Information-Centric Networking: Evaluation and Security Considerations
RFC 7945
Internet Research Task Force (IRTF) K. Pentikousis, Ed.
Request for Comments: 7945 Travelping
Category: Informational B. Ohlman
ISSN: 2070-1721 Ericsson
E. Davies
Trinity College Dublin
S. Spirou
Intracom Telecom
G. Boggia
Politecnico di Bari
September 2016
Information-Centric Networking: Evaluation and Security Considerations
Abstract
This document presents a number of considerations regarding
evaluating Information-Centric Networking (ICN) and sheds some light
on the impact of ICN on network security. It also surveys the
evaluation tools currently available to researchers in the ICN area
and provides suggestions regarding methodology and metrics.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Research Task Force
(IRTF). The IRTF publishes the results of Internet-related research
and development activities. These results might not be suitable for
deployment. This RFC represents the consensus of the <insert_name>
Research Group of the Internet Research Task Force (IRTF). Documents
approved for publication by the IRSG are not a candidate for any
level of Internet Standard; see Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc7945.
Pentikousis, et al. Informational [Page 1]
RFC 7945 ICN Evaluation and Security September 2016
Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Evaluation Considerations . . . . . . . . . . . . . . . . . . 4
2.1. Topology Selection . . . . . . . . . . . . . . . . . . . . 5
2.2. Traffic Load . . . . . . . . . . . . . . . . . . . . . . . 6
2.3. Choosing Relevant Metrics . . . . . . . . . . . . . . . . 10
2.3.1. Traffic Metrics . . . . . . . . . . . . . . . . . . . 13
2.3.2. System Metrics . . . . . . . . . . . . . . . . . . . . 14
2.4. Resource Equivalence and Trade-Offs . . . . . . . . . . . 16
3. ICN Security Aspects . . . . . . . . . . . . . . . . . . . . . 16
3.1. Authentication . . . . . . . . . . . . . . . . . . . . . . 17
3.2. Authorization, Access Control, and Logging . . . . . . . . 18
3.3. Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.4. Changes to the Network Security Threat Model . . . . . . . 20
4. Evaluation Tools . . . . . . . . . . . . . . . . . . . . . . . 21
4.1. Open-Source Implementations . . . . . . . . . . . . . . . 21
4.2. Simulators and Emulators . . . . . . . . . . . . . . . . . 22
4.2.1. ndnSIM . . . . . . . . . . . . . . . . . . . . . . . . 22
4.2.2. ccnSIM . . . . . . . . . . . . . . . . . . . . . . . . 23
4.2.3. Icarus Simulator . . . . . . . . . . . . . . . . . . . 23
4.3. Experimental Facilities . . . . . . . . . . . . . . . . . 24
4.3.1. Open Network Lab (ONL) . . . . . . . . . . . . . . . . 24
4.3.2. POINT Testbed . . . . . . . . . . . . . . . . . . . . 25
4.3.3. CUTEi: Container-Based ICN Testbed . . . . . . . . . . 25
5. Security Considerations . . . . . . . . . . . . . . . . . . . 25
6. Informative References . . . . . . . . . . . . . . . . . . . . 26
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 37
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 38
Pentikousis, et al. Informational [Page 2]
RFC 7945 ICN Evaluation and Security September 2016
1. Introduction
Information-Centric Networking (ICN) is a networking concept that
arose from the desire to align the operation model of a network with
the model of its typical use. For TCP/IP networks, this implies
Show full document text