Information centric networking the architecture
This presentation is the property of its rightful owner.
Sponsored Links
1 / 51

Information-Centric Networking & the Ψ Architecture PowerPoint PPT Presentation


  • 65 Views
  • Uploaded on
  • Presentation posted in: General

Information-Centric Networking & the Ψ Architecture. George C. Polyzos. ICN talk Outline. Introduction, motivation, overview The Pub/Sub Internet ( Ψ ) Architecture pub-sub, rendezvous i dentifiers forwarding/ LIPSIN p rototypes, testbeds , and evaluation S ecurity aspects

Download Presentation

Information-Centric Networking & the Ψ Architecture

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Information centric networking the architecture

Information-Centric Networking& the Ψ Architecture

George C. Polyzos


Icn talk outline

ICN talk Outline

  • Introduction, motivation, overview

  • The Pub/Sub Internet (Ψ) Architecture

    • pub-sub, rendezvous

    • identifiers

    • forwarding/LIPSIN

    • prototypes, testbeds, and evaluation

  • Security aspects

  • Mobility support

  • Continuous Media/Multimedia

  • The role of Satellites

  • Discussion & Conclusion

[email protected]


Internet history and outlook

InternetHistory and Outlook

Connecting Wires

the past…

Interconnecting Computers

the current Internet

evolutionary development

… started decades earlier

Interconnecting Information

the Future Internet

revolutionary research

10-15 years in the future

tussle resolution at or near run-time

Trust-to-Trust principle

towards…

Information-Centric Networking

  • At the beginning…

    • cooperation; no competition…

    • no commercial traffic!

    • endpoint-centric services/E2E

  • Now…

    • Content distribution…

      • >50% of traffic today is video↑

    • Overlays… DPI by ISPs…

    • Trust? Endpoint trust?

      • viruses, phishing, DoS attacks…

    • E2E?

      • NAT, firewalls, middleboxes, CDNs

    • The sender has the power…

    • Tussles…

      • e.g.: privacy vs. accountability

[email protected]


Publish subscribe internet vision

Routing

Security

network economics

Unification of

wireline and wireless

Publish-Subscribe Internet Vision

  • information centrism

    • everything is information & information is everything

  • Recursive & and generalized use of publish-subscribe

    • enables dynamic change of roles between actors

    • Network cache

      • publishes info (cached)

      • subscribes to get info to cache

    • Access Points publish ID

      • mobiles subscribe

        Objectives

  • Specify, implement, & test

    an internetworked pub/sub architecture

    • follow a clean-slate design approach

  • Perform qualitative and quantitative evaluation

    • Security and socio-economics important!

    • Migration and incentive scenarios important (e.g., overlay)!

[email protected]


Our icn related research projects

Our ICN-related Research Projects

  • PSIRP: Publish Subscribe Internet Routing Paradigm

    • FP7 ICT STREP, 2008-2010

      • the basis

      • focus on (inter)-networking

  • PURSUIT: Publish Subscribe Internet Technologies

    • FP7 ICT STREP, 2010-2013

      • extending, above & below the Internet layer

      • optical, wireless, mobility, transport…

  • Euro-NF: Anticipating the Network of the Future—From Theory to Design

    • FP7 ICT Network of Excellence, 2008-2012

      • ASPECTS, GOVPIMIT, E-key-nets

  • EIFFEL: Evolved Internet Future For European Leadership

    • FP7 ICT SSA, 2008-2010; Think-Tank continued

    • June 2011 TT @ MIT: Information-Centric Networking

  • φSAT: The Role of Satellites in Future Internet Services

    • European Space Agency funded

    • 2011-2013

[email protected]


Icn timeline

ICNtimeline

papers/talks

projects

CCN

Van Jacobson

“A Survey of

Information-Centric Networking Research,” forthcoming

[email protected]


Icn research community

ICN Research Community

  • workshops…

    • with ACM SIGCOMM

      • ICN 2011 (Toronto)

      • ICN 2012 (Helsinki)

      • ICN 2013 (Hong Kong):

        • 3rd ACM SIGCOMM ICN workshop

          • Abstract: March 10

          • Paper:March 17

    • with IEEE INFOCOM

      • NOMEN 2012

      • NOMEN 2013

  • [email protected]

  • Journal & Magazines Special Issues

[email protected]


The psi architecture

The PSI (Ψ) Architecture

  • Pub/Sub Internet Architecture

  • Clean-Slate

  • Native

  • Two different prototype implementations exist

    • Blackhawk (PSIRP)

