Skip to main content

Advertisement

Log in

Blockchain-Based Cache Poisoning Security Protection and Privacy-Aware Access Control in NDN Vehicular Edge Computing Networks

  • Published:
Journal of Grid Computing Aims and scope Submit manuscript

Abstract

Recent advances in artificial intelligence, big data, mobile edge computing and embedded systems have successfully driven the emergence and adoption of smart vehicles and vehicle edge computing which will improve road safety, traffic congestions, and vehicle exhaust emissions. The high-mobility, ad-hoc network topology, and diverse vehicle-to-everything (V2X) have brought substantial challenges in the TCP/IP-based vehicular networking. Given the unique characteristics and strengths in resilient communication in mobile ad hoc networking environments, named data networking (NDN) has become a natural fit for supporting vehicular edge computing (VEC) as the underlying network architecture. However, a variety of security and privacy challenges remain for developing NDN-based VEC networks such as key management, cache poisoning, access control. In this paper, we introduce a novel blockchain-based security architecture in NDN-based VEC networks to systematically tackle these security challenges. More specifically, we design and implement an efficient blockchain system on NDN by adopting lightweight yet robust delegate consensus algorithm, and carry out extensive experiments to evaluate performance efficiency on key management protocols, cache poisoning defense schemes, and access control strategies for NDN-based VEC networks. To the best of our knowledge, this paper is the first effort to systematically devise practical and efficient blockchain-based security architecture to provide key management, cache poisoning security protection, and privacy-aware access control in NDN VEC networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C. P. A., Sun, Z.: Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet of Things Journal 4(6), 1832–1843 (2017). https://doi.org/10.1109/JIOT.2017.2740569

    Article  Google Scholar 

  2. Baugher, M., Davie, B., Narayanan, A., Oran, D.: Self-verifying names for read-only named data. In: Proceedings of IEEE INFOCOM Workshops (2012)

  3. Cesar, G., Gene, T., Ersin, U.: Needle in a haystack: Mitigating content poisoning in named-data networking. In: Proceedings of NDSS Workshop on Security of Emerging Networking Technologies (SENT) (2014)

  4. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: Proceedings of International Conference on Computer Science and Electronics Engineering (2012)

  5. Chen, T., Lei, K., Xu, K.: An encryption and probability based access control model for named data networking. In: Proceedings of IEEE International Performance Computing and Communications Conference (IPCCC) (2014)

  6. da Silva, RS, Zorzo, S.D.: An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges. In: Proceedings of IEEE Consumer Communications and Networking Conference (CCNC) (2015)

  7. Deng, M., Tian, H., Lyu, X.: Adaptive sequential offloading game for multi-cell mobile edge computing. In: Proceedings of International Conference on Telecommunications (ICT) (2016)

  8. Gasti, P., Tsudik, G., Uzun, E., Zhang, L.: Dos and ddos in named data networking. In: Proceedings of International Conference on Computer Communication and Networks (ICCCN) (2013)

  9. Gerla, M., Lee, E. K., Pau, G., Lee, U.: Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In: Proceedings of IEEE world forum on internet of things (WF-IoT) (2014)

  10. Ghali, C., Tsudik, G., Uzun, E.: Network-layer trust in named-data networking. ACM SIGCOMM Computer Communication Review 44(5), 12–19 (2014)

    Article  Google Scholar 

  11. Ghali Cesar, T. G., Ersin, U.: Needle in a haystack: Mitigating content poisoning in named-data networking. In: Proceedings of NDSS Workshop on Security of Emerging Networking Technologies (SENT) (2014)

  12. Grassi, G., Pesavento, D., Pau, G., Vuyyuru, R., Wakikawa, R., Zhang, L.: Vanet via named data networking. In: Proceedings of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2014)

  13. Grassi, G., Pesavento, D., Pau, G., Zhang, L., Fdida, S.: Navigo: Interest forwarding by geolocations in vehicular named data networking. In: Proceedings of International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2015)

