期刊文献+
共找到22篇文章
< 1 2 >
每页显示 20 50 100
A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking 被引量:1
1
作者 Arif Hussain Magsi Ali Ghulam +3 位作者 Saifullah Memon Khalid Javeed Musaed Alhussein Imad Rida 《Computers, Materials & Continua》 SCIE EI 2023年第11期1445-1465,共21页
Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing ND... Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing NDN faces three significant challenges,including security,privacy,and routing.In particular,security attacks,such as Content Poisoning Attacks(CPA),can jeopardize legitimate vehicles with malicious content.For instance,attacker host vehicles can serve consumers with invalid information,which has dire consequences,including road accidents.In such a situation,trust in the content-providing vehicles brings a new challenge.On the other hand,ensuring privacy and preventing unauthorized access in vehicular(VNDN)is another challenge.Moreover,NDN’s pull-based content retrieval mechanism is inefficient for delivering emergency messages in VNDN.In this connection,our contribution is threefold.Unlike existing rule-based reputation evaluation,we propose a Machine Learning(ML)-based reputation evaluation mechanism that identifies CPA attackers and legitimate nodes.Based on ML evaluation results,vehicles accept or discard served content.Secondly,we exploit a decentralized blockchain system to ensure vehicles’privacy by maintaining their information in a secure digital ledger.Finally,we improve the default routing mechanism of VNDN from pull to a push-based content dissemination using Publish-Subscribe(Pub-Sub)approach.We implemented and evaluated our ML-based classification model on a publicly accessible BurST-Asutralian dataset for Misbehavior Detection(BurST-ADMA).We used five(05)hybrid ML classifiers,including Logistic Regression,Decision Tree,K-Nearest Neighbors,Random Forest,and Gaussian Naive Bayes.The qualitative results indicate that Random Forest has achieved the highest average accuracy rate of 100%.Our proposed research offers the most accurate solution to detect CPA in VNDN for safe,secure,and reliable vehicle communication. 展开更多
关键词 named data networking vehicular networks REPUTATION CACHING MACHINE-LEARNING
下载PDF
Push-Based Content Dissemination and Machine Learning-Oriented Illusion Attack Detection in Vehicular Named Data Networking
2
作者 Arif Hussain Magsi Ghulam Muhammad +2 位作者 Sajida Karim Saifullah Memon Zulfiqar Ali 《Computers, Materials & Continua》 SCIE EI 2023年第9期3131-3150,共20页
Recent advancements in the Vehicular Ad-hoc Network(VANET)have tremendously addressed road-related challenges.Specifically,Named Data Networking(NDN)in VANET has emerged as a vital technology due to its outstanding fe... Recent advancements in the Vehicular Ad-hoc Network(VANET)have tremendously addressed road-related challenges.Specifically,Named Data Networking(NDN)in VANET has emerged as a vital technology due to its outstanding features.However,the NDN communication framework fails to address two important issues.The current NDN employs a pull-based content retrieval network,which is inefficient in disseminating crucial content in Vehicular Named Data Networking(VNDN).Additionally,VNDN is vulnerable to illusion attackers due to the administrative-less network of autonomous vehicles.Although various solutions have been proposed for detecting vehicles’behavior,they inadequately addressed the challenges specific to VNDN.To deal with these two issues,we propose a novel push-based crucial content dissemination scheme that extends the scope of VNDN from pullbased content retrieval to a push-based content forwarding mechanism.In addition,we exploitMachine Learning(ML)techniques within VNDN to detect the behavior of vehicles and classify them as attackers or legitimate.We trained and tested our system on the publicly accessible dataset Vehicular Reference Misbehavior(VeReMi).We employed fiveML classification algorithms and constructed the bestmodel for illusion attack detection.Our results indicate that RandomForest(RF)achieved excellent accuracy in detecting all illusion attack types in VeReMi,with an accuracy rate of 100%for type 1 and type 2,96%for type 4 and type 16,and 95%for type 8.Thus,RF can effectively evaluate the behavior of vehicles and identify attacker vehicles with high accuracy.The ultimate goal of our research is to improve content exchange and secureVNDNfromattackers.Thus,ourML-based attack detection and preventionmechanismensures trustworthy content dissemination and prevents attacker vehicles from sharing misleading information in VNDN. 展开更多
关键词 named data networking vehicular networks pull-push illusion attack machine learning
下载PDF
Secure vehicular data communication in Named Data Networking
3
作者 Xiaonan Wang Xilan Chen Xingwei Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第1期203-210,共8页
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data N... Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives. 展开更多
