Publications from conferences, workshops, and journals are listed below. Please also see the NDN Technical Reports and Technical Presentations.
2024
Zhang, Zhiyi; Xiao, Guorui; Song, Sichen; Aygun, R. Can; Stavrou, Angelos; Zhang, Lixia; Osterweil, Eric
Revealing the Architectural Design Patterns in the Volumetric DDoS Defense Design Space Journal Article
In: 2024.
Links | BibTeX | Tags: Security
@article{Zhang_2024,
title = {Revealing the Architectural Design Patterns in the Volumetric DDoS Defense Design Space},
author = {Zhiyi Zhang and Guorui Xiao and Sichen Song and R. Can Aygun and Angelos Stavrou and Lixia Zhang and Eric Osterweil},
url = {http://dx.doi.org/10.36227/techrxiv.23245082.v2},
doi = {10.36227/techrxiv.23245082.v2},
year = {2024},
date = {2024-05-01},
urldate = {2024-05-01},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
keywords = {Security},
pubstate = {published},
tppubtype = {article}
}
Yu, Tianyuan; Ma, Xinyu; Patil, Varun; Kocaogullar, Yekta; Zhang, Yulong; Burke, Jeff; Kutscher, Dirk; Zhang, Lixia
Secure Web Objects: Building Blocks for Metaverse Interoperability and Decentralization Journal Article
In: arXiv preprint arXiv:2407.15221, 2024.
BibTeX | Tags: decentralization, Security
@article{yu2024secure,
title = {Secure Web Objects: Building Blocks for Metaverse Interoperability and Decentralization},
author = {Tianyuan Yu and Xinyu Ma and Varun Patil and Yekta Kocaogullar and Yulong Zhang and Jeff Burke and Dirk Kutscher and Lixia Zhang},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
journal = {arXiv preprint arXiv:2407.15221},
keywords = {decentralization, Security},
pubstate = {published},
tppubtype = {article}
}
Yu, Tianyuan; Ma, Xinyu; Patil, Varun; Kocaogullar, Yekta; Zhang, Lixia
Exploring the Design of Collaborative Applications via the Lens of NDN Workspace Journal Article
In: arXiv preprint arXiv:2407.15234, 2024.
BibTeX | Tags: Applications
@article{yu2024exploring,
title = {Exploring the Design of Collaborative Applications via the Lens of NDN Workspace},
author = {Tianyuan Yu and Xinyu Ma and Varun Patil and Yekta Kocaogullar and Lixia Zhang},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
journal = {arXiv preprint arXiv:2407.15234},
keywords = {Applications},
pubstate = {published},
tppubtype = {article}
}
Zhang, Zhiyi; Xiao, Guorui; Song, Sichen; Aygun, R. Can; Stavrou, Angelos; Zhang, Lixia; Osterweil, Eric
Revealing the Architectural Design Patterns in the Volumetric DDoS Defense Design Space Journal Article
In: 2024.
Links | BibTeX | Tags: Security
@article{Zhang_2024b,
title = {Revealing the Architectural Design Patterns in the Volumetric DDoS Defense Design Space},
author = {Zhiyi Zhang and Guorui Xiao and Sichen Song and R. Can Aygun and Angelos Stavrou and Lixia Zhang and Eric Osterweil},
url = {http://dx.doi.org/10.36227/techrxiv.23245082.v2},
doi = {10.36227/techrxiv.23245082.v2},
year = {2024},
date = {2024-05-01},
urldate = {2024-05-01},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
keywords = {Security},
pubstate = {published},
tppubtype = {article}
}
Yu, Tianyuan; Kong, Zhaoning; Ma, Xinyu; Wang, Lan; Zhang, Lixia
PythonRepo: Persistent In-Network Storage for Named Data Networking Proceedings Article
In: 2024 International Conference on Computing, Networking and Communications (ICNC), pp. 927-931, 2024.
Links | BibTeX | Tags: Applications, Storage
@inproceedings{10556243,
title = {PythonRepo: Persistent In-Network Storage for Named Data Networking},
author = {Tianyuan Yu and Zhaoning Kong and Xinyu Ma and Lan Wang and Lixia Zhang},
doi = {10.1109/ICNC59896.2024.10556243},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
booktitle = {2024 International Conference on Computing, Networking and Communications (ICNC)},
pages = {927-931},
keywords = {Applications, Storage},
pubstate = {published},
tppubtype = {inproceedings}
}
Presley, Justin; Wang, Xi; Ai, Xusheng; Yu, Tianyuan; Brandel, Tym; Podder, Proyash; Patil, Varun; Afanasyev, Alex; Feltus, F. Alex; Zhang, Lixia; Shannigrahi, Susmit
Hydra: A Scalable Decentralized P2P Storage Federation for Large Scientific Datasets Proceedings Article
In: 2024 International Conference on Computing, Networking and Communications (ICNC), pp. 810-816, 2024.
Links | BibTeX | Tags: Applications, Storage
@inproceedings{10556269,
title = {Hydra: A Scalable Decentralized P2P Storage Federation for Large Scientific Datasets},
author = {Justin Presley and Xi Wang and Xusheng Ai and Tianyuan Yu and Tym Brandel and Proyash Podder and Varun Patil and Alex Afanasyev and F. Alex Feltus and Lixia Zhang and Susmit Shannigrahi},
doi = {10.1109/ICNC59896.2024.10556269},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
booktitle = {2024 International Conference on Computing, Networking and Communications (ICNC)},
pages = {810-816},
keywords = {Applications, Storage},
pubstate = {published},
tppubtype = {inproceedings}
}
2023
Yu, Tianyuan; Xie, Hongcheng; Liu, Siqi; Ma, Xinyu; Patil, Varun; Jia, Xiaohua; Zhang, Lixia
CLedger: A Secure Distributed Certificate Ledger via Named Data Proceedings Article
In: ICC 2023 - IEEE International Conference on Communications, pp. 5091–5096, 2023, (ISSN: 1938-1883).
Abstract | Links | BibTeX | Tags: Security, trust management
@inproceedings{yu_cledger_2023,
title = {CLedger: A Secure Distributed Certificate Ledger via Named Data},
author = {Tianyuan Yu and Hongcheng Xie and Siqi Liu and Xinyu Ma and Varun Patil and Xiaohua Jia and Lixia Zhang},
url = {https://ieeexplore.ieee.org/abstract/document/10279244},
doi = {10.1109/ICC45041.2023.10279244},
year = {2023},
date = {2023-05-01},
urldate = {2023-05-01},
booktitle = {ICC 2023 - IEEE International Conference on Communications},
pages = {5091–5096},
abstract = {Named-Data Networking (NDN) is a novel network that secures network communication by fetching semantically named and secured data. All data packets in NDN are signed by producers and verified by data consumers. Therefore, it is vital to have producers' certificates available all the time. In this paper, we describe the design of CLedger, a secure distributed certificate ledger, to ensure certificate availability in NDN. CLedger logs certificate records in an immutable Directed Acyclic Graph (DAG) structure and replicates the DAG among a set of distributed loggers. We implemented CLedger using NDN's pub/sub API, and evaluated our design through an emulated deployment setting. Our initial evaluation results show that CLedger is effective, efficient, and resilient to failures.},
note = {ISSN: 1938-1883},
keywords = {Security, trust management},
pubstate = {published},
tppubtype = {inproceedings}
}
Patil, Varun; Yu, Tianyuan; Ma, Xinyu; Zhang, Lixia
Decentralized Photo Sharing via Named Data Networking Proceedings Article
In: Proceedings of the 10th ACM Conference on Information-Centric Networking, pp. 118–120, Association for Computing Machinery, New York, NY, USA, 2023, ISBN: 9798400704031.
