Abstract

Recently, Named Data Networking (NDN) has emerged as a popular and active Internet architecture that addresses the issues of current host-centric communication. NDN is well suited for Internet of Things (IoT) which possesses massive applications that dominate the Internet today. It intends to provide named-based routing, in-networking caching, built-in mobility and multicast support as part of its design which leads to a substantial improvement in content delivery/retrieval. Though, this new architecture aches from some new challenges in terms of security. In this article, we seek our attention towards Content Poisoning Attack (CPA). The purpose of CPA is to inject poisoned content with an invalid signature into the NDN-based IoT networks. Unfortunately, none of the existing proposals work effectively when malicious attackers compromise the caches of NDN routers. To prevent this, we proposed a certificateless signature scheme for the preservation of CPA in NDN-based IoT networks. The proposed scheme is formally secure under the security hardness of Hyperelliptic Curve Discrete Logarithm Problem (HCDLP) with a security simulation/validation in “Automated Validation of Internet Security Protocols and Applications (AVISPA).” Besides, the formal proof we also compared the designed scheme with some existing solutions to show the cost-efficiency in terms of communication overhead and computation cost. To conclude, a robust deployment on NDN-based IoT networks is shown.

Highlights

  • Over the past decade, Internet of Things (IoT) attracted widespread attention from industry and academia

  • RESEARCH MOTIVATION AND CONTRIBUTIONS Inspired by the above discussion, we suggest a new certificateless signature scheme based on effective and proven security under the Random Oracle Model (ROM) [66,67,68]

  • Definition 3: the proposed scheme is existentially unforgeable against Α1, if Α1 runs the polynomial-time algorithm (PTA) by making at most QH queries to Hash oracle, QCU queries to the oracle CreateUsers (IDi), QPS queries to the oracle ExtractPartialSecret (IDi), QPKR queries to the oracle PublicKeyReplacement (IDi, PBKi, PBKi′),QES

Read more

Summary

INTRODUCTION

IoT attracted widespread attention from industry and academia. Connectivity with the Internet has opened up many avenues for research and development [1]. B. CONTENT POISONING ATTACK (CPA) Due to its novel architecture NDN facing some security issues in the context of IoT networks; Among them, CPA is the most critical and demanding [11]. In a CPA, the malicious attacker takes full control of the intermediate routers and sends the target content with an invalid signature to the consumer. C. RESEARCH MOTIVATION AND CONTRIBUTIONS Inspired by the above discussion, we suggest a new certificateless signature scheme based on effective and proven security under the Random Oracle Model (ROM) [66,67,68]. We will first provide the basic syntax for an effective and proven secure certificateless signature scheme for NDN-based IoT. We deployed the proposed scheme on the NDNbased IoT scenario with a detail analysis for the prevention of content poisoning attack.

RELATED WORK
LIMITATIONS
PRELIMINARIES
SYNTAX OF THE PROPOSED SCHEME
CONSTRUCTION OF THE PROPOSED SCHEME
THEOREM-I
THEOREM II
COST ANALYSIS
COMMUNICATION OVERHEAD
VIII. CONCLUSION
Simulation and Validation
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call