diff options
Diffstat (limited to 'doc/rfc/rfc7945.txt')
-rw-r--r-- | doc/rfc/rfc7945.txt | 2131 |
1 files changed, 2131 insertions, 0 deletions
diff --git a/doc/rfc/rfc7945.txt b/doc/rfc/rfc7945.txt new file mode 100644 index 0000000..4adfb6b --- /dev/null +++ b/doc/rfc/rfc7945.txt @@ -0,0 +1,2131 @@ + + + + + + +Internet Research Task Force (IRTF) K. Pentikousis, Ed. +Request for Comments: 7945 Travelping +Category: Informational B. Ohlman +ISSN: 2070-1721 Ericsson + E. Davies + Trinity College Dublin + S. Spirou + Intracom Telecom + G. Boggia + Politecnico di Bari + September 2016 + + + Information-Centric Networking: Evaluation and Security Considerations + +Abstract + + This document presents a number of considerations regarding + evaluating Information-Centric Networking (ICN) and sheds some light + on the impact of ICN on network security. It also surveys the + evaluation tools currently available to researchers in the ICN area + and provides suggestions regarding methodology and metrics. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Research Task Force + (IRTF). The IRTF publishes the results of Internet-related research + and development activities. These results might not be suitable for + deployment. This RFC represents the consensus of the <insert_name> + Research Group of the Internet Research Task Force (IRTF). Documents + approved for publication by the IRSG are not a candidate for any + level of Internet Standard; see Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc7945. + + + + + + + + + + + + +Pentikousis, et al. Informational [Page 1] + +RFC 7945 ICN Evaluation and Security September 2016 + + +Copyright Notice + + Copyright (c) 2016 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 + 2. Evaluation Considerations . . . . . . . . . . . . . . . . . . 4 + 2.1. Topology Selection . . . . . . . . . . . . . . . . . . . . 5 + 2.2. Traffic Load . . . . . . . . . . . . . . . . . . . . . . . 6 + 2.3. Choosing Relevant Metrics . . . . . . . . . . . . . . . . 10 + 2.3.1. Traffic Metrics . . . . . . . . . . . . . . . . . . . 13 + 2.3.2. System Metrics . . . . . . . . . . . . . . . . . . . . 14 + 2.4. Resource Equivalence and Trade-Offs . . . . . . . . . . . 16 + 3. ICN Security Aspects . . . . . . . . . . . . . . . . . . . . . 16 + 3.1. Authentication . . . . . . . . . . . . . . . . . . . . . . 17 + 3.2. Authorization, Access Control, and Logging . . . . . . . . 18 + 3.3. Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . 19 + 3.4. Changes to the Network Security Threat Model . . . . . . . 20 + 4. Evaluation Tools . . . . . . . . . . . . . . . . . . . . . . . 21 + 4.1. Open-Source Implementations . . . . . . . . . . . . . . . 21 + 4.2. Simulators and Emulators . . . . . . . . . . . . . . . . . 22 + 4.2.1. ndnSIM . . . . . . . . . . . . . . . . . . . . . . . . 22 + 4.2.2. ccnSIM . . . . . . . . . . . . . . . . . . . . . . . . 23 + 4.2.3. Icarus Simulator . . . . . . . . . . . . . . . . . . . 23 + 4.3. Experimental Facilities . . . . . . . . . . . . . . . . . 24 + 4.3.1. Open Network Lab (ONL) . . . . . . . . . . . . . . . . 24 + 4.3.2. POINT Testbed . . . . . . . . . . . . . . . . . . . . 25 + 4.3.3. CUTEi: Container-Based ICN Testbed . . . . . . . . . . 25 + 5. Security Considerations . . . . . . . . . . . . . . . . . . . 25 + 6. Informative References . . . . . . . . . . . . . . . . . . . . 26 + Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 37 + Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 38 + + + + + + + + + + +Pentikousis, et al. Informational [Page 2] + +RFC 7945 ICN Evaluation and Security September 2016 + + +1. Introduction + + Information-Centric Networking (ICN) is a networking concept that + arose from the desire to align the operation model of a network with + the model of its typical use. For TCP/IP networks, this implies + changing the mechanisms of data access and transport from a host-to- + host model to a user-to-information model. The premise is that the + effort invested in changing models will be offset, or even surpassed, + by the potential of a "better" network. However, such a claim can be + validated only if it is quantified. + + Different ICN approaches are evaluated in the peer-reviewed + literature using a mixture of theoretical analysis, simulation and + emulation techniques, and empirical (testbed) measurements. The + specific methodology employed may depend on the experimentation goal, + e.g., whether one wants to evaluate scalability, quantify resource + utilization, or analyze economic incentives. In addition, though, we + observe that ease and convenience of setting up and running + experiments can sometimes be a factor in published evaluations. As + discussed in [RFC7476], the development phase that ICN is going + through and the plethora of approaches to tackle the hardest problems + make this a very active and growing research area but, on the + downside, it also makes it more difficult to compare different + proposals on an equal footing. + + Performance evaluation using actual network deployments has the + advantage of realistic workloads and reflects the environment where + the service or protocol is to be deployed. In the case of ICN, + however, it is not currently clear what qualifies as a "realistic + workload". Trace-based analysis of ICN is in its infancy, and more + work is needed towards defining characteristic workloads for ICN + evaluation studies. Accordingly, the experimental process and the + evaluation methodology per se are actively being researched for + different ICN architectures. Numerous factors affect the + experimental results, including the topology selected; the background + traffic that an application is being subjected to; network conditions + such as available link capacities, link delays, and loss-rate + characteristics throughout the selected topology; failure and + disruption patterns; node mobility; and the diversity of devices + used. + + The goal of this document is to summarize evaluation guidelines and + tools alongside suggested data sets and high-level approaches. We + expect this to be of interest to the ICN community as a whole, as it + can assist researchers and practitioners alike to compare and + contrast different ICN designs, as well as with the state of the art + in host-centric solutions, and identify the respective strengths and + weaknesses. We note that, apart from the technical evaluation of the + + + +Pentikousis, et al. Informational [Page 3] + +RFC 7945 ICN Evaluation and Security September 2016 + + + functionality of an ICN architecture, the future success of ICN will + be largely driven by its deployability and economic viability. + Therefore, ICN evaluations should assess incremental deployability in + the existing network environment together with a view of how the + technical functions will incentivize deployers to invest in the + capabilities that allow the architecture to spread across the + network. + + This document has been produced by the IRTF Information-Centric + Networking Research Group (ICNRG). The main objective of the ICNRG + is to couple ongoing ICN research in the above areas with solutions + that are relevant for evolving the Internet at large. The ICNRG + produces documents that provide guidelines for experimental + activities in the area of ICN so that different, alternative + solutions can be compared consistently, and information sharing can + be accomplished for experimental deployments. This document + incorporates input from ICNRG participants and their corresponding + text contributions; it has been reviewed by several ICNRG active + participants (see the Acknowledgments), and represents the consensus + of the research group. That said, note that this document does not + constitute an IETF standard; see also [RFC5743]. + + The remainder of this document is organized as follows. Section 2 + presents various techniques and considerations for evaluating + different ICN architectures. Section 3 discusses the impact of ICN + on network security. Section 4 surveys the tools currently available + to ICN researchers. + +2. Evaluation Considerations + + It is clear that the way we evaluate IP networks will not be directly + applicable to evaluating ICN. In IP, the focus is on the performance + and characteristics of end-to-end connections between a source and a + destination. In ICN, the "source" responding to a request can be any + ICN node in the network and may change from request to request. This + makes it difficult to use concepts like delay and throughput in a + traditional way. In addition, evaluating resource usage in ICN is a + more complicated task, as memory used for caching affects delays and + use of transmission resources; see the discussion on resource + equivalents in Section 2.4. + + There are two major types of evaluations of ICN that we see a need to + make. One type is to compare ICN to traditional networking, and the + other type is to compare different ICN implementations and approaches + against each other. + + In this section, we detail some of the functional components needed + when evaluating different ICN implementations and approaches. + + + +Pentikousis, et al. Informational [Page 4] + +RFC 7945 ICN Evaluation and Security September 2016 + + +2.1. Topology Selection + + There's a wealth of earlier work on topology selection for simulation + and performance evaluation of host-centric networks. While the + classic dumbbell topology is regarded as inappropriate for ICN, most + ICN studies so far have been based on that earlier work for host- + centric networks [RFC7476]. However, there is no single topology + that can be used to easily evaluate all aspects of ICN. Therefore, + one should choose from a range of topologies depending on the focus + of the evaluation. + + For scalability and resilience studies, there is a wide range of + synthetic topologies, such as the Barabasi-Albert model [Barabasi99] + and the Watts-Strogatz small-world topology [Watts98]. These allow + experiments to be performed whilst controlling various key parameters + (e.g., node degree). These synthetic topologies are appropriate in + the general case, as there are no practical assurances that a future + information-centric network will have the same topology as any of + today's networks. + + When studies look at cost (e.g., transit cost) or migration to ICN, + realistic topologies should be used. These can be inferred from + Internet traces, such as the CAIDA Macroscopic Internet Topology Data + Kit (http://www.caida.org/data/active/internet-topology-data-kit) and + Rocketfuel + (http://www.cs.washington.edu/research/networking/rocketfuel). A + problem is the large size of the topology (approximately 45K + Autonomous Systems, close to 200K links), which