4.6 Article

Blockchain-Based Cache Poisoning Security Protection and Privacy-Aware Access Control in NDN Vehicular Edge Computing Networks

Journal

JOURNAL OF GRID COMPUTING
Volume 18, Issue 4, Pages 593-613

Publisher

SPRINGER
DOI: 10.1007/s10723-020-09531-1

Keywords

NDN VEC network; Blockchain

Funding

  1. Shenzhen Key Laboratory Project [ZDSYS201802051831427]
  2. project PCL Future Regional Network Facilities for Large scale Experiments and Applications

Ask authors/readers for more resources

Recent advances in artificial intelligence, big data, mobile edge computing and embedded systems have successfully driven the emergence and adoption of smart vehicles and vehicle edge computing which will improve road safety, traffic congestions, and vehicle exhaust emissions. The high-mobility, ad-hoc network topology, and diverse vehicle-to-everything (V2X) have brought substantial challenges in the TCP/IP-based vehicular networking. Given the unique characteristics and strengths in resilient communication in mobile ad hoc networking environments, named data networking (NDN) has become a natural fit for supporting vehicular edge computing (VEC) as the underlying network architecture. However, a variety of security and privacy challenges remain for developing NDN-based VEC networks such as key management, cache poisoning, access control. In this paper, we introduce a novel blockchain-based security architecture in NDN-based VEC networks to systematically tackle these security challenges. More specifically, we design and implement an efficient blockchain system on NDN by adopting lightweight yet robust delegate consensus algorithm, and carry out extensive experiments to evaluate performance efficiency on key management protocols, cache poisoning defense schemes, and access control strategies for NDN-based VEC networks. To the best of our knowledge, this paper is the first effort to systematically devise practical and efficient blockchain-based security architecture to provide key management, cache poisoning security protection, and privacy-aware access control in NDN VEC networks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available