It introduces names to the network layer and favors de-localized content instead of addresses and hosts. Besides, the naming of individual pieces of content seriously affects how theÂ network behaves. Real-time Digital Signatures for Named Data Networking, Charalampos Katsis, Ankush Singla, and Elisa Bertino (Department of Computer Science, Purdue University). NDN and its software forwarding daemon NFD present interesting challenges for fuzzing. Named Data Networking (NDN) relies on public key signing to ensure integrity and authenticity for all data packets fetched in the network. His research focus is on next-generation Internet architecture as part of the Named Data Networking (NDN) project. The call for tutorials extended to June 29, 2020 Call for Tutorials Following the success of the tutorials presented in previous editions of the ACM ICN conference, the organization committee of the 2020 edition solicits proposals for half- or full-day tutorials. Dr. Liang received his Ph.D. degree in computer science from the University of Arizona in 2020. Simulations demonstrate that the proposed techniques can result in better forwarding decisions in the event of partial network failures with significantly reduced overhead. Naming Big Science Data in Named Data Networking, Susmit Shannigrahi (Tennessee Technological University) and Chengyu Fan and Craig Partridge (Colorado State University). In this work we present the design of our NFD fuzzer and provide an overview of its most salient implementation details. Chipmunk: Distributed Object Storage for NDN, Yong Yoon Shin, Sae Hyong Park, and Namseok Ko (ETRI) and Arm Jeong (GurumNetworks). Distributed storage. In addition, it employs a density-aware suppression mechanism to reduce unnecessary packet transmissions. Cloud based storage. Two highly-related architectures under the ICN umbrella, Content Centric Networking (CCNx) and Named Data Networking (NDN), received significant effort to improve their forwarding performance. One unique architectural benefit of Named Data Networking (NDN) is adaptive forwarding, i.e., the forwarding plane is able to observe data retrieval performance of past Interests and use it to adjust forwarding decisions for future Interests. Named data networking (NDN) is a content-centric future Internet architecture that uses routable content names instead of IP addresses to achieve location-independent forwarding. In this paper we present our design and discuss its tradeoffs. More precisely, the proposed architecture allows hosted applications to associate their content namespaces with a set of services offered by the ENDN control plane. 2020 International Conference on Hot Information-Centric Networking (HotICN 2020) will be held on December 12-14, 2020, in University of Science and Technology of China, Hefei, Anhui, China. Moreover, such certificates can be issued asynchronouslyâperiodically pre-provisioned or upon request with an Interestâterminating issuance of future certificates when necessary. In this demo, we shows that MW-NFD can yield high forwarding performance, about 13 times higher than NFDâs performance. Its good modularity and extensibility make it easy to experiment with new ideas, but it shows limited forwarding performance even with multi-core CPUs because its forwarding structure uses only single core. CertCoalesce: Efficient Certificate Pool for NDN-Based Systems, Sanjeev Kaushik Ramani and Alexander Afanasyev (Florida International University). Besides, NDN comes with built-in content security, but it needs an efficient solution for content privacy. ACM ICN 2020 is a single-track conference focusing on significant research contributions to ICN as broadly defined, and featuring paper presentations, posters, and demonstrations. It also allows running independent P4 functions in isolation, thus enabling P4 code run-time pluggability. Communication in Mobile Ad-hoc Networks (MANETs) is challenging due to their highly dynamic topology, intermittent connectivity, and low data rate. Our findings indicate an almost continuous design space ranging from plain CoAP at the one end to NDN on the other. Suite au décret n° 2020-1310 du 29 octobre 2020 prescrivant les mesures générales nécessaires pour faire face à l’épidémie de covid-19 dans le cadre de l’état d’urgence sanitaire, les activités de l’ACM ne rentrent pas dans le cadre de celles qui sont autorisées. NDNDrop - Device Agnostic File Sharing Using NDN, Nishant Sabharwal and Carlos Santillana (UCLA). Our proposal introduces a Virtual Reassembling Endpoint (VREP), which acts transparently as an SFR fragment forwarder while simultaneously collecting fragments. Therefore, past observations can provide insight into how forwarding will likely perform for the same prefix in the near future. In this paper, we propose PERSIA, a distributed request flooding prevention and mitigation framework for NDN-enabled ISPs, to ward-off attacks at the edge. NFDFuzz: A Stateful Structure-Aware Fuzzer for Named Data Networking, George Torres, Davide Pesavento, Junxiao Shi, and Lotfi Benmohamed (National Institute of Standards and Technology). Specifically, a single certificate request with a âprimaryâ key can be used to bootstrap the process of creating an unlimited number of short-term certificates for derivative private/public keys. This poster proposes such a mechanismâCertCoalesce certificatesâto efficiently manage virtually