may limit the + scalability of the employed evaluation tool. Katsaros et al. + [Katsaros15] address this problem by using scaled down topologies + created following the methodology described in [Dimitropoulos09]. + + Studies that focus on node or content mobility can benefit from + topologies and their dynamic aspects as used in the Delay-Tolerant + Networking (DTN) community. As mentioned in [RFC7476], DTN traces + are available to be used in such ICN evaluations. + + As with host-centric topologies, defining just a node graph will not + be enough for most ICN studies. The experimenter should also clearly + define and list the respective matrices that correspond to the + network, storage, and computation capacities available at each node + as well as the delay characteristics of each link [Montage]. Real + values for such parameters can be taken from existing platforms such + as iPlane (http://iplane.cs.washington.edu). Synthetic values could + be produced with specific tools [Kaune09]. + + + + + + +Pentikousis, et al. Informational [Page 5] + +RFC 7945 ICN Evaluation and Security September 2016 + + +2.2. Traffic Load + + In this subsection, we provide a set of common guidelines, in the + form of what we will refer to as a content catalog for different + scenarios. This catalog, which is based on previously published + work, can be used to evaluate different ICN proposals, for instance, + on routing, congestion control, and performance, and can be + considered as other kinds of ICN contributions emerge. As we are + still lacking ICN-specific traffic workloads, we can currently only + extrapolate from today's workloads. A significant challenge then + relates to the identification of the applications contributing to the + observed traffic (e.g., Web or peer-to-peer), as well as to the exact + amount of traffic they contribute to the overall traffic mixture. + Efforts in this direction can take heed of today's traffic mix + comprising Web, peer-to-peer file sharing, and User-Generated Content + (UGC) platforms (e.g., YouTube), as well as Video on Demand (VoD) + services. Publicly available traces for these include those from web + sites such as the MultiProbe Framework + <http://multiprobe.ewi.tudelft.nl/multiprobe.html>, + <http://an.kaist.ac.kr/traces/IMC2007.html> (see also [Cha07]), and + the UMass Trace Repository + <http://traces.cs.umass.edu/index.php/Network/Network>. + + Taking a more systematic approach, and with the purpose of modeling + the traffic load, we can resort to measurement studies that + investigate the composition of Internet traffic, such as [Labovitz10] + and [Maier09]. In [Labovitz10], a large-scale measurement study was + performed, with the purpose of studying the traffic crossing inter- + domain links. The results indicate the dominance of Web traffic, + amounting to 52% over all measured traffic. However, Deep Packet + Inspection (DPI) techniques reveal that 25-40% of all HTTP traffic + actually carries video traffic. Results from DPI techniques also + reveal the difficulty in correctly identifying the application type + in the case of P2P traffic: mapping observed port numbers to well- + known applications shows P2P traffic constituting only 0.85% of + overall traffic, while DPI raises this percentage to 18.32% + [Labovitz10]. Relevant studies on a large ISP show that the + percentage of P2P traffic ranges from 17% to 19% of overall traffic + [Maier09]. Table 1 provides an overview of these figures. The + "other" traffic type denotes traffic that cannot be classified in any + of the first three application categories, and it consists of + unclassified traffic and traffic heavily fragmented into several + applications (e.g., 0.17% DNS traffic). + + + + + + + + +Pentikousis, et al. Informational [Page 6] + +RFC 7945 ICN Evaluation and Security September 2016 + + + Traffic Type | Ratio + ===================== + Web | 31-39% + --------------------- + P2P | 17-19% + --------------------- + Video | 13-21% + --------------------- + Other | 29-31% + ===================== + + Table 1: Traffic Type Ratios of Total Traffic [Labovitz10] [Maier09] + + The content catalog for each type of traffic can be characterized by + a specific set of parameters: + + a) the cardinality of the estimated content catalog + + b) the size of the exchanged contents (either chunks or entire named + information objects) + + c) the popularity of objects (expressed in their request frequency) + + In most application types, the popularity distribution follows some + power law, indicating that a small number of information items + trigger a large proportion of the entire set of requests. The exact + shape of the power law popularity distribution directly impacts the + performance of the underlying protocols. For instance, highly skewed + popularity distributions (e.g., a Zipf-like distribution with a high + slope value) favor the deployment of caching schemes, since caching a + very small set of information items can dramatically increase the + cache hit ratio. + + Several studies in the past few years have stated that Zipf's law is + the discrete distribution that best represents the request frequency + in a number of application scenarios, ranging from the Web to VoD + services. The key aspect of this distribution is that the frequency + of a content request is inversely proportional to the rank of the + content itself, i.e., the smaller the rank, the higher the request + frequency. If M denotes the content catalog cardinality and 1 <= i + <= M denotes the rank of the i-th most popular content, we can + express the probability of requesting the content with rank "i" as: + + P(X=i) = (1 / i^(alpha)) / C, with C = SUM(1 / j^(alpha)), alpha > 0 + where the sum is obtained considering all values of j, 1 <= j <= M. + + + + + + +Pentikousis, et al. Informational [Page 7] + +RFC 7945 ICN Evaluation and Security September 2016 + + + A recent analysis of HTTP traffic showed that content popularity is + better reflected by a trimodal distribution model in which the head + and tail of a Zipf distribution (with slope value 0.84) are replaced + by two discrete Weibull distributions with shape parameter values 0.5 + and 0.24, respectively [IMB2014]. + + A variation of the Zipf distribution, termed the Mandelbrot-Zipf + distribution was suggested [Saleh06] to better model environments + where nodes can locally store previously requested content. For + example, it was observed that peer-to-peer file-sharing applications + typically exhibited a 'fetch-at-most-once' style of behavior. This + is because peers tend to persistently store the files they download, + a behavior that may also be prevalent in ICN. + + Popularity can also be characterized in terms of: + + a) The temporal dynamics of popularity, i.e., how requests are + distributed in time. The popularity distribution expresses the + number of requests submitted for each information item + participating into a certain workload. However, they do not + describe how these requests are distributed in time. This aspect + is of primary importance when considering the performance of + caching schemes since the ordering of the requests obviously + affects the contents of a cache. For example, with a Least + Frequently Used (LFU) cache replacement policy, if all requests + for a certain item are submitted close in time, the item is + unlikely to be evicted from the cache, even by a (globally) more + popular item whose requests are more evenly distributed in time. + The temporal ordering of requests gains even more importance when + considering workloads consisting of various applications, all + competing for the same cache space. + + b) The spatial locality of popularity i.e., how requests are + distributed throughout a network. The importance of spatial + locality relates to the ability to avoid redundant traffic in the + network. If requests are highly localized in some area of the + entire network, then similar requests can be more efficiently + served with mechanisms such as caching and/or multicast, i.e., the + concentration of similar requests in a limited area of the network + allows increasing the perceived cache hit ratios at caches in the + area and/or the traffic savings from the use of multicast. + Table 2 provides an overview of distributions that can be used to + model each of the identified traffic types i.e., Web, Video (based + on YouTube measurements), and P2P (based on BitTorrent + measurements). These distributions are the outcome of a series of + modeling efforts based on measurements of real traffic workloads + ([Breslau99] [Mahanti00] [Busari02] [Arlitt97] [Barford98] + [Barford99] [Hefeeda08] [Guo07] [Bellissimo04] [Cheng08] + + + +Pentikousis, et al. Informational [Page 8] + +RFC 7945 ICN Evaluation and Security September 2016 + + + [Cheng13]). A tool for the creation of synthetic workloads + following these models, and also allowing the generation of + different traffic mixes, is described in [Katsaros12]. + + | Object Size | Temporal Locality | Popularity Distribution + ===================================================================== + Web | Concatenation | Ordering via the | Zipf: p(i)=K/i^a + | of Lognormal | Least Recently Used | i: popularity rank + | (body) and | (LRU) stack model | N: total items + | Pareto (tail) | [Busari02] | K: 1/Sum(1/i^a) + | [Barford98] | | a: distribution slope + | [Barford99] | Exact timing via | values 0.64-0.84 + | | exponential | [Breslau99] [Mahanti00] + | | distribution | + | | [Arlitt97] | + --------------------------------------------------------------------- + VoD | Duration/size: | No analytical models | Weibull: k=0.513, + | Concatenated | | lambda=6010 + | normal; most | Random distribution | + | videos | across total | Gamma: k=0.372, + | ~330 kbit/s | duration | theta=23910 + | [Cheng13] | | [Cheng08] + --------------------------------------------------------------------- + P2P | Wide variation | Mean arrival rate of | Mandelbrot-Zipf + | on torrent | 0.9454 torrents/hour | [Hefeeda08]: + | sizes | Peers in a swarm | p(i)=K/((i+q)/a) + | [Hefeeda08]. | arrive as | q: plateau factor, + | No analytical | l(t)= l0*e^(-t/tau) | 5 to 100. + | models exist: | l0: initial arrival | Flatter head than in + | Sample a real | rate (87.74 average) | Zipf-like distribution + | BitTorrent | tau: object | (where q=0) + | distribution | popularity | + | [Bellissimo04] | (1.16 average)* | + | or use fixed | [Guo07] | + | value | | + ===================================================================== + + * Random ordering of swarm births (first request). For each swarm, + calculate a different tau. Based on average tau and object + popularity. Exponential decay rule for subsequent requests. + + Table 2: Overview of