53
Views
1
CrossRef citations to date
0
Altmetric
Articles

Gini impurity based NDN cache pollution attack defence mechanism

&

References

  • Singh, Vishwa Pratap, and R. L. Ujjwal, “A Walkthrough of Name Data Networking: Architecture, Functionalities, Operations and Open issues.” Sustainable Computing: Informatics and Systems” Volume 28, 2020,100419
  • Samir Kumar Jalal, Subal Chandra Biswas & Parthasarathi Mukhopadhyay (2010) Web Presence of Selected Asian Countries: A Webometric Study, COLLNET Journal of Scientometrics and Information Management, 4:2, 57-68, DOI: 10.1080/09737766.2010.10700893.
  • Liwen Vaughan (2008) A New Frontier of Informetric and Webometric Research: Mining Web Usage Data, COLLNET Journal of Scientometrics and Information Management, 2:2, 29-35, DOI: 10.1080/09737766.2008.10700851.
  • Michael J. Harnisch (2014) Impacts of the Developments in Digital Media and Communication Technology on Personalization Research, COLLNET Journal of Scientometrics and Information Management, 8:2, 353-370, DOI: 10.1080/09737766.2014.916873.
  • P Kamal, RS Raw, N Singh, S Kumar, A Kumar - 2016. VANET based health monitoring through wireless sensor network, 3rd International Conference on Computing for sustainable global development(app. 2865-2871). IEEE, Delhi.
  • Singh, A., Payal, A., & Bharti, S. (2019). A walkthrough of the emerging IoT paradigm: Visualizing inside functionalities, key features, and open issues. Journal of Network and Computer Applications, 143, 111-151. doi: 10.1016/j.jnca.2019.06.013
  • Singh, V. P., & Ujjwal, R. L. (2019). Privacy Attack Modeling and Risk Assessment Method for Name Data Networking. In Advances in Computer Communication and Computational Sciences (pp. 109-119 ). Springer, Singapore. doi: 10.1007/978-981-13-6861-5_10
  • T. Nguyen, X. Marchal, G. Doyen, T. Cholez and R. Cogranne, “Content poisoning in named data networking: Comprehensive characterization of real deployment, In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) 2017 May 8 (pp. 72-80).
  • M. Xie, I. Widjaja and H. Wang, “Enhancing cache robustness for content-centric networking,” 2012. In 2012 Proceedings IEEE INFO-COM (pp. 2426-2434). IEEE.
  • M. Conti, P. Gasti and M. Teoli, “A lightweight mechanism for detection of cache pollution attacks in named data networking,” Computer Networks, vol. 57, pp. 3178-3191, 2013. doi: 10.1016/j.comnet.2013.07.034
  • Nayancy, Sandip Dutta & Soubhik Chakraborty (2020) A survey on implementation of lightweight block ciphers for resource constraints devices, Journal of Discrete Mathematical Sciences and Cryptography, DOI: 10.1080/09720502.2020.1766767.
  • Singh, A. & Jain, A. An Empirical Study of AML Approach for Credit Card Fraud Detection-Financial Transactions. Int. J. Comput. Commun. Control 14, (2019). doi: 10.15837/ijccc.2019.6.3498
  • C. Ghali, G. Tsudik and E. Uzun, “Needle in a haystack: Mitigating content poisoning in named-data networking,” In Proceedings of NDSS Workshop on Security of Emerging Networking Technologies (SENT).
  • T. Zhi, H. Luo and Y. Liu, “A Gini impurity-based interest flooding attack defence mechanism in NDN,” IEEE Communications Letters, vol. 22, pp. 538-541, 2018. doi: 10.1109/LCOMM.2018.2789896
  • Li-Shuang Chen & Qi Huang (2018) An exact calculation method for Gini coefficient and its application in China, Journal of Discrete Mathematical Sciences and Cryptography, 21:6, 1235-1240, DOI: 10.1080/09720529.2018.1525906.
  • Q. Xu, Z. Su and K. Zhang, “HMM Based Cache Pollution Attack Detection for Edge Computing Enabled Mobile Social Networks,” In ICC 2019-2019 IEEE International Conference on Communications (ICC) (pp. 1-5).IEEE.
  • Yu Zhang, Guang Yu & Donghui Yang (2016) Predicting non-performing loan of business bank by multiple classifier fusion algorithms, Journal of Interdisciplinary Mathematics, 19:4, 657-667, DOI: 10.1080/09720502.2016.1179486

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.