    • Blackadder (PURSUIT)

[email protected]


Basic psi functions

Publications

information/content

metadata

Subscriptions (interests)

asynchronous

& in any order

Rendezvous: Matchespublications with subscriptions & initializes the forwarding process

Topology: Monitors the network and it creates information delivery paths

Forwarding: Implements information forwarding

Basic PSIFunctions

[email protected]


Identifiers

Identifiers

[email protected]


Publication

Ψ Publication

N. Fotiou, D. Trossen, G.C. Polyzos, “Illustrating a Publish-Subscribe Internet Architecture,” Telecommunication Systems, Springer, vol. 52, no. 3, pp. 233-245, 2012 (Special Issue on ‘Future Internet Services and Architectures: Trends and Visions).

[email protected]


Subscription

Ψ Subscription

[email protected]


Caching or multiple information providers multiple paths

‘Caching’ or Multiple Information Providers & Multiple Paths

G. Xylomenos, et al., “Caching and Mobility Support in a Publish-Subscribe Internet Architecture,” IEEE Communications Magazine, feature topic on ‘Information-Centric Networking,’ vol. 50, no. 7, pp. 52-58, July 2012.

[email protected]


Resource sharing multicast

Resource Sharing / Multicast

[email protected]


Building blocks in bubbles

Needed to implement the

3 basic functions:

Rendezvous, Topology& Forwarding(RTF)

The bubble concept is akin to the current layering model

The basic building block of functionality at all levels

from OS

through LAN

to Global Internetwork

Bubbles offer availability and extensibility through the recursive execution of basic functions

Building Blocks in Ψ: Bubbles

[email protected]


Secure forwarding mechanism

Secure Forwarding Mechanism

[email protected]

  • Forwarding based on Bloom filter (called zFilter) that contains all the link IDs through which a packet has to travel

  • Supports multicast

  • Hashing

    • False positives

    • Limitations in size

      • Hierarchical / inter-networks

  • Link identifiers are unique per information flow

  • zFilter creation involves an encryption mechanism

    • DoS attack resistant

    • Almost impossible to

      • redirect an information flow

      • send arbitrary packets to a destination


Zfilters based forwarding

zFilters Based Forwarding

P. Jokela, et al., “LIPSIN: Line Speed Publish/ Subscribe Inter-networking,” Proc. ACM SIGCOMM 2009.

[email protected]


Prototype implementations testbeds

Prototype Implementations & Testbeds

  • PURSUITTestbed (w/ Blackadder)

  • 25 nodes

  • 5 countries: UK, FI, GR, D, US

  • Tunneled (VPN)

    • over the public Internet

PSIRP

PURSUIT

  • PSIRPTestbed (w/ Blackhawk)

  • 6 countries: UK, FI, GR, D, BU, US

    • In addition: Belgium during ICT demos

  • Tunneled over the public Internet

    • +dedicated fiber where available

D. Trossen and G. Parisis, “Designing and realizing an information-centric internet,” IEEE Communications Magazine, vol. 50, July 2012. - https://github.com/fp7-pursuit/blackadder

[email protected]


Caching and replication

Caching and replication

  • All content sources are equivalent in PSI

    • Origin, cache, or replication point

    • Chunks can be retrieved from different sources

    • Sources are visible to the network

    • Network-level caching

  • Caching vs. replication

    • Similar to the user, different to the network

    • Replication is planned (as in CDNs)

    • Caching is opportunistic (as in P2Ps)

    • PSI handles both in a unified manner

[email protected]


On path caching

u

On-path caching

Local RENE

Local RENE

Sub

R

Pub

3

  • Very lightweight

    • bypasses rendezvous network

  • Good for

    • multicast error control

4

Global RENE

RP

FN

Internet

5

2

1a

Sub1

1b

Sub2

Sub

[email protected]


Off path caching

u

Off-path caching

Sub

Local RENE

R

Pub

3

  • Uses the rendezvous network

    • to serve more users

  • Good for

    • local (access network) caching

Global RENE

RP

4a

4b

Internet

2

Local RENE

Cache

1

Sub

Sub

[email protected]


Content replication

Content replication

Sub

Local RENE

RP

Pub

3a

  • The rendezvous network chooses the best source

  • Good for CDN-like proactive replication

Global RENE

4a

3b

CDN

Internet

2

4b

Local RENE

1

Sub

[email protected]


Security requirements

Security Requirements

Publications confidentiality

publications should not be revealedto unauthorized subscribers

Subscription confidentiality

user subscriptions should be kept secret

Integrity, Availability

Authentication, Anonymity

Accountability

Information Scoping

[email protected]


Scopes s information firewalls

Scopes: Ψ’sInformation Firewalls

[email protected]

  • Scopes allow for information location as well as for control of information dissemination

  • Can be physical….