Traffic Type Models + + Table 3 summarizes the content catalog. With this shared point of + reference, the use of the same set of parameters (depending on the + scenario of interest) among researchers will be eased, and different + proposals could be compared on a common base. + + + + +Pentikousis, et al. Informational [Page 9] + +RFC 7945 ICN Evaluation and Security September 2016 + + + Traffic | Catalog | Mean Object Size | Popularity Distribution + Load | Size | [Zhou11] [Fri12] | [Cha07] [Fri12] [Yu06] + |[Goog08] | [Marciniak08] | [Breslau99] [Mahanti00] + |[Zhang10a]| [Bellissimo04] | + |[Cha07] | [Psaras11] | + |[Fri12] | [Carofiglio11] | + | | | + | | | + | | | + =================================================================== + Web | 10^12 | Chunk: 1-10 KB | Zipf with + | | | 0.64 <= alpha <= 0.83 + ------------------------------------------------------------------- + File | 5x10^6 | Chunk: 250-4096 KB | Zipf with + sharing | | Object: ~800 MB | 0.75 <= alpha <= 0.82 + ------------------------------------------------------------------- + UGC | 10^8 | Object: ~10 MB | Zipf, alpha >= 2 + ------------------------------------------------------------------- + VoD | 10^4 | Object: ~100 MB | Zipf, 0.65 <= alpha <= 1 + (+HLS) | | ~1 KB (*) | + (+DASH) | | ~5.6 KB (*) | + =================================================================== + + UGC = User-Generated Content + VoD = Video on Demand + HLS = HTTP Live Streaming + DASH = Dynamic Adaptive Streaming over HTTP + + (*) Using adaptive video streaming (e.g., HLS and DASH), with an + optimal segment length (10 s for HLS and 2 s for DASH) and a + bitrate of 4500 kbit/s [RFC7933] [Led12] + + Table 3: Content Catalog + +2.3. Choosing Relevant Metrics + + Quantification of network performance requires a set of standard + metrics. These metrics should be broad enough so they can be applied + equally to host-centric and information-centric (or other) networks. + This will allow reasoning about a certain ICN approach in relation to + an earlier version of the same approach, to another ICN approach, or + to the incumbent host-centric approach. It will therefore be less + difficult to gauge optimization and research direction. On the other + hand, the metrics should be targeted to network performance only and + should avoid unnecessary expansion into the physical and application + layers. Similarly, at this point, it is more important to capture as + metrics only the main figures of merit and to leave more esoteric and + less frequent cases for the future. + + + +Pentikousis, et al. Informational [Page 10] + +RFC 7945 ICN Evaluation and Security September 2016 + + + To arrive at a set of relevant metrics, it would be beneficial to + look at the metrics used in existing ICN approaches, such as Content- + Centric Networking (CCN) [Jacobson09] [VoCCN] [Zhang10b], NetInf + [4WARD6.1] [4WARD6.3] [SAIL-B2] [SAIL-B3], PURSUIT [PRST4.5], COMET + [CMT-D5.2] [CMT-D6.2], Connect [Muscariello11] [Perino11], and + CONVERGENCE [Detti12] [Blefari-Melazzi12] [Salsano12]. The metrics + used in these approaches fall into two categories: metrics for the + approach as a whole, and metrics for individual components (name + resolution, routing, and so on). Metrics for the entire approach are + further subdivided into traffic and system metrics. It is important + to note that the various approaches do not name or define metrics + consistently. This is a major problem when trying to find metrics + that allow comparison between approaches. For the purposes of + exposition, we have tried to smooth over differences by classifying + similarly defined metrics under the same name. Also, due to space + constraints, we have chosen to report here only the most common + metrics between approaches. For more details, the reader should + consult the references for each approach. + + Traffic metrics in existing ICN approaches are summarized in Table 4. + These are metrics for evaluating an approach mainly from the + perspective of the end user, i.e., the consumer, provider, or owner + of the content or service. Depending on the level where these + metrics are measured, we have made the distinction into user, + application, and network-level traffic metrics. So, for example, + network-level metrics are mostly focused on packet characteristics, + whereas user-level metrics can cover elements of human perception. + The approaches do not make this distinction explicitly, but we can + see from the table that CCN and NetInf have used metrics from all + levels, PURSUIT and COMET have focused on lower-level metrics, and + Connect and CONVERGENCE opted for higher-level metrics. Throughput + and download time seem to be the most popular metrics altogether. + + + + + + + + + + + + + + + + + + + +Pentikousis, et al. Informational [Page 11] + +RFC 7945 ICN Evaluation and Security September 2016 + + + User | Application | Network + ====================================================== + Download | Goodput | Startup | Throughput | Packet + time | | latency | | delay + ================================================================== + CCN | x | x | | x | x + ------------------------------------------------------------------ + NetInf | x | | x | x | x + ------------------------------------------------------------------ + PURSUIT | | | x | x | x + ------------------------------------------------------------------ + COMET | | | x | x | + ------------------------------------------------------------------ + Connect | x | | | | + ------------------------------------------------------------------ + CONVERGENCE | x | x | | | + ================================================================== + + Table 4: Traffic Metrics Used in ICN Evaluations + + While traffic metrics are more important for the end user, the owner + or operator of the networking infrastructure is normally more + interested in system metrics, which can reveal the efficiency of an + approach. The most common system metrics used are: protocol + overhead, total traffic, transit traffic, cost savings, router cost, + and router energy consumption. + + Besides the traffic and systems metrics that aim to evaluate an + approach as a whole, all surveyed approaches also evaluate the + performance of individual components. Name resolution, request/data + routing, and data caching are the most typical components, as + summarized in Table 5. Forwarding Information Base (FIB) size and + path length, i.e., the routing component metrics, are almost + ubiquitous among approaches, perhaps due to the networking background + of the involved researchers. That might be also the reason for the + sometimes decreased focus on traffic and system metrics, in favor of + component metrics. It can certainly be argued that traffic and + system metrics are affected by component metrics; however, no + approach has made the relationship clear. With this in mind and + taking into account that traffic and system metrics are readily + useful to end users and network operators, we will restrict ourselves + to those in the following subsections. + + + + + + + + + +Pentikousis, et al. Informational [Page 12] + +RFC 7945 ICN Evaluation and Security September 2016 + + + Resolution | Routing | Cache + ====================================================== + Resolution | Request | FIB | Path | Size | Hit + time | rate | size | length | | ratio + ================================================================== + CCN | x | | x | x | x | x + ------------------------------------------------------------------ + NetInf | x | x | | x | | x + ------------------------------------------------------------------ + PURSUIT | | | x | x | | + ------------------------------------------------------------------ + COMET | x | x | x | x | | x + ------------------------------------------------------------------ + CONVERGENCE | | x | x | | x | + ================================================================== + + Table 5: Component Metrics in Existing ICN Approaches + + Before proceeding, we should note that we would like our metrics to + be applicable to host-centric networks as well. Standard metrics + already exist for IP networks, and it would certainly be beneficial + to take them into account. It is encouraging that many of the + metrics used by existing ICN approaches can also be used on IP + networks and that all of the approaches have tried on occasion to + draw the parallels. + +2.3.1. Traffic Metrics + + The IETF has been working for more than a decade on devising metrics + and methods for measuring the performance of IP networks. The work + has been carried out largely within the IP Performance Metrics (IPPM) + working group, guided by a relevant framework [RFC2330]. IPPM + metrics include delay, delay variation, loss, reordering, and + duplication. While the IPPM work is certainly based on packet- + switched IP networks, it is conceivable that it can be modified and + extended to cover ICN networks as well. However, more study is + necessary to turn this claim into a certainty. Many experts have + toiled for a long time on devising and refining the IPPM metrics and + methods, so it would be an advantage to use them for measuring ICN + performance. In addition, said metrics and methods work already for + host-centric networks, so comparison with information-centric + networks would entail only the ICN extension of the IPPM framework. + Finally, an important benefit of measuring the transport performance + of a network at its output, using Quality of Service (QoS) metrics + such as IPPM, is that it can be done mostly without any dependence to + applications. + + + + + +Pentikousis, et al. Informational [Page 13] + +RFC 7945 ICN Evaluation and Security September 2016 + + + Another option for measuring transport performance would be to use + QoS metrics, not at the output of the network like with IPPM, but at + the input to the application. For a live video-streaming application + the relevant metrics would be startup latency, playout lag, and + playout continuity. The benefit of this approach is that it + abstracts away all details of the underlying transport network, so it + can be readily applied to compare between networks of different + concepts (host-centric, information-centric, or other). As implied + earlier, the drawback of the approach is its dependence on the + application, so it is likely that different types of applications + will require different metrics. It might be possible to identify + standard metrics for each type of application, but the situation is + not as clear as with IPPM metrics, and further investigation is + necessary. + + At a higher level of abstraction, we could measure the network's + transport performance at the application output. This entails + measuring the quality