본문 바로가기
HOME> 논문 > 논문 검색상세

학위논문 상세정보

(An) Enhanced Framework for Secure and Efficient CCN Services 원문보기

  • 저자

    Eung Jun Cho

  • 학위수여기관

    경희대학교 대학원

  • 학위구분

    국내박사

  • 학과

    컴퓨터공학과

  • 지도교수

    Choong Seon Hong

  • 발행년도

    2014

  • 총페이지

    77 p.

  • 키워드

    Live Streaming;CCN;Contents Authentication;Security;

  • 언어

    eng

  • 원문 URL

    http://www.riss.kr/link?id=T13536624&outLink=K  

  • 초록

    Nowadays, many computing services are provided via the Internet. A lot of devices are connected to the Internet and are used to provide services, for example, Smart phone, TV and sensors, etc. Internet of Things (IoT) is a technology that enables Internet connection to any device and provide more suitable services to the users. These situations lead to exponential increase of Internet traffic. In 2010, almost half of the total Internet traffic is generated by streaming services because of smart device popularization and IPTV services. Moreover TV services are digitized and its resolution is increasing gradually. IPTV has several benefits in compare to coaxial cable TV and TV air channels. For instance, it can provide bidirectional services such as VoD (Video on Demand). And the bandwidth which can be used for IPTV is much higher than others. From SD, which has 720 x 480 resolution, to FHD (1920 x 1080), resolution has increased 6 times. UHD (4K : 3840 x 2160) TV has been commercialized and UHD TV service is almost ready to deploy. In Korea, to provide UHD TV service via air channel, broadcasting association requires more radio bandwidth for TV services because current secured radio bandwidth for TV services is not enough for UHD TV services. In case of IPTV, there is no problem to provide UHD TV services. However, the amount of subscribers is increasing, and the core network of IPTV service providers needs to be upgraded to catch up with huge demands subscribers. Network security is also an important in current Internet. Internet banking, Internet shopping, and SNS (Social Network Service) use a lot of user's private information. Even though many advanced security mechanisms and security products has been developed, we still cannot prevent threats based on social engineering methods such as smishing, phishing, spam-mail, etc. Intrusion detection systems (IDSs) are one of the solutions to prevent this kind of attacks. IDSs are practical and efficient security mechanism. They can be classified into two categories by their method of attack detection: those which uses attack signatures and those which uses abnormal states. The latter type requires a large amounts of memory to store the traffic states and high computation power to analyze the traffic, making them not suitable to deploying in network devices (such as router, switch, etc). The signature-based IDSs also require the storage of many attack signatures, which increases memory usage although not as much as behavior-based IDS. A behavior-based IDS needs strong processing power to analyze abnormal behaviors. However, as we mentioned, it is not easy to implement IDS for all devices which are connected to the Internet. If we can operate IDS on the network devices, we can secure important and private information from attackers, efficiently. As such, how we use the Internet nowadays is drastically different than how we used it before. And TCP/IP design (root of current Internet) is not efficient and secure for current Internet environment. To solve this problem, Van Jacobson et al. [1] proposed Contents Centric Networking (CCN). CCN provides method to find content bases on its name, not its location. CCN is designed to replace the current IP based network system. CCN has functionality to cache the contents on CCN routers. CCN router can directly reply the contents to the user when the contents are cached on its contents store (CS). This reduces duplicated data transmission and enhances the network utility.


 활용도 분석

  • 상세보기

    amChart 영역
  • 원문보기

    amChart 영역