    • e.g., a sub-network

  • … or logical

    • e.g., my friends in Facebook

  • In scopes, access control and accounting mechanisms are/will be implemented


Access control enforcement delegation

Access Control Enforcement Delegation

  • Motivation

    • Kazaa: 50% of versions and copies polluted[INFOCOM’05, Liang et al.]

    • Kazaa: 15% infected by 52 different viruses [SIGCOMM06, Shin et al.]

    • Limewire: 68% of executables, archives is malware[SIGCOMM’06, Kalafut et al.]

  • Observations

    • users can change behavior,

      information cannot!

    • Information identification is easier

      • Hash function vs. Certificates

  • Design

    • only positive, implicit votes

      • only 1 vote /item /publisher

      • no communication overhead

    • weight of a vote:

      • 1/(Σvotes of pub in this set )α

        N. Fotiou, G. Marias, G.C. Polyzos, “Access Control Enforcement Delegation for Information-Centric Networking Architectures,” Proc. ACM SIGCOMM ICN, August 2012.

[email protected]


Information i dentification

IMG32010234

Information Identification

facebook.com/nikos/pics/

May give a location hint, denote the principal/owner

Associated with an access control policy

Handled by a (set of ) dedicated network node(s)

Identifies uniquely the information object (globally or within the prefix)

Prefix

Suffix

  • Users can create prefix, advertise prefix/suffix pairs, request prefix/suffix pairs

[email protected]


Psi implementation

PSI Implementation

Define access control policy: who can advertise, who can subscribe

A subscriber has properly authenticated himself and requests item X

Provide Credentials

  • Prefix: Scope Identifier (SId)

  • Suffix: Rendezvous Identifier (RId)

  • SIds are managed by the Rendezvous node

  • Users can advertise data and subscribe to data

  • Information flow:

  • [email protected]


    Benefits

    Benefits

    • Consumer credentials protected

    • Minimum user intervention

    • RP has no access to consumer’s personal information

    • RP does not have to implement any access control policy

    • Access control policies can be re-used

      • Even by users who do not know their content

      • “Access Control Store”

    • Access control policies can be easily modified

    [email protected]


    Mobility and privacy support

    Bubbles support mobility as well as location privacy

    N. Fotiou, K.V. Katsaros G.C. Polyzos,

    M. Särelä, D. Trossen, G. Xylomenos,

    “Handling Mobility in Future Publish-Subscribe Information-Centric Networks,” Telecommunication Systems, Springer,

    Special Issue on ‘Mobility Management in the Future Internet,’ to appear.

    Mobility and Privacysupport

    [email protected]


    Packet level authentication pla

    Packet Level Authentication (PLA)

    [email protected]

    • Per packet public key cryptographic operations are possible

      • at wire speed

    • The network carries only authentic data

      • Requires third-party certificates

    • Need not be implemented at all nodes

      • Selected key nodes

    • PLA offers significant energy efficiency

    • Implemented in NetFPGAs


    Security characteristics of

    Security Characteristics of Ψ

    • Pub/Sub restores the imbalance of power between sender and receiver(s)

    • No information flow until explicit signal for

      • Interest for specific piece of information

        • Anti-Spam mechanism

      • Availability of a specific piece of information

        • Anti-DoS mechanism

    • Pub/Sub facilitates

      • Anonymity

      • Mobility

      • Multihoming

    • Message aggregation

      • Resource sharing (e.g., with multicast)

    [email protected]


    Inforanking lightweight mechanism to distinguish and isolate polluted information

    InfoRanking: lightweight mechanism to distinguish and isolate polluted information

    • Motivation

      • Kazaa: 50% of versions and copies polluted[INFOCOM’05, Liang et al.]

      • Kazaa: 15% infected by 52 different viruses [SIGCOMM06, Shin et al.]

      • Limewire: 68% of executables, archives is malware[SIGCOMM’06, Kalafut et al.]

    • Observations

      • users can change behavior, information cannot!