Abstract | Links | BibTeX | Tags: Applications, decentralization, distributed system, file sharing
@inproceedings{patil_decentralized_2023,
title = {Decentralized Photo Sharing via Named Data Networking},
author = {Varun Patil and Tianyuan Yu and Xinyu Ma and Lixia Zhang},
url = {https://dl.acm.org/doi/10.1145/3623565.3623755},
doi = {10.1145/3623565.3623755},
isbn = {9798400704031},
year = {2023},
date = {2023-10-01},
urldate = {2023-10-01},
booktitle = {Proceedings of the 10th ACM Conference on Information-Centric Networking},
pages = {118–120},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
series = {ACM ICN '23},
abstract = {The semantic naming and data-centric security paradigm of Named Data Networking opens up new possibilities for building decentralized applications. In this poster, we identify some factors that lead to centralization and non-interoperability of cloud services. We present the preliminary design of a photo sharing application as a simple example to articulate how NDN can overcome the lack of cloud-independent user identities, illustrating the process and considerations involved in designing decentralized applications that can provide the features offered by existing cloud services.},
keywords = {Applications, decentralization, distributed system, file sharing},
pubstate = {published},
tppubtype = {inproceedings}
}
Liang, Teng; Huang, Wei; Ma, Xinyu; Zhang, Weizhe; Zhang, Yu; Zhang, Beichuan
PCLive: Bringing Named Data Networking to Internet Livestreaming Proceedings Article
In: Proceedings of the 10th ACM Conference on Information-Centric Networking, pp. 36–45, Association for Computing Machinery, New York, NY, USA, 2023, ISBN: 9798400704031.
Abstract | Links | BibTeX | Tags: Applications, NDNizing applications, network measurement, protocol translation, realtime data distribution
@inproceedings{liang_pclive_2023,
title = {PCLive: Bringing Named Data Networking to Internet Livestreaming},
author = {Teng Liang and Wei Huang and Xinyu Ma and Weizhe Zhang and Yu Zhang and Beichuan Zhang},
url = {https://dl.acm.org/doi/10.1145/3623565.3623711},
doi = {10.1145/3623565.3623711},
isbn = {9798400704031},
year = {2023},
date = {2023-10-01},
urldate = {2023-10-01},
booktitle = {Proceedings of the 10th ACM Conference on Information-Centric Networking},
pages = {36–45},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
series = {ACM ICN '23},
abstract = {The lack of application support is probably the biggest obstacle to ICN/NDN deployment. One approach to tackle this problem is to NDNize existing applications by translating between application-level protocols and NDN, which can benefit from NDN's architectural advantages while minimizing development efforts needed. In this paper, we validate the effectiveness of this approach by applying it to Internet livestreaming, and develop PCLive, a livestreaming system with NDN embedded as its distribution network. PCLive makes minimal changes to an Internet livestreaming architecture, achieving the maximum compatibility with existing components including video players, OBS, and video transcoders. By solving a number of design issues such as HLS/NDN protocol translation, data translation, naming and security, PCLive is able to run over an NDN network and enjoy its architectural benefits. Since December 2021, PCLive has been running on an NDN testbed consisting of cloud servers from seven cities. It can serve almost four times as many clients as an existing livestreaming system can over IP under the same network conditions; at the same time, the average throughput of the bottleneck link in the NDN testbed is 34.8% lower than that in IP. We also evaluate congestion control and adaptive forwarding with PCLive.},
keywords = {Applications, NDNizing applications, network measurement, protocol translation, realtime data distribution},
pubstate = {published},
tppubtype = {inproceedings}
}
Yu, Tianyuan; Ma, Xinyu; Xie, Hongcheng; Kocaoğullar, Yekta; Zhang, Lixia
A New API in Support of NDN Trust Schema Proceedings Article
In: Proceedings of the 10th ACM Conference on Information-Centric Networking, pp. 46–54, Association for Computing Machinery, New York, NY, USA, 2023, ISBN: 9798400704031.
Abstract | Links | BibTeX | Tags: API, Security, trust schema
@inproceedings{yu_new_2023,
title = {A New API in Support of NDN Trust Schema},
author = {Tianyuan Yu and Xinyu Ma and Hongcheng Xie and Yekta Kocaoğullar and Lixia Zhang},
url = {https://dl.acm.org/doi/10.1145/3623565.3623709},
doi = {10.1145/3623565.3623709},
isbn = {9798400704031},
year = {2023},
date = {2023-10-01},
urldate = {2023-10-01},
booktitle = {Proceedings of the 10th ACM Conference on Information-Centric Networking},
pages = {46–54},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
series = {ACM ICN '23},
abstract = {The decade-long experiences from developing applications over Named Data Networking (NDN) have taught us the importance of well-designed libraries that offer support to application developers to support data security. NDN trust schema provides a critical component in the NDN security support, however its implementation and support only started receiving significant attention in recent years. This paper first provides a summary of the existing API support for trust schema, then takes a step forward by developing a new trust schema API, named Envelope. Envelope addresses the application requirements by offering comprehensive trust schema functionalities, an easy-to-write schema language, and an extensible design. To demonstrate the usefulness of Envelope, we develop a blog application which uses Envelope to secure its data. Our results show that Envelope provides effective trust schema support for applications with acceptable overhead.},
keywords = {API, Security, trust schema},
pubstate = {published},
tppubtype = {inproceedings}
}
Yu, Tianyuan; Ma, Xinyu; Xie, Hongcheng; Jia, Xiaohua; Zhang, Lixia
On the Security Bootstrapping in Named Data Networking Miscellaneous
2023.
Abstract | Links | BibTeX | Tags: Bootstrapping, Security
@misc{yu_security_2023,
title = {On the Security Bootstrapping in Named Data Networking},
author = {Tianyuan Yu and Xinyu Ma and Hongcheng Xie and Xiaohua Jia and Lixia Zhang},
url = {https://arxiv.org/abs/2308.06490v1},
year = {2023},
date = {2023-08-01},
urldate = {2023-08-01},
journal = {arXiv.org},
abstract = {By requiring all data packets been cryptographically authenticatable, the Named Data Networking (NDN) architecture design provides a basic building block for secured networking. This basic NDN function requires that all entities in an NDN network go through a security bootstrapping process to obtain the initial security credentials. Recent years have witnessed a number of proposed solutions for NDN security bootstrapping protocols. Built upon the existing results, in this paper we take the next step to develop a systematic model of security bootstrapping: Trust-domain Entity Bootstrapping (TEB). This model is based on the emerging concept of trust domain and describes the steps and their dependencies in the bootstrapping process. We evaluate the expressiveness and sufficiency of this model by using it to describe several current bootstrapping protocols.},
keywords = {Bootstrapping, Security},
pubstate = {published},
tppubtype = {misc}
}
Patil, Varun; Otsu, Seiji; Zhang, Lixia
Timers in State Vector Sync Proceedings Article
In: Proceedings of the 10th ACM Conference on Information-Centric Networking, pp. 115–117, Association for Computing Machinery, New York, NY, USA, 2023, ISBN: 9798400704031.
Abstract | Links | BibTeX | Tags: Applications, distributed dataset synchronization, state vector sync, Sync
@inproceedings{patil_timers_2023,
title = {Timers in State Vector Sync},
author = {Varun Patil and Seiji Otsu and Lixia Zhang},
url = {https://dl.acm.org/doi/10.1145/3623565.3623754},
doi = {10.1145/3623565.3623754},
isbn = {9798400704031},
year = {2023},
date = {2023-10-01},
urldate = {2023-10-01},
booktitle = {Proceedings of the 10th ACM Conference on Information-Centric Networking},
pages = {115–117},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
series = {ACM ICN '23},
abstract = {State Vector Sync (SVS) is a Distributed Dataset Synchronization (Sync) protocol designed to support distributed applications running over NDN. The design of SVS has two unique features that set it apart from all the previous Sync protocol designs. First, SVS encodes the raw information of data namespace to be synchronized in its Sync Interest packets. Second, and related, it uses Sync Interests as notifications which do not solicit data replies. To reveal insights of how its unique design features enable SVS to outperform its counterparts, in this poster we describe the operation of two types of timers used in SVS and their effectiveness in minimizing protocol overhead while keeping synchronization delay low.},
keywords = {Applications, distributed dataset synchronization, state vector sync, Sync},
pubstate = {published},
tppubtype = {inproceedings}
}
Dulal, Saurab; Wang, Lan
Reining in Redundant Traffic through Adaptive Duplicate Suppression in Multi-Access NDN Networks Proceedings Article
In: Proceedings of the 10th ACM Conference on Information-Centric Networking, pp. 78–87, 2023.