关键词 named data networking Reverse path Secure data communication
下载PDF
Energy-Aware Traffic Routing with Named Data Networking 被引量:2
4
作者 Song Yunlong Liu Min 《China Communications》 SCIE CSCD 2012年第6期71-81,共11页
Greening Internet is an important issue now, which studies the way to reduce the increas- ing energy expenditure. Our work focuses on the network infrastructure and considers its energy awareness in traffic routing. W... Greening Internet is an important issue now, which studies the way to reduce the increas- ing energy expenditure. Our work focuses on the network infrastructure and considers its energy awareness in traffic routing. We formulate the model by traffic engineering to achieve link rate a- daption, and also predict traffic matrices to pre- serve network stability. However, we realize that there is a tradeoff between network performance and energy efficiency, which is an obvious issue as Internet grows larger and larger. An essential cause is the huge traffic, and thus we try to fred its so- lution from a novel architecture called Named Data Networking (NDN) which tent in edge routers and can flexibly cache con- decrease the backbone traffic. We combine our methods with NDN, and finally improve both the network performance and the energy efficiency. Our work shows that it is effective, necessary and feasible to consider green- ing idea in the design of future Internet. 展开更多
关键词 Greening Internet energy-aware traf-fic routing named data networking traffic matri-ces prediction link stability
下载PDF
Preventing“Bad”Content Dispersal in Named Data Networking 被引量:2
5
作者 Yi Wang Zhuyun Qi Bin Liu 《China Communications》 SCIE CSCD 2018年第6期109-119,共11页
Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each ... Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead. 展开更多
关键词 named data networking ROUTER content verification encryption algorithm
下载PDF
A Cache Replacement Policy Based on Multi-Factors for Named Data Networking 被引量:1
6
作者 Meiju Yu Ru Li Yuwen Chen 《Computers, Materials & Continua》 SCIE EI 2020年第10期321-336,共16页
Named Data Networking(NDN)is one of the most excellent future Internet architectures and every router in NDN has the capacity of caching contents passing by.It greatly reduces network traffic and improves the speed of... Named Data Networking(NDN)is one of the most excellent future Internet architectures and every router in NDN has the capacity of caching contents passing by.It greatly reduces network traffic and improves the speed of content distribution and retrieval.In order to make full use of the limited caching space in routers,it is an urgent challenge to make an efficient cache replacement policy.However,the existing cache replacement policies only consider very few factors that affect the cache performance.In this paper,we present a cache replacement policy based on multi-factors for NDN(CRPM),in which the content with the least cache value is evicted from the caching space.CRPM fully analyzes multi-factors that affect the caching performance,puts forward the corresponding calculation methods,and utilize the multi-factors to measure the cache value of contents.Furthermore,a new cache value function is constructed,which makes the content with high value be stored in the router as long as possible,so as to ensure the efficient use of cache resources.The simulation results show that CPRM can effectively improve cache hit ratio,enhance cache resource utilization,reduce energy consumption and decrease hit distance of content acquisition. 展开更多
关键词 Cache replacement policy named data networking content popularity FRESHNESS energy consumption
下载PDF
Security Attacks in Named Data Networking: A Review and Research Directions 被引量:1
7
作者 Naveen Kumar Ashutosh Kumar Singh +1 位作者 Abdul Aleem Shashank Srivastava 《Journal of Computer Science & Technology》 SCIE EI CSCD 2019年第6期1319-1350,共32页
Contents such as audios,videos,and images,contribute most of the Internet traffic in the current paradigm.Secure content sharing is a tedious issue.The existing security solutions do not secure data but secure the com... Contents such as audios,videos,and images,contribute most of the Internet traffic in the current paradigm.Secure content sharing is a tedious issue.The existing security solutions do not secure data but secure the communicating endpoints.Named data networking(NDN)secures the data by enforcing the data publisher to sign the data.Any user can verify the data by using the public key of the publisher.NDN is resilient to most of the probable security attacks in the TCP/IP model due to its new architecture.However,new types of attacks are possible in NDN.This article surveys the most significant security attacks in NDN such as interest flooding attacks,cache privacy attacks,cache pollution attacks,and content poisoning attacks.Each attack is classified according to their behavior and discussed for their detection techniques,countermeasures,and the affected parameters.The article is an attempt to help new researchers in this area to gather the domain knowledge of NDN.The article also provides open research issues that could be addressed by researchers. 展开更多
关键词 named data networking(NDN) interest flooding attack cache privacy attack cache pollution attack content poisoning attack
原文传递
A Dataflow-Oriented Programming Interface for Named Data Networking 被引量:1
8
作者 Li-Jing Wang Yong-Qiang Lv +1 位作者 Ilya Moiseenko Dong-Sheng Wang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第1期158-168,共11页
Inheriting from a data-driven communication pattern other than a location-driven pattern, named data net- working (NDN) offers better support to network-layer dataflow. However, the application developers have to ha... Inheriting from a data-driven communication pattern other than a location-driven pattern, named data net- working (NDN) offers better support to network-layer dataflow. However, the application developers have to handle complex tasks, such as data segmentation, packet verification, and flow control, due to the lack of proper transport-layer protocols over the network layer. In this study, we design a dataflow-oriented programming interface to provide transport strategies for NDN, which greatly improves the efficiency in developing applications. This interface presents two application data unit; (ADU) retrieval strategies according to different data publishing patterns, in which it adopts an adaptive ADU pipelining algorithm to control the dataflow based on the current network status and data generation rate. The interface also offers network measurement strategies to monitor an abundance of critical metrics infuencing the application performance. We verify the functionality and performance of our interface by implementing a video streaming application spanning 11 time zones over the worldwide NDN testbed. Our experiments show that the interface can efficiently support developing high-performance and dataflow-driven NDN applications. 展开更多
关键词 named data networking (NDN) dataFLOW network architecture and design transport-layer protocol
原文传递
SAFT-VNDN: A Socially-Aware Forwarding Technique in Vehicular Named Data Detworking
9
作者 Amel Boudelaa Zohra Abdelhafidi +4 位作者 Nasreddine Lagraa Chaker Abdelaziz Kerrache Muhammad Bilal Daehan Kwak Mohamed Bachir Yagoubi 《Computers, Materials & Continua》 SCIE EI 2022年第11期2495-2512,共18页
Vehicular Social Networks(VSNs)is the bridge of social networks and Vehicular Ad-Hoc Networks(VANETs).VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicl... Vehicular Social Networks(VSNs)is the bridge of social networks and Vehicular Ad-Hoc Networks(VANETs).VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicle(V2V)and Vehicle-to-Infrastructure(V2I)communication protocols.Vehicular Named Data Networking(VNDN)is an auspicious communication paradigm for the challenging VSN environment since it can optimize content dissemination by decoupling contents from their physical locations.However,content dissemination and caching represent crucial challenges in VSNs due to short link lifetime and intermittent connectivity caused by vehicles’high mobility.Our aim with this paper is to improve content delivery and cache hit ratio,as well as decrease the transmission delay between end-users.In this regard,we propose a novel hybrid VNDN-VSN forwarding technique based on social communities,which allows requester vehicles to easily find the most suitable forwarder or producer among the community members in their neighborhood area.Furthermore,we introduce an effective caching mechanism by dividing the content store into two parts,one for community private contents and the second one for public contents.Simulation results show that our proposed forwarding technique can achieve a favorable performance compared with traditional VNDN,in terms of data delivery ratio,average data delivery delay,and cache hit ratio. 展开更多
关键词 Vehicular Social Networks(VSNs) Vehicular named data networking forwarding technique social communities
下载PDF
Research on the Method of Implementing Named Data Network Interconnection Based on IP Network
10
作者 Yabin Xu Lufa Qin Xiaowei Xu 《Journal of Cyber Security》 2022年第1期41-55,共15页
In order to extend the application scope of NDN and realize the transmission of different NDNs across IP networks,a method for interconnecting NDN networks distributed in different areas with IP networks is proposed.F... In order to extend the application scope of NDN and realize the transmission of different NDNs across IP networks,a method for interconnecting NDN networks distributed in different areas with IP networks is proposed.Firstly,the NDN data resource is located by means of the DNS mechanism,and the gateway IP address of the NDN network where the data resource is located is found.Then,the transmission between different NDNs across the IP network is implemented based on the tunnel technology.In addition,in order to achieve efficient and fast NDN data forwarding,we have added a small number of NDN service nodes in the IP network,and proposed an adaptive probabilistic forwarding strategy and a link cost function-based forwarding strategy to make NDN data obtaining the cache service provided by the NDN service node as much as possible.The results of analysis and simulation experiments show that,the interconnectionmethod of NDN across IP network proposed is generally effective and feasible,and the link cost function forwarding strategy is better than the adaptive probability forwarding strategy. 展开更多