of the transported and reconstructed + information as perceived by the user during consumption. In such an + instance we would use Quality of Experience (QoE) metrics, which are + by definition dependent on the application. For example, the + standardized methods for obtaining a Mean Opinion Score (MOS) for + VoIP (e.g., ITU-T Recommendation P.800) is quite different from those + for IPTV (e.g., Perceptual Evaluation of Video Quality (PEVQ)). + These methods are notoriously hard to implement, as they involve real + users in a controlled environment. Such constraints can be relaxed + or dropped by using methods that model human perception under certain + environments, but these methods are typically intrusive. The most + important drawback of measuring network performance at the output of + the application is that only one part of each measurement is related + to network performance. The rest is related to application + performance, e.g., video coding, or even device capabilities, both of + which are irrelevant to our purposes here and are generally hard to + separate. We therefore see the use of QoE metrics in measuring ICN + performance as a poor choice at this stage. + +2.3.2. System Metrics + + Overall system metrics that need to be considered include + reliability, scalability, energy efficiency, and delay/disconnection + tolerance. In deployments where ICN is addressing specific + scenarios, relevant system metrics could be derived from current + experience. For example, in Internet of Things (IoT) scenarios, + which are discussed in [RFC7476], it is reasonable to consider the + current generation of sensor nodes, sources of information, and even + measurement gateways (e.g., for smart metering at homes) or + smartphones. In this case, ICN operation ought to be evaluated with + respect not only to overall scalability and network efficiency, but + + + +Pentikousis, et al. Informational [Page 14] + +RFC 7945 ICN Evaluation and Security September 2016 + + + also the impact on the nodes themselves. Karnouskos et al. + [SensReqs] provide a comprehensive set of sensor and IoT-related + requirements, for example, which include aspects such as resource + utilization, service life-cycle management, and device management. + + Additionally, various specific metrics are also critical in + constrained environments, such as processing requirements, signaling + overhead, and memory allocation for caching procedures, in addition + to power consumption and battery lifetime. For gateways (which + typically act as a point of service to a large number of nodes and + have to satisfy the information requests from remote entities), we + need to consider scalability-related metrics, such as frequency and + processing of successfully satisfied information requests. + + Finally, given the in-network caching functionality of ICNs, + efficiency and performance metrics of in-network caching have to be + defined. Such metrics will need to guide researchers and operators + regarding the performance of in-network caching algorithms. A first + step on this direction has been made in [Psaras11]. The paper + proposes a formula that approximates the proportion of time that a + piece of content stays in a network cache. The model takes as input + the rate of requests for a given piece of content (the Content of + Interest (CoI)) and the rate of requests for all other contents that + go through the given network element (router) and move the CoI down + in the (LRU) cache. The formula takes also into account the size of + the cache of this router. + + The output of the model essentially reflects the probability that the + CoI will be found in a given cache. An initial study [Psaras11] is + applied to the CCN / Named Data Networking (NDN) framework, where + contents get cached at every node they traverse. The formula + according to which the probability or proportion is calculated is + given by: + + pi = [mu / (mu + lambda)]^N + + where lambda is the request rate for the CoI, mu is the request rate + for contents that move the CoI down the cache, and N is the size of + the cache (in slots). + + The formula can be used to assess the caching performance of the + system and can also potentially be used to identify the gain of the + system due to caching. This can then be used to compare against + gains by other factors, e.g., addition of extra bandwidth in the + network. + + + + + + +Pentikousis, et al. Informational [Page 15] + +RFC 7945 ICN Evaluation and Security September 2016 + + +2.4. Resource Equivalence and Trade-Offs + + As we have seen above, every ICN network is built from a set of + resources, which include link capacities, and different types of + memory structures and repositories used for storing named data + objects and chunks temporarily (i.e., caching) or persistently, as + well as name resolution and other lookup services. A range of + engineering trade-offs arise from the complexity and processing + requirements of forwarding decisions, management needs (e.g., manual + configuration, explicit garbage collection), and routing needs (e.g., + amount of state, manual configuration of routing tables, support for + mobility). + + In order to be able to compare different ICN approaches, it would be + beneficial to be able to define equivalence in terms of different + resources that today are considered incomparable. For example, would + provisioning an additional 5 Mbit/s link capacity lead to better + performance than adding 100 GB of in-network storage? Within this + context, one would consider resource equivalence (and the associated + trade-offs) -- for example, for cache hit ratios per GB of cache, + forwarding decision times, CPU cycles per forwarding decision, and so + on. + +3. ICN Security Aspects + + The introduction of an information-centric networking architecture + and the corresponding communication paradigm results in changes to + many aspects of network security. These will affect all scenarios + described in [RFC7476]. Additional evaluation will be required to + ensure relevant security requirements are appropriately met by the + implementation of the chosen architecture in the various scenarios. + + The ICN security aspects described in this document reflect the ICN + security challenges outlined in [RFC7927]. + + The ICN architectures currently proposed have concentrated on + authentication of delivered content to ensure its integrity. Even + though the approaches are primarily applicable to freely accessible + content that does not require access authorization, they will + generally support delivery of encrypted content. + + The introduction of widespread caching mechanisms may also provide + additional attack surfaces. The caching architecture to be used also + needs to be evaluated to ensure that it meets the requirements of the + usage scenarios. + + + + + + +Pentikousis, et al. Informational [Page 16] + +RFC 7945 ICN Evaluation and Security September 2016 + + + In practice, the work on security in the various ICN research + projects has been heavily concentrated on authentication of content. + Work on authorization, access control, and privacy and security + threats due to the expanded role of in-network caches has been quite + limited. For example, a roadmap for improving the security model in + NetInf can be found in [Renault09]. As secure communications on the + Internet are becoming the norm, major gaps in ICN security aspects + are bound to undermine the adoption of ICN. A comprehensive overview + of ICN security is also provided in [Tourani16]. + + In the following subsections, we briefly consider the issues and + provide pointers to the work that has been done on the security + aspects of the architectures proposed. + +3.1. Authentication + + For fully secure content distribution, content access requires that + the receiver be able to reliably assess: + + validity: Is it a complete, uncorrupted copy of what was + originally published? + + provenance: Can the receiver identify the publisher? If so, can it + and the source of any cached version of the document + be adequately trusted? + + relevance: Is the content an answer to the question that the + receiver asked? + + All ICN architectures considered in this document primarily target + the validity requirement using strong cryptographic means to tie the + content request name to the content. Provenance and relevance are + directly targeted to varying extents: There is a tussle or trade-off + between simplicity and efficiency of access and level of assurance of + all these traits. For example, maintaining provenance information + can become extremely costly, particularly when considering (historic) + relationships between multiple objects. Architectural decisions have + therefore been made in each case as to whether the assessment is + carried out by the information-centric network or left to the + application. + + An additional consideration for authentication is whether a name + should be irrevocably and immutably tied to a static piece of + preexisting content or whether the name can be used to refer to + dynamically or subsequently generated content. Schemes that only + target immutable content can be less resource-hungry as they can use + digest functions rather than public key cryptography for generating + and checking signatures. However, this can increase the load on + + + +Pentikousis, et al. Informational [Page 17] + +RFC 7945 ICN Evaluation and Security September 2016 + + + applications because they are required to manage many names, rather + than use a single name for an item of evolving content that changes + over time (e.g., a piece of data containing an age reference). + + Data-Oriented Network Architecture (DONA) [DONA] and CCN [Jacobson09] + [Smetters09] integrate most of the data needed to verify provenance + into all content retrievals but need to be able to retrieve + additional information (typically a security certificate) in order to + complete the provenance authentication. Whether the application has + any control of this extra retrieval will depend on the + implementation. CCN is explicitly designed to handle dynamic content + allowing names to be pre-allocated and attached to subsequently + generated content. DONA offers variants for dynamic and immutable + content. + + Publish-Subscribe Internet Technology (PURSUIT) [Tagger12] appears to + allow implementers to choose the authentication mechanism so that it + can, in theory, emulate the authentication strategy of any of the + other architectures. It is not clear whether different choices would + lead to lack of interoperability. + + NetInf uses the Named Information (ni) URI scheme [RFC6920] to + identify content. This allows NetInf to assure validity without any + additional information but gives no assurance on provenance or + relevance. A "search" request allows an application to identify + relevant content, and applications may choose to structure content to + allow provenance assurance, but this will typically require + additional network access. NetInf validity authentication is + consequently efficient in a network environment with intermittent + connectivity as it does not force additional network accesses and + allows the application to decide on provenance validation if + required. For dynamic content, NetInf can use, e.g., signed + manifests. For more details on NetInf security, see [Dannewitz10]. + +3.2. Authorization, Access Control, and Logging + + A potentially major concern for all ICN architectures considered here + is that they do not provide any inbuilt support for an authorization + framework or for logging. Once content has been published and cached + in servers, routers, or endpoints not controlled by the publisher, + the publisher has no way to enforce access control, determine which + users have accessed the content, or revoke its publication. In fact, + in some cases (where requests do not necessarily contain host/user + identifier information), it is difficult for the publishers + themselves to perform access control. + + + + + + +Pentikousis, et al. Informational [Page 18] + +RFC 7945 ICN Evaluation and Security September 2016 + + + Access could be limited by encrypting the content, but the necessity + of distributing keys out-of-band appears to negate the advantages of + in-network caching. This also creates significant challenges when + attempting to manage and restrict key access. An authorization + delegation scheme has been proposed [Fotiou12]. This scheme allows + semi-trusted entities (such as caches or CDN nodes) to delegate + access control decisions to third-party access control providers that + are trusted by the content publisher. The former entities have no + access to subscriber-related information and should respect the + decisions of the access control providers. + + A recent proposal for an extra layer in the protocol stack [LIRA] + gives control of the name resolution infrastructure to the publisher. + This enables access logging as well some degree of active cache + management, e.g., purging of stale content. + + One possible technique that could allow for providing access control + to heterogeneous groups and still allow for a single encrypted object + representation that remains cacheable is Attribute-Based Encryption + (ABE). A first proposal for this is presented in [Ion13]. To + support heterogeneous groups and avoid having a single authority that + has a master key multi-authority, ABE can be used [Lewko11]. + + Evaluating the impact of the absence of these features will be + essential for any scenario where an ICN architecture might be + deployed. It may have a seriously negative impact on the + applicability of ICN in commercial environments unless a solution can + be found. + +3.3. Privacy + + Another area where the architectures have not been significantly + analyzed is privacy. Caching implies a trade-off between network + efficiency and privacy. The activity of users is significantly more + exposed to the scrutiny of cache owners with whom they may not have + any relationship. However, it should be noted that it is only the + first-hop router/cache that can see who requests what, as requests + are aggregated and only the previous-hop router is visible when a + request is forwarded. + + Although in many ICN architectures the source of a request is not + explicitly identified, an attacker may be able to obtain considerable + information if he or she can monitor transactions on the cache and + obtain details of the objects accessed, the topological direction of + requests, and information about the timing of transactions. The + persistence of data in the cache can make life easier for an attacker + by giving a longer timescale for analysis. + + + + +Pentikousis, et al. Informational [Page 19] + +RFC 7945 ICN Evaluation and Security September 2016 + + + The impact of CCN on privacy has been investigated in [Lauinger10], + and the analysis is applicable to all ICN architectures because it is + mostly focused on the common caching aspect. The privacy risks of + Named Data Networking are also highlighted in [Lauinger12]. Further + work on privacy in ICNs can be found in [Chaabane13]. Finally, + Fotiou et al. define an ICN privacy evaluation framework in + [Fotiou14]. + +3.4. Changes to the Network Security Threat Model + + The architectural differences of the various ICN models versus TCP/IP + have consequences for network security. There is limited + consideration of the threat models and potential mitigation in the + various documents describing the architectures. [Lauinger10] and + [Chaabane13] also consider the changed threat model. Some of the key + aspects are: + + o Caching implies a trade-off between network efficiency and user + privacy as discussed in Section 3.3. + + o More-powerful routers upgraded to handle persistent caching + increase the network's attack surface. This is particularly + the case in systems that may need to perform cryptographic + checks on content that is being cached. For example, not doing + this could lead routers to disseminate invalid content. + + o ICNs makes it difficult to identify the origin of a request (as + mentioned in Section 3.3), slowing down the process of blocking + requests and requiring alternative mechanisms to differentiate + legitimate requests from inappropriate ones as access control + lists (ACLs) will probably be of little value for ICN requests. + + o Denial-of-service (DoS) attacks may require more effort on ICN + than on TCP/IP-based host-centric networks, but they are still + feasible. One reason for this is that it is difficult for the + attacker to force repeated requests for the same content onto a + single node; ICNs naturally spread content so that after the + initial few requests, subsequent requests will generally be + satisfied by alternative sources, blunting the impact of a DoS + attack. That said, there are many ways around this, e.g., + generating random suffix identifiers that always result in + cache misses. + + o Per-request state in routers can be abused for DoS attacks. + + + + + + + +Pentikousis, et al. Informational [Page 20] + +RFC 7945 ICN Evaluation and Security September 2016 + + + o Caches can be misused in the following ways: + + + Attackers can use caches as storage to make their own + content available. + + + The efficiency of caches can be decreased by attackers with + the goal of DoS attacks. + + + Content can be extracted by any attacker connected to the + cache, putting users' privacy at risk. + + Appropriate mitigation of these threats will need to be considered in + each scenario. + +4. Evaluation Tools + + Since ICN is an emerging area, the community is in the process of + developing effective evaluation environments, including releasing + open-source implementations, simulators, emulators, and testbeds. To + date, none of the available evaluation tools can be seen as the one + and only community reference evaluation tool. Furthermore, no single + environment supports all well-known ICN approaches, as we describe + below, hindering the direct comparison of the results obtained for + different ICN approaches. The subsections that follow review the + currently publicly available ICN implementations, simulators, and + experimental facilities. + + An updated list of the available evaluation tools will be maintained + at the ICNRG Wiki page: <https://trac.tools.ietf.org/group/irtf/trac/ + wiki/IcnEvaluationAndTestbeds> + +4.1. Open-Source Implementations + + The Named Data Networking (NDN) project has open-sourced a software + reference implementation of the architecture and protocol called NDN + (http://named-data.net). NDN is available for deployment on various + operating systems and includes C and Java libraries that can be used + to build applications. + + CCN-lite (http://www.ccn-lite.net) is a lightweight implementation of + the CCN protocol that supports most of the key features of CCNx and + is interoperable with CCNx. CCN-lite implements the core CCN logic + in about 1000 lines of code, so it is ideal for classroom work and + course projects as well as for quickly experimenting with CCN + extensions. For example, Baccelli et al. use CCN-lite on top of the + RIOT operating system to conduct experiments over an IoT testbed + [Baccelli14]. + + + + +Pentikousis, et al. Informational [Page 21] + +RFC 7945 ICN Evaluation and Security September 2016 + + + PARC is offering CCN source code under various licensing schemes, + please see <http://www.ccnx.org> for details. + + The PURSUIT project (http://www.fp7-pursuit.eu) has open-sourced its + Blackhawk publish-subscribe (Pub/Sub) implementation for Linux and + Android; more details are available at + <https://github.com/fp7-pursuit/blackadder>. Blackadder uses the + Click modular router for ease of development. The code distribution + features a set of tools, test applications, and scripts. The POINT + project (http://www.point-h2020.eu) is currently maintaining + Blackadder. + + The 4WARD and SAIL projects have open-sourced software that + implements different aspects of NetInf, e.g., the NetInf URI format + and HTTP and UDP convergence layer, using different programming + languages. The Java implementation provides a local caching proxy + and client. Further, an OpenNetInf prototype is available as well as + a hybrid host-centric and information-centric network architecture + called the Global Information Network (GIN), a browser plug-in and + video-streaming software. See <http://www.netinf.org/open-source> + for more details. + +4.2. Simulators and Emulators + + Simulators and emulators should be able to capture faithfully all + features and operations of the respective ICN architecture(s) and any + limitations should be openly documented. It is essential that these + tools and environments come with adequate logging facilities so that + one can use them for in-depth analysis as well as debugging. + Additional requirements include the ability to support medium- to + large-scale experiments, the ability to quickly and correctly set + various configurations and parameters, as well as to support the + playback of traffic traces captured on a real testbed or network. + Obviously, this does not even begin to touch upon the need for strong + validation of any evaluated implementations. + +4.2.1. ndnSIM + + The Named Data Networking (NDN) project (http://named-data.net) has + developed ndnSIM [ndnSIM] [ndnSIM2]; this is a module that can be + plugged into the ns-3 simulator (https://www.nsnam.org) and supports + the core features of NDN. One can use ndnSIM to experiment with + various NDN applications and services as well as components developed + for NDN such as routing protocols and caching and forwarding + strategies, among others. The code for ns-3 and ndnSIM is openly + available to the community and can be used as the basis for + implementing ICN protocols or applications. For more details, see + <http://ndnsim.net/2.0/>. + + + +Pentikousis, et al. Informational [Page 22] + +RFC 7945 ICN Evaluation and Security September 2016 + + +4.2.2. ccnSIM + + ccnSim [ccnSim] is a CCN-specific simulator that was specially + designed to handle forwarding of a large number of CCN-chunks + (http://www.infres.enst.fr/~drossi/index.php?n=Software.ccnSim). + ccnSim is written in C++ for the OMNeT++ simulation framework + (https://omnetpp.org). Other CCN-specific simulators include the CCN + Packet-Level Simulator [CCNPL] and CCN-Joker [Cianci12]. CCN-Joker + emulates in user space all basic aspects of a CCN node (e.g., + handling of Interest and Data packets, cache sizing, replacement + policies), including both flow and congestion control. The code is + open source and is suitable for both emulation-based analyses and + real experiments. Finally, Cabral et al. [MiniCCNx] use container- + based emulation and resource isolation techniques to develop a + prototyping and emulation tool. + +4.2.3. Icarus Simulator + + The Icarus simulator [ICARUS] focuses on caching in ICN and is + agnostic with respect to any particular ICN implementation. The + simulator is implemented in Python, uses the Fast Network Simulator + Setup tool [Saino13], and is available at + <http://icarus-sim.github.io>. Icarus has several caching strategies + implemented, including among others ProbCache [Psaras12], node- + centrality-based caching [Chai12], and hash-route-based caching + [HASHROUT]. + + ProbCache [Psaras12] is taking a resource management view on caching + decisions and approximates the available cache capacity along the + path from source to destination. Based on this approximation and in + order to reduce caching redundancy across the path, it caches content + probabilistically. According to [Chai12], the node with the highest + "betweenness centrality" along the path from source to destination is + responsible for caching incoming content. Finally, [HASHROUT] + calculates the hash function of a content's name and assigns contents + to caches of a domain according to that. The hash space is split + according to the number of caches of the network. Then, upon + subsequent requests, and based again on the hash of the name included + in the request, edge routers redirect requests to the cache assigned + with the corresponding hash space. [HASHROUT] is an off-path caching + strategy; in contrast to [Psaras12] and [Chai12], it requires minimum + coordination and redirection overhead. In its latest update, Icarus + also includes implementation of the "Satisfied Interest Table" (SIT) + [Sourlas15]. The SIT points in the direction where content has been + sent recently. Among other benefits, this enables information + resilience in case of network fragmentation (i.e., content can still + + + + + +Pentikousis, et al. Informational [Page 23] + +RFC 7945 ICN Evaluation and Security September 2016 + + + be found in neighbor caches or in users' devices) and inherently + supports user-assisted caching (i.e., P2P-like content distribution). + + Tortelli et al. [ICNSIMS] provide a comparison of ndnSIM, ccnSim, and + Icarus. + +4.3. Experimental Facilities + + An important consideration in the evaluation of any kind of future + Internet mechanism lies in the characteristics of that evaluation + itself. Central to the assessment of the features provided by a + novel mechanism is the consideration of how it improves over already + existing technologies, and by "how much". With the disruptive nature + of clean-slate approaches generating new and different technological + requirements, it is complex to provide meaningful results for a + network-layer framework, in comparison with what is deployed in the + current Internet. Thus, despite the availability of ICN + implementations and simulators, the need for large-scale environments + supporting experimental evaluation of novel research is of prime + importance to the advancement of ICN deployment. + + Different experimental facilities have different characteristics and + capabilities, e.g., having low cost of use, reproducible + configuration, easy-to-use tools, and available background traffic, + and being sharable. + +4.3.1. Open Network Lab (ONL) + + An example of an experimental facility that supports CCN is the Open + Network Lab [ONL] that currently comprises 18 extensible gigabit + routers and over a 100 computers representing clients and is freely + available to the public for running CCN experiments. Nodes in ONL + are preloaded with CCNx software. ONL provides a graphical user + interface for easy configuration and testbed setup as per the + experiment requirements, and also serves as a control mechanism, + allowing access to various control variables and traffic counters. + + Further, it is also possible to run and evaluate CCN over popular + testbeds [PLANETLAB] [EMULAB] [DETERLAB] [OFELIA] by directly + running, for example, the CCNx open-source code [Salsano13] + [Carofiglio13] [Awiphan13] [Bernardini14]. Also, the Network + Experimentation Programming Interface (NEPI) [NEPI] is a tool + developed for controlling and managing large-scale network + experiments. NEPI can be used to control and manage large-scale CCNx + experiments, e.g., on PlanetLab [Quereilhac14]. + + + + + + +Pentikousis, et al. Informational [Page 24] + +RFC 7945 ICN Evaluation and Security September 2016 + + +4.3.2. POINT Testbed + + The POINT project is maintaining a testbed with 40 machines across + Europe, North America (Massachusetts Institute of Technology (MIT)), + and Japan (National Institute of Information and Communications + Technology (NICT)) interconnected in a topology containing one + Topology Manager and one rendezvous node that handle all + publish/subscribe and topology formation requests [Parisis13]. All + machines run Blackadder (see Section 4.1). New nodes can join, and + experiments can be run on request. + +4.3.3. CUTEi: Container-Based ICN Testbed + + NICT has also developed a testbed used for ICN experiments [Asaeda14] + comprising multiple servers located in Asia and other locations. + Each testbed server (or virtual machine) utilizes a Linux kernel- + based container (LXC) for node virtualization. This testbed enables + users to run applications and protocols for ICN in two + experimentation modes using two different container designs: + + 1. application-level experimentation using a "common container" + and + + 2. network-level experimentation using a "user container." + + A common container is shared by all testbed users, and a user + container is assigned to one testbed user. A common container has a + global IP address to connect with other containers or external + networks, whereas each user container uses a private IP address and a + user space providing a closed networking environment. A user can + login to his/her user containers using SSH with his/her certificate, + or access them from PCs connected to the Internet using SSH + tunneling. + + This testbed also implements an "on-filesystem cache" to allocate + caching data on a UNIX filesystem. The on-filesystem cache system + accommodates two kinds of caches: "individual cache" and "shared + cache." Individual cache is accessible for one dedicated router for + the individual user, while shared cache is accessible for a set of + routers in the same group to avoid duplicated caching in the + neighborhood for cooperative caching. + +5. Security Considerations + + This document does not impact the security of the Internet, but + Section 3 outlines security and privacy concerns that might affect a + deployment of a future ICN approach. + + + + +Pentikousis, et al. Informational [Page 25] + +RFC 7945 ICN Evaluation and Security September 2016 + + +6. Informative References + + [4WARD6.1] Ohlman, B., et al., "First NetInf Architecture + Description", 4WARD Project Deliverable D-6.1, April 2009. + + [4WARD6.3] Ahlgren, B., et al., "NetInf Evaluation", 4WARD Project + Deliverable D-6.3, June 2010. + + [Arlitt97] Arlitt, M. and C. Williamson, "Internet web servers: + workload characterization and performance implications", + IEEE/ACM Transactions on Networking, vol. 5, pp. 631-645, + DOI 10.1109/90.649565, 1997. + + [Asaeda14] Asaeda, H., Li, R., and N. Choi, "Container-Based Unified + Testbed for Information-Centric Networking", IEEE Network, + vol. 28, no. 6, pp. 60-66, DOI 10.1109/MNET.2014.6963806, + 2014. + + [Awiphan13] + Awiphan, S., et al., "Video streaming over content centric + networking: Experimental studies on PlanetLab", Proc. + Computing, Communications and IT Applications Conference + (ComComAp), IEEE, DOI 10.1109/ComComAp.2013.6533602, 2013. + + [Baccelli14] + Baccelli, E., et al., "Information Centric Networking in + the IoT: Experiments with NDN in the Wild", Proceedings of + the 1st international conference on Information-centric + networking (ICN '14), ACM, DOI 10.1145/2660129.2660144, + 2014. + + [Barabasi99] + Barabasi, A. and R. Albert, "Emergence of Scaling in + Random Networks", Science, vol. 286, no. 5439, pp. + 509-512, DOI 10.1126/science.286.5439.509, 1999. + + [Barford98] + Barford, P. and M. Crovella, "Generating representative + web workloads for network and server performance + evaluation", in ACM SIGMETRICS '98 / PERFORMANCE '98, pp. + 151-160, DOI 10.1145/277851.277897, 1998. + + [Barford99] + Barford, P., Bestavros, A., Bradley, A., and M. Crovella, + "Changes in web client access patterns: Characteristics + and caching implications", World Wide Web, vol. 2, pp. + 15-28, DOI 10.1023/A:1019236319752, 1999. + + + + +Pentikousis, et al. Informational [Page 26] + +RFC 7945 ICN Evaluation and Security September 2016 + + + [Bellissimo04] + Bellissimo, A., Levine, B., and P. Shenoy, "Exploring the + Use of BitTorrent as the Basis for a Large Trace + Repository", University of Massachusetts Amherst, Tech. + Rep. 04-41, 2004. + + [Bernardini14] + Bernardini, C., et al., "Socially-aware caching strategy + for content centric networking", Proc. IFIP Networking + Conference, DOI 10.1109/IFIPNetworking.2014.6857093, 2014. + + [Blefari-Melazzi12] + Blefari Melazzi, N., et al., "Scalability Measurements in + an Information-Centric Network", Springer Lecture Notes in + Computer Science (LNCS), vol. 7586, + DOI 10.1007/978-3-642-41296-7_6, 2012. + + [Breslau99] + Breslau, L., Cao, P., Fan, L., Phillips, G., and S. + Shenker, "Web caching and zipf-like distributions: + evidence and implications", Proc. of INFOCOM '99, New York + (NY), USA, DOI 10.1109/INFCOM.1999.749260, March 1999. + + [Busari02] Busari, M. and C. Williamson, "ProWGen: a synthetic + workload generation tool for simulation evaluation of web + proxy caches", Computer Networks, vol. 38, no. 6, pp. + 779-794, DOI 10.1016/S1389-1286(01)00285-7, 2002. + + [Carofiglio11] + Carofiglio, G., Gallo, M., Muscariello, L., and D. Perino, + "Modeling Data Transfer in Content-Centric Networking", + Proceedings of the 23rd International Teletraffic Congress + (ITC '11), San Francisco, USA, September 2011. + + [Carofiglio13] + Carofiglio, G., et al., "Optimal multipath congestion + control and request forwarding in Information-Centric + Networks", Proc. 2013 21st IEEE International Conference + on Network Protocols (ICNP), + DOI 10.1109/ICNP.2013.6733576, 2013. + + [CCNPL] Institut de Recherche Technologique (IRT) SystemX, "CCNPL- + SIM", <http://systemx.enst.fr/ccnpl-sim>. + + [ccnSim] Rossini, G. and D. Rossi, "Large scale simulation of CCN + networks", Proc. AlgoTel 2012, La Grande Motte, France, + May 2012. + + + + +Pentikousis, et al. Informational [Page 27] + +RFC 7945 ICN Evaluation and Security September 2016 + + + [Cha07] Cha, M., Kwak, H., Rodriguez, P., Ahn, Y.