      • Information identification is easier

        • Hash function vs. Certificates

    • Design

      • only positive, implicit votes

        • only 1 vote /item /publisher

        • no communication overhead

      • weight of a vote:

        • 1/(Σvotes of pub in this set )α

          N. Fotiou, G. Marias, G.C. Polyzos, “Information Ranking in Content-Centric Networks,” Proc. Future Network & Mobile Summit, Florence, Italy, June 2010.

    [email protected]


    Security privacy

    Security & Privacy

    • E2E direct trust not applicable

      • Current Internet does not support it either

      • Socioeconomic trust through mediators (e.g., Rendezvous Providers)

      • D. Lagutin, K. Visala, A. Zahemszky, T. Burbridge, G.F. Marias, “Roles and Security in a Publish/Subscribe Network Architecture,” Proc. IEEE ISCC 2010, Bologna, Italy, June 2010.

    • Users change behavior, content does not

      • Rely on new methods to evaluate content integrity and authenticity

      • Reputable Content

      • N. Fotiou, G.F. Marias, G.C. Polyzos, "Fighting Spam in Publish/Subscribe Networks Using Information Ranking," Proc. 6th Conf. on Next Generation Internet, Paris, France, June 2010.

    • End-user privacy can be effectively supported in ICN (@ internetwork level)

      • Who asks for what content hidden from content provider, caches

      • Pub/Sub matching through trusted mediator service (e.g., Rendezvous providers)

        • BUT privacy from Rendezvous providers becomes more of an issue

    • Spam & malicious content distribution is blocked

      • There is no unsolicited traffic in the network!

        • Content is delivered after explicit request

      • New adversary models

      • P. Nikander, G.F. Marias, “TowardsUnderstandingPurePublish/SubscribeCryptographicProtocols,” Cambridge Security Protocols Workshop, June 2008 .

    [email protected]


    Advantages of psi in mobility support

    Advantages of PSI in Mobility Support

    • Decoupling IDs from location

    • Publish/Subscribe is asynchronous and multicast

      • Adapts better to frequent mobility

    • Publishers & Subscribers can seamlessly & simultaneously move

      • Data (packets) are identified independently from source or destination

      • Information (cached? content) is still transparently available

    • Routing and Forwarding

      • decoupling IDs from location is a major advantage

        • locations are ephemeral

        • no need for triangular routing

        • ingress filtering problem

        • anycast choice of the best source of content

    • Mobility & user behavior prediction together with proactive caching/prefetching can be used to enhance mobility support

      G. Xylomenos et al., “Caching and Mobility Support in a Publish-Subscribe Internet Architecture,” IEEE Communications Magazine, July 2012.

    [email protected]


    Proactive selective neighbor caching for enhancing mobility support in icn

    Proactive Selective Neighbor Cachingfor enhancing Mobility Support in ICN

    Mobility

    • Delay can be reduced by using proxies to pre-fetch and cache data

      • approaches

        • Reactive

        • Durable subscriptions

        • Proactive

    • Proactive Selective Neighbor Caching

      • mobile initially connected to proxy i

      • select an optimum subset of neighbor proxies

        • iwill send the mobile’s subscriptions, and

        • which will proactively cache

          • information items matching these subscriptions

      • if the mobile connects to one of these proxies

      • then it can immediately receive information items

      • it did not receive due to its disconnection

    • Cost Function:

      X. Vasilakoset al.“Proactive Selective Neighbor Caching for enhancing Mobility Support in Information-Centric Networks,” Proc. ACM SIGCOMM ICN, August 2012.

    [email protected]


    Multimedia over

    Motive: Multimedia over Ψ

    “YouTube” a la Ψ …

    Streaming videos

    without RTP/TCP/IP

    only native Ψ

    Basic Components of the application:

    Publisher: the owner of the video

    Subscriber: the user that seeks to view the video

    Technologies Involved

    We tried different applications

    Video

    Audio/voice (VoPSI)

    ...

