Mitigating content poisoning attacks in named data networking: a survey of recent solutions, limitations, challenges and future research directions Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.1007/s10462-024-10994-x
Named Data Networking (NDN) is one of the capable applicants for the future Internet architecture, where communications focus on content rather than providing content. NDN implements Information-Centric Networking (ICN) with its unique node structure and significant characteristics such as built-in mobility support, multicast support, and efficient content distribution to end-users. It has several key features, including inherent security, that protect the content rather than the communication channel. Despite the good features that NDN provides, it is nonetheless vulnerable to a variety of attacks, the most critical of them is the Content Poisoning Attack (CPA). In this survey, the existing solutions presented for the prevention of CPA in the NDN paradigm have been critically analyzed. Furthermore, we also compared the suggested schemes based on latency, communication overhead, and security. In addition, we have also shown the possibility of other possible NDN attacks on the suggested schemes. Finally, we adds some open research challanges.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1007/s10462-024-10994-x
- https://link.springer.com/content/pdf/10.1007/s10462-024-10994-x.pdf
- OA Status
- hybrid
- Cited By
- 4
- References
- 84
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4405654300
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4405654300Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/s10462-024-10994-xDigital Object Identifier
- Title
-
Mitigating content poisoning attacks in named data networking: a survey of recent solutions, limitations, challenges and future research directionsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-12-20Full publication date if available
- Authors
-
Syed Sajid Ullah, Saddam Hussain, Ihsan Ali, Hizbullah Khattak, Spyridon MastorakisList of authors in order
- Landing page
-
https://doi.org/10.1007/s10462-024-10994-xPublisher landing page
- PDF URL
-
https://link.springer.com/content/pdf/10.1007/s10462-024-10994-x.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://link.springer.com/content/pdf/10.1007/s10462-024-10994-x.pdfDirect OA link when available
- Concepts
-
Computer science, Multicast, Computer network, Overhead (engineering), Node (physics), Computer security, Key (lock), The Internet, Content distribution, Open research, Latency (audio), Telecommunications, World Wide Web, Operating system, Structural engineering, EngineeringTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
4Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 4Per-year citation counts (last 5 years)
- References (count)
-
84Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4405654300 |
|---|---|
| doi | https://doi.org/10.1007/s10462-024-10994-x |
| ids.doi | https://doi.org/10.1007/s10462-024-10994-x |
| ids.openalex | https://openalex.org/W4405654300 |
| fwci | 3.3474644 |
| type | article |
| title | Mitigating content poisoning attacks in named data networking: a survey of recent solutions, limitations, challenges and future research directions |
| biblio.issue | 2 |
| biblio.volume | 58 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11478 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Caching and Content Delivery |
| topics[1].id | https://openalex.org/T10796 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9779999852180481 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Cooperative Communication and Network Coding |
| topics[2].id | https://openalex.org/T12038 |
| topics[2].field.id | https://openalex.org/fields/25 |
| topics[2].field.display_name | Materials Science |
| topics[2].score | 0.9690999984741211 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2505 |
| topics[2].subfield.display_name | Materials Chemistry |
| topics[2].display_name | Covalent Organic Framework Applications |
| funders[0].id | https://openalex.org/F4320327751 |
| funders[0].ror | https://ror.org/03x297z98 |
| funders[0].display_name | Universitetet i Agder |
| is_xpac | False |
| apc_list.value | 2490 |
| apc_list.currency | EUR |
| apc_list.value_usd | 3090 |
| apc_paid.value | 2490 |
| apc_paid.currency | EUR |
| apc_paid.value_usd | 3090 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8492450714111328 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C32295351 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7289934754371643 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q899288 |
| concepts[1].display_name | Multicast |
| concepts[2].id | https://openalex.org/C31258907 |
| concepts[2].level | 1 |
| concepts[2].score | 0.6341550946235657 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[2].display_name | Computer network |
| concepts[3].id | https://openalex.org/C2779960059 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5987175703048706 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q7113681 |
| concepts[3].display_name | Overhead (engineering) |
| concepts[4].id | https://openalex.org/C62611344 |
| concepts[4].level | 2 |
| concepts[4].score | 0.577342689037323 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1062658 |
| concepts[4].display_name | Node (physics) |
| concepts[5].id | https://openalex.org/C38652104 |
| concepts[5].level | 1 |
| concepts[5].score | 0.5231360793113708 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[5].display_name | Computer security |
| concepts[6].id | https://openalex.org/C26517878 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5096714496612549 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[6].display_name | Key (lock) |
| concepts[7].id | https://openalex.org/C110875604 |
| concepts[7].level | 2 |
| concepts[7].score | 0.465844988822937 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[7].display_name | The Internet |
| concepts[8].id | https://openalex.org/C3018752578 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4577052593231201 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q269415 |
| concepts[8].display_name | Content distribution |
| concepts[9].id | https://openalex.org/C2778464652 |
| concepts[9].level | 2 |
| concepts[9].score | 0.45162904262542725 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q309849 |
| concepts[9].display_name | Open research |
| concepts[10].id | https://openalex.org/C82876162 |
| concepts[10].level | 2 |
| concepts[10].score | 0.43458643555641174 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q17096504 |
| concepts[10].display_name | Latency (audio) |
| concepts[11].id | https://openalex.org/C76155785 |
| concepts[11].level | 1 |
| concepts[11].score | 0.19553449749946594 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[11].display_name | Telecommunications |
| concepts[12].id | https://openalex.org/C136764020 |
| concepts[12].level | 1 |
| concepts[12].score | 0.17239218950271606 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[12].display_name | World Wide Web |
| concepts[13].id | https://openalex.org/C111919701 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[13].display_name | Operating system |
| concepts[14].id | https://openalex.org/C66938386 |
| concepts[14].level | 1 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q633538 |
| concepts[14].display_name | Structural engineering |
| concepts[15].id | https://openalex.org/C127413603 |
| concepts[15].level | 0 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[15].display_name | Engineering |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8492450714111328 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/multicast |
| keywords[1].score | 0.7289934754371643 |
| keywords[1].display_name | Multicast |
| keywords[2].id | https://openalex.org/keywords/computer-network |
| keywords[2].score | 0.6341550946235657 |
| keywords[2].display_name | Computer network |
| keywords[3].id | https://openalex.org/keywords/overhead |
| keywords[3].score | 0.5987175703048706 |
| keywords[3].display_name | Overhead (engineering) |
| keywords[4].id | https://openalex.org/keywords/node |
| keywords[4].score | 0.577342689037323 |
| keywords[4].display_name | Node (physics) |
| keywords[5].id | https://openalex.org/keywords/computer-security |
| keywords[5].score | 0.5231360793113708 |
| keywords[5].display_name | Computer security |
| keywords[6].id | https://openalex.org/keywords/key |
| keywords[6].score | 0.5096714496612549 |
| keywords[6].display_name | Key (lock) |
| keywords[7].id | https://openalex.org/keywords/the-internet |
| keywords[7].score | 0.465844988822937 |
| keywords[7].display_name | The Internet |
| keywords[8].id | https://openalex.org/keywords/content-distribution |
| keywords[8].score | 0.4577052593231201 |
| keywords[8].display_name | Content distribution |
| keywords[9].id | https://openalex.org/keywords/open-research |
| keywords[9].score | 0.45162904262542725 |
| keywords[9].display_name | Open research |
| keywords[10].id | https://openalex.org/keywords/latency |
| keywords[10].score | 0.43458643555641174 |
| keywords[10].display_name | Latency (audio) |
| keywords[11].id | https://openalex.org/keywords/telecommunications |
| keywords[11].score | 0.19553449749946594 |
| keywords[11].display_name | Telecommunications |
| keywords[12].id | https://openalex.org/keywords/world-wide-web |
| keywords[12].score | 0.17239218950271606 |
| keywords[12].display_name | World Wide Web |
| language | en |
| locations[0].id | doi:10.1007/s10462-024-10994-x |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S122814990 |
| locations[0].source.issn | 0269-2821, 1573-7462 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 0269-2821 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Artificial Intelligence Review |
| locations[0].source.host_organization | https://openalex.org/P4310319900 |
| locations[0].source.host_organization_name | Springer Science+Business Media |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://link.springer.com/content/pdf/10.1007/s10462-024-10994-x.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Artificial Intelligence Review |
| locations[0].landing_page_url | https://doi.org/10.1007/s10462-024-10994-x |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5072148840 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-5406-0389 |
| authorships[0].author.display_name | Syed Sajid Ullah |
| authorships[0].countries | NO |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I200650556 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Information and Communication Technology, University of Agder (UiA), N-4898, Grimstad, 100190, Norway |
| authorships[0].institutions[0].id | https://openalex.org/I200650556 |
| authorships[0].institutions[0].ror | https://ror.org/03x297z98 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I200650556 |
| authorships[0].institutions[0].country_code | NO |
| authorships[0].institutions[0].display_name | University of Agder |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Syed Sajid Ullah |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | Department of Information and Communication Technology, University of Agder (UiA), N-4898, Grimstad, 100190, Norway |
| authorships[1].author.id | https://openalex.org/A5100698089 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-1523-1330 |
| authorships[1].author.display_name | Saddam Hussain |
| authorships[1].countries | BN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I189462010 |
| authorships[1].affiliations[0].raw_affiliation_string | School of Digital Science, Universiti Brunei Darussalam, Jalan Tungku Link, Gadong, BE1410, Brunei |
| authorships[1].institutions[0].id | https://openalex.org/I189462010 |
| authorships[1].institutions[0].ror | https://ror.org/02qnf3n86 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I189462010 |
| authorships[1].institutions[0].country_code | BN |
| authorships[1].institutions[0].display_name | Universiti Brunei Darussalam |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Saddam Hussain |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | School of Digital Science, Universiti Brunei Darussalam, Jalan Tungku Link, Gadong, BE1410, Brunei |
| authorships[2].author.id | https://openalex.org/A5066848056 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-9549-2540 |
| authorships[2].author.display_name | Ihsan Ali |
| authorships[2].countries | US |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I161165907 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computer Science, Southeast Missouri State University, One University Plaza, Cape Girardeau, MO, 63701, USA |
| authorships[2].institutions[0].id | https://openalex.org/I161165907 |
| authorships[2].institutions[0].ror | https://ror.org/010n41y16 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I161165907 |
| authorships[2].institutions[0].country_code | US |
| authorships[2].institutions[0].display_name | Southeast Missouri State University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Ihsan Ali |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science, Southeast Missouri State University, One University Plaza, Cape Girardeau, MO, 63701, USA |
| authorships[3].author.id | https://openalex.org/A5073312603 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-7847-5127 |
| authorships[3].author.display_name | Hizbullah Khattak |
| authorships[3].countries | PK |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I263208278 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Information Technology, Hazara University Mansehra, Dodyal, Mansehra, 21120, KPK, Pakistan |
| authorships[3].institutions[0].id | https://openalex.org/I263208278 |
| authorships[3].institutions[0].ror | https://ror.org/018y22094 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I263208278 |
| authorships[3].institutions[0].country_code | PK |
| authorships[3].institutions[0].display_name | Hazara University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Hizbullah Khattak |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Information Technology, Hazara University Mansehra, Dodyal, Mansehra, 21120, KPK, Pakistan |
| authorships[4].author.id | https://openalex.org/A5022042508 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-8498-4718 |
| authorships[4].author.display_name | Spyridon Mastorakis |
| authorships[4].countries | US |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I107639228 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering College of Engineering, University of Notre Dame, Notre Dame, IN, 46556, USA |
| authorships[4].institutions[0].id | https://openalex.org/I107639228 |
| authorships[4].institutions[0].ror | https://ror.org/00mkhxb43 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I107639228 |
| authorships[4].institutions[0].country_code | US |
| authorships[4].institutions[0].display_name | University of Notre Dame |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Spyridon Mastorakis |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Computer Science and Engineering College of Engineering, University of Notre Dame, Notre Dame, IN, 46556, USA |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://link.springer.com/content/pdf/10.1007/s10462-024-10994-x.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Mitigating content poisoning attacks in named data networking: a survey of recent solutions, limitations, challenges and future research directions |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11478 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Caching and Content Delivery |