-Y., and S. Moon, + "I tube, you tube, everybody tubes: analyzing the world's + largest user generated content video system", Proceedings + of the 7th ACM SIGCOMM conference on Internet measurement + (IMC '07), San Diego (CA), USA, + DOI 10.1145/1298306.1298309, October 2007. + + [Chaabane13] + Chaabane, A., De Cristofaro, E., Kaafar, M., and E. Uzun, + "Privacy in Content-Oriented Networking: Threats and + Countermeasures", ACM SIGCOMM Computer Communication + Review, Vol. 43, Issue 3, DOI 10.1145/2500098.2500102, + July 2013. + + [Cheng08] Cheng, X., Dale, C., and J. Liu, "Statistics and social + network of YouTube videos", 16th International Workshop on + Quality of Service (IWQoS 2008), IEEE, pp. 229-238, + DOI 10.1109/IWQOS.2008.32, 2008. + + [Cheng13] Cheng, X., Liu, J., and C. Dale, "Understanding the + Characteristics of Internet Short Video Sharing: YouTube + as a Case Study", IEEE Transactions on Multimedia, vol. + 15, issue 5, DOI 10.1109/TMM.2013.2265531, 2013. + + [Chai12] Chai, W., He, D., Psaras, I., and G. Pavlou, "Cache 'Less + for More' in Information-centric Networks", Proceedings of + the 11th international IFIP TC 6 conference on Networking + (IFIP '12), DOI 10.1007/978-3-642-30045-5_3, 2012. + + [Cianci12] Cianci, I. et al. "CCN - Java Opensource Kit EmulatoR for + Wireless Ad Hoc Networks", Proc. of the 7th International + Conference on Future Internet Technologies (CFI '12), + Seoul, Korea, DOI 10.1145/2377310.2377313, September 2012. + + [CMT-D5.2] Beben, A., et al., "Scalability of COMET System", COMET + Project Deliverable D5.2, February 2013. + + [CMT-D6.2] Georgiades, M., et al., "Prototype Experimentation and + Demonstration", COMET Project Deliverable D6.2, February + 2013. + + [Dannewitz10] + Dannewitz, C., Golic, J., Ohlman, B., B. Ahlgren, "Secure + Naming for A Network of Information", IEEE Conference on + Computer Communications Workshops (INFOCOM), San Diego, + CA, DOI 10.1109/INFCOMW.2010.5466661, March 2010. + + + + + +Pentikousis, et al. Informational [Page 28] + +RFC 7945 ICN Evaluation and Security September 2016 + + + [DETERLAB] Benzel, T., "The Science of Cyber-Security + Experimentation: The DETER Project", Proceedings of the + 27th Annual Computer Security Applications Conference + (ACSAC '11), DOI 10.1145/2076732.2076752, December 2011. + + [Dimitropoulos09] + Dimitropoulos, X., et al., "Graph annotations in modeling + complex network topologies", ACM Transactions on Modeling + and Computer Simulation (TOMACS), vol. 19, no. 4, + DOI 10.1145/1596519.1596522, November 2009. + + [DONA] Koponen, T., et al., "A Data-Oriented (and Beyond) Network + Architecture", Proceedings of the 2007 conference on + Applications, technologies, architectures, and protocols + for computer communications (SIGCOMM '07), ACM, + DOI 10.1145/1282380.1282402, 2007. + + [EMULAB] Eide, E., et al., "An Experimentation Workbench for + Replayable Networking Research", Proceedings of the 4th + USENIX conference on Networked systems design & + implementation (NSDI '07), 2007. + + [Fotiou12] Fotiou, N., et al., "Access control enforcement delegation + for information-centric networking architectures", + Proceedings of the second edition of the ICN workshop on + Information-centric networking (ICN '12), ACM, + DOI 10.1145/2342488.2342507, 2012. + + [Fotiou14] Fotiou, N., et al., "A framework for privacy analysis of + ICN architectures", Proc. Second Annual Privacy Forum + (APF), Springer, DOI 10.1007/978-3-319-06749-0_8, 2014. + + [Fri12] Fricker, C., Robert, P., Roberts, J. and N. Sbihi, + "Impact of traffic mix on caching performance in a + content-centric network", 2012 IEEE Conference on Computer + Communications Workshops (INFOCOM WKSHPS), Orlando, USA, + DOI 10.1109/INFCOMW.2012.6193511, March 2012. + + [Goog08] Google, "Official Google Blog: We knew the web was + big...", July 2008, <http://googleblog.blogspot.it/ + 2008/07/we-knew-web-was-big.html>. + + [Guo07] Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X., and X. + Zhang, "A performance study of BitTorrent-like peer-to- + peer systems", IEEE Journal on Selected Areas in + Communication, vol. 25, no. 1, pp. 155-169, + DOI 10.1109/JSAC.2007.070116, 2007. + + + + +Pentikousis, et al. Informational [Page 29] + +RFC 7945 ICN Evaluation and Security September 2016 + + + [HASHROUT] Saino, L., Psaras, I., and G. Pavlou, "Hash-routing + Schemes for Information-Centric Networking", Proceedings + of the 3rd ACM SIGCOMM workshop on Information-centric + networking (ICN '13), DOI 10.1145/2491224.2491232, 2013. + + [Hefeeda08] + Hefeeda, M. and O. Saleh, "Traffic Modeling and + Proportional Partial Caching for Peer-to-Peer Systems", + IEEE/ACM Transactions on Networking, vol. 16, no. 6, pp. + 1447-1460, DOI 10.1109/TNET.2008.918081, 2008. + + [ICARUS] Saino, L., Psaras, I., and G. Pavlou, "Icarus: a Caching + Simulator for Information Centric Networking (ICN)", + Proceedings of the 7th International ICST Conference on + Simulation Tools and Techniques (SimuTools '14), + DOI 10.4108/icst.simutools.2014.254630, 2014. + + [Detti12] Detti, A., et al., "Supporting the Web with an Information + Centric Network that Routes by Name", Elsevier Computer + Networks, vol. 56, no. 17, + DOI 10.1016/j.comnet.2012.08.006, November 2012. + + [ICNSIMS] Tortelli, M., et al., "CCN Simulators: Analysis and Cross- + Comparison", Proceedings of the 1st international + conference on Information-centric networking (ICN '14), + ACM, DOI 10.1145/2660129.2660133, 2014. + + [IMB2014] Imbrenda, C., Muscariello, L., and D. Rossi, "Analyzing + Cacheable Traffic in ISP Access Networks for Micro CDN + Applications via Content-Centric Networking", Proceedings + of the 1st international conference on Information-centric + networking (ICN '14), DOI 10.1145/2660129.2660146, 2014. + + [Ion13] Ion, M., Zhang, J., and E. Schooler, "Toward content- + centric privacy in ICN: attribute-based encryption and + routing", Proceedings of the ACM SIGCOMM 2013 conference + on SIGCOMM (SIGCOMM '13), ACM, + DOI 10.1145/2486001.2491717, 2013. + + [Jacobson09] + Jacobson, V., et al., "Networking Named Content", + Proceedings of the 5th international conference on + Emerging networking experiments and technologies (CoNEXT + '09), DOI 10.1145/1658939.1658941, 2009. + + + + + + + +Pentikousis, et al. Informational [Page 30] + +RFC 7945 ICN Evaluation and Security September 2016 + + + [Katsaros12] + Katsaros, K., Xylomenos, G., and G. Polyzos, "GlobeTraff: + a traffic workload generator for the performance + evaluation of future Internet architectures", 2012 5th + International Conference on New Technologies, Mobility and + Security (NTMS), DOI 10.1109/NTMS.2012.6208742, 2012. + + [Katsaros15] + Katsaros, K., et al., "On the Inter-domain Scalability of + Route-by-Name Information-Centric Network Architectures", + Proc. IFIP Networking Conference, + DOI 10.1109/IFIPNetworking.2015.7145308, 2015. + + [Kaune09] Kaune, S. et al., "Modelling the Internet Delay Space + Based on Geographical Locations", 17th Euromicro + International Conference on Parallel, Distributed and + Network-based Processing, Weimar, Germany, + DOI 10.1109/PDP.2009.44, 2009. + + [Labovitz10] + Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide, + J., and F. Jahanian, "Internet inter-domain traffic", In + Proceedings of the ACM SIGCOMM 2010 conference (SIGCOMM + DOI 10.1145/1851182.1851194, 2010. + + [Lauinger10] + Lauinger, T., "Security and Scalability of Content-Centric + Networking", Masters Thesis, Technische Universitaet + Darmstadt and Eurecom, September 2010. + + [Lauinger12] + Lauinger, Y., et al, "Privacy Risks in Named Data + Networking: What is the Cost of Performance?", ACM SIGCOMM + Computer Communication Review, Vol. 42, Issue 5, + DOI 10.1145/2378956.2378966, 2012. + + [Led12] Lederer, S., Muller, C., and C. Timmerer, "Dynamic + adaptive streaming over HTTP dataset", Proceedings of the + ACM Multimedia Systems Conference (MMSys '12), pp. 89-94, + DOI 10.1145/2155555.2155570, 2012. + + [Lewko11] Lewko, A. and B. Waters, "Decentralizing attribute-based + encryption", Proc. of EUROCRYPT 2011, Lecture Notes in + Computer Science (LNCS), vol. 6632, pp. 568-588, + DOI 10.1007/978-3-642-20465-4_31, 2011. + + + + + + +Pentikousis, et al. Informational [Page 31] + +RFC 7945 ICN Evaluation and Security September 2016 + + + [LIRA] Psaras, I., Katsaros, K., Saino, L., and G. Pavlou, "Lira: + A location independent routing layer based on source- + provided ephemeral names", Electronic and Electrical Eng. + Dept., UCL, London, UK, Tech. Rep. 2014, + <http://www.ee.ucl.ac.uk/comit-project/publications.html>. + + [Mahanti00] + Mahanti, A., Williamson, C., and D. Eager., "Traffic + analysis of a web proxy caching hierarchy", IEEE Network, + Vol. 14, No. 3, pp. 16-23, DOI 10.1109/65.844496, May/June + 2000. + + [Maier09] Maier, G., Feldmann, A., Paxson, V., and M. Allman, "On + dominant characteristics of residential broadband internet + traffic", In Proceedings of the 9th ACM SIGCOMM conference + on Internet measurement conference (IMC '09), New York, + NY, USA, 90-102. DOI 10.1145/1644893.1644904, 2009. + + [Marciniak08] + Marciniak, P., Liogkas, N., Legout, A., and E. Kohler, + "Small is not always beautiful", In Proc. of IPTPS, + International Workshop of Peer-to-Peer Systems, Tampa Bay, + Florida (FL), USA, February 2008. + + [MiniCCNx] Cabral, C., et al., "High fidelity content-centric + experiments with Mini-CCNx", 2014 IEEE Symposium on + Computers and Communications (ISCC), + DOI 10.1109/ISCC.2014.6912537, 2014. + + [Montage] Hussain, A. and J. Chen, "Montage Topology Manager: Tools + for Constructing and Sharing Representative Internet + Topologies", DETER Technical Report, ISI-TR-684, August + 2012. + + [Muscariello11] + Muscariello, L., Carofiglio, G., and M. Gallo, "Bandwidth + and storage sharing performance in information centric + networking", Proceedings of the ACM SIGCOMM workshop on + Information-centric networking (ICN '11), + DOI 10.1145/2018584.2018593, 2011. + + [ndnSIM] Afanasyev, A., et al., "ndnSIM: NDN simulator for NS-3", + NDN Technical Report NDN-0005, Revision 2, October 2012. + + [ndnSIM2] Mastorakis, S., et al., "ndnSIM 2.0: A new version of the + NDN simulator for NS-3", NDN Technical Report NDN-0028, + Revision 1, January 2015. + + + + +Pentikousis, et al. Informational [Page 32] + +RFC 7945 ICN Evaluation and Security September 2016 + + + [NEPI] Quereilhac, A., et al., "NEPI: An integration framework + for Network Experimentation", 2011 19th International + Conference on Software, Telecommunications and Computer + Networks (SoftCOM), IEEE, 2011. + + [OFELIA] Sune, M., et al., "Design and implementation of the OFELIA + FP7 facility: The European OpenFlow testbed", Computer + Networks, vol. 61, pp. 132-150, + DOI 10.1016/j.bjp.2013.10.015, March 2014. + + [ONL] DeHart, J., et al., "The open network laboratory: a + resource for networking research and education", ACM + SIGCOMM Computer Communication Review (CCR), vol. 35, no. + 5, pp. 75-78, DOI 10.1145/1096536.1096547, 2005. + + [Parisis13] + Parisis, G., Trossen, D., and H. Asaeda, "A Node Design + and a Framework for Development and Experimentation for an + Information-Centric Network", IEICE Transactions on + Communications, vol. E96-B, no. 7, pp. 1650-1660, July + 2013. + + [Perino11] Perino, D. and M. Varvello, "A Reality Check for Content + Centric Networking", Proceedings of the ACM SIGCOMM + workshop on Information-centric networking (ICN '11), + DOI 10.1145/2018584.2018596, 2011. + + [PLANETLAB] + Chun, B., et al., "Planetlab: an overlay testbed for + broad-coverage services", ACM SIGCOMM Computer + Communication Review (CCR), vol. 33, no. 3, pp. 3-12, + DOI 10.1145/956993.956995, 2003. + + [PRST4.5] Riihijarvi, J., et al., "Final Architecture Validation and + Performance Evaluation Report", PURSUIT Project + Deliverable D4.5, January 2013. + + [Psaras11] Psaras, I., Clegg, R., Landa, R., Chai, W., Pavlou, G., + "Modelling and Evaluation of CCN-Caching Trees", + Proceedings of the 10th international IFIP TC 6 conference + on Networking, Valencia, Spain, May 2011. + + [Psaras12] Psaras, I., Chai, W., and G. Pavlou, "Probabilistic In- + Network Caching for Information-Centric Networks", + Proceedings of the second edition of the ICN workshop on + Information-centric networking (ICN '12), + DOI 10.1145/2342488.2342501, 2012. + + + + +Pentikousis, et al. Informational [Page 33] + +RFC 7945 ICN Evaluation and Security September 2016 + + + [Quereilhac14] + Quereilhac, A., et al., "Demonstrating a unified ICN + development and evaluation framework", Proceedings of the + 1st international conference on Information-centric + networking (ICN '14), ACM, DOI 10.1145/2660129.2660132, + 2014. + + [Renault09] + Renault, E., Ahmad, A., and M. Abid, "Toward a Security + Model for the Future Network of Information", Proceedings + of the 4th International Conference on Ubiquitous + Information Technologies & Applications (ICUT '09), IEEE, + DOI 10.1109/ICUT.2009.5405676, 2009. + + [RFC2330] Paxson, V., Almes, G., Mahdavi, J., and M. Mathis, + "Framework for IP Performance Metrics", RFC 2330, + DOI 10.17487/RFC2330, May 1998, + <http://www.rfc-editor.org/info/rfc2330>. + + [RFC5743] Falk, A., "Definition of an Internet Research Task Force + (IRTF) Document Stream", RFC 5743, DOI 10.17487/RFC5743, + December 2009, <http://www.rfc-editor.org/info/rfc5743>. + + [RFC6920] Farrell, S., Kutscher, D., Dannewitz, C., Ohlman, B., + Keranen, A., and P. Hallam-Baker, "Naming Things with + Hashes", RFC 6920, DOI 10.17487/RFC6920, April 2013, + <http://www.rfc-editor.org/info/rfc6920>. + + [RFC7476] Pentikousis, K., Ed., Ohlman, B., Corujo, D., Boggia, G., + Tyson, G., Davies, E., Molinaro, A., and S. Eum, + "Information-Centric Networking: Baseline Scenarios", + RFC 7476, DOI 10.17487/RFC7476, March 2015, + <http://www.rfc-editor.org/info/rfc7476>. + + [RFC7927] Kutscher, D., Ed., Eum, S., Pentikousis, K., Psaras, I., + Corujo, D., Saucez, D., Schmidt, T., and M. Waehlisch, + "Information-Centric Networking (ICN) Research + Challenges", RFC 7927, DOI 10.17487/RFC7927, July 2016, + <http://www.rfc-editor.org/info/rfc7927>. + + [RFC7933] Westphal, C., Ed., Lederer, S., Posch, D., Timmerer, C., + Azgin, A., Liu, W., Mueller, C., Detti, A., Corujo, D., + Wang, J., Montpetit, M., and N. Murray, "Adaptive Video + Streaming over Information-Centric Networking (ICN)", + RFC 7933, DOI 10.17487/RFC7933, August 2016, + <http://www.rfc-editor.org/info/rfc7933>. + + + + + +Pentikousis, et al. Informational [Page 34] + +RFC 7945 ICN Evaluation and Security September 2016 + + + [SAIL-B2] SAIL, "NetInf Content Delivery and Operations", SAIL + Project Deliverable D-B.2, May 2012. + + [SAIL-B3] Kutscher, D., Ed., et al., "Final NetInf Architecture", + SAIL Project Deliverable D-B.3, January 2013, + <http://www.sail-project.eu/deliverables/>. + + [Saino13] Saino, L., Cocora, C., and G. Pavlou, "A Toolchain for + Simplifying Network Simulation Setup", Proceedings of the + 6th International ICST Conference on Simulation Tools and + Techniques (SimuTools '13), 2013. + + [Saleh06] Saleh, O., and M. Hefeeda, "Modeling and caching of peer- + to-peer traffic", Proceedings of the 2006 IEEE + International Conference on Network Protocols (ICNP), + DOI 10.1109/ICNP.2006.320218, 2006. + + [Salsano12] + Salsano, S., et al., "Transport-Layer Issues in + Information Centric Networks", Proceedings of the second + edition of the ICN workshop on Information-centric + networking (ICN '12), ACM, DOI 10.1145/2342488.2342493, + 2012. + + [Salsano13] + Salsano, S., et al., "Information Centric Networking over + SDN and OpenFlow: Architectural Aspects and Experiments on + the OFELIA Testbed", Computer Networks, vol. 57, no. 16, + pp. 3207-3221, DOI 10.1016/j.comnet.2013.07.031, November + 2013. + + [SensReqs] Karnouskos, S., et al., "Requirement considerations for + ubiquitous integration of cooperating objects", 2011 4th + IFIP International Conference on New Technologies, + Mobility and Security (NTMS), + DOI 10.1109/NTMS.2011.5720605, 2011. + + [Smetters09] + Smetters, D., and V. Jacobson, "Securing network content", + Technical Report TR-2009-01, PARC, 2009. + + [Sourlas15] + Sourlas, V., Tassiulas, L., Psaras, I., and G. Pavlou, + "Information Resilience through User-Assisted Caching in + Disruptive Content-Centric Networks", 14th IFIP Networking + Conference, Toulouse, France, + DOI 10.1109/IFIPNetworking.2015.7145301, May 2015. + + + + +Pentikousis, et al. Informational [Page 35] + +RFC 7945 ICN Evaluation and Security September 2016 + + + [Tagger12] Tagger, B., et al., "Update on the Architecture and Report + on Security Analysis", Deliverable 2.4, PURSUIT EU FP7 + project, April 2012. + + [Tourani16] + Tourani, R., Mick, T., Misra, S., and G. Panwar, + "Security, Privacy, and Access Control in Information- + Centric Networking: A Survey", arXiv:1603.03409, March + 2016. + + [VoCCN] Jacobson, V., et al., "VoCCN: Voice-over Content-Centric + Networks", Proceedings of the 2009 workshop on Re- + architecting the internet (ReArch '09), + DOI 10.1145/1658978.1658980, 2009. + + [Watts98] Watts, D. J. and S. H. Strogatz, "Collective dynamics of + 'small-world' networks", Nature, vol. 393, no. 6684, pp. + 440-442, DOI 10.1038/30918, April 1998. + + [Yu06] Yu, H., Zheng, D., Zhao, B., and W. Zheng, "Understanding + user behavior in large-scale video-on-demand systems", ACM + SIGOPS Operating Systems Review - Proceedings of the 2006 + EuroSys conference, Vol. 40, Issue 4, pp. 333-344, + DOI 10.1145/1218063.1217968, April 2006. + + [Zhang10a] Zhang, C., Dhungel, P., Wu, D., and K. Ross, "Unraveling + the BitTorrent Ecosystem", IEEE Transactions on Parallel + and Distributed Systems, vol. 22, issue 7, pp. 1164-1177, + DOI 10.1109/TPDS.2010.123, 2010. + + [Zhang10b] Zhang, L., et al., "Named Data Networking (NDN) Project", + NDN Technical Report NDN-0001, October 2010, + <http://named-data.net/publications/techreports/>. + + [Zhou11] Zhou, J., Li, Y., Adhikari, K., and Z.-L. Zhang, + "Counting YouTube videos via random prefix sampling", + Proceedings of the 2011 ACM SIGCOMM conference on Internet + measurement conference (IMC '11), Berlin, Germany, + DOI 10.1145/2068816.2068851, November 2011. + + + + + + + + + + + + +Pentikousis, et al. Informational [Page 36] + +RFC 7945 ICN Evaluation and Security September 2016 + + +Acknowledgments + + Konstantinos Katsaros contributed the updated text of Section 2.2 + along with an extensive set of references. + + Priya Mahadevan, Daniel Corujo, and Gareth Tyson contributed to a + draft version of this document. + + This document has benefited from reviews, pointers to the growing ICN + literature, suggestions, comments, and proposed text provided by the + following members of the IRTF Information-Centric Networking Research + Group (ICNRG), listed in alphabetical order: Marica Amadeo, Hitoshi + Asaeda, E. Baccelli, Claudia Campolo, Christian Esteve Rothenberg, + Suyong Eum, Nikos Fotiou, Dorothy Gellert, Luigi Alfredo Grieco, + Myeong-Wuk Jang, Ren Jing, Will Liu, Antonella Molinaro, Luca + Muscariello, Ioannis Psaras, Dario Rossi, Stefano Salsano, Damien + Saucez, Dirk Trossen, Jianping Wang, Yuanzhe Xuan, and Xinwen Zhang. + + The IRSG review was provided by Aaron Falk. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Pentikousis, et al. Informational [Page 37] + +RFC 7945 ICN Evaluation and Security September 2016 + + +Authors' Addresses + + Kostas Pentikousis (editor) + Travelping + Koernerstr. 7-10 + 10785 Berlin + Germany + + Email: k.pentikousis@travelping.com + + + Borje Ohlman + Ericsson Research + S-16480 Stockholm + Sweden + + Email: Borje.Ohlman@ericsson.com + + + Elwyn Davies + Trinity College Dublin/Folly Consulting Ltd + Dublin, 2 + Ireland + + Email: davieseb@scss.tcd.ie + + + Spiros Spirou + Intracom Telecom + 19.7 km Markopoulou Avenue + 19002 Peania, Athens + Greece + + Email: spis@intracom-telecom.com + + + Gennaro Boggia + Dept. of Electrical and Information Engineering + Politecnico di Bari + Via Orabona 4 + 70125 Bari + Italy + + Email: g.boggia@poliba.it + + + + + + + +Pentikousis, et al. Informational [Page 38] + |