A survey of interest flooding attack in named-data networking: Taxonomy, performance and future research challenges

Internet of Things (IoT) allows all entities such as computing devices, machines, objects, people, etc., to interact with each other through their Internet Protocol (IP) addresses without human inter- venti on. Consequently, IP addresses are being exhausted rapidly. Named-Data Networking (NDN) tends...

Full description

Saved in:
Bibliographic Details
Main Authors: Ren-Ting Lee, Yu-Beng Leau, Yong Jin Park, Mohammed Anbar
Format: Article
Language:en
Published: Medknow Publications 2021
Subjects:
Online Access:https://eprints.ums.edu.my/id/eprint/45168/1/FULLTEXT.pdf
https://eprints.ums.edu.my/id/eprint/45168/
https://doi.org/10.1080/02564602.2021.1957029
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Internet of Things (IoT) allows all entities such as computing devices, machines, objects, people, etc., to interact with each other through their Internet Protocol (IP) addresses without human inter- venti on. Consequently, IP addresses are being exhausted rapidly. Named-Data Networking (NDN) tends to transit the conventional host-centric network into the data-centric network. However, routing attacks such as Interest Flooding Attack (IFA) is a primary security concern. To date, far too little attention has been paid to classify the IFA detection mechanisms and further identify the key points to design an efficient detection technique. This study aimed to conduct a comprehensive survey of state-of-the-art IFA detection mechanisms and analyzed the algorithms used. In this paper, we sum- maize the different types of possible attack models with a specific name with a description in NDN, specifically the PIT-oriented routing attack. Besides, we classified these mechanisms into nine categories with its topology used, analogy metrics and attack focus. Finally, we have highlighted and provide recommendations in some critical pieces of architecture in detection mechanism design as future challenges to secure the IoT data from IFA in NDN.