DOI QR코드

DOI QR Code

A Method for Enhancing Timely-Delivery and Security Using IGPT in Content-Centric Networking

콘텐츠 중심 네트워킹에서 IGPT를 이용한 적시성 및 보안성 향상 방안

  • Jung, Seunghoon (Dept. of Computer Science & Engineering, Korea National Defense University) ;
  • Park, Heungsoon (Dept. of Computer Science & Engineering, Korea National Defense University) ;
  • Kwon, Taewook (Dept. of Computer Science & Engineering, Korea National Defense University)
  • Received : 2014.05.30
  • Accepted : 2014.11.11
  • Published : 2014.11.28

Abstract

Recently, Information-Centric Networking(ICN), different from traditional IP-based networking, has been highlighted. Content-Centric Networking(CCN), proposed by Van Jacobson, is a representative scheme of the ICN architectures. It can deliver messages slightly faster than the IP-based networking by focusing on the access and delivery to the content itself. However, CCN is restricted to distribute the information without transmitting the request packet in advance because it is pull-based architecture by content requester. In addition, it has a problem that the Pending Interest Table(PIT) could be overloaded easily when DDoS attack happens. In this paper, we suggest an algorithm using a push-based scheme without request packets and overcoming PIT overload situation by Interest Group Push Table(IGPT). The proposed scheme enables to transmit a large amount of content than an existing scheme during the same amount of time in terms of timely-delivery and security.

최근에 기존 IP기반과는 다른, 정보 중심 네트워킹이 부각되고 있으며 그 중의 하나인 Content-Centric Networking(CCN)은 Van Jacobson에 의해 처음 제안되어 대표적인 정보 중심 네트워킹 패러다임으로 활발히 연구되고 있다. CCN은 콘텐츠 자체에 대한 접근과 전달에 목표를 두고 라우터에서 콘텐츠의 배분이 가능토록 하여 IP 방식보다 좀 더 빠르게 콘텐츠가 전달되도록 하는 장점을 가지고 있다. 하지만, CCN은 정보요청자 기준의 통신(pull-based)으로 사전 요청패킷의 전송없이 정보를 분배하는 것이 제한된다. 또한, PIT(Pending Interest Table)의 사용으로 DDoS 공격 등을 받을 시 PIT 메모리 오버로드의 문제점이 있다. 이에 본 논문은 CCN에서 요청패킷 없이 정보를 전달하는 push-based 기법과 PIT 오버로드 상황에서 데이터 전달이 가능하도록 Interest Group Pushing Table(IGPT)을 활용한 정보전송 방법을 제안한다. 제안하는 기법은 데이터 전송의 신속성 및 보안성 향상 측면에서 기존의 기법보다 동일 시간동안 많은 양의 콘텐츠 전송이 가능하다.

Keywords

References

  1. V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, "Networking named content," in Proc. CoNext'09, pp. 1-12, 2009.
  2. J. P. Martin-Flatin, "Push vs. Pull in webbased network management," in Proc. Sixth IFIP/IEEE Int. Symp., pp. 3-18, Boston, MA, 1999.
  3. E. Bozdag and A. Mesbah, "A comparson of push and pull techniques for Ajax," in Proc. 9th IEEE Int. Workshop WSE 2007, pp. 15-22, 2007.
  4. V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass, P. Stewart, J. D. Thornton, and R. L. Braynard, "VoCCN: Voice-over contentcentric networks," in Proc. ACM Int. Workshop Re-Architecting Internet (ReArch '09), pp. 1-6, Rome, Italy, Dec. 2009.
  5. Z. Zhu, S. Wang, X. Yang, V. Jacobson, and L. Zhang, "ACT: Audio conference tool over named data networking," in Proc. ACM SIGCOMM Workshop Inf.-Centric Netw. (ICN '11), pp. 68-73, Toronto, Canada, Aug. 2011.
  6. A. Carzaniga, M. Papalini, and A. L. Wolf, "Content-based publish/subscribe networking and information-centric networking," in Proc. ACM SIGCOMM Workshop Inf.-Centric Netw., ACM, pp. 56-61, 2011.
  7. J. Kim, M. Jang, Y. Bae, and B.-J. Lee, "Named content sharing in virtual private community," in Proc. 9th IEEE Consumer Commun. Netw. Conf. (CCNC '12), pp. 50-51, Las Vegas, USA, Jan. 2012.
  8. J. Francois, T. Cholez, and T. Engel, "CCN traffic optimization for IoT," in Proc. 4th Int. Conf. Netw. Future(NoF), pp. 1-5, Pohang, 2013.
  9. K. Kim, S. Choi, S. Kim, and B. H. Roh, "A push-enabling scheme for live streaming system in content-centric networking," in Proc. CoNEXT Student Workshop '13, ACM, pp. 49-52, 2013.
  10. W. You, B. Mathieu, P. Truong, J. Peltier, and G. Simon, "Dipit: a distributed bloom-lter based pit table for ccn nodes," in Proc. of ICCCN '12, Munich, Germany, Jul. 2012.
  11. H. Dai, Y. Wang, J. Fan, and B. Liu. "Mitigate ddos attacks in ndn by interest traceback," in Proc. NOMEN '13, Turin, Italy, Apr. 2013.
  12. A. Afanasyev, P. Mahadevany, I. Moiseenko, E. Uzuny, and L. Zhang, "Interest flooding attack and countermeasures in named data networking," in Proc. IFIP Netw. Conf., pp. 1-9, Brooklyn, NY, May 2013.
  13. S. S. Seo, J. M. Kang, Y. Han, and J. W. K. Hong, "Analysis and performance evaluation of data transport methods in content-centric networking," in Proc. 2013 15th Asia-Pacific, IEEE Network Operations and Management Symp. (APNOMS), pp. 1-3, 2013.
  14. A. Afanasyev, I. Moiseenko, and L. Zhang, ndnSIM: NDN simulator for NS-3, Technical Report NDN-0005, NDN Project, 2012.
  15. S. Jung, H. Park, and T. Kwon, "A study on the data push using push table in content networking," in Proc. KICS winter Conf., pp. 667-668, Pyeongchang, Korea, Jan. 2014.
  16. H. Park and T. Kwon, "Military routing scheme using content-centric mobile ad hoc networks," J. KICS, vol. 39C, no. 04, pp. 334-342, 2014.
  17. S. Jung, H. Park, and T. Kwon, "Data pushing using IPT in content-centric networking," in Proc. 2014 6th Int. Conf. IEEE, Ubiquitous and Future Netw.(ICUFN), pp. 164-165, Jul. 2014.