    Multimedia over Ψ

    [email protected]


    Information centric networking the architecture

    Publish Videos

    Publish a video or a directory with multiple videos

    Define the scope for the video she uploads to the network

    Currently done via local exchange of video knowledge

    Subscribe to a Video

    Search for the desirable videousing the name of the video

    Currently done via local exchange of information

    Subscribe to its PSI-level identifiers

    Play the video while downloading

    Stream Source

    (e.g. VLC)

    Stream Sink

    (e.g. VLC)

    Local UDP Socket

    Local UDP Socket

    Send updated dataas datagrams

    Stream Publisher

    Stream Subscriber

    Receive datagramsinto a publication buffer

    Publication

    Publication

    Publish new versionswith same RId

    Subscribe to RId andlisten to updates

    NOTE: The publisher knows the subscriber set for this RId, sends the metadata directly to the subscribers; no rendezvous. Subscriber with metadata for a new version, subscribes to the corresponding data chunks.

    [email protected]


    Optimization of real time media distribution

    Optimization of Real-Time Media Distribution

    Exploit

    • Functional organization

      • Item resolution decoupled from forwarding (path establishment)

    • In-network resources

      • TM nodes → (logically) centralized path/tree formation

    • Stateless multicast forwarding

      Compute minimum cost (Steiner) trees for multicast delivery

    • Cost of optimization:

      • Signaling cost: resolve the subscription

        • → analogous to a DNS or DHT resolution

      • Computation delay at TM

    • Evaluation: Emulation of AS 224 (Norwegian Univ. & Research Network)

      • 233 routers, 75 access routers → 75 PSI access networks…

      • For 90% of subscriptions, delay (Steiner - Shortest-path) < 2ms; For 99.6%, < 60ms

      • Steiner-tree byte footprint compared to Shortest-path trees: - 30%, multiple unicasts: - 48%

        C. Tsilopoulos et al. “Efficient Real-time Information Delivery in Future Internet Publish-Subscribe Networks,” Proc. IEEE ICNC, San Diego, CA, January 2013.

    [email protected]


    An information centric overlay network architecture for content distribution and mobility support

    An Information-Centric Overlay Network Architecture for Content Distribution and Mobility Support

    [email protected]

    Ph.D. Dissertation by Konstantinos Katsaros

    • Multicast

      • Router Assisted Overlay Multicast (RAOM)

        • Deploying multicast functionality in an overlay fashion

    • Multicast & Caching

      • MultiCache

        • Enabling caching of data delivered by multicast trees

    • Adapting to the inter-network structure

      • H-Pastry

        • Canonical version of Pastry

    • Mobility Support

      • Overlay Multicast Assisted Mobility (OMAM)

        • Revisiting multicast assisted mobility

          K.V. Katsaros, G. Xylomenos, G.C. Polyzos, “MultiCache: an Overlay Architecture for Information-Centric Networking,” Computer Networks,vol. 55, no. 4, pp. 936-947,Special Issue on ‘Architectures and Protocols for the Future Internet,’March 2011.


    Sat the role of satellites in fi services

    Saturation

    Name Server

    Name Resolution

    # of ICN adopters

    Fast ICN adoption

    Data Transport

    Forwarding Node

    Initial deployment

    Subscriber

    time

    Publisher

    φSAT: The role of Satellites in FI Services

    • Aim:

      • To investigate the technical

        feasibility & business viability

        of the integration of SatCom

        with terrestrial ICN architectures

    • Results

      • Methodology to identify application/service scenarios where the capabilities of SatCom and ICN bring highest techno-economic gains

        • Key SatCom capabilities: Broadcast/Multicast, Wide Coverage

        • Key ICN capabilities: Data aggregation, Multipath

          Routing, Mobility Support, In-network Caching

      • Candidate scenarios identified

        • Hybrid Broadcast netTV

        • M2M Communications

        • 4G Backhauling

      • Socio-economic evaluation

        • Market evolution for each scenario

    [email protected]


    Conclusions

    Conclusions

    [email protected]

    • ICN is well positioned to address

      • caching, mobility, multihoming, traffic management/QoS, security...

      • evolution: tussles resolved at or near run-time

    • PSI chose

      • specific name/ID resolvers (for each scope: RP), rather than flooding

      • separation or functions

        • separate forwarding from resolution (no reverse path)

          • centralized aspects, optimizations, policies

          • well matched to SDN/OpenFlow—all optical forwarding

    • The PSI architecture inherits the advantages of

      • ICN& the publish/subscribe paradigm

        • in particular the security ones, but….

    • PSI selected and added specific security mechanisms

      • Secure Forwarding (zFilters), Scopes, Bubbles, Packet Level Authentication, Information Ranking


    Psi key observations and issues

    PSI: Key Observations and Issues

    • RIDs: hash of content vs. not...

