Abstract
AbstractNamed data networking (NDN) has been viewed as a promising future Internet architecture due to its data-centric design. It requires a new security model that is orienting data but not devices. In this paper, an advanced hierarchical identity-based security mechanism by blockchain (AHISM-B) is to be proposed for the NDN networks. On one hand, the hierarchical identity-based cryptology is used to bind the data name to a public key. The valid public parameters would be requested by consumers with the Interest packets so that consumers would compose producers’ public keys to authenticate producers and verify the integrity of the Data packets. On the other hand, a blockchain is employed to manage public parameters to avoid catastrophes due to a single node failure. Both of the security proof result and the formal validation result indicate that the proposed AHISM-B is secure. Moreover, the simulation results show that the performance of our AHISM-B outperforms that of the classic NDN scheme. Especially, the average response delay of the AHISM-B scheme is less by 8% than that of the classic NDN scheme. With the increase of the average arrival rate of Interest packets, the advantage of the AHISM-B could be enhanced further to 11%.
Funder
Shenzhen Education Science Planning Leading Group Funds
Shenzhen Science and Technology Innovation Committee Funds
Qatar University
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Computer Networks and Communications,Hardware and Architecture,Information Systems
Reference34 articles.
1. Li, Z., Xu, Y., Zhang, B., Yan, L., Liu, K.: Packet forwarding in named data networking requirements and survey of solutions. IEEE Commun. Surveys Tutor. 21(2), 1950–1987 (2019)
2. AbdAllah, E.G., Hassanein, H.S., Zulkernine, M.: A survey of security attacks in information-centric networking. IEEE Commun. Survey Tutor. 17(3), 1441–1454 (2015)
3. Chatterjee, T., Ruj, S., Bit, S.D.: Security issues in named data networks. Computer 51(1), 66–75 (2018)
4. Borrego, C., Amadeo, M., Molinaro, A., Jhaveri, R.H.: Privacy-preserving forwarding using homomorphic encryption for information-centric wireless ad hoc networks. IEEE Commun. Lett. 23(10), 1708–1711 (2019)
5. Sagar, R., Jhaveri, R., Borrego, C.: Applications in security and evasions in machine learning: a survey. Electronics 9(97), 1–42 (2020)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献