2018
DOI: 10.2299/jsp.22.97
|View full text |Cite
|
Sign up to set email alerts
|

Secure Caching Scheme by Using Blockchain for Information-Centric Network-Based Wireless Sensor Networks

Abstract: This paper addresses a secure caching scheme for information-centric network (ICN)-based wireless sensor networks (WSNs). In order to achieve the above mechanism, we utilize both the public-key cryptography technique and the blockchain technique, which enable data to be safely gathered and the decentralized and crossverified sensing data to be copied and stored. In addition, we propose a protocol design for introducing the proposed structure into an ICN-based WSN system. Furthermore, we formulate statistical m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 20 publications
(30 reference statements)
0
11
0
2
Order By: Relevance
“…In this section, we will demonstrate that the proposed scheme can overcome the remaining problems outlined in our previous study [7]. As far as we know, the PoW scheme (including Ethereum) is utilized as the consensus scheme for typical related systems.…”
Section: Comparison With Conventional Schemesmentioning
confidence: 86%
See 2 more Smart Citations
“…In this section, we will demonstrate that the proposed scheme can overcome the remaining problems outlined in our previous study [7]. As far as we know, the PoW scheme (including Ethereum) is utilized as the consensus scheme for typical related systems.…”
Section: Comparison With Conventional Schemesmentioning
confidence: 86%
“…To demonstrate the above advantage, we developed a hardware-based testbed device using the familiar single-board computer of a Raspberry Pi 3 with the default Raspbian kernel version 10. As in our previous study [7], for a hash function, we used the firstgeneration secured hash algorithm (SHA-1) method [29], which is widely utilized for general purposes. We implemented the prototype program code using C++ language with the CLX C++ library [30] and we compiled and linked an executable binary program by using the GNU GCC compiler.…”
Section: Comparison With Conventional Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…Em [Mori 2018], propõe-se um esquema para assegurar a integridade e autenticidade da fonte de dados de sensoriamento na cache em redes de sensores sem fio baseadas em NDN. Nesse sentido, os autores adotaram duas tecnologias chave: criptografia assimétrica e blockchain.…”
Section: Trabalhos Relacionadosunclassified
“…Em NDNs, essa tecnologia tem sido adotada para garantir a integridade de conteúdos na cache em redes de sensores sem fio [Mori 2018], implementar uma rede blockchain propriamente dita sobre NDN, de forma a otimizar o desempenho de transações de criptomoedas e gerenciamento de chaves criptográficas [Jin et al 2017]. Todavia, em sua maioria, os trabalhos não abordam o esquema de permissionamento de provedores ou sequer consideraram a presença de produtores maliciosos na rede.…”
Section: Introductionunclassified