Skip to main content
. 2021 Mar 17;7:e435. doi: 10.7717/peerj-cs.435

Table 2. CPA detection and mitigation.

References NDN node Detection Mitigation Overhead
Gasti et al. (2012) Consumer, Router Signature, PPKD SSCIC, DSCIC Verification of random signatures
Ghali, Tsudik & Uzun (2014a) Consumer Signature Content ranking Content ranking calculation
Ghali, Tsudik & Uzun (2014b) Router PPKD and signature Interest key binding Signature verification
Nam, Kim & Yeom (2015) Router Signature SLRU extension Signature verification
Kim et al. (2015) Router Signature SLRU extension Signature verification
Wu et al. (2016) Consumer, router Signature Reputation based forwarding Signature verification
Kim et al. (2017) Router Signature in case of cache-hit SLRU extension Signature verification
DiBenedetto & Papadopoulos (2016) Consumer, router Signature Modified forwarding strategy Complete Bogus packet in reissued interest packet
Hu et al. (2018) Consumer, router PPKD and signature Name-key based forwarding and multipath forwarding based inband probe Signature verification (Hash matching is fast due to PPKD entry)