  14. Hamdane, B., Serhrouchni, A., El Fatmi, S. G.: Access control enforcement in named data networking. In: Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST) (2013)

  15. Hamdane, B., Serhrouchni, A., Fadlallah, A., Fatmi, S. G. E.: Named-data security scheme for named data networking. In: Proceedings of International Conference on The Network of the Future (NOF) (2012)

  16. Ion, M., Zhang, J., Schooler, E.M.: Toward content-centric privacy in icn: Attribute-based encryption and routing. In: Proceedings of ACM SIGCOMM Workshop on Information-centric Networking (2013)

  17. Jin, T., Zhang, X., Liu, Y., Lei, K.: Blockndn: A bitcoin blockchain decentralized system over named data networking. In: Proceedings of International Conference on Ubiquitous and Future Networks (ICUFN) (2017)

  18. Kim, D., Nam, S., Bi, J., Yeom, I.: Efficient content verification in named data networking. In: Proceedings of ACM Conference on Information-Centric Networking (2015)

  19. Larsen Michael, G. F.: Port randomization Work in Progress (2009)

  20. Ma, M., Shi, G., Li, F.: Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the Iot scenario. IEEE Access 7, 34045–34059 (2019). https://doi.org/10.1109/ACCESS.2019.2904042

    Article  Google Scholar 

  21. Mannes, E., Maziero, C.: Naming content on the network layer: A security analysis of the information-centric network model. ACM Computing Surveys 52(3), 44:1–44:28 (2019)

    Article  Google Scholar 

  22. Milutinovic, M., He, W., Wu, H., Kanwal, M.: Proof of luck: An efficient blockchain consensus protocol. In: Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX ’16, pp 2:1–2:6. ACM, New York (2016), https://doi.org/10.1145/3007788.3007790

  23. Muzammal, M., Qu, Q., Nasrulin, B.: Renovating blockchain with distributed databases: An open source system. Futur. Gener. Comput. Syst. 90, 105–117 (2019)

    Article  Google Scholar 

  24. Alexiou, N., Basagiannis, S., Katsaros, P., Dashpande, T., Smolka, S.A.: Formal analysis of the kaminsky dns cache-poisoning attack using probabilistic model checking. In: 2010 IEEE 12th International Symposium on High Assurance Systems Engineering, pp. 94–103. https://doi.org/10.1109/HASE.2010.25 (2010)

  25. Nguyen, T., Mai, H., Doyen, G., Cogranne, R., Mallouli, W., d. Oca, E.M., Festor, O.: A security monitoring plane for named data networking deployment. IEEE Communications Magazine 56(11), 88–94 (2018)

    Article  Google Scholar 

  26. Nurgaliev, I., Muzammal, M., Qu, Q.: Enabling blockchain for efficient spatio-temporal query processing. In: Hacid, H., Cellary, W., Wang, H., Paik, H. Y., Zhou, R. (eds.) Web Information Systems Engineering – WISE 2018, pp 36–51. Springer International Publishing, Cham (2018)

  27. Ouaddah Aafaf, A.E.A., Abdellah, A.O.: Fairaccess: a new blockchain-based access control framework for the internet of things. Security and Communication Networks 9(18), 5943–5964 (2016). https://doi.org/10.1002/sec.1748. https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.1748

    Article  Google Scholar 

  28. Wang, Q., Chen, D., Zhang, N., Qin, Z., Qin, Z.: Lacs: A lightweight label-based access control scheme in iot-based 5g caching context. IEEE Access 5, 4018–4027 (2017). https://doi.org/10.1109/ACCESS.2017.2678510

    Article  Google Scholar 

  29. Qu, Q., Nurgaliev, I., Muzammal, M., Jensen, C.S., Fan, J.: On spatio-temporal blockchain query processing. Futur. Gener. Comput. Syst. 98, 208–218 (2019)

