Skip to main content

Study of Censorship in Named Data Networking

  • Conference paper
  • First Online:
Advanced Multimedia and Ubiquitous Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 354))

  • 1404 Accesses

Abstract

Named Data Networking (NDN) (Zhang et al. in Named data networking (ndn) project. Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC, 2010) focuses on content rather than hosts as in today’s IP-based network. While NDN aims to incorporate security into its design, some security issues such as censorship in NDN has not been studied. This paper aims to investigate the robustness of file transmission in NDN in the face of censorship. We mainly focus on two types of censorship techniques: name-watchlist attack and deep packet inspection (DPI). We show by simulation that file transmission in NDN is robuster than that in IP-based network since NDN allows multiple outgoing faces when forwarding an Interest packet. Despite of this, we show that censorship in NDN still affects users to get their requested data and therefore anti-censorship is necessary. We further propose an anti-censorship system against these two censorship techniques. We give the system design along with the security analysis and performance evaluation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, L., Estrin, D., Burke, J., et al.: Named data networking (ndn) project. Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC (2010)

    Google Scholar 

  2. Leberknight, C.S., Chiang, M., Poor, H.V., et al.: A taxonomy of internet censorship and anti-censorship. In: Fifth International Conference on Fun with Algorithms (2010)

    Google Scholar 

  3. Arianfar, S., Koponen, T., Raghavan, B., et al.: On preserving privacy in content-oriented networks. In: Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking. ACM, pp. 19–24 (2011)

    Google Scholar 

  4. Stubblefield, A.B., Dagster, W.D.S.: Censorship-resistant publishing without replication. Rice University, Department of Computer Science, Tech. Rep. TR01-380 (2001)

    Google Scholar 

  5. Afanasyev, A., Moiseenko, I., Zhang, L.: ndnSIM: NDN simulator for NS-3. University of California, Los Angeles, Tech. Rep. (2012)

    Google Scholar 

  6. Rocketfuel. http://research.cs.washington.edu/networking/rocketfuel/

Download references

Acknowledgments

The work described in this paper was partially supported by the HKU Seed Fundings for Applied Research 201409160030, and HKU Seed Fundings for Basic Research 201311159149 and 201411159122.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xingmin Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cui, X., Hui, L.C.K., Yiu, S.M., Tsang, Y.H. (2016). Study of Censorship in Named Data Networking. In: Park, J., Chao, HC., Arabnia, H., Yen, N. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47895-0_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47895-0_18

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47894-3

  • Online ISBN: 978-3-662-47895-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics