Match!

Cache attacks on blockchain based information centric networks: an experimental evaluation

Published on Jan 4, 2019 in ICDCN (International Conference of Distributed Computing and Networking)
· DOI :10.1145/3288599.3288640
Swapnoneel Roy4
Estimated H-index: 4
(UNF: University of North Florida),
Faustina J. Anto Morais1
Estimated H-index: 1
(UNF: University of North Florida)
+ 1 AuthorsMainak Chatterjee26
Estimated H-index: 26
(UCF: University of Central Florida)
Sources
Abstract
Protecting and securing data that reside at various hosts in the Internet has become more important than ever before because of the growing number of cyber attacks. Though there have been several studies related to denial of service and cache attacks, those studies are primarily based on simulations and investigations of attacks on real networks are still lacking. In this paper, we experimentally investigated the effects of cache attacks on blockchain based information-centric networks. We used the hyperledger fabric to implement the blockchains for small and medium-sized networks. We implemented cache attacks where the attacker target the cache with unpopular content, forcing the user to fetch the data from the web servers. We experimented with two different topologies (linear and mesh) and also considered two cache sizes at the nodes. Three cache replacement policies were used: Least Recently Used, Random, and First In First Out. The cache hit, time taken to get the data, and the number of hops to serve the request were obtained with real network traffic. On the hyperledger fabric framework, we implemented two types of requests and showed how the query delay, invoke delay, and update delay vary with time. Based on our results, we find that most of the information centric networks, including the ones based on blockchains, are vulnerable to cache attacks.
  • References (31)
  • Citations (2)
📖 Papers frequently viewed together
2012INFOCOM: International Conference on Computer Communications
3 Authors (Mengjun Xie, ..., Haining Wang)
95 Citations
7 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
References31
Newest
1 CitationsSource
#1Victor OrtegaH-Index: 1
#2Faiza BouchmalH-Index: 1
Last. Jose F. Monserrat (Polytechnic University of Valencia)H-Index: 16
view all 3 authors...
Vehicular communications, though a reality, must continue to evolve to support higher throughput and, above all, ultralow latency to accommodate new use cases, such as the fully autonomous vehicle. Cybersecurity must be assured since the risk of losing control of vehicles if a country were to come under attack is a matter of national security. This article presents the technological enablers that ensure security requirements are met. Under the umbrella of a dedicated network slice, this article ...
11 CitationsSource
Oct 1, 2017 in CIC (Color Imaging Conference)
#1Mehrdad Salimitari (UCF: University of Central Florida)H-Index: 2
#2Mainak Chatterjee (UCF: University of Central Florida)H-Index: 26
Last. Eduardo L. Pasiliao (AFRL: Air Force Research Laboratory)H-Index: 13
view all 4 authors...
It is predicted that cryptocurrencies will play an important role in the global economy. Therefore, it is prudent for us to understand the importance and monetary value of such cryptocurrencies, and strategize our investments accordingly. One of the ways to obtain cryptocurrency is via mining. As solo mining is not possible because of the computational requirements, pool mining has gained popularity. In this paper, we focus on Bitcoin and its pools. With more than 20 pools in the network of Bitc...
6 CitationsSource
The constant rise of over-the-top video consumption nowadays challenges the current Internet architecture. In this article, we propose a user-centric approach that helps the necessary reshaping of the content delivery ecosystem. We study how blockchain-powered smart contracts and network service chaining can be exploited to support such novel collaboration schemes. Finally, our findings suggest that the proposed solution can complement existing technologies by supporting a wide range of business...
23 CitationsSource
#1Val A. Red (AFRL: Air Force Research Laboratory)H-Index: 2
Existing distributed ledger implementations – specifically, several blockchain implementations – embody a cacophony of divergent capabilities augmenting innovations of cryptographic hashes, consensus mechanisms, and asymmetric cryptography in a wide variety of applications. Whether specifically designed for cryptocurrency or otherwise, several distributed ledgers rely upon modular mechanisms such as consensus or smart contracts. These components, however, can vary substantially among implementat...
6 CitationsSource
#1Mohsen Karimzadeh Kiskani (UCSC: University of California, Santa Cruz)H-Index: 7
#2Hamid R. Sadjadpour (UCSC: University of California, Santa Cruz)H-Index: 21
The next generation of cellular networks deploying wireless distributed femtocaching infrastructure proposed by Golrezaei et al. is studied. By taking advantage of multihop communications in each cell, the number of required femtocaching helpers is significantly reduced. This reduction is achieved by using underutilized storage and communication capabilities in user terminals, which results in reducing the deployment costs of distributed femtocaches. A multihop index coding technique is proposed...