Links | BibTeX | Tags: Forwarding, Forwarding Strategy
@inproceedings{dulal2023reining,
title = {Reining in Redundant Traffic through Adaptive Duplicate Suppression in Multi-Access NDN Networks},
author = {Saurab Dulal and Lan Wang},
url = {https://dl.acm.org/doi/abs/10.1145/3623565.3623717},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Proceedings of the 10th ACM Conference on Information-Centric Networking},
pages = {78–87},
keywords = {Forwarding, Forwarding Strategy},
pubstate = {published},
tppubtype = {inproceedings}
}
Wang, Lan; Lane, Alexander; Serban, Constantin; Elwell, Jesse; Afanasyev, Alex; Zhang, Lixia
Investigating the Synergy between Routing and Forwarding Strategy in NDN Networks Proceedings Article
In: Proceedings of the 10th ACM Conference on Information-Centric Networking, pp. 67–77, 2023.
Links | BibTeX | Tags: Forwarding, Forwarding Strategy, Routing
@inproceedings{wang2023investigating,
title = {Investigating the Synergy between Routing and Forwarding Strategy in NDN Networks},
author = {Lan Wang and Alexander Lane and Constantin Serban and Jesse Elwell and Alex Afanasyev and Lixia Zhang},
url = {https://dl.acm.org/doi/10.1145/3623565.3623714},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Proceedings of the 10th ACM Conference on Information-Centric Networking},
pages = {67–77},
keywords = {Forwarding, Forwarding Strategy, Routing},
pubstate = {published},
tppubtype = {inproceedings}
}
Townley, Daniel; Kim, Young; Douglis, Fred; Elwell, Jesse; Serban, Constantin; Wang, Lan; Afanasyev, Alex; Zhang, Lixia
Secure NDN Packet Encapsulation Proceedings Article
In: ICC 2023-IEEE International Conference on Communications, pp. 1106–1111, IEEE 2023.
Links | BibTeX | Tags: Security
@inproceedings{townley2023secure,
title = {Secure NDN Packet Encapsulation},
author = {Daniel Townley and Young Kim and Fred Douglis and Jesse Elwell and Constantin Serban and Lan Wang and Alex Afanasyev and Lixia Zhang},
url = {https://named-data.net/wp-content/uploads/2023/12/2305ICCNDN-pkt-encryption.pdf},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {ICC 2023-IEEE International Conference on Communications},
pages = {1106–1111},
organization = {IEEE},
keywords = {Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Barbosa, George; Theeranantachai, Sirapop; Zhang, Beichuan; Zhang, Lixia
A Comparative Evaluation of TCP Congestion Control Schemes over Low-Earth-Orbit (LEO) Satellite Networks Proceedings Article
In: Proceedings of the 18th Asian Internet Engineering Conference, pp. 105–112, 2023.
BibTeX | Tags: Congestion Control, Satellite
@inproceedings{barbosa2023comparative,
title = {A Comparative Evaluation of TCP Congestion Control Schemes over Low-Earth-Orbit (LEO) Satellite Networks},
author = {George Barbosa and Sirapop Theeranantachai and Beichuan Zhang and Lixia Zhang},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Proceedings of the 18th Asian Internet Engineering Conference},
pages = {105–112},
keywords = {Congestion Control, Satellite},
pubstate = {published},
tppubtype = {inproceedings}
}
Theeranantachai, Sirapop; Zhang, Beichuan; Zhang, Lixia
NDN’s Stateful Forwarding Plane Meeting Frequent Connectivity Changes of LEO Satellite Constellations Proceedings Article
In: Proceedings of the 10th ACM Conference on Information-Centric Networking, pp. 127–129, 2023.
BibTeX | Tags: Forwarding, Forwarding Strategy, Satellite
@inproceedings{theeranantachai2023ndn,
title = {NDN’s Stateful Forwarding Plane Meeting Frequent Connectivity Changes of LEO Satellite Constellations},
author = {Sirapop Theeranantachai and Beichuan Zhang and Lixia Zhang},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Proceedings of the 10th ACM Conference on Information-Centric Networking},
pages = {127–129},
keywords = {Forwarding, Forwarding Strategy, Satellite},
pubstate = {published},
tppubtype = {inproceedings}
}
2022
Patil, Varun; Desai, Hemil; Zhang, Lixia
Kua: A Distributed Object Store over Named Data Networking Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 56–66, Association for Computing Machinery, Osaka, Japan, 2022, ISBN: 9781450392570.
Abstract | Links | BibTeX | Tags: Applications, Data Management, distributed storage
@inproceedings{patil2022kua:,
title = {Kua: A Distributed Object Store over Named Data Networking},
author = {Varun Patil and Hemil Desai and Lixia Zhang},
url = {https://doi.org/10.1145/3517212.3558083},
doi = {10.1145/3517212.3558083},
isbn = {9781450392570},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {56–66},
publisher = {Association for Computing Machinery},
address = {Osaka, Japan},
series = {ICN '22},
abstract = {Applications such as machine learning training systems or log collection generate and consume large amounts of data. Object storage systems provide a simple abstraction to store and access such large datasets. These datasets are typically larger than the capacities of individual storage servers, and require fault tolerance through replication. In this paper, we present Kua, a distributed object storage system built over Named Data Networking (NDN). The data-centric nature of NDN helps Kua maintain a simple design while catering to requirements of storing large objects, providing fault tolerance, low latency and strong consistency guarantees, along with data-centric security. Our prototype Kua implementation provides easy-to-use primitives to let applications store and access data securely, and our initial evaluation suggests that Kua can leverage NDN's capabilities of multicast data delivery and in-network caching to achieve higher efficiency than existing object storage systems.},
keywords = {Applications, Data Management, distributed storage},
pubstate = {published},
tppubtype = {inproceedings}
}
Yu, Tianyuan; Xie, Hongcheng; Liu, Siqi; Ma, Xinyu; Jia, Xiaohua; Zhang, Lixia
CertRevoke: A Certificate Revocation Framework for Named Data Networking Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 80–90, Association for Computing Machinery, Osaka, Japan, 2022, ISBN: 9781450392570.
Abstract | Links | BibTeX | Tags: certificate revocations, Security, trust management
@inproceedings{yu2022certrevoke:,
title = {CertRevoke: A Certificate Revocation Framework for Named Data Networking},
author = {Tianyuan Yu and Hongcheng Xie and Siqi Liu and Xinyu Ma and Xiaohua Jia and Lixia Zhang},
url = {https://doi.org/10.1145/3517212.3558079},
doi = {10.1145/3517212.3558079},
isbn = {9781450392570},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {80–90},
publisher = {Association for Computing Machinery},
address = {Osaka, Japan},
series = {ICN '22},
abstract = {Named Data Networking (NDN) secures network communications by requiring all data packets to be signed upon production. This requirement makes usable and efficient NDN certificate issuance and revocation essential for NDN operations. In this paper, we first investigate and clarify core concepts related to NDN certificate revocation, then proceed with the design of CertRevoke, an NDN certificate revocation framework. CertRevoke utilizes naming conventions and trust schema to ensure certificate owners and issuers legitimately produce in-network cacheable records for revoked certificates. We evaluate the security properties and performance of CertRevoke through case studies. Our results show that deploying CertRevoke in an operational NDN network is feasible.},
keywords = {certificate revocations, Security, trust management},
pubstate = {published},
tppubtype = {inproceedings}
}
Dulal, Saurab; Ali, Nasir; Thieme, Adam Robert; Yu, Tianyuan; Liu, Siqi; Regmi, Suravi; Zhang, Lixia; Wang, Lan
Building a Secure MHealth Data Sharing Infrastructure over NDN Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 114–124, Association for Computing Machinery, Osaka, Japan, 2022, ISBN: 9781450392570.
