Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures

Bachelor Thesis (2021)
Author(s)

S. Arora (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

Chhagan Lal – Mentor (TU Delft - Cyber Security)

Mauro Conti – Graduation committee member (TU Delft - Cyber Security)

F.A. Oliehoek – Coach (TU Delft - Interactive Intelligence)

Faculty
Electrical Engineering, Mathematics and Computer Science
Copyright
© 2021 Shruti Arora
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 Shruti Arora
Graduation Date
01-07-2021
Awarding Institution
Delft University of Technology
Project
CSE3000 Research Project
Programme
Computer Science and Engineering
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Information-centric Networking (ICN) is the revolution of the internet due to its many benefit over the current internet infrastructure, namely caching, location-independent routing, and data-centric security. ICN ensures seamless data transfer due to its content-centric nature. Due to its content-centric nature, it is a must to ensure that security and privacy are in place before a shift to ICN takes place. There are three ways to make a shift to ICN: 1) Underlay, deploying ICN under the IP; 2) Overlay, deploying ICN over IP; 3) Hybrid, deploying ICN with IP. In this paper, we center on hybrid ICN architectures, two architectures are analyzed to examine their security and privacy features. The two architectures discussed are Hybrid Information-Centric Networking (hICN), and Content Centric Inter-Networking (CONET). Background and related works, on ICN as a whole, and the two architectures are given, followed by the analysis of the two. Features namely Availability, Access Control, Non-repudiation, Integrity, and Authentication are studied under security. Whereas in privacy, Anonymity, Confidentiality, and Unlinkability are studied. The paper presents the implementation and the relevance of these features to ICN architecture. After analyzing these traits separately in the two architectures, a comparison is drawn between them. Lastly, the conclusions are formed with a discussion of future works.

Files

Group_1_Research_Paper.pdf
(pdf | 0.537 Mb)
License info not available