A Framework for Validation of Content in Named Data Networks based on Blockchain
Abstract
In recent years, Named Data Networks (NDN) have been proposed as a promising paradigm for the Internet of the future because of their disruptive content-centric feature. In order to ensure content authenticity, NDN relies on the use of digital signature which, due to the complexity involved in the validation process, may result in additional processing overhead. As a result, NDN implementations are susceptible to a variety of attacks. This work proposes a security framework that aims to use blockchain technology attributes to enable verification of the integrity and authenticity of NDN content. Results obtained from emulation showed that the proposed framework can detect data tampering attacks and prevent the misrepresentation of content by malicious providers.
References
Buterin, V. et al. (2013). Ethereum white paper, 2014. URL https://github.com/ethereum/wiki/wiki/White-Paper.
de Sousa, A. M., Ara´ujo, F. R. C., and Sampaio, L. N. (2018). A link-stability-based interest-forwarding strategy for vehicular named data networks. IEEE Internet Computing, 22(3):16–26.
Fotiou, N. and Polyzos, G. C. (2016). Decentralized name-based security for content distribution using blockchains. In Computer Communications Workshops (INFOCOM WKSHPS), 2016 IEEE Conference on, pages 415–420. IEEE.
Greve, F., Sampaio, L., Abijaude, J., Coutinho, A. A. R., Brito, I. V. S., and Queiroz, S. (2018). Blockchain e a revolução do consenso sob demanda. In Livro de Minicursos do XXXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC). Cap. 5. 2018, Campos do Jordão, SP.
Jin, T., Zhang, X., Liu, Y., and Lei, K. (2017). Blockndn: A bitcoin blockchain decentralized system over named data networking. In Ubiquitous and Future Networks (ICUFN), 2017 Ninth International Conference on, pages 75–80. IEEE.
Mori, S. (2018). Secure caching scheme by using blockchain for information-centric network-based wireless sensor networks. Journal of Signal Processing, 22(3):97–108.
Ribeiro, I., Guimarães, F. Q., Kazienko, J. F., Rocha, A., Velloso, P., Moraes, I. M., and Albuquerque, C. V. (2012). Seguranc¸a em redes centradas em conteúdo: Vulnerabilidades, ataques e contramedidas. Minicursos do XII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais—SBSeg 2012, pages 151–195.
Saxena, D., Raychoudhury, V., Suri, N., Becker, C., and Cao, J. (2016). Named data networking: a survey. Computer Science Review, 19:15–55.
Tourani, R., Misra, S., Mick, T., and Panwar, G. (2018). Security, privacy, and access control in information-centric networking: A survey. IEEE Communications Surveys Tutorials, 20(1):566–600.
Yu, Y., Afanasyev, A., Seedorf, J., Zhang, Z., and Zhang, L. (2017). Ndn delorean: An authentication system for data archives in named data networking. In Proceedings of the 4th ACM Conference on Information-Centric Networking, pages 11–21. ACM.
Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Claffy, K., Crowley, P., Papadopoulos, C., Wang, L., and Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer Communication Review, 44(3):66–73.
