【打印本页】      【下载PDF全文】   查看/发表评论  下载PDF阅读器  关闭
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 4867次   下载 5145 本文二维码信息
码上扫一扫!
内容中心网络安全技术研究综述
朱大立,梁杰,李婷,张杭生,耿立茹,吴荻,张天魁,刘银龙
分享到: 微信 更多
(中国科学院信息工程研究所 北京 中国 100093;中国科学院大学网络空间安全学院 北京 中国 100049;北京邮电大学网络体系构建与融合北京市重点实验室 北京 中国 100876)
摘要:
内容中心网络(Content Centric Networking,CCN)属于信息中心网络的一种,是未来互联网体系架构中极具前景的架构之一,已成为下一代互联网体系的研究热点。内容中心网络中的内容路由、内嵌缓存、接收端驱动传输等新特征,一方面提高了网络中的内容分发效率,另一方面也带来了新的安全挑战。本文在分析CCN工作原理的基础上,介绍了CCN的安全威胁、安全需求以及现有的解决方案,并展望了CCN安全技术研究的方向。首先,详细介绍了CCN的原理和工作流程,对比分析了CCN与TCP/IP网络的区别,并分析了CCN面临的安全威胁及需求。其次,对CCN中隐私保护、泛洪攻击、缓存污染、拥塞控制等技术的研究现状进行归纳、分析、总结,并分析了现有方案的优缺点及不足,进而分析可能的解决方案。最后,对CCN安全技术面临的挑战进行了分析与讨论,并展望了未来的研究方向及发展趋势。通过对已有研究工作进行总结与分析,本文提出了CCN安全技术潜在研究方向与关键问题,为CCN安全后续研究提供有益参考。
关键词:  内容中心网络  安全  访问控制  隐私保护  泛洪攻击  缓存污染  DoS  网络拥塞
DOI:10.19363/J.cnki.cn10-1380/tn.2020.09.09
投稿时间:2018-08-21修订日期:2019-01-02
基金项目:本课题得到国家自然科学基金(No.61303251);北京市科技重大专项(No.D181100000618002)资助。
A Survey of Security in Content Centric Networking
ZHU Dali,LIANG Jie,LI Ting,ZHANG Hangsheng,GENG Liru,WU Di,ZHANG Tiankui,LIU Yinlong
Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China;Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing 100876, China
Abstract:
Content Centric Networking (CCN) belongs to the Information Centric Networking (ICN) and is one of the most promising architectures in the future Internet architecture system. It has become a research hotspot of the next generation Internet system. The new features of CCN, such as content routing, in-network caching, and receiver-driven transmission can improve the content distribution efficiency in the network. However, it also can bring new security challenges. In this paper, we introduce CCN security threats, security requirements and existing solutions, and look forward to the possible direction of CCN security technology research based on the analysis of the working principle of CCN. Firstly, the operating principle and workflow of CCN are introduced in detail. The differences between CCN and TCP/IP are compared and analyzed, and the security threats and security requirements of CCN are analyzed. Secondly, the research status of privacy protection, flooding attack, cache pollution, network congestion and other technologies in CCN are summarized and analyzed, and analyzed the advantages and shortcomings of existing solutions and then analyzes possible solutions. Finally, the challenges faced by CCN security technology are analyzed and discussed and then we look forward to the future research direction and development trend. By summarizing and analyzing existing research work, we propose potential research directions and key issues, which can provide a useful reference for further study of CCN security.
Key words:  content centric networking  security  access control  privacy preserving  flooding attack  cache pollution attack  Dos attack  network congestion