{"id":"https://openalex.org/W2571088221","doi":"https://doi.org/10.1109/nof.2016.7810123","title":"Content pollution mitigation for Content-Centric Networking","display_name":"Content pollution mitigation for Content-Centric Networking","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2571088221","doi":"https://doi.org/10.1109/nof.2016.7810123","mag":"2571088221"},"language":"en","primary_location":{"id":"doi:10.1109/nof.2016.7810123","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nof.2016.7810123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 7th International Conference on the Network of the Future (NOF)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112869091","display_name":"Igor Ribeiro","orcid":null},"institutions":[{"id":"https://openalex.org/I161127581","display_name":"Universidade Federal Fluminense","ror":"https://ror.org/02rjhbb08","country_code":"BR","type":"education","lineage":["https://openalex.org/I161127581"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Igor Ribeiro","raw_affiliation_strings":["Computing Institute, Fluminense Federal University, Brazil"],"affiliations":[{"raw_affiliation_string":"Computing Institute, Fluminense Federal University, Brazil","institution_ids":["https://openalex.org/I161127581"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063546140","display_name":"Ant\u00f4nio Alencar Rocha","orcid":"https://orcid.org/0000-0001-7042-2506"},"institutions":[{"id":"https://openalex.org/I161127581","display_name":"Universidade Federal Fluminense","ror":"https://ror.org/02rjhbb08","country_code":"BR","type":"education","lineage":["https://openalex.org/I161127581"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Antonio Rocha","raw_affiliation_strings":["Computing Institute, Fluminense Federal University, Brazil"],"affiliations":[{"raw_affiliation_string":"Computing Institute, Fluminense Federal University, Brazil","institution_ids":["https://openalex.org/I161127581"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066716326","display_name":"C\u00e9lio Albuquerque","orcid":"https://orcid.org/0000-0002-7959-6569"},"institutions":[{"id":"https://openalex.org/I161127581","display_name":"Universidade Federal Fluminense","ror":"https://ror.org/02rjhbb08","country_code":"BR","type":"education","lineage":["https://openalex.org/I161127581"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Celio Albuquerque","raw_affiliation_strings":["Computing Institute, Fluminense Federal University, Brazil"],"affiliations":[{"raw_affiliation_string":"Computing Institute, Fluminense Federal University, Brazil","institution_ids":["https://openalex.org/I161127581"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058691584","display_name":"Flavio Guimaraes","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Flavio Guimaraes","raw_affiliation_strings":["Cyber Defense Division, Brazilian Navy"],"affiliations":[{"raw_affiliation_string":"Cyber Defense Division, Brazilian Navy","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5112869091"],"corresponding_institution_ids":["https://openalex.org/I161127581"],"apc_list":null,"apc_paid":null,"fwci":1.1581,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.82418632,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7978420257568359},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.6831908226013184},{"id":"https://openalex.org/keywords/content-centric-networking","display_name":"Content centric networking","score":0.6512067317962646},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6457933783531189},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5897461175918579},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5393102169036865},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.538378894329071},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5252651572227478},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4807046055793762},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.42301058769226074},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14499327540397644},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.13148906826972961}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7978420257568359},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.6831908226013184},{"id":"https://openalex.org/C2779649860","wikidata":"https://www.wikidata.org/wiki/Q18206174","display_name":"Content centric networking","level":3,"score":0.6512067317962646},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6457933783531189},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5897461175918579},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5393102169036865},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.538378894329071},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5252651572227478},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4807046055793762},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.42301058769226074},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14499327540397644},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.13148906826972961},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nof.2016.7810123","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nof.2016.7810123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 7th International Conference on the Network of the Future (NOF)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1531139788","https://openalex.org/W1826985456","https://openalex.org/W1992523130","https://openalex.org/W2018793106","https://openalex.org/W2091803449","https://openalex.org/W2112878730","https://openalex.org/W2177058407","https://openalex.org/W2337767373","https://openalex.org/W2962973644","https://openalex.org/W3159998597","https://openalex.org/W6631441690"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W2765763546","https://openalex.org/W96612179","https://openalex.org/W4386482731","https://openalex.org/W4229499248","https://openalex.org/W4385302085","https://openalex.org/W4399308252","https://openalex.org/W1561553168","https://openalex.org/W2165201607","https://openalex.org/W2005315877"],"abstract_inverted_index":{"Content-Centric":[0],"Networking":[1],"-":[2],"CCN":[3,15],"is":[4,43],"a":[5,18,64,77],"prominent":[6],"architectural":[7],"proposal":[8],"for":[9],"the":[10,58,84,88,94,99,119,141,146,150,158,163,181,188,195],"future":[11],"Internet.":[12],"Even":[13],"though":[14],"design":[16],"includes":[17],"set":[19],"of":[20,32,40,66,90,183,190],"security":[21,35],"mechanisms":[22],"in":[23,57,83,149,194],"order":[24],"to":[25,26,52,63,86,93,113,153,157,179],"ensure":[27],"authenticity,":[28],"integrity":[29],"and":[30,127,186],"confidentiality":[31],"contents,":[33,55],"some":[34],"threats":[36,42],"still":[37],"exists.":[38],"One":[39],"these":[41,172],"content":[44],"pollution,":[45],"where":[46],"malicious":[47],"users":[48,51,178],"cause":[49],"legitimate":[50],"retrieve":[53,180],"incorrect":[54],"what,":[56],"worst":[59],"scenario,":[60],"can":[61],"lead":[62],"denial":[65],"service":[67],"attack.":[68],"To":[69],"mitigate":[70],"this":[71,105],"problem":[72],"it":[73],"was":[74],"proposed":[75],"CCNCheck,":[76],"mechanism":[78],"that":[79,171],"makes":[80,98],"all":[81],"routers":[82,121,152],"network":[85,120,196],"check":[87],"signature":[89],"contents":[91,185],"according":[92,156],"same":[95],"probability,":[96],"which":[97],"mechanism's":[100],"efficiency":[101],"very":[102],"topology-dependent.":[103],"In":[104,140],"paper":[106],"we":[107,144],"propose":[108],"two":[109,123,131,136],"different":[110,137],"deployment":[111],"approaches":[112,173],"CCNCheck.":[114],"The":[115],"first":[116],"one":[117],"splits":[118],"into":[122],"groups:":[124],"border":[125,151],"router":[126],"core":[128],"routers.":[129],"These":[130],"groups":[132],"were":[133],"associated":[134],"with":[135],"verification":[138,147],"probabilities.":[139],"second":[142],"approach,":[143],"let":[145],"probability":[148],"vary":[154],"dynamically,":[155],"pollution":[159],"level":[160],"perceived":[161],"by":[162],"router.":[164],"We":[165],"have":[166],"shown":[167],"through":[168],"simulation":[169],"experiments":[170],"reduce":[174],"topology":[175],"dependency,":[176],"allow":[177],"majority":[182],"requested":[184],"reduces":[187],"number":[189],"polluted":[191],"messages":[192],"forwarded":[193],"core.":[197]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