关键词 NDN IP network named data network interconnection adaptive probability forwarding strategy link cost function forwarding strategy
下载PDF
Caching Strategies in NDN Based Wireless Ad Hoc Network:A Survey
11
作者 Ahmed Khalid Rana Asif Rehman Byung-Seo Kim 《Computers, Materials & Continua》 SCIE EI 2024年第7期61-103,共43页
Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Int... Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Internet is used in wireless ad hoc network.Internet is based on Transmission Control Protocol(TCP)/Internet Protocol(IP)network where clients and servers interact with each other with the help of IP in a pre-defined environment.Internet fetches data from a fixed location.Data redundancy,mobility,and location dependency are the main issues of the IP network paradigm.All these factors result in poor performance of wireless ad hoc networks.The main disadvantage of IP is that,it does not provide in-network caching.Therefore,there is a need to move towards a new network that overcomes these limitations.Named Data Network(NDN)is a network that overcomes these limitations.NDN is a project of Information-centric Network(ICN).NDN provides in-network caching which helps in fast response to user queries.Implementing NDN in wireless ad hoc network provides many benefits such as caching,mobility,scalability,security,and privacy.By considering the certainty,in this survey paper,we present a comprehensive survey on Caching Strategies in NDN-based Wireless AdHocNetwork.Various cachingmechanism-based results are also described.In the last,we also shed light on the challenges and future directions of this promising field to provide a clear understanding of what caching-related problems exist in NDN-based wireless ad hoc networks. 展开更多
关键词 Content centric network Internet of Things mobile ad hoc network named data network vehicular ad hoc network
下载PDF
A Hierarchal Clustered Based Proactive Caching in NDN-Based Vehicular Network 被引量:1
12
作者 Muhammad Yasir Khan Muhammad Adnan +3 位作者 Jawaid Iqbal Noor ul Amin Byeong-Hee Roh Jehad Ali 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1185-1208,共24页
An Information-Centric Network(ICN)provides a promising paradigm for the upcoming internet architecture,which will struggle with steady growth in data and changes in accessmodels.Various ICN architectures have been de... An Information-Centric Network(ICN)provides a promising paradigm for the upcoming internet architecture,which will struggle with steady growth in data and changes in accessmodels.Various ICN architectures have been designed,including Named Data Networking(NDN),which is designed around content delivery instead of hosts.As data is the central part of the network.Therefore,NDN was developed to get rid of the dependency on IP addresses and provide content effectively.Mobility is one of the major research dimensions for this upcoming internet architecture.Some research has been carried out to solve the mobility issues,but it still has problems like handover delay and packet loss ratio during real-time video streaming in the case of consumer and producer mobility.To solve this issue,an efficient hierarchical Cluster Base Proactive Caching for Device Mobility Management(CB-PC-DMM)in NDN Vehicular Networks(NDN-VN)is proposed,through which the consumer receives the contents proactively after handover during the mobility of the consumer.When a consumer moves to the next destination,a handover interest is sent to the connected router,then the router multicasts the consumer’s desired data packet to the next hop of neighboring routers.Thus,once the handover process is completed,consumers can easily get the content to the newly connected router.A CB-PCDMM in NDN-VN is proposed that improves the packet delivery ratio and reduces the handover delay aswell as cluster overhead.Moreover,the intra and inter-domain handover handling procedures in CB-PC-DMM for NDN-VN have been described.For the validation of our proposed scheme,MATLAB simulations are conducted.The simulation results show that our proposed scheme reduces the handover delay and increases the consumer’s interest satisfaction ratio.The proposed scheme is compared with the existing stateof-the-art schemes,and the total percentage of handover delays is decreased by up to 0.1632%,0.3267%,2.3437%,2.3255%,and 3.7313%at the mobility speeds of 5 m/s,10 m/s,15 m/s,20 m/s,and 25 m/s,and the efficiency of the packet delivery ratio is improved by up to 1.2048%,5.0632%,6.4935%,6.943%,and 8.4507%.Furthermore,the simulation results of our proposed scheme show better efficiency in terms of Packet Delivery Ratio(PDR)from 0.071 to 0.077 and a decrease in the handover delay from 0.1334 to 0.129. 展开更多
