Research Article

A Secure Dynamic Content Delivery Scheme in Named Data Networking

Table 3

State-of-the-art comparative analysis.

ReferenceExecution nodeFor dynamic contentCountermeasures
Detection byOverheadAuthNProposed method

Gasti et al. [11]Consumer and routersNoPPKD and signatureHighNoStatic content digest
Ghali et al. [1]ConsumerYesSignatureHighNoRanking
Nam et al. [19]RoutersNoSignature if cache hitsLowNoSegmented least recently used
Kim et al. [20]RoutersNoSignature if cache hitsLowNoSegmented least recently used
Hu et al. [21]Consumers and routersNoPPKD and signatureHighNoMultipath forwarding
Mai et al. [22]RoutersNoMatricesHighNoBayesian network
Ghali et al. [2, 6]Consumers and routersNoPPKD and signatureLowNoName-key binding
Kai et al. [3, 4]Consumer and routersYesPPKD and signatureHighNoName-key binding
Khelifi et al. [8]RoutersYesSignatureHighNoRanking