| related_works | https://openalex.org/W2033488476, https://openalex.org/W2131092765, https://openalex.org/W2277662012, https://openalex.org/W1589992863, https://openalex.org/W4377015086, https://openalex.org/W1617457131, https://openalex.org/W2369090769, https://openalex.org/W2997509936, https://openalex.org/W1539518678, https://openalex.org/W2145367253 |
| cited_by_count | 4 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 4 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1007/s10462-024-10994-x |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S122814990 |
| best_oa_location.source.issn | 0269-2821, 1573-7462 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 0269-2821 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Artificial Intelligence Review |
| best_oa_location.source.host_organization | https://openalex.org/P4310319900 |
| best_oa_location.source.host_organization_name | Springer Science+Business Media |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s10462-024-10994-x.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Artificial Intelligence Review |
| best_oa_location.landing_page_url | https://doi.org/10.1007/s10462-024-10994-x |
| primary_location.id | doi:10.1007/s10462-024-10994-x |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S122814990 |
| primary_location.source.issn | 0269-2821, 1573-7462 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 0269-2821 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Artificial Intelligence Review |
| primary_location.source.host_organization | https://openalex.org/P4310319900 |
| primary_location.source.host_organization_name | Springer Science+Business Media |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s10462-024-10994-x.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Artificial Intelligence Review |
| primary_location.landing_page_url | https://doi.org/10.1007/s10462-024-10994-x |
| publication_date | 2024-12-20 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W1535054020, https://openalex.org/W2063939659, https://openalex.org/W2907305569, https://openalex.org/W2109983959, https://openalex.org/W2510375540, https://openalex.org/W2744059389, https://openalex.org/W2526683572, https://openalex.org/W1573555530, https://openalex.org/W4385700549, https://openalex.org/W4388572228, https://openalex.org/W4292136447, https://openalex.org/W4387150017, https://openalex.org/W2744613887, https://openalex.org/W2792986959, https://openalex.org/W3003938609, https://openalex.org/W2057230952, https://openalex.org/W4390990842, https://openalex.org/W2576275762, https://openalex.org/W3109690352, https://openalex.org/W4319066598, https://openalex.org/W2068860357, https://openalex.org/W2512103536, https://openalex.org/W2029091717, https://openalex.org/W1862105587, https://openalex.org/W2327226400, https://openalex.org/W2868518419, https://openalex.org/W2891312626, https://openalex.org/W1755360231, https://openalex.org/W4313477842, https://openalex.org/W4283028338, https://openalex.org/W4251575039, https://openalex.org/W4312786164, https://openalex.org/W2094166085, https://openalex.org/W2883084009, https://openalex.org/W2076720940, https://openalex.org/W2735750480, https://openalex.org/W2045665001, https://openalex.org/W3048822174, https://openalex.org/W4241461833, https://openalex.org/W2996732980, https://openalex.org/W2784541748, https://openalex.org/W3088893026, https://openalex.org/W2033300564, https://openalex.org/W2727409077, https://openalex.org/W2900702342, https://openalex.org/W2809941556, https://openalex.org/W2871468533, https://openalex.org/W3000312588, https://openalex.org/W2894142466, https://openalex.org/W2301184575, https://openalex.org/W2801119850, https://openalex.org/W2901683318, https://openalex.org/W2739053192, https://openalex.org/W3118615836, https://openalex.org/W2621045668, https://openalex.org/W2094745488, https://openalex.org/W4387429459, https://openalex.org/W2513815213, https://openalex.org/W3103522521, https://openalex.org/W1992523130, https://openalex.org/W2571088221, https://openalex.org/W4385488060, https://openalex.org/W2476882019, https://openalex.org/W4323306744, https://openalex.org/W2738951162, https://openalex.org/W4317815289, https://openalex.org/W2967365328, https://openalex.org/W3024518161, https://openalex.org/W3028764597, https://openalex.org/W4394964675, https://openalex.org/W2586063241, https://openalex.org/W4321435489, https://openalex.org/W4388945519, https://openalex.org/W2896743272, https://openalex.org/W2110769762, https://openalex.org/W2970862208, https://openalex.org/W4376456756, https://openalex.org/W4286491870, https://openalex.org/W3003009118, https://openalex.org/W3120887610, https://openalex.org/W4387501693, https://openalex.org/W3101127592, https://openalex.org/W4387647860, https://openalex.org/W3125100762 |
