An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking

<p dir="ltr">Named data networking (NDN) has been viewed as a promising future Internet architecture due to its data-centric design. It requires a new security model that is orienting data but not devices. In this paper, an advanced hierarchical identity-based security mechanism by b...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Bing Li (43671) (author)
مؤلفون آخرون: Maode Ma (16864158) (author)
منشور في: 2022
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513546032775168
author Bing Li (43671)
author2 Maode Ma (16864158)
author2_role author
author_facet Bing Li (43671)
Maode Ma (16864158)
author_role author
dc.creator.none.fl_str_mv Bing Li (43671)
Maode Ma (16864158)
dc.date.none.fl_str_mv 2022-11-17T09:00:00Z
dc.identifier.none.fl_str_mv 10.1007/s10922-022-09689-x
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/An_Advanced_Hierarchical_Identity-Based_Security_Mechanism_by_Blockchain_in_Named_Data_Networking/29413403
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Data management and data science
Named data networking
Security
Blockchain
Hierarchical identity- based cryptography
dc.title.none.fl_str_mv An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p dir="ltr">Named data networking (NDN) has been viewed as a promising future Internet architecture due to its data-centric design. It requires a new security model that is orienting data but not devices. In this paper, an advanced hierarchical identity-based security mechanism by blockchain (AHISM-B) is to be proposed for the NDN networks. On one hand, the hierarchical identity-based cryptology is used to bind the data name to a public key. The valid public parameters would be requested by consumers with the Interest packets so that consumers would compose producers’ public keys to authenticate producers and verify the integrity of the Data packets. On the other hand, a blockchain is employed to manage public parameters to avoid catastrophes due to a single node failure. Both of the security proof result and the formal validation result indicate that the proposed AHISM-B is secure. Moreover, the simulation results show that the performance of our AHISM-B outperforms that of the classic NDN scheme. Especially, the average response delay of the AHISM-B scheme is less by 8% than that of the classic NDN scheme. With the increase of the average arrival rate of Interest packets, the advantage of the AHISM-B could be enhanced further to 11%.</p><h2>Other Information</h2><p dir="ltr">Published in: Journal of Network and Systems Management<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s10922-022-09689-x" target="_blank">https://dx.doi.org/10.1007/s10922-022-09689-x</a></p>
eu_rights_str_mv openAccess
id Manara2_d8dce65f51c6f260ac772fe5a15e9683
identifier_str_mv 10.1007/s10922-022-09689-x
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/29413403
publishDate 2022
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data NetworkingBing Li (43671)Maode Ma (16864158)Information and computing sciencesCybersecurity and privacyData management and data scienceNamed data networkingSecurityBlockchainHierarchical identity- based cryptography<p dir="ltr">Named data networking (NDN) has been viewed as a promising future Internet architecture due to its data-centric design. It requires a new security model that is orienting data but not devices. In this paper, an advanced hierarchical identity-based security mechanism by blockchain (AHISM-B) is to be proposed for the NDN networks. On one hand, the hierarchical identity-based cryptology is used to bind the data name to a public key. The valid public parameters would be requested by consumers with the Interest packets so that consumers would compose producers’ public keys to authenticate producers and verify the integrity of the Data packets. On the other hand, a blockchain is employed to manage public parameters to avoid catastrophes due to a single node failure. Both of the security proof result and the formal validation result indicate that the proposed AHISM-B is secure. Moreover, the simulation results show that the performance of our AHISM-B outperforms that of the classic NDN scheme. Especially, the average response delay of the AHISM-B scheme is less by 8% than that of the classic NDN scheme. With the increase of the average arrival rate of Interest packets, the advantage of the AHISM-B could be enhanced further to 11%.</p><h2>Other Information</h2><p dir="ltr">Published in: Journal of Network and Systems Management<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s10922-022-09689-x" target="_blank">https://dx.doi.org/10.1007/s10922-022-09689-x</a></p>2022-11-17T09:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1007/s10922-022-09689-xhttps://figshare.com/articles/journal_contribution/An_Advanced_Hierarchical_Identity-Based_Security_Mechanism_by_Blockchain_in_Named_Data_Networking/29413403CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/294134032022-11-17T09:00:00Z
spellingShingle An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
Bing Li (43671)
Information and computing sciences
Cybersecurity and privacy
Data management and data science
Named data networking
Security
Blockchain
Hierarchical identity- based cryptography
status_str publishedVersion
title An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
title_full An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
title_fullStr An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
title_full_unstemmed An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
title_short An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
title_sort An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
topic Information and computing sciences
Cybersecurity and privacy
Data management and data science
Named data networking
Security
Blockchain
Hierarchical identity- based cryptography