Abstract | Links | BibTeX | Tags: access control, mHealth, Security
@inproceedings{dulal2022building,
title = {Building a Secure MHealth Data Sharing Infrastructure over NDN},
author = {Saurab Dulal and Nasir Ali and Adam Robert Thieme and Tianyuan Yu and Siqi Liu and Suravi Regmi and Lixia Zhang and Lan Wang},
url = {https://doi.org/10.1145/3517212.3558091},
doi = {10.1145/3517212.3558091},
isbn = {9781450392570},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {114–124},
publisher = {Association for Computing Machinery},
address = {Osaka, Japan},
series = {ICN '22},
abstract = {Exploratory efforts in mobile health (mHealth) data collection and sharing have achieved promising results. However, fine-grained contextual access control and real-time data sharing are two of the remaining challenges in enabling temporally-precise mHealth intervention. We have developed an NDN-based system called mGuard to address these challenges. mGuard provides a pub-sub API to let users subscribe to real-time mHealth data streams, and uses name-based access control policies and key-policy attribute-based encryption to grant fine-grained data access to authorized users based on contextual information. We evaluate mGuard's performance using sample data from the MD2K project.},
keywords = {access control, mHealth, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Ma, Xinyu; Afanasyev, Alexander; Zhang, Lixia
A Type-Theoretic Model on NDN-TLV Encoding Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 91–102, Association for Computing Machinery, Osaka, Japan, 2022, ISBN: 9781450392570.
Abstract | Links | BibTeX | Tags: Applications, encoding
@inproceedings{ma2022a-type-theoretic,
title = {A Type-Theoretic Model on NDN-TLV Encoding},
author = {Xinyu Ma and Alexander Afanasyev and Lixia Zhang},
url = {https://doi.org/10.1145/3517212.3558093},
doi = {10.1145/3517212.3558093},
isbn = {9781450392570},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {91–102},
publisher = {Association for Computing Machinery},
address = {Osaka, Japan},
series = {ICN '22},
abstract = {In Named-Data Networking (NDN), all packets are encoded in the Type-Length-Value (TLV) format. TLV encoding and decoding are implemented in every NDN library, and used by all applications and forwarders. Therefore, formal analysis of TLV encoding can assist NDN software development in the simplification of the code base, analysis of the performance, and improvement of robustness.In this paper, we want to bring attention to the subtleties of TLV encoding. As an initial result, we develop a type-theoretical model of TLV encodable types, and give an algorithm to automatically derive encoding and decoding functions. We formally prove that the derived encoding and decoding functions are inverse to each other. To evaluate the practicality of automatically derived algorithms, we implement the proposed algorithms in C++ templates and evaluate them in three aspects: performance, memory usage, and code complexity. Our results show that our C++ library is competitive in these three aspects. Though our implementation is not fully automated, we show that it is possible to have a fully automated library in future that correctly produce the encoding and decoding functions. We also discussed the limitations of our model and problems worth attention. We hope our work can offer a starting point of further research on TLV, especially formal analysis and automated implementation.},
keywords = {Applications, encoding},
pubstate = {published},
tppubtype = {inproceedings}
}
Moll, Philipp; Patil, Varun; Wang, Lan; Zhang, Lixia
SoK: The Evolution of Distributed Dataset Synchronization Solutions in NDN Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 33–44, Association for Computing Machinery, Osaka, Japan, 2022, ISBN: 9781450392570.
Abstract | Links | BibTeX | Tags: NDN transport, Sync
@inproceedings{moll2022sok:,
title = {SoK: The Evolution of Distributed Dataset Synchronization Solutions in NDN},
author = {Philipp Moll and Varun Patil and Lan Wang and Lixia Zhang},
url = {https://doi.org/10.1145/3517212.3558092},
doi = {10.1145/3517212.3558092},
isbn = {9781450392570},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {33–44},
publisher = {Association for Computing Machinery},
address = {Osaka, Japan},
series = {ICN '22},
abstract = {Distributed dataset synchronization, or Sync in short, plays the role of a transport service in the Named Data Networking (NDN) architecture. A number of NDN Sync protocols have been developed over the last decade. In this paper, we conduct a systematic examination of NDN Sync protocol designs, identify common design patterns, reveal insights behind different design approaches, and collect lessons learned over the years. We show that (i) each Sync protocol can be characterized by its design decisions on three basic components - dataset namespace representation, namespace encoding for sharing, and change notification mechanism, and (ii) two or three types of choices have been observed for each design component. Through analysis and experimental evaluation, we reveal how different design choices influence the latency, reliability, overhead, and security of dataset synchronization. We also discuss the relationship between transport and application naming, the implications of namespace encoding for Sync group scalability, and the fundamental reason behind the need for Sync Interest multicast.},
keywords = {NDN transport, Sync},
pubstate = {published},
tppubtype = {inproceedings}
}
Song, Sichen; Zhang, Lixia
Effective NDN Congestion Control Based on Queue Size Feedback Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 11–21, Association for Computing Machinery, Osaka, Japan, 2022, ISBN: 9781450392570.
Abstract | Links | BibTeX | Tags: Congestion Control, multi-path forwarding
@inproceedings{song2022effective,
title = {Effective NDN Congestion Control Based on Queue Size Feedback},
author = {Sichen Song and Lixia Zhang},
url = {https://doi.org/10.1145/3517212.3558088},
doi = {10.1145/3517212.3558088},
isbn = {9781450392570},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {11–21},
publisher = {Association for Computing Machinery},
address = {Osaka, Japan},
series = {ICN '22},
abstract = {Named data networking (NDN) can improve the consumer data retrieval throughput with its built-in multicast data delivery, innetwork caching, and ability to support multi-path forwarding. However, their realization brings challenges. In this work, we first examine how multi-path forwarding and in-network caching can interfere with consumer measurements for congestion control. Based on the results, we propose a congestion control solution, NDN-QSF, that can work effectively in the presence of in-network caching. In NDN-QSF, forwarders estimate upstream bandwidth and use queue size as congestion feedback to inform downstream routers to limit interest transmission rates. We further adapt and extend NDN-QSF to enable routers to make informed multi-path forwarding decisions. We evaluated NDN-QSF through simulation experimentation and our results show that NDN-QSF can effectively control congestion by using queue size as congestion feedback and improve network throughput with multi-path forwarding.},
keywords = {Congestion Control, multi-path forwarding},
pubstate = {published},
tppubtype = {inproceedings}
}
Wu, Yuanhao; Mutlu, Faruk Volkan; Liu, Yuezhou; Yeh, Edmund; Liu, Ran; Iordache, Catalin; Balcas, Justas; Newman, Harvey; Sirvinskas, Raimondas; Lo, Michael; Song, Sichen; Cong, Jason; Zhang, Lixia; Timilsina, Sankalpa; Shannigrahi, Susmit; Fan, Chengyu; Pesavento, Davide; Shi, Junxiao; Benmohamed, Lotfi
N-DISE: NDN-Based Data Distribution for Large-Scale Data-Intensive Science Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 103–113, Association for Computing Machinery, Osaka, Japan, 2022, ISBN: 9781450392570.
Abstract | Links | BibTeX | Tags: caching, Forwarding, high energy physics
@inproceedings{wu2022n-dise:,
title = {N-DISE: NDN-Based Data Distribution for Large-Scale Data-Intensive Science},
author = {Yuanhao Wu and Faruk Volkan Mutlu and Yuezhou Liu and Edmund Yeh and Ran Liu and Catalin Iordache and Justas Balcas and Harvey Newman and Raimondas Sirvinskas and Michael Lo and Sichen Song and Jason Cong and Lixia Zhang and Sankalpa Timilsina and Susmit Shannigrahi and Chengyu Fan and Davide Pesavento and Junxiao Shi and Lotfi Benmohamed},
url = {https://doi.org/10.1145/3517212.3558087},
doi = {10.1145/3517212.3558087},
isbn = {9781450392570},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {103–113},
publisher = {Association for Computing Machinery},
address = {Osaka, Japan},
series = {ICN '22},
abstract = {To meet unprecedented challenges faced by the world's largest data- and network-intensive science programs, we design and implement a new, highly efficient and field-tested data distribution, caching, access and analysis system for the Large Hadron Collider (LHC) high energy physics (HEP) network and other major science programs. We develop a hierarchical Named Data Networking (NDN) naming scheme for HEP data, implement new consumer and producer applications to interface with the high-performance NDN-DPDK forwarder, and build on recently developed high-throughput NDN caching and forwarding methods. We integrate NDN systems concepts and algorithms with the mainstream data distribution, processing, and management system of the Compact Muon Solenoid (CMS) experiment. We design and prototype stable, high-performance virtual LANs (VLANs) over a continental-scale wide area network testbed. In extensive experiments, our proposed integrated system, named NDN for Data-Intensive Science Experiments (N-DISE), is shown to deliver LHC data over the wide area network (WAN) testbed at throughputs exceeding 31 Gbps between Caltech and StarLight, with dramatically reduced download time.},
keywords = {caching, Forwarding, high energy physics},
pubstate = {published},
tppubtype = {inproceedings}
}
Pesavento, Davide; Shi, Junxiao; McKay, Kerry; Benmohamed, Lotfi
PION: Password-based IoT Onboarding Over Named Data Networking Proceedings Article
In: ICC 2022 - IEEE International Conference on Communications, pp. 1070-1075, 2022.
Links | BibTeX | Tags: Security
@inproceedings{pesavento2022pion:,
title = {PION: Password-based IoT Onboarding Over Named Data Networking},
author = {Davide Pesavento and Junxiao Shi and Kerry McKay and Lotfi Benmohamed},
doi = {10.1109/ICC45855.2022.9839088},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {ICC 2022 - IEEE International Conference on Communications},
pages = {1070-1075},
keywords = {Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Zhang, Zhiyi; Yu, Tianyuan; Ma, Xinyu; Guan, Yu; Moll, Philipp; Zhang, Lixia
Sovereign: Self-Contained Smart Home With Data-Centric Network and Security Journal Article
In: IEEE Internet of Things Journal, vol. 9, no. 15, pp. 13808–13822, 2022, ISSN: 2327-4662, (Conference Name: IEEE Internet of Things Journal).
Abstract | Links | BibTeX | Tags: IoT, Security
@article{zhang_sovereign_2022,
title = {Sovereign: Self-Contained Smart Home With Data-Centric Network and Security},
author = {Zhiyi Zhang and Tianyuan Yu and Xinyu Ma and Yu Guan and Philipp Moll and Lixia Zhang},
url = {https://ieeexplore.ieee.org/abstract/document/9687833},
doi = {10.1109/JIOT.2022.3144980},
issn = {2327-4662},
year = {2022},
date = {2022-08-01},
urldate = {2022-08-01},
journal = {IEEE Internet of Things Journal},
volume = {9},
number = {15},
pages = {13808–13822},
abstract = {Recent years have witnessed the rapid deployment of smart homes; most of them are controlled by remote servers in the cloud. Such designs raise security and privacy concerns for end users. In this article, we describe the design of Sovereign, a home Internet of Things (IoT) system framework that provides end users complete control of their home IoT systems. Sovereign lets home IoT devices and applications communicate via application-named data and secures data directly. This approach enables direct, secure, one-to-one, and one-to-many Device-to-Device communication over wireless broadcast media. Sovereign utilizes semantic names to construct usable security solutions. We implement Sovereign as a publish–subscribe-based development platform together with a prototype home IoT controller. Our preliminary evaluation shows that Sovereign provides a systematic, easy-to-use solution to user-controlled, self-contained smart homes running on existing IoT hardware without imposing noticeable overhead.},
note = {Conference Name: IEEE Internet of Things Journal},
keywords = {IoT, Security},
pubstate = {published},
tppubtype = {article}
}
Yu, Tianyuan; Xie, Hongcheng; Liu, Siqi; Ma, Xinyu; Jia, Xiaohua; Zhang, Lixia
CertRevoke: a certificate revocation framework for named data networking Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 80–90, Association for Computing Machinery, New York, NY, USA, 2022, ISBN: 978-1-4503-9257-0.
Abstract | Links | BibTeX | Tags: certificate revocations, Security, trust management
@inproceedings{yu_certrevoke_2022,
title = {CertRevoke: a certificate revocation framework for named data networking},
author = {Tianyuan Yu and Hongcheng Xie and Siqi Liu and Xinyu Ma and Xiaohua Jia and Lixia Zhang},
url = {https://dl.acm.org/doi/10.1145/3517212.3558079},
doi = {10.1145/3517212.3558079},
isbn = {978-1-4503-9257-0},
year = {2022},
date = {2022-09-01},
urldate = {2022-09-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {80–90},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
series = {ICN '22},
abstract = {Named Data Networking (NDN) secures network communications by requiring all data packets to be signed upon production. This requirement makes usable and efficient NDN certificate issuance and revocation essential for NDN operations. In this paper, we first investigate and clarify core concepts related to NDN certificate revocation, then proceed with the design of CertRevoke, an NDN certificate revocation framework. CertRevoke utilizes naming conventions and trust schema to ensure certificate owners and issuers legitimately produce in-network cacheable records for revoked certificates. We evaluate the security properties and performance of CertRevoke through case studies. Our results show that deploying CertRevoke in an operational NDN network is feasible.},
keywords = {certificate revocations, Security, trust management},
pubstate = {published},
tppubtype = {inproceedings}
}
Yu, Tianyuan; Ma, Xinyu; Xie, Hongcheng; Kocaoğullar, Yekta; Zhang, Lixia
Intertrust: establishing inter-zone trust relationships Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 180–182, Association for Computing Machinery, New York, NY, USA, 2022, ISBN: 978-1-4503-9257-0.
Abstract | Links | BibTeX | Tags: Security, trust management
@inproceedings{yu_intertrust_2022,
title = {Intertrust: establishing inter-zone trust relationships},
author = {Tianyuan Yu and Xinyu Ma and Hongcheng Xie and Yekta Kocaoğullar and Lixia Zhang},
url = {https://doi.org/10.1145/3517212.3559489},
doi = {10.1145/3517212.3559489},
isbn = {978-1-4503-9257-0},
year = {2022},
date = {2022-09-01},
urldate = {2022-09-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {180–182},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
series = {ICN '22},
abstract = {An NDN network is made of named entities with various trust relations between each other. Entities are organized into trust zones. Each trust zone contains the entities under the same administrative control. This work-in-progress explores an approach to establishing trust relations between trust zones.},
keywords = {Security, trust management},
pubstate = {published},
tppubtype = {inproceedings}
}
Ma, Xinyu; Afanasyev, Alexander; Zhang, Lixia
A type-theoretic model on NDN-TLV encoding Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 91–102, Association for Computing Machinery, New York, NY, USA, 2022, ISBN: 978-1-4503-9257-0.