24 CitationsSource
#1Mohsen Karimzadeh Kiskani (UCSC: University of California, Santa Cruz)H-Index: 7
#2Hamid R. Sadjadpour (UCSC: University of California, Santa Cruz)H-Index: 21
Decentralized coded content caching for next generation cellular networks is studied. The contents are linearly combined and cached in under-utilized caches of user terminals and its throughput capacity is compared with decentralized uncoded content caching. In both scenarios, we consider multihop device-to-device communications and the use of femtocaches in the network. It is shown that decentralized coded content caching can increase the network throughput capacity compared to decentralized un...
18 CitationsSource
#1Jeffery Gouge (UNF: University of North Florida)H-Index: 1
#2Anand Seetharam (California State University, Monterey Bay)H-Index: 9
Last. Swapnoneel Roy (UNF: University of North Florida)H-Index: 4
view all 3 authors...
With the exponential growth of content, the Internet is undergoing a transformation from a host-centric approach to a content-centric one, popularly known as an Information Centric Networks (ICN). ICN aims to improve user performance by incorporating in-network caching at storage enabled nodes. In this paper, we explore the scalability and effectiveness of a targeted denial of service attack (DoS) designed for ICN [1]. In this attack, malicious nodes periodically request unpopular content, there...
3 CitationsSource
In recently proposed information centric networks (ICN), a user issues “interest” packets to retrieve contents from network by names. Once fetched from origin servers, “data” packets are replicated and cached in all routers along routing and forwarding paths, thus allowing further interests from other users to be fulfilled quickly. However, the way ICN caching and interest fulfillment work poses a great privacy risk: the time difference between responses for an interest of cached and uncached co...
20 CitationsSource
#1Eslam G. AbdAllah (Queen's University)H-Index: 4
#2Hossam S. Hassanein (Queen's University)H-Index: 36
Last. Mohammad Zulkernine (Queen's University)H-Index: 25
view all 3 authors...
Information-centric networking (ICN) is a new communication paradigm that focuses on content retrieval from a network regardless of the storage location or physical representation of this content. In ICN, securing the content itself is much more important than securing the infrastructure or the endpoints. To achieve the security goals in this new paradigm, it is crucial to have a comprehensive understanding of ICN attacks, their classification, and proposed solutions. In this paper, we provide a...
73 CitationsSource
Cited By2
Newest
#1Mehrdad Salimitari (UCF: University of Central Florida)H-Index: 2
#2Shameek Bhattacharjee (WMU: Western Michigan University)H-Index: 7
Last. Yaser P. Fallah (UCF: University of Central Florida)H-Index: 17
view all 4 authors...
As Internet of Things (IoT) and Cyber-Physical systems become more ubiquitous and an integral part of our daily lives, it is important that we are able to trust the data aggregate from such systems. However, the interpretation of trustworthiness is contextual and varies according to the risk tolerance attitude of the concerned application and varying levels of uncertainty associated with the evidence upon which trust models act. Hence, the data integrity scoring mechanisms should have provisions...
Source
#1Qiuyun Lyu (Hangzhou Dianzi University)H-Index: 1
#2Yizhen Qi (Hangzhou Dianzi University)
Last. Ning Zheng (Hangzhou Dianzi University)H-Index: 7
view all 6 authors...
Abstract The information-centric networking (ICN) has been proposed to meet the increasing demand for efficient content delivery. However, the in-network caching mechanism of ICN makes it hard to provide data security and privacy for content providers (CPs). Although many access control schemes are proposed to improve the security of ICN, there are still some problems unsolved. On the one hand, in spite of the centralized access control schemes are proposed to improve the security of data sharin...
Source
#1Mehrdad SalimitariH-Index: 2
#2Mainak Chatterjee (UCF: University of Central Florida)H-Index: 26
The success of blockchain as the underlying technology for cryptocurrencies has opened up possibilities for its use in other application domains as well. The main advantages of blockchain for its potential use in other domains are its inherent security mechanisms and immunity to different attacks. A blockchain relies on a consensus method for agreeing on any new data. Most of the consensus methods which are currently used for the blockchain of different cryptocurrencies require high computationa...
2 Citations