Abstract
Cache Poisoning Attack is a major threat in NDN, impacting network performance. Current solutions are costly and don't fully address router single point failures or repeated router evaluations with producer mobility. To tackle these, we introduce CPA-BT, a Blockchain-based Trust Model. It integrates blockchain, enabling edge routers connected to data producers to operate under a consensus mechanism, treating their evaluation as blockchain transactions. With 2/3 consensus, a leader edge router records the transactions, addressing the mentioned challenges. Simulations show CPA-BT effectively isolates malicious and faulty producers, reducing cache poisoning risks and outperforming other trust models in task failure rate reduction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: Proc. 5th ACM International Conference on Emerging Networking Experiments and Technologies, Rome, Italy, pp. 1–12 (2009)
Zhang, L.X., Afanasyev, A., Burke, J., et al.: Named data networking. ACM SIGCOMM Comput. Commun. Rev. 44(3), 66–73 (2014)
Castro, M., Liskov, B.: Practical Byzantine Fault Tolerance. ACM Trans. Comput. Syst. (TOCS) (2002)
Gasti, P., Tsudik, G., Uzun, E., Zhang, L.: DoS & DDoS in named data networking. In: Proceedings of 22nd IEEE ICN, pp. 1–7 (Jul 2013)
Srinivasan, S., Mazumdar, A.P.: Mitigating content poisoning in content centric network: A lightweight approach. In Proceedings of 10th International Conference on Computing and Communication Network Technology (ICCCNT), pp. 1–6 (Jul 2019)
He, Y., Ma, Y., Qing, H., et al.: Lightweight transmission behavior audit scheme for NDN Industrial Internet identity resolution and transmission based on blockchain. Electronics 12(11), 2538 (2023)
Mai, H.L.: Implementation of content poisoning attack detection and reaction in virtualized NDN networks. In: Proceedings of 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), pp. 1–3 (Feb. 2018)
Kim, D., Bi, J., Vasilakos, A.V., et al.: Security of cached content in NDN. IEEE Trans. Inform. Forensics Sec. 12(12), 2933–2944 (2017)
Cui, W., Li, Y., Zhang, Y., Liu, C., Zhan, M.: An ant colony algorithm based content poisoning mitigation in named data networking. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, pp. 176–183 (2019)
Rezaeifar, Z., et al.: A trust-based method for mitigating cache poisoning in Name Data Networking. J. Netw. Comput. Appl. 104, 117–132 (2018)
Qu, D., Lv, G., Qu, S., Shen, H., Yang, Y., Heng, Z.: An effective and lightweight countermeasure scheme to multiple network attacks in NDN. IEEE/ACM Trans. Netw. 30(2), 515–528 (2022)
Huang, X., Yu, R., Kang, J., et al.: Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 5, 25408–25420 (2017)
Yuan, J., Li, X.: A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6, 23626–23638 (2018)
Aste, T., Tasca, P., Matteo, T.D.: Blockchain technologies: the foreseeable impact on society and industry. Computer 50(9), 18–28 (2017)
Acknowledgement
This work is supported by the Tianjin University of Science and Technology Research Innovation Project for Postgraduate Students (project number KYS202205).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xiong, Y., Wang, C., Chen, C., Xu, J., Ma, M., Zhou, T. (2024). Design of a Blockchain-Based Trust Model for Detecting Cache Poisoning Attakcs in NDN. In: Huang, DS., Zhang, C., Guo, J. (eds) Advanced Intelligent Computing Technology and Applications. ICIC 2024. Lecture Notes in Computer Science, vol 14871. Springer, Singapore. https://doi.org/10.1007/978-981-97-5609-4_42
Download citation
DOI: https://doi.org/10.1007/978-981-97-5609-4_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-5608-7
Online ISBN: 978-981-97-5609-4
eBook Packages: Computer ScienceComputer Science (R0)