Abstract | Links | BibTeX | Tags: API, encoding, type-length-value format
@inproceedings{ma_type-theoretic_2022,
title = {A type-theoretic model on NDN-TLV encoding},
author = {Xinyu Ma and Alexander Afanasyev and Lixia Zhang},
url = {https://dl.acm.org/doi/10.1145/3517212.3558093},
doi = {10.1145/3517212.3558093},
isbn = {978-1-4503-9257-0},
year = {2022},
date = {2022-09-01},
urldate = {2022-09-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {91–102},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
series = {ICN '22},
abstract = {In Named-Data Networking (NDN), all packets are encoded in the Type-Length-Value (TLV) format. TLV encoding and decoding are implemented in every NDN library, and used by all applications and forwarders. Therefore, formal analysis of TLV encoding can assist NDN software development in the simplification of the code base, analysis of the performance, and improvement of robustness. In this paper, we want to bring attention to the subtleties of TLV encoding. As an initial result, we develop a type-theoretical model of TLV encodable types, and give an algorithm to automatically derive encoding and decoding functions. We formally prove that the derived encoding and decoding functions are inverse to each other. To evaluate the practicality of automatically derived algorithms, we implement the proposed algorithms in C++ templates and evaluate them in three aspects: performance, memory usage, and code complexity. Our results show that our C++ library is competitive in these three aspects. Though our implementation is not fully automated, we show that it is possible to have a fully automated library in future that correctly produce the encoding and decoding functions. We also discussed the limitations of our model and problems worth attention. We hope our work can offer a starting point of further research on TLV, especially formal analysis and automated implementation.},
keywords = {API, encoding, type-length-value format},
pubstate = {published},
tppubtype = {inproceedings}
}
Moll, Philipp; Patil, Varun; Wang, Lan; Zhang, Lixia
SoK: The evolution of distributed dataset synchronization solutions in NDN Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 33–44, Association for Computing Machinery, New York, NY, USA, 2022, ISBN: 978-1-4503-9257-0.
Abstract | Links | BibTeX | Tags: distributed dataset synchronization, NDN transport, Sync, sync protocols
@inproceedings{moll_sok_2022,
title = {SoK: The evolution of distributed dataset synchronization solutions in NDN},
author = {Philipp Moll and Varun Patil and Lan Wang and Lixia Zhang},
url = {https://dl.acm.org/doi/10.1145/3517212.3558092},
doi = {10.1145/3517212.3558092},
isbn = {978-1-4503-9257-0},
year = {2022},
date = {2022-09-01},
urldate = {2022-09-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {33–44},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
series = {ICN '22},
abstract = {Distributed dataset synchronization, or Sync in short, plays the role of a transport service in the Named Data Networking (NDN) architecture. A number of NDN Sync protocols have been developed over the last decade. In this paper, we conduct a systematic examination of NDN Sync protocol designs, identify common design patterns, reveal insights behind different design approaches, and collect lessons learned over the years. We show that (i) each Sync protocol can be characterized by its design decisions on three basic components - dataset namespace representation, namespace encoding for sharing, and change notification mechanism, and (ii) two or three types of choices have been observed for each design component. Through analysis and experimental evaluation, we reveal how different design choices influence the latency, reliability, overhead, and security of dataset synchronization. We also discuss the relationship between transport and application naming, the implications of namespace encoding for Sync group scalability, and the fundamental reason behind the need for Sync Interest multicast.},
keywords = {distributed dataset synchronization, NDN transport, Sync, sync protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
Patil, Varun; Desai, Hemil; Zhang, Lixia
Kua: a distributed object store over named data networking Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 56–66, Association for Computing Machinery, New York, NY, USA, 2022, ISBN: 978-1-4503-9257-0.
Abstract | Links | BibTeX | Tags: Applications, distributed storage, object store
@inproceedings{patil_kua_2022,
title = {Kua: a distributed object store over named data networking},
author = {Varun Patil and Hemil Desai and Lixia Zhang},
url = {https://dl.acm.org/doi/10.1145/3517212.3558083},
doi = {10.1145/3517212.3558083},
isbn = {978-1-4503-9257-0},
year = {2022},
date = {2022-09-01},
urldate = {2022-09-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {56–66},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
series = {ICN '22},
abstract = {Applications such as machine learning training systems or log collection generate and consume large amounts of data. Object storage systems provide a simple abstraction to store and access such large datasets. These datasets are typically larger than the capacities of individual storage servers, and require fault tolerance through replication. In this paper, we present Kua, a distributed object storage system built over Named Data Networking (NDN). The data-centric nature of NDN helps Kua maintain a simple design while catering to requirements of storing large objects, providing fault tolerance, low latency and strong consistency guarantees, along with data-centric security. Our prototype Kua implementation provides easy-to-use primitives to let applications store and access data securely, and our initial evaluation suggests that Kua can leverage NDN's capabilities of multicast data delivery and in-network caching to achieve higher efficiency than existing object storage systems.},
keywords = {Applications, distributed storage, object store},
pubstate = {published},
tppubtype = {inproceedings}
}
Presley, Justin; Wang, Xi; Brandel, Tym; Ai, Xusheng; Podder, Proyash; Yu, Tianyuan; Patil, Varun; Zhang, Lixia; Afanasyev, Alex; Feltus, F. Alex; Shannigrahi, Susmit
Hydra – A Federated Data Repository over NDN Miscellaneous
2022.
Abstract | Links | BibTeX | Tags: Applications, Data Management, distributed storage
@misc{presley_hydra_2022,
title = {Hydra – A Federated Data Repository over NDN},
author = {Justin Presley and Xi Wang and Tym Brandel and Xusheng Ai and Proyash Podder and Tianyuan Yu and Varun Patil and Lixia Zhang and Alex Afanasyev and F. Alex Feltus and Susmit Shannigrahi},
url = {https://arxiv.org/abs/2211.00919v1},
year = {2022},
date = {2022-11-01},
urldate = {2022-11-01},
journal = {arXiv.org},
abstract = {Today's big data science communities manage their data publication and replication at the application layer. These communities utilize myriad mechanisms to publish, discover, and retrieve datasets - the result is an ecosystem of either centralized, or otherwise a collection of ad-hoc data repositories. Publishing datasets to centralized repositories can be process-intensive, and those repositories do not accept all datasets. The ad-hoc repositories are difficult to find and utilize due to differences in data names, metadata standards, and access methods. To address the problem of scientific data publication and storage, we have designed Hydra, a secure, distributed, and decentralized data repository made of a loose federation of storage servers (nodes) provided by user communities. Hydra runs over Named Data Networking (NDN) and utilizes the State Vector Sync (SVS) protocol that lets individual nodes maintain a "global view" of the system. Hydra provides a scalable and resilient data retrieval service, with data distribution scalability achieved via NDN's built-in data anycast and in-network caching and resiliency against individual server failures through automated failure detection and maintaining a specific degree of replication. Hydra utilizes "Favor", a locally calculated numerical value to decide which nodes will replicate a file. Finally, Hydra utilizes data-centric security for data publication and node authentication. Hydra uses a Network Operation Center (NOC) to bootstrap trust in Hydra nodes and data publishers. The NOC distributes user and node certificates and performs the proof-of-possession challenges. This technical report serves as the reference for Hydra. It outlines the design decisions, the rationale behind them, the functional modules, and the protocol specifications.},
keywords = {Applications, Data Management, distributed storage},
pubstate = {published},
tppubtype = {misc}
}
Patil, Varun; Song, Sichen; Xiao, Guorui; Zhang, Lixia
Scaling state vector sync Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 168–170, Association for Computing Machinery, New York, NY, USA, 2022, ISBN: 978-1-4503-9257-0.
