Sergey Nivens - Fotolia
I read about a new Internet architecture called Named Data Networking, or NDN, that was designed to address the growth of mobile technology. How does NDN work? Will it really replace TCP/IP? Are there any security implications enterprises should be aware of should it be used in our environments?
The taxpayer-sponsored Named Data Networking project backed by the National Science Foundation aims to reengineer how the Internet works.
The "named data" feature uses data names instead of IP addresses to deliver information. The overall goal of the project is to create a more secure and bandwidth-friendly Internet environment for us to benefit from. Key components of NDN include adaptive traffic routing and forwarding, data-centric security and cryptographic authentication.
So will NDN replace the TCP/IP-based Internet as we know it? I'm no wizard with a crystal ball, but I suspect the odds of that happening are about as good as someone coming up with a truly usable replacement for passwords. However, I could certainly see this technology being beneficial in niche areas such as academia, government agencies and certain cloud environments given their available bandwidth and greater focus on security.
As for security implications, like most other emerging technologies, those remain to be discovered. Even though NDN is intended to be secure from the ground up, there are criminal hackers out there who are smarter than those developing NDN -- and they'll no doubt get their way if and when NDN hits the mainstream. Perhaps we will see an entirely new set of security threats and vulnerabilities that we can't yet imagine.
Ask the Expert:
Perplexed about network security? Send Kevin Beaver your questions today. (All questions are anonymous.)
Get more info about security and the TCP/IP stack
Dig Deeper on IPv6 security and network protocols security
Related Q&A from Kevin Beaver
Explore the differing roles of inbound versus outbound firewall rules for enterprise network security and the varying use cases for each. Continue Reading
Compare host IDS vs. network IDS through the pros and cons of each, and learn how more modern systems may be better suited to ensure effective ... Continue Reading
Different tools protect different assets at the network and application layers. But both network and application security need to support the larger ... Continue Reading