      • Implications of uniquely indentifying content

        • Caching (enabled/facilitated)

    • SIDs as special case of RIDs

    • pub/sub “recursively”

      • at many levels of the hierarchy/network

        • from wire-level to the global Internet

        • perhaps used to realize reliable transport

    • Granularity of items (to publish/subscribe to): objects, chunks, packets…

    • pub/sub model: documents vs. channels

      • versions (& IDs) of publications?

    • Algorithmic Identifiers (RIDs)

      • nice for intra-channel IDs...

    • asynchronous (subscribe before publish)

    • search engines probably still important (at different level?)

    • Wireless?

    [email protected]


    More observations questions issues

    More Observations, Questions & Issues

    • Information- vs. Content-centric vs. Named Data vs. pub/sub vs. ...

    • overlay vs. clean-slate vs. hybrid/integrated…

      • special-purpose nets only? Not global?

    • Rendezvous

      • powerful

      • trusted

        • has lots of information...

      • target of DOS attacks

      • networks of RPs = RN

      • belongs to different entities than network provider?

      • competing RNs

      • RP functionality needed at multiple & different levels

        • Intranet, global... on a wire...

    [email protected]


    Thank you

    Thank you!

    Information-Centric Networking & the Ψ Architecture

    George C. Polyzos

    Faculty: V.A. Siris, G. Xylomenos, G. Marias

    PostDocs: C.N. Ververidis, K.V. Katsaros, P. Frangoudis

    Doctoral cand.:N. Fotiou, C. Tsilopoulos, X. Vasilakos, C. Stais, I. Thomas


    Related publications

    Related Publications

    • K.V. Katsaros, G. Xylomenos, G.C. Polyzos, “MultiCache: an Overlay Architecture for Information-Centric Networking,” Computer Networks, vol. 55, no. 4, pp. 936-947, Elsevier, Special Issue on ‘Architectures and Protocols for the Future Internet,’ Guest Editors: T. Wolf & L. Eggert, March 2011.

    • N. Fotiou, D. Trossen, G.C. Polyzos, “Illustrating a Publish-Subscribe Internet Architecture,” Telecommunication Systems, Springer, vol. 51, no. 4, Special Issue on ‘Future Internet Services and Architectures: Trends and Visions,’ pp. 233 245, December 2012.

    • G. Xylomenos, X. Vasilakos, C. Tsilopoulos, V.A. Siris, G.C. Polyzos, “Caching and Mobility Support in a Publish-Subscribe Internet Architecture,” IEEE Communications Magazine, Special Issue on ‘Information-Centric Networking,’ vol. 50, no. 7, pp. 52-58, July 2012.

    • N. Fotiou, K. Katsaros, G.C. Polyzos, M. Sarela, D. Trossen, G. Xylomenos, “Handling Mobility in Future Publish-Subscribe Information-Centric Networks,” Telecommunication Systems, Springer, Special Issue on ‘Mobility Management in the Future Internet’ (to appear).

    • P. Zhang, N. Fotiou, B.E. Helvik, G.F. Marias, G.C. Polyzos, “Analysis of the effect of InfoRanking on content pollution in P2P systems,” Security and Communication Networks, John Wiley & Sons, Ltd. (to appear).

    • C. Doukas, N. Fotiou, G.C. Polyzos, I. Maglogiannis, “Cognitive and Context Aware Assistive Environments Using Future Internet Technologies,” Special Issue on ‘Cognitive Systems for Assistive Environments,’ Universal Access in the Information Society, Springer (to appear).

    • N. Fotiou, G.F. Marias, G.C. Polyzos, “Publish-Subscribe Internetworking Security Aspects,” in Trustworthy Internet, N. Blefari-Melazzi, G. Bianchi, L. Salgarelli, eds., Springer, May 2011 (pp. 3-15, http://www.springerlink.com/content/g0l4283hq1206128/fulltext.pdf).

    [email protected]


    More related publications

    more … Related Publications

    • K.V. Katsaros, C. Stais, G. Xylomenos, G.C. Polyzos, “On the Incremental Deployment of Overlay Information Centric Networks,” Proc. Future Network & Mobile Summit, Florence, Italy, June 2010.

    • N. Fotiou, G. Marias, G.C. Polyzos, “Information Ranking in Content-Centric Networks,” Proc. Future Network & Mobile Summit, Florence, Italy, June 2010.