关键词 Vehicular network named data networking CACHING hierarchical architecture
下载PDF
NDN Content Poisoning Mitigation Using Bird Swarm Optimization and Trust Value
13
作者 S.V.Vijaya Karthik J.Arputha Vijaya Selvi 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期833-847,共15页
Information-Centric Networking(ICN)is considered a viable strategy for regulating Internet consumption using the Internet’s underlying architecture.Although Named Data Networking(NDN)and its reference-based implement... Information-Centric Networking(ICN)is considered a viable strategy for regulating Internet consumption using the Internet’s underlying architecture.Although Named Data Networking(NDN)and its reference-based implementa-tion,the NDN Forwarding Daemon(NFD),are the most established ICN solu-tions,their vulnerability to the Content Poisoning Attack(CPA)is regarded as a severe threat that might dramatically impact this architecture.Content Poisoning can significantly minimize the impact of NDN’s universal data caching.Using verification signatures to protect against content poisoning attacks may be imprac-tical due to the associated costs and the volume of messages sent across the net-work,resulting in high computational costs.Therefore,in this research,we designed a method in NDN called Bird Swarm Optimization Algorithm-Based Content Poisoning Mitigation(BSO-Content Poisoning Mitigation Scheme).By aggregating the security information of entire routers along the full path,this sys-tem introduces the BSO to explore the secure transmission path and alter the con-tent retrieval procedure.Meanwhile,based on the determined trustworthy value of each node,the BSO-Content Poisoning Mitigation Scheme can bypass malicious routers,preventing them from disseminating illicit content in the future.Addition-ally,the suggested technique can minimize content poisoning utilizing removing erroneous Data packets from the cache-store during the pathfinding process.The proposed method has been subjected to extensive analysis compared with the ROM scheme and improved performance justified in several metrics.BSO-Con-tent Poisoning Mitigation Scheme is more efficient and faster than the ROM tech-nique in obtaining valid Data packets and resulting in a higher good cache hit ratio in a comparatively less amount of time. 展开更多
关键词 named data network content poisoning bird swarm optimization content validation fake content
下载PDF
Design and Implementation of Not So Cooperative Caching System 被引量:1
14
作者 HU Xiaoyan GONG Jian +2 位作者 CHENG Guang ZHANG Weiwei Ahmad Jakalan 《China Communications》 SCIE CSCD 2015年第7期31-46,共16页
Not So Cooperative Caching(NSCC) considers a network comprised of selfish nodes; each is with caching capability and an objective of reducing its own access cost by fetching data from its local cache or from neighbori... Not So Cooperative Caching(NSCC) considers a network comprised of selfish nodes; each is with caching capability and an objective of reducing its own access cost by fetching data from its local cache or from neighboring caches. These nodes would cooperate in caching and share cached content if and only if they each benefit. The challenges are to determine what objects to cache at each node and to implement the system in the context of Information Centric Networking(ICN). This work includes both a solution for the NSCC problem and a design and implementation of an NSCC system in Named Data Networking(NDN), a large effort that exemplifies ICN. Our design applies NDN synchronization protocol to facilitate the information exchange among nodes, adopts group key encryption to control data access within the NSCC group, and offers an error checker to detect error events in the system. Our approach is validated by deploying the system we developed on Planet Lab. 展开更多
关键词 named data networking content caching selfish caches SYNCHRONIZATION group rekeying error checker game theory
下载PDF
A Fast and Memory-Efficient Approach to NDN Name Lookup 被引量:4
15
作者 Dacheng He Dafang Zhang +2 位作者 Ke Xu Kun Huang Yanbiao Li 《China Communications》 SCIE CSCD 2017年第10期61-69,共9页
For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper leng... For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper length-detecting is a straightforward yet efficient solution. Binary search strategy can reduce the number of required hash detecting in the worst case. However, to assure the searching path correct in such a schema, either backtrack searching or redundantly storing some prefixes is required, leading to performance or memory issues as a result. In this paper, we make a deep study on the binary search, and propose a novel mechanism to ensure correct searching path without neither additional backtrack costs nor redundant memory consumptions. Along any binary search path, a bloom filter is employed at each branching point to verify whether a said prefix is present, instead of storing that prefix here. By this means, we can gain significantly optimization on memory efficiency, at the cost of bloom checking before each detecting. Our evaluation experiments on both real-world and randomly synthesized data sets demonstrate our superiorities clearly 展开更多
