2020
DOI: 10.1109/access.2020.2995080
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things

Abstract: Named Data Networking (NDN) is one of the future envisioned networking paradigm used to provide fast and efficient content dissemination with interest-based content retrieval, name-based routing and in-network content caching. On the one hand, this new breed of future Internet architecture is becoming a key technology for data dissemination in the IoT networks; on the other hand, NDN suffers from new challenges in terms of data security. Among them, a content poisoning attack is the most common data security c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 41 publications
(32 citation statements)
references
References 58 publications
(111 reference statements)
0
30
0
Order By: Relevance
“…To mitigate CPA, a number of proposals have been suggested in literature [26][27][28][29][30][31][32][33][34][35][36][37]. However, none of the suggested proposals can effectively mitigate the CPA.…”
Section: B Content Poisoning Attack (Cpa)mentioning
confidence: 99%
See 3 more Smart Citations
“…To mitigate CPA, a number of proposals have been suggested in literature [26][27][28][29][30][31][32][33][34][35][36][37]. However, none of the suggested proposals can effectively mitigate the CPA.…”
Section: B Content Poisoning Attack (Cpa)mentioning
confidence: 99%
“…Recently in 2020, Ullah et al [37], proposed an OnDemand lightweight identity-based signature scheme for mitigation of CPA in NDN-based IoT, by using a lightweight HCC algorithm. According to the authors, a client and provider will register themselves with a network manager by sending their identities, the network manager then generates public and private keys by using their identities and send them to both.…”
Section: A Ndn Cpa Preservation Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…However, ζ cannot replay the old messages because he/she needs fresh FNs for every new session. Furthermore, we compare our scheme with the existing CGS and ID-BGS schemes in milliseconds (ms) by using the above major operation, according to the experiments performed in [50] with the following hardware and software specifications: [50], an SPBPM will take 4.32 ms, a single SBP will take 14.90 ms, SEXP will take 1.25 ms, and SEPM will take 0.97 ms. Based on the experiments performed in [51,52], we consider that a SHEDM will take 0.48 ms. On the bases of the above expansive mathematical operations, we conduct the computation cost comparison of our proposed scheme with existing CGS schemes which are Zhang et al [28], Zhou et al [29], Zhang et al [30], Zhou [31], Waheed et al [32], and Karati et al [33] as shown in Tables 2 and 3. Further, the computation cost comparison of our proposed scheme with existing ID-BGS schemes which are Wei et al [21] and Shen et al [23] is shown in Tables 4 and 5.…”
Section: Forward Secrecymentioning
confidence: 99%