REVIEW: PERBANDINGAN SOLUSI KEAMANAN SKALABILITAS DALAM NDN

Authors

  • Adhitya Fathana
  • I Putu Sugi Almantara

DOI:

https://doi.org/10.36002/jutik.v10i1.2719

Keywords:

ABAC, NDN, RBAC, Security, SLR

Abstract

Penelitian ini mengulas kinerja dan keamanan NDN dengan fokus pada solusi terhadap masalah skalabilitas. NDN, sebagai bagian dari ICN, menawarkan pendekatan unik dengan penamaan data (objek) sebagai inti, berbeda dengan pendekatan TCP/IP yang berorientasi pada alamat lokasi. Penerapan RBAC dan ABAC dievaluasi melalui metode SLR. Hasil penelitian menyoroti kinerja positif NDN dalam menangani masalah loop, meningkatkan waktu tanggap, dan throughput yang baik. Keamanan NDN ditingkatkan melalui enkripsi data, otentikasi, dan tanda tangan digital. Pencegahan ancaman dan evolusi keamanan menuntut solusi kontrol akses yang adaptif. Solusi yang diusulkan mencakup penggunaan teknologi keamanan canggih, penerapan enkripsi yang kuat, otentikasi yang diperluas, dan integrasi kecerdasan buatan untuk respons proaktif terhadap ancaman keamanan.

References

Muhammad umar Aftab, Zhiguang Qin, Zakria, Safeer Ali, Pirah, Jalaluddin Khan. (2018). The Evaluation and Comparative Analysis of Role Based Access Control and Attribute Based Access Control Model. 2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) (pp. 35 - 39). Chengdu, China: IEEE.

Tody Ariefianto Wibowo, N. R. (2019). Named Data Network (NDN) Scalability Problem. 2019 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob) (pp. 112 - 118). Bali, Indonesia: IEEE.

Zhiwei Yan, Yong-Jin Park, Yu-Beng Leau, Lee Ren-Ting, Rosilah Hassan. (2020). Hybrid Network Mobility Support in Named Data Networking. 2020 International Conference on Information Networking (ICOIN) (pp. 16 - 19). Barcelona, Spain: IEEE.

Ratna Mayasari, Nana Rachmana Syambas. (2020). Machine Learning on Named Data Network: A survey Routing and Forwarding Strategy. 2020 14th International Conference on Telecommunication Systems, Services, and Applications (TSSA) (pp. 1 - 5). Bandung, Indonesia: IEEE.

Sri Astuti, Tody Ariefianto Wibowo, Ratna Mayasari, Ibnu Asror, Gregorius Pradana Satriawan. (2020). Klasifikasi Data Delay dengan LFID Strategi Forwarding menggunakan Machine Learning untuk Memaksimalkan Kinerja Jaringan NDN (Named Data Network). Vol. 14 No. 2 (2020): Jurnal Computech &Bisnis (e

-Journal), 115-122.

Peiter Solarso Pasaribu, Leanna Vidya Yovita, Sofia Naning Hertiana. (2022). Analisis Perbandingan Kinerja Routing Statis Pada Named Data Networking Berbasis Software Defined Networking Dan Routing Nlsr Pada NDN Tradisional. e-Proceeding of Engineering : Vol.8, No.6 Desember 2022, 2691-2700.

Yaoqing Liu, Anthony Dowling, Lauren Huie. (2020). Benchmarking Network Performance in Named Data Networking (NDN). 2020 29th Wireless and Optical Communications Conference (WOCC) (pp. 1 - 6). Newark, NJ, USA: IEEE.

Yu Zhang, Zhongda Xia, Alexander Afanasyev, Lixia Zhang. (2019). A Note on Routing Scalability in Named Data Networking. 2019 IEEE International Conference on Communications Workshops (ICC Workshops). Shanghai, China: IEEE.

Ahmad Tantoni, Arief Setyanto, Eko Pramono. (2018). ANALISIS DAN PERANCANGAN BLUEPRINT INFRASTRUKTUR JARINGAN KOMPUTER UNTUK MENDUKUNG IMPLEMENTASI SISTEM INFORMASI PADA STMIK LOMBOK. Jurnal Informasi Interaktif Vol.3 No.1 Januari 2018, 67 - 76.

Elídio Tomás Silva, António Luís Duarte Costa, Joaquim Melo Henriques Macedo. (2022). On the realization of VANET using named data networking: On improvement of VANET using NDN-based routing, caching, and security. International Journal of Communication Systems Volume 35, Issue 18, 1-48.

Zakaria Sabir, Aouatif Amine. (2021). Connected Vehicles using NDN: Security Concerns and Remaining Challenges. 2021 7th International Conference on Optimization and Applications (ICOA) (pp. 1 - 6). Wolfenbüttel, Germany: IEEE.

Prajisha C, Vasudevan A R. (2020). Security Challenges in NDN Based Underwater Wireless Sensor Networks: An Overview. Proceedings of the 2nd International Conference on IoT, Social, Mobile, Analytics & Cloud in Computational Vision & Bio-Engineering (ISMAC-CVB 2020) (pp. 210-223). India: SSRN.

Yuan Fei, Huibiao Zhu, Phan Cong Vinh . (2020). Security Analysis of the Access Control Solution of NDN Using BAN Logic. Mobile Networks and Applications.

Philipp Moll, Varun Patil, Lan Wang, Lixia Zhang . (2022). SoK: The evolution of distributed dataset synchronization solutions in NDN. ICN '22: Proceedings of the 9th ACM Conference on Information-Centric Networking, 33–44.

Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural. (2019). Deploying ABAC policies using RBAC systems. Journal of Computer Security, 483–506.

Marcel Danilescu. (2021). Comparative Study of Access Control Methods in Enterprise Information Systems, Based on RBAC, ABAC, and TBAC policies. Performance and Risks in the European Economy, 177-184.

Kritika Soni, Suresh Kumar. (2019). Comparison of RBAC and ABAC Security Models for Private Cloud. 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon) (pp. 584 - 587). Faridabad, India: IEEE

Downloads

Published

2024-01-04

How to Cite

Adhitya Fathana, & I Putu Sugi Almantara. (2024). REVIEW: PERBANDINGAN SOLUSI KEAMANAN SKALABILITAS DALAM NDN. JUTIK : Jurnal Teknologi Informasi Dan Komputer, 10(1). https://doi.org/10.36002/jutik.v10i1.2719

Similar Articles

<< < 1 2 

You may also start an advanced similarity search for this article.