    • N. Fotiou, G. Marias, G.C. Polyzos, “Towards a Secure Rendezvous Network for Future Publish/Subscribe Architectures,” Proc. 3rd Future Internet Symposium, September 2010.

    • N. Fotiou, G.F. Marias, G.C. Polyzos, “Fighting Phishing the Information-Centric way,” Proc. 5th IFIPNTMS, Security Track, Istanbul, Turkey, May 2012.

    • K.V. Katsaros, G. Xylomenos, G.C. Polyzos, “GlobeTraff: a traffic workload generator for the performance evaluation of future Internet architectures,” Proc. 5th IFIPNTMS, May 2012.

    • K.V. Katsaros, et al., “On Inter-domain Name Resolution for Information-Centric Networks,” Proc. IFIP/TC6 Networking), Prague, Czech Republic, May 2012.

    • G.F. Marias, N. Fotiou, G.C. Polyzos, “Efficient Information Lookup for the Internet of Things,” Proc. First IEEE WoWMoMIoT-SoS, San Francisco, CA, June 2012.

    • X. Vasilakos, et al., “Proactive Selective Neighbor Caching for enhancing Mobility Support in Information-Centric Networks,” Proc. ACM SIGCOMM ICN'12, Helsinki, Finland, August 2012.

    • N. Fotiou, G.F. Marias, G.C. Polyzos, “Access Control Enforcement Delegation for Information-Centric Networking Architectures,” Proc. ACM SIGCOMM ICN'12, Helsinki, Finland, August 2012.

    • K.P. Liolis, et al., “Satellite-Terrestrial Integration Scenarios for Future Information-Centric Networks,” Proc. ICSSC, September 2012.

    • V.A. Siris, C.N. Ververidis, G.C. Polyzos, K. Liolis, “Information-Centric Networking Architectures for Integration of Satellites Into the Future Internet,” Proc. ESTEL, Rome, Italy, October 2012.

    • C. Tsilopoulos, I. Gasparis, G. Xylomenos, G.C. Polyzos, “Efficient Real-time Information Delivery in Future Internet Publish-Subscribe Networks,” Proc. IEEE ICNC, San Diego, CA, January 2013.

    [email protected]


    Sat scenario 1 hybrid broadcast net tv

    φSAT Scenario #1: Hybrid broadcast netTV

    • Key drivers for this scenario identification

      • DTH Broadcasting: 1st market for telecom satellites

      • Unlimited potential for hybrid access

        • To bring a boost of the link capacity

        • To increase availability of service and QoE

        • To add a return link capability for interactive/added-value services

        • To enlarge service offer (e.g. number of programs for linear / on-demand TV) with several service providers

        • To favor partnerships and competitiveness and to lower costs

      • In this context, IP/TV over MPEG-based broadcast brings ease and flexibility for service integration

        • Common standards to any access network

        • E.g. service management, native e2e IP transport…

        • New usages and trends of TV consumption


    Scenario 1 hybrid broadcast net tv

    Scenario #1: Hybrid broadcast netTV


    Sat scenario 2 smart m2m transport

    φSAT Scenario #2: Smart M2M Transport

    Smart Transport M2M use case

    • Key Challenges

      • Mobility support

    • ICN Specific Advantages

      • Information collection and

        dissemination to/from

        multiple sources/sinks

      • Information aggregation

      • Traffic Prioritization

      • Mobility support

      • Delay tolerant communications

      • Reliable real-time SW upgrading


    Sat scenario 3 extended 4g backhauling

    φSAT Scenario #3: Extended 4G Backhauling

    • Key driver for this scenario

      • Provides advantages in SatCom integration within the 4G/mobile Internet context given the aggressive video traffic growth levels in terrestrial mobile networks.

      • Integrating satellite in a terrestrial 4G infrastructure allows Service Providers to extend their services towards isolated areas and enhance network capabilities for more efficient video content delivery, such as Evolved Multimedia Broadcast Multicast (eMBMS).

    • Satellite Network Configuration

      • GEO or MEO topology

      • In some areas terrestrial repeaters (such as in systems based on DVB-SH and –NGH) could also be used to boost the satellite signal, e.g. for reception in urban areas (Hybrid satellite –LTE system).

    • ICN potential

      • QoS based inter-component handover management

      • Opportunistic/proactive caching for satellite backhauled BS

      • Traffic Aggregation & Caching for operator managed VAS


    Sat scenario 3 extended 4g backhauling1

    φSAT Scenario #3: Extended 4G Backhauling


  • Login