Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey
- URL: http://arxiv.org/abs/2209.02835v2
- Date: Tue, 11 Jul 2023 09:16:47 GMT
- Title: Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey
- Authors: Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk
- Abstract summary: This article provides the first comprehensive Security and Privacy (SP) analysis of the state-of-the-art IP-ICN coexistence architectures.
Our analysis shows that most architectures fail to provide several SP features, including data and traffic flow confidentiality, availability, and anonymity of communication.
- Score: 18.841230080121118
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Today Internet is experiencing a massive number of users with a continuously
increasing need for data, which is the leading cause of introduced limitations
among security and privacy issues. To overcome these limitations, a shift from
host-centric to data-centric is proposed, and in this context,
Information-Centric Networking (ICN) represents a promising solution.
Nevertheless, unsettling the current Internet network layer, i.e., Internet
Protocol (IP), with ICN is a challenging, expensive task since it requires
worldwide coordination among Internet Service Providers (ISPs), backbone, and
Autonomous Services (AS). Therefore, researchers foresee that the replacement
process of the current Internet will transition through the coexistence of IP
and ICN. In this perspective, novel architectures combine IP and ICN protocols.
However, only a few of the proposed architectures place the security-by-design
feature. Therefore, this article provides the first comprehensive Security and
Privacy (SP) analysis of the state-of-the-art IP-ICN coexistence architectures
by horizontally comparing the SP features among three deployment approaches,
i.e., overlay, underlay, and hybrid, and vertically comparing among the ten
considered SP features. Lastly, the article sheds light on the open issues and
possible future directions for IP-ICN coexistence. Our analysis shows that most
architectures fail to provide several SP features, including data and traffic
flow confidentiality, availability, and anonymity of communication. Thus, this
article shows the secure combination of current and future protocol stacks
during the coexistence phase that the Internet will definitely walk across.
Related papers
- Power Networks SCADA Communication Cybersecurity, A Qiskit Implementation [0.0]
The cyber-physical system of electricity power networks utilizes supervisory control and data acquisition systems (SCADA)
In the plausible quantum world (Q-world), conventional approaches will likely face new challenges.
This paper highlights the opportunities and challenges in securing SCADA communication in the plausible quantum computing and communication regime.
arXiv Detail & Related papers (2025-03-26T09:40:31Z) - Distributed satellite information networks: Architecture, enabling technologies, and trends [56.747473208256174]
The distributed satellite information networks (DSIN) have emerged as an innovative architecture, bridging information gaps across diverse satellite systems.
This survey first provides a profound discussion about innovative network architectures of DSIN.
The DSIN faces challenges from network heterogeneity, unpredictable channel dynamics, sparse resources, and decentralized collaboration frameworks.
arXiv Detail & Related papers (2024-12-17T06:44:05Z) - Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - A Survey on Integrated Sensing, Communication, and Computation [57.6762830152638]
The forthcoming generation of wireless technology, 6G, aims to usher in an era of ubiquitous intelligent services.
The performance of these modules is interdependent, creating a resource competition for time, energy, and bandwidth.
Existing techniques like integrated communication and computation (ICC), integrated sensing and computation (ISC), and integrated sensing and communication (ISAC) have made partial strides in addressing this challenge.
arXiv Detail & Related papers (2024-08-15T11:01:35Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - SISSA: Real-time Monitoring of Hardware Functional Safety and
Cybersecurity with In-vehicle SOME/IP Ethernet Traffic [49.549771439609046]
We propose SISSA, a SOME/IP communication traffic-based approach for modeling and analyzing in-vehicle functional safety and cyber security.
Specifically, SISSA models hardware failures with the Weibull distribution and addresses five potential attacks on SOME/IP communication.
Extensive experimental results show the effectiveness and efficiency of SISSA.
arXiv Detail & Related papers (2024-02-21T03:31:40Z) - Service Level Agreements and Security SLA: A Comprehensive Survey [51.000851088730684]
This survey paper identifies state of the art covering concepts, approaches, and open problems of SLA management.
It contributes by carrying out a comprehensive review and covering the gap between the analyses proposed in existing surveys and the most recent literature on this topic.
It proposes a novel classification criterium to organize the analysis based on SLA life cycle phases.
arXiv Detail & Related papers (2024-01-31T12:33:41Z) - Atmosphere: Context and situational-aware collaborative IoT architecture
for edge-fog-cloud computing [2.962390297307338]
The Internet of Things (IoT) has grown significantly in popularity.
Big data and real-time data analysis have taken on great importance.
This growth in data and infrastructure must be accompanied by a software architecture that allows its exploitation.
arXiv Detail & Related papers (2024-01-26T16:01:09Z) - Accelerating Tactile Internet with QUIC: A Security and Privacy Perspective [3.2738809491666077]
We envision a futuristic scenario where a QUIC-enabled network uses the underlying 6G communication infrastructure to achieve the requirements for Tactile Internet.
This article reviews the existing security and privacy attacks in QUIC and their implication on users.
arXiv Detail & Related papers (2024-01-12T16:05:13Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Prevention of cyberattacks in WSN and packet drop by CI framework and
information processing protocol using AI and Big Data [0.0]
This study integrates a cognitive intelligence (CI) framework, an information processing protocol, and sophisticated artificial intelligence (AI) and big data analytics approaches.
The framework is capable of detecting and preventing several forms of assaults, including as denial-of-service (DoS) attacks, node compromise, and data tampering.
It is highly resilient to packet drop occurrences, which improves the WSN's overall reliability and performance.
arXiv Detail & Related papers (2023-06-15T19:00:39Z) - A Comprehensive Survey on the Cyber-Security of Smart Grids:
Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions [0.5735035463793008]
We provide a classification of attacks based on the Open System Interconnection (OSI) model.
We discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication.
arXiv Detail & Related papers (2022-06-22T14:55:06Z) - Edge Security: Challenges and Issues [7.315147165274525]
Edge computing shifts data processing services to the network edge, where data are generated.
This paper discusses the security threats and vulnerabilities emerging from the edge network architecture spanning from the hardware layer to the system layer.
arXiv Detail & Related papers (2022-06-14T20:49:48Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.