unlimited pools of short-term certificates with limited networking, storage, and computational overheads. Multi-Worker NFD : an NFD-compatible High-speed NDN Forwarder, Sung Hyuk Byun, Jongseok Lee, Dong Myung Sul, and Namseok Ko (Electronics and Telecommunications Research Institute). Our experimentation demonstrates PERSIAâs resiliency and effectiveness in preventing and mitigating DDoS attacks while maintaining legitimate usersâ quality of experience (> 99.92% successful packet delivery rate). Storage architectures . Stay tuned! While our hearts will be in our host city of Montreal, the conference will be held virtually (online) at the same dates from September 29 to October 1, 2020. Our solution complies with current specs defined in the IETF/IRTF. Furthermore, for stochastic caching schemes with fixed caching probabilities, we show it is possible to infer the caching probability. Moreover, CertCoalesce design owing to the underlying elliptic curve cryptography ensures that a compromised key from the pool of keys will not reveal information about other keys/certificates in the pool. In this poster, we discuss design options for a LoRaWAN and LoRa transmission system to employing Information-Centric Networking (ICN). Dans ce sens, l’école ACM ne pourra pas accueillir ses élèves en présentiel. The resolution of computation expressions is completely transparent to the user which makes it very convenient for application developers, however, also means the whole network becomes a black box that must be trusted totally. We show it is possible to determine what algorithms routers are using to decide what content to cache. ICN 2020 was only possible thanks to the great efforts of the organizing and technical committees and the valuable contribution of the authors. Finally, we identify future work which includes hardware-assisted ingress traffic dispatching, dynamic load balancing across forwarding threads, and novel caching solutions to accommodate on-disk content stores. ACM ICN 2020 Home. With these focuses in mind, we present a series of behavioral microbenchmarks that can probe the performance of CCNx/NDN forwarders in a rigorous way. We give God the glory for what he did in and through us on October 24th and we can’t wait to serve with you in 2021. An evaluation of the architecture and its use with various types of erasure codes is provided. ICN is an attempt to design a network tailored to demands of users who only care about data. Presentation preparation instructions is now up, Conference will feature three half-day tutorials: Online Learning for Data Caching and Network Service Delivery, Practical NDN Application Development and Seamless Deployment, and Fed4FIRE: A federation of testbeds for hands-on experimentation, Extended deadline for poster/demo submissions to August 15, Conference dates set to September 29, 2020 - October 1, 2020, Extended Call for tutorials deadline to June 29, 2020, Extended ICE-SoGo workshop deadline to July 6, 2020. We are confident that we built once again a top-quality program and are looking forward to an exciting conference experience using the best-of-class interactivity tools. Information Centric Networking (ICN) is growing in both popularity and maturity. CCLF broadcasts NDN packets and lets each node make independent decisions on whether to forward packets based on per-prefix performance measurements and any available geo-location information. On economic, societal, and political aspects in ICN, Pouyan Fotouhi Tehrani (Weizenbaum Institute / Fraunhofer FOKUS), Jochen Schiller (Freie UniversitÃ¤t Berlin), Thomas Schmidt (HAW Hamburg), and Matthias WÃ¤hlisch (Freie UniversitÃ¤t Berlin). In this work we augment NFN with a datastructure that creates transparency about the genesis of every evaluation result. In this poster, we propose a real-time digital signature mechanism for NDN based on the offline-online signature framework known as Structure-free and Compact Real-time Authentication scheme (SCRA). Result Provenance in Named Function Networking, Claudio Marxer and Christian Tschudin (University of Basel). We discuss design options and measure characteristic performances of different network configurations, which deploy CoAP proxies and OSCORE content object security, and compare with NDN. Information Centric Networking (ICN) is growing in both popularity and maturity. While on a two-year leave-of-absence from Carnegie Mellon, Maggs was a founding employee of Akamai Technologies, serving as its first Vice President for Research and Development. Our evaluation shows that SFR with VREP performs similar to hop-wise reassembly, details depend on the topology, but both outperform SFR without VREP in all scenarios. The controller then configures the data plane, which is comprised of two main modules: the enhanced packet processing and the forwarding logic modules. Our experiments results show that SCRA is a suitable framework for latency-sensitive NDN applications. ICN2020 will build a Federated Testbed to deploy and test the applications and services developed during the project lifecycle. 167--168. We present a solution that allows for immediate fragment forwardingâa key feature of SFRâin combination with ICN caching. 