关键词 named data networking binary search of hash table bloom filter
下载PDF
A Secure NDN Framework for Internet of Things Enabled Healthcare 被引量:1
16
作者 Syed Sajid Ullah Saddam Hussain +1 位作者 Abdu Gumaei Hussain AlSalman 《Computers, Materials & Continua》 SCIE EI 2021年第4期223-240,共18页
Healthcare is a binding domain for the Internet of Things(IoT)to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet.The current IP-based Internet ar... Healthcare is a binding domain for the Internet of Things(IoT)to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet.The current IP-based Internet architecture suffers from latency,mobility,location dependency,and security.The Named Data Networking(NDN)has been projected as a future internet architecture to cope with the limitations of IP-based Internet.However,the NDN infrastructure does not have a secure framework for IoT healthcare information.In this paper,we proposed a secure NDN framework for IoTenabled Healthcare(IoTEH).In the proposed work,we adopt the services of Identity-Based Signcryption(IBS)cryptography under the security hardness Hyperelliptic Curve Cryptosystem(HCC)to secure the IoTEH information in NDN.The HCC provides the corresponding level of security using minimal computational and communicational resources as compared to bilinear pairing and Elliptic Curve Cryptosystem(ECC).For the efficiency of the proposed scheme,we simulated the security of the proposed solution using Automated Validation of Internet Security Protocols and Applications(AVISPA).Besides,we deployed the proposed scheme on the IoTEH in NDN infrastructure and compared it with the recent IBS schemes in terms of computation and communication overheads.The simulation results showed the superiority and improvement of the proposed framework against contemporary related works. 展开更多
关键词 named data networking healthcare identity-based signcryption
下载PDF
A Lightweight Anonymous Device Authentication Scheme for Information-Centric Distribution Feeder Microgrid
17
作者 Anhao Xiang Jun Zheng 《Computers, Materials & Continua》 SCIE EI 2021年第11期2141-2158,共18页
Distribution feeder microgrid(DFM)built based on existing distributed feeder(DF),is a promising solution for modern microgrid.DFM contains a large number of heterogeneous devices that generate heavy network traffice a... Distribution feeder microgrid(DFM)built based on existing distributed feeder(DF),is a promising solution for modern microgrid.DFM contains a large number of heterogeneous devices that generate heavy network traffice and require a low data delivery latency.The information-centric networking(ICN)paradigm has shown a great potential to address the communication requirements of smart grid.However,the integration of advanced information and communication technologies with DFM make it vulnerable to cyber attacks.Adequate authentication of grid devices is essential for preventing unauthorized accesses to the grid network and defending against cyber attacks.In this paper,we propose a new lightweight anonymous device authentication scheme for DFM supported by named data networking(NDN),a representative implementation of ICN.We perform a security analysis to show that the proposed scheme can provide security features such as mutual authentication,session key agreement,defending against various cyber attacks,anonymity,and resilience against device capture attack.The security of the proposed scheme is also formally verified using the popular AVISPA(Automated Validation of Internet Security Protocols and Applications)tool.The computational and communication costs of the proposed scheme are evaluated.Our results demonstrate that the proposed scheme achieves significantly lower computational,communication and energy costs than other state-of-the-art schemes. 展开更多
关键词 Mutual authentication information-centric networking named data networking distribution feeder microgrid smart devices AVISPA security
下载PDF
A Cost-Effective Approach for NDN-Based Internet of Medical Things Deployment
18
作者 Syed Sajid Ullah Saddam Hussain +4 位作者 Abdu Gumaei Mohsin SAlhilal Bader Fahad Alkhamees Mueen Uddin Mabrook Al-Rakhami 《Computers, Materials & Continua》 SCIE EI 2022年第1期233-249,共17页