| referenced_works_count | 84 |
| abstract_inverted_index.a | 80 |
| abstract_inverted_index.In | 95, 129 |
| abstract_inverted_index.It | 51 |
| abstract_inverted_index.as | 39 |
| abstract_inverted_index.in | 107 |
| abstract_inverted_index.is | 5, 76, 89 |
| abstract_inverted_index.it | 75 |
| abstract_inverted_index.of | 7, 82, 87, 105, 137 |
| abstract_inverted_index.on | 19, 123, 142 |
| abstract_inverted_index.to | 49, 79 |
| abstract_inverted_index.we | 116, 131, 147 |
| abstract_inverted_index.CPA | 106 |
| abstract_inverted_index.NDN | 25, 73, 109, 140 |
| abstract_inverted_index.and | 35, 45, 127 |
| abstract_inverted_index.for | 11, 102 |
| abstract_inverted_index.has | 52 |
| abstract_inverted_index.its | 31 |
| abstract_inverted_index.key | 54 |
| abstract_inverted_index.one | 6 |
| abstract_inverted_index.the | 8, 12, 61, 65, 69, 84, 90, 98, 103, 108, 119, 135, 143 |
| abstract_inverted_index.Data | 2 |
| abstract_inverted_index.adds | 148 |
| abstract_inverted_index.also | 117, 133 |
| abstract_inverted_index.been | 112 |
| abstract_inverted_index.good | 70 |
| abstract_inverted_index.have | 111, 132 |
| abstract_inverted_index.most | 85 |
| abstract_inverted_index.node | 33 |
| abstract_inverted_index.open | 150 |
| abstract_inverted_index.some | 149 |
| abstract_inverted_index.such | 38 |
| abstract_inverted_index.than | 22, 64 |
| abstract_inverted_index.that | 59, 72 |
| abstract_inverted_index.them | 88 |
| abstract_inverted_index.this | 96 |
| abstract_inverted_index.with | 30 |
| abstract_inverted_index.(ICN) | 29 |
| abstract_inverted_index.(NDN) | 4 |
| abstract_inverted_index.Named | 1 |
| abstract_inverted_index.based | 122 |
| abstract_inverted_index.focus | 18 |
| abstract_inverted_index.other | 138 |
| abstract_inverted_index.shown | 134 |
| abstract_inverted_index.where | 16 |
| abstract_inverted_index.(CPA). | 94 |
| abstract_inverted_index.Attack | 93 |
| abstract_inverted_index.future | 13 |
| abstract_inverted_index.rather | 21, 63 |
| abstract_inverted_index.unique | 32 |
| abstract_inverted_index.Content | 91 |
| abstract_inverted_index.Despite | 68 |
| abstract_inverted_index.attacks | 141 |
| abstract_inverted_index.capable | 9 |
| abstract_inverted_index.content | 20, 47, 62 |
| abstract_inverted_index.protect | 60 |
| abstract_inverted_index.schemes | 121 |
| abstract_inverted_index.several | 53 |
| abstract_inverted_index.survey, | 97 |
| abstract_inverted_index.variety | 81 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.Finally, | 146 |
| abstract_inverted_index.Internet | 14 |
| abstract_inverted_index.attacks, | 83 |
| abstract_inverted_index.built-in | 40 |
| abstract_inverted_index.channel. | 67 |
| abstract_inverted_index.compared | 118 |
| abstract_inverted_index.content. | 24 |
| abstract_inverted_index.critical | 86 |
| abstract_inverted_index.existing | 99 |
| abstract_inverted_index.features | 71 |
| abstract_inverted_index.inherent | 57 |
| abstract_inverted_index.latency, | 124 |
| abstract_inverted_index.mobility | 41 |
| abstract_inverted_index.paradigm | 110 |
| abstract_inverted_index.possible | 139 |
| abstract_inverted_index.research | 151 |
| abstract_inverted_index.schemes. | 145 |
| abstract_inverted_index.support, | 42, 44 |
| abstract_inverted_index.Poisoning | 92 |
| abstract_inverted_index.addition, | 130 |
| abstract_inverted_index.analyzed. | 114 |
| abstract_inverted_index.efficient | 46 |
| abstract_inverted_index.features, | 55 |
| abstract_inverted_index.including | 56 |
| abstract_inverted_index.multicast | 43 |
| abstract_inverted_index.overhead, | 126 |
| abstract_inverted_index.presented | 101 |
| abstract_inverted_index.provides, | 74 |
| abstract_inverted_index.providing | 23 |
| abstract_inverted_index.security, | 58 |
| abstract_inverted_index.security. | 128 |
| abstract_inverted_index.solutions | 100 |
| abstract_inverted_index.structure | 34 |
| abstract_inverted_index.suggested | 120, 144 |
| abstract_inverted_index.Networking | 3, 28 |
| abstract_inverted_index.applicants | 10 |
| abstract_inverted_index.critically | 113 |
| abstract_inverted_index.end-users. | 50 |
| abstract_inverted_index.implements | 26 |
| abstract_inverted_index.prevention | 104 |
| abstract_inverted_index.vulnerable | 78 |
| abstract_inverted_index.challanges. | 152 |
| abstract_inverted_index.nonetheless | 77 |
| abstract_inverted_index.possibility | 136 |
| abstract_inverted_index.significant | 36 |
| abstract_inverted_index.Furthermore, | 115 |
| abstract_inverted_index.distribution | 48 |
| abstract_inverted_index.architecture, | 15 |
| abstract_inverted_index.communication | 66, 125 |
| abstract_inverted_index.communications | 17 |
| abstract_inverted_index.characteristics | 37 |
| abstract_inverted_index.Information-Centric | 27 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 97 |
| corresponding_author_ids | https://openalex.org/A5072148840 |
| countries_distinct_count | 4 |
| institutions_distinct_count | 5 |
| corresponding_institution_ids | https://openalex.org/I200650556 |
| citation_normalized_percentile.value | 0.88075713 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |