Skip to main content

Design of a Blockchain-Based Trust Model for Detecting Cache Poisoning Attakcs in NDN

  • Conference paper
  • First Online:
Advanced Intelligent Computing Technology and Applications (ICIC 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14871))

Included in the following conference series:

  • 551 Accesses

Abstract

Cache Poisoning Attack is a major threat in NDN, impacting network performance. Current solutions are costly and don't fully address router single point failures or repeated router evaluations with producer mobility. To tackle these, we introduce CPA-BT, a Blockchain-based Trust Model. It integrates blockchain, enabling edge routers connected to data producers to operate under a consensus mechanism, treating their evaluation as blockchain transactions. With 2/3 consensus, a leader edge router records the transactions, addressing the mentioned challenges. Simulations show CPA-BT effectively isolates malicious and faulty producers, reducing cache poisoning risks and outperforming other trust models in task failure rate reduction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: Proc. 5th ACM International Conference on Emerging Networking Experiments and Technologies, Rome, Italy, pp. 1–12 (2009)

    Google Scholar 

  2. Zhang, L.X., Afanasyev, A., Burke, J., et al.: Named data networking. ACM SIGCOMM Comput. Commun. Rev. 44(3), 66–73 (2014)

    Google Scholar 

  3. Castro, M., Liskov, B.:  Practical Byzantine Fault Tolerance. ACM Trans. Comput. Syst. (TOCS) (2002)

    Google Scholar 

  4. Gasti, P., Tsudik, G., Uzun, E., Zhang, L.: DoS & DDoS in named data networking. In:  Proceedings of 22nd IEEE ICN, pp. 1–7 (Jul 2013)

    Google Scholar 

  5. Srinivasan, S., Mazumdar, A.P.: Mitigating content poisoning in content centric network: A lightweight approach. In Proceedings of 10th International  Conference on Computing and Communication Network Technology (ICCCNT), pp. 1–6 (Jul 2019)

    Google Scholar 

  6. He, Y., Ma, Y., Qing, H., et al.: Lightweight transmission behavior audit scheme for NDN Industrial Internet identity resolution and transmission based on blockchain. Electronics 12(11), 2538 (2023)

    Article  Google Scholar 

  7. Mai,  H.L.: Implementation of content poisoning attack detection and reaction in virtualized NDN networks. In: Proceedings of 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), pp. 1–3 (Feb. 2018)

    Google Scholar 

  8. Kim, D., Bi, J., Vasilakos, A.V., et al.: Security of cached content in NDN. IEEE Trans. Inform. Forensics Sec. 12(12), 2933–2944 (2017)

    Google Scholar 

  9. Cui, W., Li, Y., Zhang, Y., Liu, C., Zhan, M.: An ant colony algorithm based content poisoning mitigation in named data networking. In:  2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, pp. 176–183 (2019)

    Google Scholar 

  10. Rezaeifar, Z., et al.: A trust-based method for mitigating cache poisoning in Name Data Networking. J. Netw. Comput. Appl. 104,  117–132 (2018)

    Google Scholar 

  11. Qu, D., Lv, G., Qu, S., Shen, H., Yang, Y., Heng, Z.: An effective and lightweight countermeasure scheme to multiple network attacks in NDN. IEEE/ACM Trans. Netw. 30(2), 515–528 (2022)

    Article  Google Scholar 

  12. Huang, X., Yu, R., Kang, J., et al.: Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 5, 25408–25420 (2017)

    Google Scholar 

  13. Yuan, J., Li, X.: A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6, 23626–23638 (2018)

    Article  Google Scholar 

  14. Aste, T., Tasca, P., Matteo, T.D.: Blockchain technologies: the foreseeable impact on society and industry. Computer 50(9), 18–28 (2017)

    Article  Google Scholar 

Download references

Acknowledgement

This work is supported by the Tianjin University of Science and Technology Research Innovation Project for Postgraduate Students (project number KYS202205).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cong Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiong, Y., Wang, C., Chen, C., Xu, J., Ma, M., Zhou, T. (2024). Design of a Blockchain-Based Trust Model for Detecting Cache Poisoning Attakcs in NDN. In: Huang, DS., Zhang, C., Guo, J. (eds) Advanced Intelligent Computing Technology and Applications. ICIC 2024. Lecture Notes in Computer Science, vol 14871. Springer, Singapore. https://doi.org/10.1007/978-981-97-5609-4_42

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-5609-4_42

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-5608-7

  • Online ISBN: 978-981-97-5609-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics