Table 2. CPA detection and mitigation.
| References | NDN node | Detection | Mitigation | Overhead |
|---|---|---|---|---|
| Gasti et al. (2012) | Consumer, Router | Signature, PPKD | SSCIC, DSCIC | Verification of random signatures |
| Ghali, Tsudik & Uzun (2014a) | Consumer | Signature | Content ranking | Content ranking calculation |
| Ghali, Tsudik & Uzun (2014b) | Router | PPKD and signature | Interest key binding | Signature verification |
| Nam, Kim & Yeom (2015) | Router | Signature | SLRU extension | Signature verification |
| Kim et al. (2015) | Router | Signature | SLRU extension | Signature verification |
| Wu et al. (2016) | Consumer, router | Signature | Reputation based forwarding | Signature verification |
| Kim et al. (2017) | Router | Signature in case of cache-hit | SLRU extension | Signature verification |
| DiBenedetto & Papadopoulos (2016) | Consumer, router | Signature | Modified forwarding strategy | Complete Bogus packet in reissued interest packet |
| Hu et al. (2018) | Consumer, router | PPKD and signature | Name-key based forwarding and multipath forwarding based inband probe | Signature verification (Hash matching is fast due to PPKD entry) |