Research Article
A Secure Dynamic Content Delivery Scheme in Named Data Networking
Table 3
State-of-the-art comparative analysis.
| Reference | Execution node | For dynamic content | Countermeasures | Detection by | Overhead | AuthN | Proposed method |
| Gasti et al. [11] | Consumer and routers | No | PPKD and signature | High | No | Static content digest | Ghali et al. [1] | Consumer | Yes | Signature | High | No | Ranking | Nam et al. [19] | Routers | No | Signature if cache hits | Low | No | Segmented least recently used | Kim et al. [20] | Routers | No | Signature if cache hits | Low | No | Segmented least recently used | Hu et al. [21] | Consumers and routers | No | PPKD and signature | High | No | Multipath forwarding | Mai et al. [22] | Routers | No | Matrices | High | No | Bayesian network | Ghali et al. [2, 6] | Consumers and routers | No | PPKD and signature | Low | No | Name-key binding | Kai et al. [3, 4] | Consumer and routers | Yes | PPKD and signature | High | No | Name-key binding | Khelifi et al. [8] | Routers | Yes | Signature | High | No | Ranking |
|
|