Revised - 15-05-2013     |    Published - 30-06-2013
Volume - 7   Issue - 2    |    Publication Date - June 2013  Table of Contents
ICN, Denial of Service, Encryption, Digital Signature.
With development of internet and the enormous growth of contents over networks, that motivated the researchers to proposed new paradigm model called Information Centric Networks ICN , the most features of ICN model is based on the content itself, instead, of the server located the contents over internet. This new model has a lot of challenges such as, mobility of contents, naming, replications, cashing, communications, and the security issue to secure the contents, customer, and providers. In this paper we will focus on ICN Model and propose solutions of security to protect the network elements, since the security is based on the packet itself rather than the host-centric.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 TechRepublic 
5 Scribd 
6 SlideShare 
7 PdfSR 
1 CiscoSystems. (2011). Cisco Report for IP Growth for 2011-2016. Internet Report, 1, 3.
2 Cheriton,D. R., & Gritter, M. (2000). TRIAD: A new next-generation Internet architecture.Retrieved from. Available on :http://citeseerx.ist.psu.edu/viewdoc/summary?doi=
3 Koponen, T., Chawla, M., Chun, B.G., Ermolinskiy, A., Kim, K. H., Shenker, S., & Stoica, I.(2007). A data-oriented (and beyond) network architecture. SIGCOMM Comput. Commun.Rev., 37(4), 181–192. doi:10.1145/1282427.1282402.
4 Dimitrov, V., & Koptchev, V. (2010). PSIRP project – publish-subscribe internet routing paradigm: new ideas for future internet. In Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies (pp. 167–171). New York,NY, USA: ACM. doi:10.1145/1839379.1839409.
5 Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., & Braynard, R. L.(2009). Networking named content. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (pp. 1–12). New York, NY, USA: ACM.doi:10.1145/1658939.1658941.
6 B. Ahlgren et al., “Second NetInf Architecture Description,” 4WARD EU FP7 Project,Deliverable D-6.2 v2.0, Apr. 2010, FP7-ICT-2007-1-216041- 4WARD / D-6.2,http://www.4ward-project.eu/.
7 Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, and Börje Ohlman, A Survey of Information-Centric Networking. 0163-6804/12/, 2012 IEEE IEEE Communications Magazine. July 2012.
8 Ali Ghodsi, Teemu Koponen, Barath Raghavan, Scott Shenker, Ankit Singla, Janes Wilcox,Information-Centric Networking. Seeing the Forest for the Trees, Cambridge, MA,USA. copyright 2022, ACM 978-1-4503-1059-8/11/11, 2011.
9 M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the Web from DNS. In Proc. of NSDI, 2004.
10 D. Wendlandt, I. Avramopoulos, D. Andersen, and J. Rexford. Don’t Secure Routing Protocols, Secure Data Delivery. In Proc. of HotNets, 2006.
11 A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. Shenker. Naming in ContentOriented Architectures. In Proc of SIGCOMM, Workshop on ICN, 2011.
12 D. Smetters and V. Jacobson. Securing Network Content. Technical report, PARC,October 2009.
Dr. Amjad Mahfouth
Computer Information System Al Quds Open Univeristy Tulkarm,00970, Palestine - Palestine