2019
DOI: 10.1109/access.2018.2885037
|View full text |Cite
|
Sign up to set email alerts
|

Secure Identifier Management Based on Blockchain Technology in NDN Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(19 citation statements)
references
References 20 publications
0
19
0
Order By: Relevance
“…On the other hand, NDN still has various security and privacy issues [20], such as naming, signature, and cache privacy, which makes the establishment of VNDN challenging. Several works have designed solutions to address security issues from the perspective of NDNs [21][22][23]. Song et al [21] proposed a smart contract-based trusted content retrieval mechanism for NDNs.…”
Section: Security In Ndnmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, NDN still has various security and privacy issues [20], such as naming, signature, and cache privacy, which makes the establishment of VNDN challenging. Several works have designed solutions to address security issues from the perspective of NDNs [21][22][23]. Song et al [21] proposed a smart contract-based trusted content retrieval mechanism for NDNs.…”
Section: Security In Ndnmentioning
confidence: 99%
“…is mechanism uses smart contract-based content and a repository of information trusted by producers and provides content retrieval and name resolution services for content consumers. A blockchain-based effective identifier management scheme in the NDN environment was proposed in [22]. is scheme uses the content name of an identifier to create transactions to protect the identifier of a specific user and realizes secure storage and management through this identifier segmentation management technology.…”
Section: Security In Ndnmentioning
confidence: 99%
“…Thus, the SDN controller can detect and warn attacks such as false topology, ARP poisoning and DDos (Sharma, Chen & Park, 2017). With blockchain's distributed data management, the cost of the system is reduced and its integrity and data security are ensured (Yang, Cha & Song, 2018).…”
Section: Data Integrity and Accessibilitymentioning
confidence: 99%
“…Further, Kuzmin et al [25] introduced the concept of blockchain in unnamed aerial vehicles where each vehicle is considered as a node in which the functionality for reading and creating the transactions or communication exchange in done through the blockchain network. Yang et al [26] used the concept of blockchain during the sharing of traffic flow among vehicles by ensuring the tamper resistant and data correctness in the agreement mechanism. The proof-of-event agreement is used to collect the traffic data bypassing of roadside vehicles.…”
Section: Related Workmentioning
confidence: 99%