Abstract | Links | BibTeX | Tags: distributed dataset synchronization, NDN transport, state vector sync, Sync
@inproceedings{patil_scaling_2022,
title = {Scaling state vector sync},
author = {Varun Patil and Sichen Song and Guorui Xiao and Lixia Zhang},
url = {https://doi.org/10.1145/3517212.3559485},
doi = {10.1145/3517212.3559485},
isbn = {978-1-4503-9257-0},
year = {2022},
date = {2022-09-01},
urldate = {2022-09-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {168–170},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
series = {ICN '22},
abstract = {State Vector Sync (SVS) is a Distributed Dataset Synchronization (Sync) protocol designed to support distributed applications running over NDN. SVS encodes raw dataset state in its messages to achieve resilient synchronization with low latency. As a result, the SVS message size grows linearly with the number of data producers in the same communication group, raising concerns about its scalability. This poster proposes a solution to improve SVS's scalability through the use of partial state vectors (p-SVS), and presents the results from our preliminary evaluation. Our results show that p-SVS has similar performance to vanilla SVS with improved scalability.},
keywords = {distributed dataset synchronization, NDN transport, state vector sync, Sync},
pubstate = {published},
tppubtype = {inproceedings}
}
Dulal, Saurab; Ali, Nasir; Thieme, Adam Robert; Yu, Tianyuan; Liu, Siqi; Regmi, Suravi; Zhang, Lixia; Wang, Lan
Building a secure mHealth data sharing infrastructure over NDN Proceedings Article
In: Proceedings of the 9th ACM Conference on Information-Centric Networking, pp. 114–124, Association for Computing Machinery, New York, NY, USA, 2022, ISBN: 978-1-4503-9257-0.
Abstract | Links | BibTeX | Tags: access control, Applications, mHealth, real-time data sharing
@inproceedings{dulal_building_2022,
title = {Building a secure mHealth data sharing infrastructure over NDN},
author = {Saurab Dulal and Nasir Ali and Adam Robert Thieme and Tianyuan Yu and Siqi Liu and Suravi Regmi and Lixia Zhang and Lan Wang},
url = {https://dl.acm.org/doi/10.1145/3517212.3558091},
doi = {10.1145/3517212.3558091},
isbn = {978-1-4503-9257-0},
year = {2022},
date = {2022-09-01},
urldate = {2022-09-01},
booktitle = {Proceedings of the 9th ACM Conference on Information-Centric Networking},
pages = {114–124},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
series = {ICN '22},
abstract = {Exploratory efforts in mobile health (mHealth) data collection and sharing have achieved promising results. However, fine-grained contextual access control and real-time data sharing are two of the remaining challenges in enabling temporally-precise mHealth intervention. We have developed an NDN-based system called mGuard to address these challenges. mGuard provides a pub-sub API to let users subscribe to real-time mHealth data streams, and uses name-based access control policies and key-policy attribute-based encryption to grant fine-grained data access to authorized users based on contextual information. We evaluate mGuard's performance using sample data from the MD2K project.},
keywords = {access control, Applications, mHealth, real-time data sharing},
pubstate = {published},
tppubtype = {inproceedings}
}
2021
Liu, Siqi; Patil, Varun; Yu, Tianyuan; Afanasyev, Alexander; Feltus, Frank Alex; Zhang, Lixia
Designing Hydra with Centralized versus Decentralized Control: A Comparative Study Proceedings Article
In: Proceedings of CoNext IWCI Workshop, 2021.
Links | BibTeX | Tags: Applications
@inproceedings{siqi-liu2021designing,
title = {Designing Hydra with Centralized versus Decentralized Control: A Comparative Study},
author = {Siqi Liu and Varun Patil and Tianyuan Yu and Alexander Afanasyev and Frank Alex Feltus and Lixia Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/siqi-liu2021designing.pdf},
year = {2021},
date = {2021-12-01},
urldate = {2021-12-01},
booktitle = {Proceedings of CoNext IWCI Workshop},
keywords = {Applications},
pubstate = {published},
tppubtype = {inproceedings}
}
Hu, Yi; Serban, Constantin; Wang, Lan; Afanasyev, Alexander; Zhang, Lixia
PLI-Sync: Prefetch Loss-Insensitive Sync for NDN Group Streaming Proceedings Article
In: Proc. of IEEE ICC Next-Generation Networking and Internet Symposium, 2021.
@inproceedings{yi-hu2021pli-sync:,
title = {PLI-Sync: Prefetch Loss-Insensitive Sync for NDN Group Streaming},
author = {Yi Hu and Constantin Serban and Lan Wang and Alexander Afanasyev and Lixia Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/2106PLI-Sync.pdf},
year = {2021},
date = {2021-06-01},
urldate = {2021-06-01},
booktitle = {Proc. of IEEE ICC Next-Generation Networking and Internet Symposium},
keywords = {Sync},
pubstate = {published},
tppubtype = {inproceedings}
}
Moll, Philipp; Patil, Varun; Pesavento, Davide; Zhang, Lixia
Resilient Brokerless Publish-Subscribe over NDN Proceedings Article
In: Proc. of IEEE Military Communications Conference (MILCOM), 2021.
Links | BibTeX | Tags: Applications, Sync
@inproceedings{philipp-moll2021resilient,
title = {Resilient Brokerless Publish-Subscribe over NDN},
author = {Philipp Moll and Varun Patil and Davide Pesavento and Lixia Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/Resilient_Brokerless_Publish-Subscribe_over_NDN.pdf},
year = {2021},
date = {2021-11-01},
urldate = {2021-11-01},
booktitle = {Proc. of IEEE Military Communications Conference (MILCOM)},
keywords = {Applications, Sync},
pubstate = {published},
tppubtype = {inproceedings}
}
Zhang, Zhiyi; Won, Su Yong; Zhang, Lixia
Investigating the Design Space for Name Confidentiality in Named Data Networking Proceedings Article
In: Proc. of IEEE Military Communications Conference (MILCOM), 2021.
Links | BibTeX | Tags: Applications, Security
@inproceedings{zhiyi-zhang2021investigating,
title = {Investigating the Design Space for Name Confidentiality in Named Data Networking},
author = {Zhiyi Zhang and Su Yong Won and Lixia Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/Investigating_the_Design_Space_for_Name_Confidentiality_in_Named_Data_Networking.pdf},
year = {2021},
date = {2021-11-01},
urldate = {2021-11-01},
booktitle = {Proc. of IEEE Military Communications Conference (MILCOM)},
keywords = {Applications, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Yu, Tianyuan; Moll, Philipp; Zhang, Zhiyi; Afanasyev, Alexander; Zhang, Lixia
Enabling Plug-n-Play in Named Data Networking Proceedings Article
In: Proc. of IEEE Military Communications Conference (MILCOM), 2021.
Links | BibTeX | Tags: Applications, Security
@inproceedings{tianyuan-yu2021enabling,
title = {Enabling Plug-n-Play in Named Data Networking},
author = {Tianyuan Yu and Philipp Moll and Zhiyi Zhang and Alexander Afanasyev and Lixia Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/Enabling_Plug-n-Play_in_Named_Data_Networking.pdf},
year = {2021},
date = {2021-11-01},
urldate = {2021-11-01},
booktitle = {Proc. of IEEE Military Communications Conference (MILCOM)},
keywords = {Applications, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Zhang, Zhiyi; Liu, Siqi; King, Randy; Zhang, Lixia
NDN-MPS: Supporting Multiparty Authentication over Named Data Networking Proceedings Article
In: Proc. of ACM Information Centric Networking (ICN), 2021.
Links | BibTeX | Tags: Security
@inproceedings{zhiyi-zhang2021ndn-mps:,
title = {NDN-MPS: Supporting Multiparty Authentication over Named Data Networking},
author = {Zhiyi Zhang and Siqi Liu and Randy King and Lixia Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/3460417.3482971.pdf},
year = {2021},
date = {2021-09-01},
urldate = {2021-09-01},
booktitle = {Proc. of ACM Information Centric Networking (ICN)},
keywords = {Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Newberry, Eric; Ma, Xinyu; Zhang, Lixia
YaNFD: Yet another Named Data Networking Forwarding Daemon Proceedings Article
In: Proc. of ACM Information Centric Networking (ICN), 2021.
