Secure Caching Scheme by Using Blockchain for Information-Centric Network-Based Wireless Sensor Networks

Published on May 25, 2018in Journal of Signal Processing
· DOI :10.2299/jsp.22.97
Shintaro Mori1
Estimated H-index: 1
(Fukuoka University)
  • References (19)
  • Citations (1)
📖 Papers frequently viewed together
4 Authors (Yanchang Du, ..., Yang Guo)
4 Authors (Libo Fengi, ..., Yong Chen)
5 Citations
20174.10IEEE Access
5 Authors (Qixu Wang, ..., Zhiguang Qin)
21 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
#1Mandrita Banerjee (UTSA: University of Texas at San Antonio)H-Index: 1
#2Junghee Lee (UTSA: University of Texas at San Antonio)H-Index: 9
Last. Kim-Kwang Raymond Choo (UTSA: University of Texas at San Antonio)H-Index: 21
view all 3 authors...
Abstract Internet-of-Things (IoT) are increasingly found in civilian and military contexts, ranging from Smart Cities to Smart Grids to Internet-of-Medical-Things to Internet-of-Vehicles to Internet-of-Military-Things to Internet-of-Battlefield-Things, etc. In this paper, we survey articles presenting IoT security solutions published in English since January 2016. We make a number of observations, include the lack of publicly available IoT datasets that can be used by the research and practition...
63 CitationsSource
#1Ali Dorri (UNSW: University of New South Wales)H-Index: 10
#2Salil S. Kanhere (UNSW: University of New South Wales)H-Index: 36
Last. Raja Jurdak (CSIRO: Commonwealth Scientific and Industrial Research Organisation)H-Index: 28
view all 3 authors...
There has been increasing interest in adopting BlockChain (BC), that underpins the crypto-currency Bitcoin, in Internet of Things (IoT) for security and privacy. However, BCs are computationally expensive and involve high bandwidth overhead and delays, which are not suitable for most IoT devices. This paper proposes a lightweight BC-based architecture for IoT that virtually eliminates the overheads of classic BC, while maintaining most of its security and privacy benefits. IoT devices benefit fr...
196 CitationsSource
#1Hai Wang (U of C: University of Calgary)H-Index: 3
#2Abraham O. Fapojuwo (U of C: University of Calgary)H-Index: 16
Low power and long range machine-to-machine (M2M) communication techniques are expected to provide ubiquitous connections for the wireless devices. In this paper, three major low power and long range M2M solutions are surveyed. The first type of solutions is referred to as the low power wide area (LPWA) network. The design of the LPWA techniques features low cost, low data rate, long communication range, and low power consumption. The second type of solutions is the IEEE 802.11ah which features ...
41 CitationsSource
#1Usman Raza (Toshiba)H-Index: 10
#2Parag Kulkarni (Toshiba)H-Index: 14
Last. Mahesh Sooriyabandara (Toshiba)H-Index: 17
view all 3 authors...
Low power wide area (LPWA) networks are attracting a lot of attention primarily because of their ability to offer affordable connectivity to the low-power devices distributed over very large geographical areas. In realizing the vision of the Internet of Things, LPWA technologies complement and sometimes supersede the conventional cellular and short range wireless technologies in performance for various emerging smart city and machine-to-machine applications. This review paper presents the design...
421 CitationsSource
#1Jie Zhang (Xi'an Jiaotong-Liverpool University)H-Index: 22
#2Nian Xue (Xi'an Jiaotong-Liverpool University)H-Index: 3
Last. Xin Huang (Xi'an Jiaotong-Liverpool University)H-Index: 9
view all 3 authors...
Modern technologies of mobile computing and wireless sensing prompt the concept of pervasive social network (PSN)-based healthcare. To realize the concept, the core problem is how a PSN node can securely share health data with other nodes in the network. In this paper, we propose a secure system for PSN-based healthcare. Two protocols are designed for the system. The first one is an improved version of the IEEE 802.15.6 display authenticated association. It establishes secure links with unbalanc...
