论文标题
IP-ICN共存的安全性和隐私:一项全面调查
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey
论文作者
论文摘要
如今,Internet正在经历大量对数据需求不断增加的用户,这是安全和隐私问题引入限制的主要原因。为了克服这些局限性,提出了从中心以数据为中心的转变,在这种情况下,信息为中心的网络(ICN)代表了一个有希望的解决方案。然而,让当前的Internet网络层(即Internet协议(IP))不安,具有ICN是一项具有挑战性,昂贵的任务,因为它需要在Internet服务提供商(ISP)(ISP),骨干和自动服务(AS)之间进行全球协调。因此,研究人员认为,当前互联网的替代过程将通过IP和ICN的共存过渡。从这个角度来看,新颖的体系结构结合了IP和ICN协议。但是,只有少数提出的体系结构放置了安全性的功能。因此,本文通过水平比较三种部署方法之间的SP特征,即覆盖,底层和混合动力,以及在十个被考虑的SP功能之间进行比较,从而提供了对最新IP-IP-ICN共存体系结构进行首次全面安全和隐私分析。最后,该文章阐明了IP-ICN共存的开放问题以及可能的未来方向。我们的分析表明,大多数架构无法提供多种SP功能,包括数据和流量流的机密性,可用性和通信的匿名性。因此,本文显示了在共存阶段的当前和未来协议堆栈的安全组合,互联网肯定会跨越。
Today Internet is experiencing a massive number of users with a continuously increasing need for data, which is the leading cause of introduced limitations among security and privacy issues. To overcome these limitations, a shift from host-centric to data-centric is proposed, and in this context, Information-Centric Networking (ICN) represents a promising solution. Nevertheless, unsettling the current Internet network layer, i.e., Internet Protocol (IP), with ICN is a challenging, expensive task since it requires worldwide coordination among Internet Service Providers (ISPs), backbone, and Autonomous Services (AS). Therefore, researchers foresee that the replacement process of the current Internet will transition through the coexistence of IP and ICN. In this perspective, novel architectures combine IP and ICN protocols. However, only a few of the proposed architectures place the security-by-design feature. Therefore, this article provides the first comprehensive Security and Privacy (SP) analysis of the state-of-the-art IP-ICN coexistence architectures by horizontally comparing the SP features among three deployment approaches, i.e., overlay, underlay, and hybrid, and vertically comparing among the ten considered SP features. Lastly, the article sheds light on the open issues and possible future directions for IP-ICN coexistence. Our analysis shows that most architectures fail to provide several SP features, including data and traffic flow confidentiality, availability, and anonymity of communication. Thus, this article shows the secure combination of current and future protocol stacks during the coexistence phase that the Internet will definitely walk across.