Security and Privacy of Overlay-based ICN/IPCoexistence Approaches

Bachelor Thesis (2021)
Author(s)

C.B. van der Poel (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

Chhagan Lal – Mentor (TU Delft - Cyber Security)

Mauro Conti – Mentor (TU Delft - Cyber Security)

F.A. Oliehoek – Graduation committee member (TU Delft - Interactive Intelligence)

Faculty
Electrical Engineering, Mathematics and Computer Science
Copyright
© 2021 Cesar van der Poel
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 Cesar van der Poel
Graduation Date
01-07-2021
Awarding Institution
Delft University of Technology
Project
['CSE3000 Research Project']
Programme
['Computer Science and Engineering']
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Information-Centric Networking (ICN) is a networking paradigm proposed to replace the current IP network. It uses in-network caching to enhance availability. However, as a clean slate approach is unlikely to work, an architecture that allows for the two paradigms to coexist needs to me used to facilitate the transition. Several such architectures have already been designed, but further research is needed to make sure a transition into such an architecture does not pose any risks to the privacy or security of users of the internet. The aim of this paper is to identify several important privacy and security requirements and apply these to several coexistence architectures. The focus of this paper is on underlay-based coexistence architectures, which map IP packets to ICN packets to ``tunnel'' IP over ICN. The architectures were compared based on the requirements they satisfy and their modes of deployment. The investigated architectures largely supported the same set of requirements to approximately the same extent. However, many important requirements were not or only partially supported by one or more of the architectures. Further research is needed to compare these architectures to overlay-based and hybrid architectures.

Files

License info not available