Identifying previously requested content by side-channel timing attack in NDN

7Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

NDN is a new name-based network paradigm. It is designed to keep the contents in the cache to increase the network efficiency. However, previously requested content may put the user privacy at risk. The time difference between cached and non-cached contents of interest responses can be used by an adversary to determine previously requested contents in cache. This attack is classified as side-channel timing attack. In NDN, it is used a signature to authenticate interests and data packets. However, signed packets does not affect the performance of side-channel timing attack. Independently of being signed or not, the adversary may identify both the sensitive and non-sensitive contents, recently cached by router. In order to mitigate side-channel attacks in NDN, there are several countermeasure methods proposed by other researchers. In this work, firstly we developed an attack scenario using ndnSIM simulator. Then we evaluated the scenario under attack and without attacks. We also proposed an adversary detection algorithm that combines three different defense countermeasures in order to maximize the cache availability.

Cite

CITATION STYLE

APA

Dogruluk, E., Costa, A., & Macedo, J. (2018). Identifying previously requested content by side-channel timing attack in NDN. In Communications in Computer and Information Science (Vol. 878, pp. 33–46). Springer Verlag. https://doi.org/10.1007/978-3-319-94421-0_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free