Nowadays,healthcare has become an important area for the Internet of Things(IoT)to automate healthcare facilities to share and use patient data anytime and anywhere with Internet services.At present,the host-based Int... Nowadays,healthcare has become an important area for the Internet of Things(IoT)to automate healthcare facilities to share and use patient data anytime and anywhere with Internet services.At present,the host-based Internet paradigm is used for sharing and accessing healthcare-related data.However,due to the location-dependent nature,it suffers from latency,mobility,and security.For this purpose,Named Data Networking(NDN)has been recommended as the future Internet paradigm to cover the shortcomings of the traditional host-based Internet paradigm.Unfortunately,the novel breed lacks a secure framework for healthcare.This article constructs an NDN-Based Internet of Medical Things(NDN-IoMT)framework using a lightweight certificateless(CLC)signature.We adopt the Hyperelliptic Curve Cryptosystem(HCC)to reduce cost,which provides strong security using a smaller key size compared to Elliptic Curve Cryptosystem(ECC).Furthermore,we validate the safety of the proposed scheme through AVISPA.For cost-efficiency,we compare the designed scheme with relevant certificateless signature schemes.The final result shows that our proposed scheme uses minimal network resources.Lastly,we deploy the given framework on NDN-IoMT. 展开更多
关键词 Internet of Medical Things healthcare named data networking
下载PDF
Toward long-range adaptive communication via information centric networking
19
作者 Anthony Dowling Lauren Huie +2 位作者 Laurent Njilla Hong Zhao Yaoqing Liu 《Intelligent and Converged Networks》 2021年第1期1-15,共15页
As Internet of Things(IoT)applications become more prevalent and grow in their use,a limited number of wireless communication methods may be unable to enable dependable,robust delivery of information.It is necessary t... As Internet of Things(IoT)applications become more prevalent and grow in their use,a limited number of wireless communication methods may be unable to enable dependable,robust delivery of information.It is necessary to enable adaptive communication and interoperability over a variety of wireless communication media to meet the requirements of large-scale IoT applications.This paper utilizes Named Data Networking(NDN),an up-and-coming Information-Centric Network architecture,to interconnect differing communication links via the network layer,and implements dynamic forwarding strategies and routing mechanisms which aid in the efficient dissemination of information.This work targets the creation of an interface technique to allow NDN to be transported via LoRa.This is acheived via the coupling of LoRa and WiFi using the NDN Forwarding Daemon(NFD)to create a universal ad hoc network.This network has the capacity for high range and multi-hop Device-to-Device(D2D)communication together with compatibility with other network communication media.Testing of the system in a real environment has shown that the newly created ad hoc network is capable of communicating over a several kilometer radius,while making use of the features provided by NDN to capitalize upon various links available to enable the efficient dissemination of data.Furthermore,the newly created network leverages NDN features to enable content-based routing within the LoRa network and utilize content-based routing techniques. 展开更多
关键词 named data networking(NDN) ad hoc network device-to-device communication
原文传递
Broadband Communications for High-Speed Trains via NDN Wireless Mesh Network
20
作者 Fan Wu Wang Yang +1 位作者 Runtong Chen Xinfang Xie 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第4期419-430,共12页
With the increasing utilization of High-Speed Trains (HSTs), the need for a reliable and high-bandwidth Internet access under high-speed mobility scenarios has become more demanding. In static, walking, and low mobi... With the increasing utilization of High-Speed Trains (HSTs), the need for a reliable and high-bandwidth Internet access under high-speed mobility scenarios has become more demanding. In static, walking, and low mobility environments, TCP/IP (transmission control protocol/Internet protocol) can work well. However, TCP/IP cannot work well in high-speed scenarios because of reliability and handoff delay problems. This is mainly because the mobile node is required to maintain the connection to the corresponding node when it handovers to another access point node. In this paper, we propose a named data networking wireless mesh network architecture for HST wireless communication (NDN-Mesh-T), which combines the advantages of Wireless Mesh Networks (WMNs) and NDN architectures. We attempt to solve the reliability and handoff delay problems to enable high bandwidth and low latency in Internet access in HST scenarios. To further improve reliability and bandwidth utilization, we propose a Direction-Aware Forwarding (DAF) strategy to forward Interest packet along the direction of the running train. The simulation results show that the proposed scheme can significantly reduce the packet loss rate by up to 51% compared to TCP/IP network architecture. Moreover, the proposed mechanism can reduce the network load, handoff delay, and data redundancy. 展开更多
关键词 named data networking wireless communications high-speed trains MOBILITY forwarding strategy
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部