67 CitationsSource
#1Haoran Guo (USTC: University of Science and Technology of China)H-Index: 2
#2Xiaodong Wang (USTC: University of Science and Technology of China)H-Index: 2
Last. Ye Tian (USTC: University of Science and Technology of China)H-Index: 11
view all 4 authors...
With information becoming a first-class citizen on the Internet, information-centric networking (ICN) is considered as a promising direction for the future Internet. Named data networking (NDN) is a prominent example of emerging ICN architectures. Unfortunately, NDN is vulnerable to various attacks targeting its in-network caching mechanism. In this paper, we focus on the false-locality pollution attack, in which an adversary repeatedly requests a number of unpopular data objects to waste the pr...
11 CitationsSource
#1Konstantinos Christidis (NCSU: North Carolina State University)H-Index: 2
#2Michael Devetsikiotis (NCSU: North Carolina State University)H-Index: 24
Motivated by the recent explosion of interest around blockchains, we examine whether they make a good fit for the Internet of Things (IoT) sector. Blockchains allow us to have a distributed peer-to-peer network where non-trusting members can interact with each other without a trusted intermediary, in a verifiable manner. We review how this mechanism works and also look into smart contracts—scripts that reside on the blockchain that allow for the automation of multi-step processes. We then move i...
740 CitationsSource
#1Giulia Mauri (Polytechnic University of Milan)H-Index: 5
#2Riccardo Raspadori (Polytechnic University of Milan)H-Index: 1
Last. Giacomo Verticale (Polytechnic University of Milan)H-Index: 13
view all 4 authors...
The Information Centric Networking (ICN) model relies on the ubiquitous use of caching to improve performance and reduce bandwidth requirements. ICN also makes it possible for routers to fetch content from downstream nodes, such as when a content for a home user is fetched from a neighbor’s home router, with significant performance improvement. This paper shows how an attacker using compromised hosts can easily gather a massive amount of low-cost, low-latency storage for malware, junk, and other...
5 CitationsSource
#1Chengchao Liang (Carleton University)H-Index: 11
#2F. Richard Yu (Carleton University)H-Index: 48
Last. Xi Zhang (A&M: Texas A&M University)H-Index: 59
view all 3 authors...
Wireless network virtualization and information-centric networking (ICN) are two promising techniques in software-defined 5G mobile wireless networks. Traditionally, these two technologies have been addressed separately. In this paper we show that integrating wireless network virtualization with ICN techniques can significantly improve the end-to-end network performance. In particular, we propose an information- centric wireless network virtualization architecture for integrating wireless networ...
144 CitationsSource
#1Qi Li (THU: Tsinghua University)H-Index: 9
#2Xinwen Zhang (Samsung)H-Index: 38
Last. Xiaoming Fu (GAU: University of Göttingen)H-Index: 27
view all 5 authors...
Named data networking (NDN) is a new paradigm for the future Internet wherein interest and data packets carry content names rather than the current IP paradigm of source and destination addresses. Security is built into NDN by embedding a public key signature in each data packet to enable verification of authenticity and integrity of the content. However, existing heavyweight signature generation and verification algorithms prevent universal integrity verification among NDN nodes, which may resu...
30 CitationsSource
Cited By1
Jan 4, 2019 in ICDCN (International Conference of Distributed Computing and Networking)
#1Swapnoneel Roy (UNF: University of North Florida)H-Index: 4
#2Faustina J. Anto Morais (UNF: University of North Florida)H-Index: 1
Last. Mainak Chatterjee (UCF: University of Central Florida)H-Index: 26
view all 4 authors...
Protecting and securing data that reside at various hosts in the Internet has become more important than ever before because of the growing number of cyber attacks. Though there have been several studies related to denial of service and cache attacks, those studies are primarily based on simulations and investigations of attacks on real networks are still lacking. In this paper, we experimentally investigated the effects of cache attacks on blockchain based information-centric networks. We used ...
4 CitationsSource