Home > Published Issues > 2017 > Volume 12, No. 7, July 2017 >

The Comparison of Forwarding Strategies between Best Route, Multicast, and Access on Named Data Networking (NDN). Case Study: A Node Compromised by the Prefix Hijack

Dodi W. Sudiharto, Anton Herutomo, and Yunita N. Rohmah
School of Computing, Telkom University, Bandung 40257, Indonesia

Abstract—Named Data Networking (NDN) is a new design of network architecture and becomes the leading trend of network architecture because of its packet carries the Name of data, it does not carry the information of a source or a destination address, such an IP address packet. In a network routing, a NDN network has an adaptive forwarding mechanism. A NDN router determines packets immediately which pass through the router by assigning the pending Interest and observe the Data which are sent. Each NDN router can measure a forwarding plane performance of each path. These information can be used to select the best path which is available, to detect and to recover forwarding problems which can be caused by a physical failure or a malicious attack, including a hijack attack. The NDN network has several forwarding strategies which can be used. Three of them are the Best Route, the Multicast, and the Access. According to those forwarding strategies, doing multipath mechanism for forwarding packets seems a good idea to send the packets as soon as possible to the Producer. However, there is an inconsistency with this argument that the Best Route can prevent its packets from dropping higher than others. This study is going to verifies that by making a comparison between those three forwarding strategies while there is a hijack attack on a node of the NDN network.
 
Index Terms—NDN, forwarding strategy, prefix hijack, best route, multicast, access

Cite: Dodi W. Sudiharto, Anton Herutomo, and Yunita N. Rohmah, "The Comparison of Forwarding Strategies between Best Route, Multicast, and Access on Named Data Networking (NDN). Case Study: A Node Compromised by the Prefix Hijack," Journal of Communications, vol. 12, no. 7, pp. 426-432, 2017. Doi: 10.12720/jcm.12.7.426-432.