    Article  Google Scholar 

  30. Saha, B.K., Misra, S.: Mitigating NDN-based fake content dissemination in opportunistic mobile networks. IEEE Transactions on Mobile Computing (2019)

  31. Saxena, D., Raychoudhury, V., Becker, C.: Implementation and performance evaluation of name-based forwarding schemes in v-NDN. In: Proceedings of International Conference on Distributed Computing and Networking (2017)

  32. Shang, W., Ding, Q., Marianantoni, A., Burke, J., Zhang, L.: Securing building management systems using named data networking. IEEE Netw. 28(3), 50–56 (2014)

    Article  Google Scholar 

  33. Singh, V.P., Ujjwal, R.L.: Privacy attack modeling and risk assessment method for name data networking. In: Bhatia, S.K., Tiwari, S., Mishra, K.K., Trivedi, M.C. (eds.) Advances in Computer Communication and Computational Sciences, pp. 109–119 (2019)

  34. Wang, L., Afanasyev, A., Kuntz, R., Vuyyuru, R., Wakikawa, R., Zhang, L.: Rapid traffic information dissemination using named data. In: Proceedings of ACM Workshop on Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications (2012)

  35. Wang, S., Xing, Z., Yan, Z., Lin, W., Wang, W.: A survey on mobile edge networks: Convergence of computing, caching and communications. IEEE Access 5(99), 6757–6779 (2017)

    Article  Google Scholar 

  36. Wright, A., De Filippi, P.: Decentralized blockchain technology and the rise of lex cryptographia. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2580664 (2015)

  37. Yang, H., Cha, H., Song, Y.: Secure identifier management based on blockchain technology in NDN environment. IEEE Access 7, 6262–6268 (2019)

    Article  Google Scholar 

  38. Yi, C., Afanasyev, A., Wang, L., Zhang, B., Zhang, L.: Adaptive forwarding in named data networking. ACM SIGCOMM Computer Communication Review 42(3), 62–67 (2012)

    Article  Google Scholar 

  39. Yin, H., Zhang, J., Xiong, Y., Ou, L., Li, F., Liao, S., Li, K.: Cp-abse: A ciphertext-policy attribute-based searchable encryption scheme. IEEE Access 7, 5682–5694 (2019)

    Article  Google Scholar 

  40. Yu, Y.: Public key management in named data networking. Tech. Rep NDN-0029 (2015)

  41. Yu, Y., Afanasyev, A., Zhu, Z., Zhang, L.: An endorsement-based key management system for decentralized NDN chat application. Tech. Rep NDN-0023 (2014)

  42. Yu, Y., Dilmaghani, R.B., Calo, S., Sanadidi, M.Y., Gerla, M.: Interest propagation in named data manets. In: Proceedings of International Conference on Computing, Networking and Communications (ICNC) (2013)

  43. Yu, Y., Gerla, M.: Potential benefits of information-centric networks for vanets (2015)

  44. Zhang, Z., Yu, Y., Ramani, S.K., Afanasyev, A., Zhang, L.: Nac: Automating access control via named data. In: Proceedings of IEEE Military Communications Conference (MILCOM) (2018)

  45. Zhu, Z., Wang, S., Yang, X., Jacobson, V., Zhang, L.: Act: Audio conference tool over named data networking. In: Proceedings of the ACM SIGCOMM Workshop on Information-centric Networking (2011)

Download references

Acknowledgment

This work was financially supported by Shenzhen Key Laboratory Project (ZDSYS201802051831427) and the project ”PCL Future Regional Network Facilities for Large scale Experiments and Applications”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuai Xu.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lei, K., Fang, J., Zhang, Q. et al. Blockchain-Based Cache Poisoning Security Protection and Privacy-Aware Access Control in NDN Vehicular Edge Computing Networks. J Grid Computing 18, 593–613 (2020). https://doi.org/10.1007/s10723-020-09531-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10723-020-09531-1

Keywords

Navigation