Sergey Nivens - Fotolia
I read about a new Internet architecture called Named Data Networking, or NDN, that was designed to address the growth of mobile technology. How does NDN work? Will it really replace TCP/IP? Are there any security implications enterprises should be aware of should it be used in our environments?
The taxpayer-sponsored Named Data Networking project backed by the National Science Foundation aims to reengineer how the Internet works.
The "named data" feature uses data names instead of IP addresses to deliver information. The overall goal of the project is to create a more secure and bandwidth-friendly Internet environment for us to benefit from. Key components of NDN include adaptive traffic routing and forwarding, data-centric security and cryptographic authentication.
So will NDN replace the TCP/IP-based Internet as we know it? I'm no wizard with a crystal ball, but I suspect the odds of that happening are about as good as someone coming up with a truly usable replacement for passwords. However, I could certainly see this technology being beneficial in niche areas such as academia, government agencies and certain cloud environments given their available bandwidth and greater focus on security.
As for security implications, like most other emerging technologies, those remain to be discovered. Even though NDN is intended to be secure from the ground up, there are criminal hackers out there who are smarter than those developing NDN -- and they'll no doubt get their way if and when NDN hits the mainstream. Perhaps we will see an entirely new set of security threats and vulnerabilities that we can't yet imagine.
Ask the Expert:
Perplexed about network security? Send Kevin Beaver your questions today. (All questions are anonymous.)
Get more info about security and the TCP/IP stack
Dig Deeper on IPv6 security and network protocols security
Related Q&A from Kevin Beaver
The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains ... Continue Reading
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an ... Continue Reading
Android Oreo replaced the allow unknown sources setting with a new feature that enables users to selectively install unknown apps. Kevin Beaver ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.