A Triggered Delay-based Approach against Cache Privacy Attack in NDN
- 10.2991/ijndc.2018.6.3.5How to use a DOI?
- Cache Privacy Attack; CPA; Named Data Networking; NDN
Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the received content is cached or not, by simply observing the time difference between the requested and the received data. Existing solutions apply delay whenever the data is accessed from the cache. These approaches mitigate attack to some extent but compromise the performance of NDN. To overcome this issue, a counter scheme has been proposed in this article that detects the attack pattern at the gateway router itself and triggers the countermeasure in case of attack. The triggered-based approach delays the data accessed from the cache, only when the attack is detected instead of each time when the data is accessed from the cache. The proposed approach has been compared with an approach that induces a random delay in case of the cache hit. The results prove that the triggered delay-based approach is better than the random delay approach in terms of average delay.
- © 2018, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article under the CC BY-NC license (http://creativecommons.org/licences/by-nc/4.0/).
Cite this article
TY - JOUR AU - Naveen Kumar AU - Ashutosh Kumar Singh AU - Shashank Srivastava PY - 2018 DA - 2018/07/31 TI - A Triggered Delay-based Approach against Cache Privacy Attack in NDN JO - International Journal of Networked and Distributed Computing SP - 174 EP - 184 VL - 6 IS - 3 SN - 2211-7946 UR - https://doi.org/10.2991/ijndc.2018.6.3.5 DO - 10.2991/ijndc.2018.6.3.5 ID - Kumar2018 ER -