Annals of Telecommunications
https://doi.org/10.1007/s12243-018-0669-9
Cache nFace: a simple countermeasure for the producer-consumer
collusion attack in Named Data Networking
Andr ´ e Nasserala
1,2
· Ian Vilar Bastos
1
· Igor Monteiro Moraes
1
Received: 13 June 2018 / Accepted: 5 October 2018
© Institut Mines-T´ el´ ecom and Springer Nature Switzerland AG 2018
Abstract
We propose, in this paper, a countermeasure against the producer-consumer collusion attack in Named Data Networking
(NDN). In this attack, malicious nodes act in collusion by generating content requests at high rate and thus changing content
popularity. The goal of the attack is to reduce in-network caching efficiency by increasing the probability of legitimate
consumers to retrieve contents directly from the producer. The proposed countermeasure, called Cache nFace, mitigates this
attack by dividing the cache of a node into sub-caches. Each sub-cache only stores contents requested through one specific
network interface. Our assumption is that malicious requests do not arrive simultaneously at all interfaces of a content
router very often. Results show that cache nFace reduces up to 50% the effectiveness of the attack and outperforms another
proposal found in the literature in all the analyzed scenarios.
Keywords Collusion attack · Network security · Named Data Networking
1 Introduction
Information-centric networking (ICN) is a new communica-
tion paradigm for the Internet [1, 2]. ICN aims at delivering
contents to users regardless of the location of these contents,
as opposed to the TCP/IP stack, that aims at interconnecting
end systems. Several architectures have been proposed for
this new communication paradigm and the most cited in the
literature is the Named Data Networking (NDN) [1, 3]. The
main features of NDN are routing based on content names,
in-network caching, and content-based security [1, 4].
The advantage brought by NDN is the indirect content
retrieval because of its in-network caching technique [5].
Andr´ e Nasserala
nasserala@ufac.br
Ian Vilar Bastos
ianvilar@id.uff.br
Igor Monteiro Moraes
igor@ic.uff.br
1
Laborat´ orio M´ıdiaCom, PGC-TCC, Instituto de Computac¸˜ ao,
Universidade Federal Fluminense, Niter´ oi, Brazil
2
Centro de Ciˆ encias Exatas e Tecnol´ ogicas, Universidade
Federal do Acre, Rio Branco, Brazil
With NDN, if any node in the network receives a content
request and has the content stored in cache, this node is able
to send back the content to the requesting node. The con-
sumer is the node that requests a content and the producer
is the source of this content. In-network caching therefore
allows nodes closer to the consumer to satisfy the content
request and thus the content retrieval time is reduced [6, 7].
In addition, in-network caching increases content availabil-
ity and can reduce bandwidth usage because contents tra-
verse less number of hops towards consumers very often [8].
NDN has also the advantage of securing the content
itself [3]. With NDN, each content packet contains a digital
signature and the producer’s public key or indicates how to
obtain this key [1]. Thus, consumers are able to verify the
integrity of packets and if the packet has been generated by
the producer that possesses that public key. NDN archi-
tecture is also more robust against denial-of-service (DoS)
attacks that are common in the TCP/IP stack, such as
bandwidth depletion and reflection, because intermediate
nodes cache contents and aggregate content requests [9], as
discussed in Section 2.
NDN, however, is not able to handle a particular DoS
attack [10, 11] called producer-consumer collusion attack,
which aims at increasing the content retrieval time. In this
attack, malicious consumers request contents that are only
available in malicious producers at high rate. The retrieval
time of legitimate contents increases, in this case, because