Named Data Networking (NDN), Internet Architecture Design and Security Attacks
G. Arulkumaran1, N. R. Rajalakshmi2

1G. Arulkumaran, Assistant Professor, Vel Tech Rangarajan Dr.Sagunthala R&D institute of Science And Technology, Chennai, India.

2N. R. Rajalakshmi, Associate Professor, Vel Tech Rangarajan Dr.Sagunthala R&D institute of Science And Technology, Chennai, India.

Manuscript received on 15 September 2019 | Revised Manuscript received on 23 September 2019 | Manuscript Published on 11 October 2019 | PP: 1281-1284 | Volume-8 Issue-11S September 2019 | Retrieval Number: K125809811S19/2019©BEIESP | DOI: 10.35940/ijitee.K1258.09811S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (

Abstract: In Internet over established communication medium a packet in a network transmit data where users and data server with specific IP addresses interacted each other. Recent years, this peer to peer data communication also called as client – server data communication. Modern applications like YouTube, Social Networks and Bit Torrent have revolutionized the idea of user generated contents. The end users care only for precise data items irrespective of their sources. So, the importance is based on precise data called as named data rather than using IP addresses to recognize servers hosting a meticulous content. Likewise, necessity of IP addresses is a demanding issue persistent the Internet community. Due to content-centric networking platform, in which data has less importance, and proposed new terminology called Named Data Networking. NDN allows end users to float a new data request without any awareness about the end user host. Compare to Internet services NDN can handle security issues and user mobility, more efficiently. In this paper, we surveyed different network issues and security attacks in Named Data Networks and its counter measures and also we identified a set of current challenges in NDN for budding researchers in due course.

Keywords: Named Data Networking, IP address, Security attacks, NDN Security
Scope of the Article: Social Networks