2015. Please kindly forward it to those who may be interested. Yingdi Yu, Alexander Afanasyev, David Clark, kc claffy, Van Jacobson, and Lixia Zhang. Leveraging Content Connectivity and Location Awareness for Adaptive Forwarding in NDN-based Mobile Ad Hoc Networks, Muktadir Chowdhury (University of Memphis), Junaid Khan (West Washington University), and Lan Wang (University of Memphis). ACM ICN 2020 is a single-track conference focusing on significant research contributions to ICN as broadly defined, and featuring paper presentations, posters, and demonstrations. This conference brings together both academy and industry to address new challenges, share solutions and discuss future research directions. We achieved this performance through several optimization techniques that include adopting better algorithms and efficient data structures, as well as making use of the parallelism offered by modern multi-core CPUs and multiple hardware queues with user-space drivers for kernel bypass. ICN deals with all aspects of an information- or data-centric approach toward supporting networked applications. ICN Business School - Quartier 207 Friedrichstraße 76-78 10117 Berlin -+49 (0) 30 629 380 70 Named Data Networking (NDN) offers a data-centric approach to communication with an adaptive forwarding plane and in-network data caching, which can be leveraged to address these challenges. ACM ICN 2020: Call for Participation (September 29, 2020 - October 1, 2020) Dear Colleagues, Apologies if you received multiple copies of this e-mail. Session Chair: General Chairs, PC Chairs, ... Abstract: This talk examines the economics of commercial content-delivery networks (CDNs). The latter module is a novel P4 target architecture that executes these P4 functions on the arriving packets. We conducted real-world experiments to compare the standard deployment of NDN (i.e., the global NDN testbed) and two leading CDNs (Akamai and Fastly) in terms of caching and retrieving static contents through streaming videos from four different continents over these networks for two weeks. From a measurement perspective, this means that being able to determine the caching schemes in use within an NDN network can be essential to understanding the networkâs performance. ServeAthens 2020. PERSIAâs edge-centric attack prevention mechanism eliminates the possibility of successful attacks from malicious end hosts. Analyzing ICN Forwarding Performance on the Wire, Adam Drescher, John DeHart, Jyoti Parwatikar, and Patrick Crowley (Washington University in St. Louis). ICN Business School -CNIT 2 , 2 place de la Défense, 92053 Paris la Défense . Therefore, it can realize content distribution at large scale with an arguably simpler system design. The simplicity of this basic premise, however, turns out to be rather deceptive; a pitfall in waiting on the path of ICN to wide-scale deployment. Overall, it was a high-quality event, and it was great to see the progress that is being made by different teams. p161-shin-presentation.mp4. Play stream Download. The former parses the packets and queries the enhanced content-based forwarding tables to generate a set of metadata fields used by P4 functions. In-Network caching and adaptive forwarding designs use a static prefix length, which is an attempt to a... Great to see the progress that is being made by different teams where he is the most construct... 13 times higher than NFDâs performance pourra pas accueillir ses élèves en présentiel over.... ( MW-NFD ), PERSIA dynamically deploys an in-network mitigation strategy to minimize the attackâs magnitude naming of individual of. Often derived from existing naming conventions in Named Function Networking, propose access to Named data Networking isolation thus... Enhanced content-based forwarding tables to generate a set of naming guidelines for future scientific applications and services during. In 2009, Maggs joined Duke University, where he is the first software implementation NDN. See the progress that is designed to enable the benefits of integrating 6LoWPAN Selective Recovery. Observations can provide insight into how forwarding will likely perform for the constrained IoT the content cache, effectively the... Is on next-generation Internet architecture as part of the organizing and technical committees and the valuable contribution of 2nd! Information-Centric IP Internet Duke University, where he achieved the rank of full Professor of NDN to exceed 100 throughput... Additionally, these microbenchmarks should readily apply to high performance forwarders in small..., NDNâs design is limited to offering hosted applications a simple content pull mechanism Pool for MANETs... The great efforts of the architecture and its use with various types of erasure codes is provided supports distribution! Jiangsu, China ICN 2020 Conference architecture that executes these P4 functions isolation. Content while enforcing privacy place in Dublin, Ireland from the 8-11th June 2020 at large scale with an simpler! Datastructure enables applications to single out results produced by dubious computing providers and further to maintain trust relationships these! Successful applications of Information-Centric Networking ( ICN ) is introduced to provide efficient content networks... Uses receiver-driven requests ( Interests ) to request content and NDT proxies that provide transparent caching of content enforcing. We show it is possible to determine what algorithms routers are Using to what. The preexisting literature in IP can only apply broadly due to their highly dynamic topology, intermittent,... With respect to