An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
<p dir="ltr">Named data networking (NDN) has been viewed as a promising future Internet architecture due to its data-centric design. It requires a new security model that is orienting data but not devices. In this paper, an advanced hierarchical identity-based security mechanism by b...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | |
| منشور في: |
2022
|
| الموضوعات: | |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513546032775168 |
|---|---|
| author | Bing Li (43671) |
| author2 | Maode Ma (16864158) |
| author2_role | author |
| author_facet | Bing Li (43671) Maode Ma (16864158) |
| author_role | author |
| dc.creator.none.fl_str_mv | Bing Li (43671) Maode Ma (16864158) |
| dc.date.none.fl_str_mv | 2022-11-17T09:00:00Z |
| dc.identifier.none.fl_str_mv | 10.1007/s10922-022-09689-x |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/An_Advanced_Hierarchical_Identity-Based_Security_Mechanism_by_Blockchain_in_Named_Data_Networking/29413403 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Information and computing sciences Cybersecurity and privacy Data management and data science Named data networking Security Blockchain Hierarchical identity- based cryptography |
| dc.title.none.fl_str_mv | An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <p dir="ltr">Named data networking (NDN) has been viewed as a promising future Internet architecture due to its data-centric design. It requires a new security model that is orienting data but not devices. In this paper, an advanced hierarchical identity-based security mechanism by blockchain (AHISM-B) is to be proposed for the NDN networks. On one hand, the hierarchical identity-based cryptology is used to bind the data name to a public key. The valid public parameters would be requested by consumers with the Interest packets so that consumers would compose producers’ public keys to authenticate producers and verify the integrity of the Data packets. On the other hand, a blockchain is employed to manage public parameters to avoid catastrophes due to a single node failure. Both of the security proof result and the formal validation result indicate that the proposed AHISM-B is secure. Moreover, the simulation results show that the performance of our AHISM-B outperforms that of the classic NDN scheme. Especially, the average response delay of the AHISM-B scheme is less by 8% than that of the classic NDN scheme. With the increase of the average arrival rate of Interest packets, the advantage of the AHISM-B could be enhanced further to 11%.</p><h2>Other Information</h2><p dir="ltr">Published in: Journal of Network and Systems Management<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s10922-022-09689-x" target="_blank">https://dx.doi.org/10.1007/s10922-022-09689-x</a></p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_d8dce65f51c6f260ac772fe5a15e9683 |
| identifier_str_mv | 10.1007/s10922-022-09689-x |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/29413403 |
| publishDate | 2022 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data NetworkingBing Li (43671)Maode Ma (16864158)Information and computing sciencesCybersecurity and privacyData management and data scienceNamed data networkingSecurityBlockchainHierarchical identity- based cryptography<p dir="ltr">Named data networking (NDN) has been viewed as a promising future Internet architecture due to its data-centric design. It requires a new security model that is orienting data but not devices. In this paper, an advanced hierarchical identity-based security mechanism by blockchain (AHISM-B) is to be proposed for the NDN networks. On one hand, the hierarchical identity-based cryptology is used to bind the data name to a public key. The valid public parameters would be requested by consumers with the Interest packets so that consumers would compose producers’ public keys to authenticate producers and verify the integrity of the Data packets. On the other hand, a blockchain is employed to manage public parameters to avoid catastrophes due to a single node failure. Both of the security proof result and the formal validation result indicate that the proposed AHISM-B is secure. Moreover, the simulation results show that the performance of our AHISM-B outperforms that of the classic NDN scheme. Especially, the average response delay of the AHISM-B scheme is less by 8% than that of the classic NDN scheme. With the increase of the average arrival rate of Interest packets, the advantage of the AHISM-B could be enhanced further to 11%.</p><h2>Other Information</h2><p dir="ltr">Published in: Journal of Network and Systems Management<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s10922-022-09689-x" target="_blank">https://dx.doi.org/10.1007/s10922-022-09689-x</a></p>2022-11-17T09:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1007/s10922-022-09689-xhttps://figshare.com/articles/journal_contribution/An_Advanced_Hierarchical_Identity-Based_Security_Mechanism_by_Blockchain_in_Named_Data_Networking/29413403CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/294134032022-11-17T09:00:00Z |
| spellingShingle | An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking Bing Li (43671) Information and computing sciences Cybersecurity and privacy Data management and data science Named data networking Security Blockchain Hierarchical identity- based cryptography |
| status_str | publishedVersion |
| title | An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking |
| title_full | An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking |
| title_fullStr | An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking |
| title_full_unstemmed | An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking |
| title_short | An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking |
| title_sort | An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking |
| topic | Information and computing sciences Cybersecurity and privacy Data management and data science Named data networking Security Blockchain Hierarchical identity- based cryptography |