Links | BibTeX | Tags: Forwarding
@inproceedings{eric-newberry2021yanfd:,
title = {YaNFD: Yet another Named Data Networking Forwarding Daemon},
author = {Eric Newberry and Xinyu Ma and Lixia Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/3460417.3482969.pdf},
year = {2021},
date = {2021-09-01},
urldate = {2021-09-01},
booktitle = {Proc. of ACM Information Centric Networking (ICN)},
keywords = {Forwarding},
pubstate = {published},
tppubtype = {inproceedings}
}
Ma, Xinyu; Zhang, Lixia
Poster: GitSync: Distributed Git Platform on NDN Proceedings Article
In: Proc. of ACM Information Centric Networking (ICN), 2021.
Links | BibTeX | Tags: Applications, Poster
@inproceedings{xinyu-ma2021poster:,
title = {Poster: GitSync: Distributed Git Platform on NDN},
author = {Xinyu Ma and Lixia Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/3460417.3483372.pdf},
year = {2021},
date = {2021-09-01},
urldate = {2021-09-01},
booktitle = {Proc. of ACM Information Centric Networking (ICN)},
keywords = {Applications, Poster},
pubstate = {published},
tppubtype = {inproceedings}
}
Liu, Siqi; Moll, Philipp; Zhang, Lixia
Poster: Mnemosyne: An Immutable Distributed Logging Framework over Named Data Networking Proceedings Article
In: Proc. of ACM Information Centric Networking (ICN), 2021.
Links | BibTeX | Tags: Applications, Poster, Security
@inproceedings{siqi-liu2021poster:,
title = {Poster: Mnemosyne: An Immutable Distributed Logging Framework over Named Data Networking},
author = {Siqi Liu and Philipp Moll and Lixia Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/3460417.3483375.pdf},
year = {2021},
date = {2021-09-01},
urldate = {2021-09-01},
booktitle = {Proc. of ACM Information Centric Networking (ICN)},
keywords = {Applications, Poster, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Patil, Varun; Moll, Philipp; Zhang, Lixia
Poster: Supporting Pub/Sub over NDN Sync Proceedings Article
In: Proc. of ACM Information Centric Networking (ICN), 2021.
Links | BibTeX | Tags: Poster, Sync
@inproceedings{varun-patil2021poster:,
title = {Poster: Supporting Pub/Sub over NDN Sync},
author = {Varun Patil and Philipp Moll and Lixia Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/3460417.3483376.pdf},
year = {2021},
date = {2021-09-01},
urldate = {2021-09-01},
booktitle = {Proc. of ACM Information Centric Networking (ICN)},
keywords = {Poster, Sync},
pubstate = {published},
tppubtype = {inproceedings}
}
Song, Sichen; Zhang, Lixia
Poster: Exploring Rate-based Congestion Control in NDN Proceedings Article
In: Proc. of ACM Information Centric Networking (ICN), 2021.
Links | BibTeX | Tags: Applications, Congestion Control, Forwarding, Poster
@inproceedings{sichen-song2021poster:,
title = {Poster: Exploring Rate-based Congestion Control in NDN},
author = {Sichen Song and Lixia Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/3460417.3483379.pdf},
year = {2021},
date = {2021-09-01},
urldate = {2021-09-01},
booktitle = {Proc. of ACM Information Centric Networking (ICN)},
keywords = {Applications, Congestion Control, Forwarding, Poster},
pubstate = {published},
tppubtype = {inproceedings}
}
Rahman, Md Ashiqur; Zhang, Beichuan
On the analysis of adaptive-rate applications in data-centric wireless ad-hoc networks Proceedings Article
In: 2021 IEEE 46th Conference on Local Computer Networks (LCN), pp. 503–510, IEEE 2021.
Links | BibTeX | Tags: Ad Hoc, Congestion Control, Forwarding, Wireless
@inproceedings{rahman2021analysis,
title = {On the analysis of adaptive-rate applications in data-centric wireless ad-hoc networks},
author = {Md Ashiqur Rahman and Beichuan Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/DAF_rahman_icccn21.pdf},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
booktitle = {2021 IEEE 46th Conference on Local Computer Networks (LCN)},
pages = {503--510},
organization = {IEEE},
keywords = {Ad Hoc, Congestion Control, Forwarding, Wireless},
pubstate = {published},
tppubtype = {inproceedings}
}
Rahman, Md Ashiqur; Zhang, Beichuan
On data-centric forwarding in mobile ad-hoc networks: Baseline design and simulation analysis Proceedings Article
In: 2021 International Conference on Computer Communications and Networks (ICCCN), pp. 1–9, IEEE 2021.
Links | BibTeX | Tags: Ad Hoc, Forwarding, Mobile
@inproceedings{rahman2021data,
title = {On data-centric forwarding in mobile ad-hoc networks: Baseline design and simulation analysis},
author = {Md Ashiqur Rahman and Beichuan Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/DIL_rahman_lcn21.pdf},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
booktitle = {2021 International Conference on Computer Communications and Networks (ICCCN)},
pages = {1--9},
organization = {IEEE},
keywords = {Ad Hoc, Forwarding, Mobile},
pubstate = {published},
tppubtype = {inproceedings}
}
Rahman, Md Ashiqur; Liang, Teng; Zhang, Beichuan
BLEnD: Improving NDN Performance Over Wireless Links Using Interest Bundling Proceedings Article
In: MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), pp. 432–437, IEEE 2021.
Links | BibTeX | Tags: Forwarding, Wireless
@inproceedings{rahman2021blend,
title = {BLEnD: Improving NDN Performance Over Wireless Links Using Interest Bundling},
author = {Md Ashiqur Rahman and Teng Liang and Beichuan Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/BLEnD_rahman_milcom21.pdf},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
booktitle = {MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM)},
pages = {432--437},
organization = {IEEE},
keywords = {Forwarding, Wireless},
pubstate = {published},
tppubtype = {inproceedings}
}
Ogle, Cameron; Reddick, David; McKnight, Coleman; Biggs, Tyler; Pauly, Rini; Ficklin, Stephen P; Feltus, F Alex; Shannigrahi, Susmit
Named Data Networking for Genomics Data Management and Integrated Workflows Journal Article
In: Frontiers in big Data, pp. 1, 2021.
Links | BibTeX | Tags: Applications, Data Management, Genomics
@article{ogle2021named,
title = {Named Data Networking for Genomics Data Management and Integrated Workflows},
author = {Cameron Ogle and David Reddick and Coleman McKnight and Tyler Biggs and Rini Pauly and Stephen P Ficklin and F Alex Feltus and Susmit Shannigrahi},
url = {https://www.frontiersin.org/articles/10.3389/fdata.2021.582468/full},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
journal = {Frontiers in big Data},
pages = {1},
publisher = {Frontiers},
keywords = {Applications, Data Management, Genomics},
pubstate = {published},
tppubtype = {article}
}
Liang, Teng; Shi, Junxiao; Wang, Yi; Zhang, Beichuan
On the Prefix Granularity Problem in NDN Adaptive Forwarding Journal Article
In: IEEE/ACM Transactions on Networking, vol. 29, no. 6, pp. 2820–2833, 2021.
Links | BibTeX | Tags: Forwarding
@article{liang2021prefix,
title = {On the Prefix Granularity Problem in NDN Adaptive Forwarding},
author = {Teng Liang and Junxiao Shi and Yi Wang and Beichuan Zhang},
url = {https://named-data.net/wp-content/uploads/2022/03/On_the_Prefix_Granularity_Problem_in_NDN_Adaptive_Forwarding.pdf},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
journal = {IEEE/ACM Transactions on Networking},
volume = {29},
number = {6},
pages = {2820--2833},
publisher = {IEEE},
keywords = {Forwarding},
pubstate = {published},
tppubtype = {article}
}