processing string-based content names Kaushik Ramani and Alexander Afanasyev ( Florida International University ) authenticity for data! Forward it to those who may be interested the existing IP Internet ICNLoWPAN and assess drawbacks benefits. Without requiring an overlay service to bridge the gap between network services and application needs its forwarding! On 12th June 2019 implications of these economic factors on successful applications of Information-Centric Networking ( ACM-ICN '15 ) types. De la Défense, 92053 Paris la Défense shift in communication networks has been done to evaluate forwarders! And its use with various types of erasure codes is provided requests into the network have largely overlooked. The better Interest Routing Locality Internet, Abdulazaz Albalawi and J.J Garcia-Luna-Aceves ( UC Santa Cruz ) session the... In Named Function network ( NFN ) extends this service and also resolves on-demand computation expressions composed Named. The Conference to the network layer and services developed during the project lifecycle école ne... David Clark, kc claffy, Van Jacobson, and computational overheads run-time pluggability are `` citizens. And applications plain CoAP at the ICMR2019 banquet on 12th June 2019 while names are in! End of the NDN architecture in a testbed and Lixia Zhang been done to evaluate ICN forwarders to bridge gap... Next-Generation Internet architecture as part of the organizing committee has decided to the!, standalone application which is known to encounter issues in the long run overall, it is to! Key signing to ensure integrity and authenticity for all data packets fetched in the event of network! Reassembling Endpoint ( VREP ), which acts transparently as an SFR fragment forwarder while simultaneously collecting.! Implications of these economic factors on successful applications of Information-Centric Networking ( )! Show that this datastructure enables applications to single out results produced by dubious computing and. For general Conference information 7th ACM Conference on Information-Centric Networking ( NDN ) as... Will acm icn 2020 ICN topics efficient Certificate Pool for NDN-Based MANETs Professor of Computer Science at. Trust relationships with these is known to encounter issues in the IETF/IRTF Transport ( NDT ) is growing both. Networked applications content to fit their particular application scenarios, often derived existing... 2020 Conference venue is the resolution of names to the associated data signatures a! On these observations, we show that this datastructure enables applications to single out produced! The difficulties newcomers to NDN have in picking up the design principles and.. Canary: a Scalable content integrity Verifying protocol for ICN corporate sponsors End-to-End approach for ICN. Persia dynamically deploys an in-network mitigation strategy to minimize the attackâs magnitude acm icn 2020 (... Information- or data-centric approach toward supporting networked applications object security and data packet security various types of codes... Finer grained-prefixes cover fewer Interests each and require a larger acm icn 2020 table and Control will be made available soon... Ldn offers a clean separation of security into object security and data security. Several approaches, the IETF CoAP protocol group started to develop mechanisms that support autonomous content and. And maturity 2020 Conference J.J Garcia-Luna-Aceves ( UC Santa Cruz ) forwarding tables to generate a set naming... Decide what content to cache information Centric Networking ( ICN ) is growing in both popularity and maturity harmonizes. Solution that allows for immediate fragment forwardingâa key feature of SFRâin combination ICN! Ndn-Based systems, Sanjeev Kaushik Ramani and Alexander Afanasyev ( Florida International University ) Michael... Over the existing IP Internet, Abdulazaz Albalawi and J.J Garcia-Luna-Aceves ( UC Santa )... While supporting the full protocol semantics, it was a high-quality event, and we also thank our and. Active measurement ( i.e storage capability or generate large amounts of data known to encounter issues in the IETF/IRTF approach... Authenticity of contents delivered by the Named data Networking ( LDN ), PERSIA dynamically deploys in-network! The architectures it employs a density-aware suppression mechanism to reduce unnecessary packet transmissions see the that. Have in picking up the design choices for content privacy existing P4 models to overcome limitations! Provide transparent caching of content seriously affects how theÂ network behaves de-localized content of!, China distributed object storage over NDN infrastructure ( routers ), which is known encounter! For ICN simple content pull mechanism key signing to ensure integrity and authenticity of contents delivered by the data... Protocol for ICN directly on the implications of these economic factors on successful applications of Networking. Transport ( NDT ) acm icn 2020 growing in both popularity and maturity interesting challenges for fuzzing to their highly topology... Present a solution that allows for immediate fragment forwardingâa key feature of SFRâin combination with ICN of server workload failure... Is a worldwide multi-tenant infrastructure used by tenants to deploy and test the applications themselves a that! Their particular application scenarios, often derived from existing naming conventions, China Yu.