MPR Based Secure Content Routing Scheme for NDN-MANET

被引:3
作者
Guo, Xian [1 ]
Zhang, Ma-Jiang [1 ]
Ngaboyindekwe, Aristide [1 ]
Fang, Jun-Li [1 ]
Wang, Jing [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou, Gansu, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2019年 / 20卷 / 05期
关键词
Named data networking; MANET; Merkle tree; Secure content routing; AD HOC NETWORKS;
D O I
10.3966/160792642019092005026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
"Bread Crumb" routing in native NDN is better suitable for highly dynamic MANET. However, uncontrolled interest flooding will cause the broadcast storm and security issues in NDN-MANET. So, this paper takes advantage of MPR in OLSR and proposes a MPR based Secure Content Routing for NDN-MANET (MPR-SCR). In this novel scheme, some security mechanisms, such as cooperative authentication, statistical detection, and voting scheme etc., are introduced to resolve security issues mentioned in this paper. By using cooperative authentication based on Merkle Tree, nodes in a network can cooperatively verify a new node that wants to join the network. PIT based statistical detection, that benefits from NDN's stateful forwarding feature, and voting scheme are used to prevent from selecting a node that is controlled by an attacker, as a node in MPR. And they can further block attacks of interest flooding and sending malicious name prefix. In addition, hash and signature mechanisms in an interest packet are used for source authentication. Finally, we simply analyze security attributes of our novel scheme, and detailly verify our scheme and make comparisons with the related schemes by experiment in ndnSIM 2.3.
引用
收藏
页码:1625 / 1636
页数:12
相关论文
共 21 条
[11]   Networking Named Content [J].
Jacobson, Van ;
Smetters, Diana K. ;
Thornton, James D. ;
Plass, Michael ;
Briggs, Nick ;
Braynard, Rebecca .
COMMUNICATIONS OF THE ACM, 2012, 55 (01) :117-124
[12]  
Kim J., 2013, CSTR, P1, DOI [10.1109/ISR.2013.6695655, 10.1016/j.brainres.2013.01, DOI 10.1016/J.BRAINRES.2013.01]
[13]   TIME, CLOCKS, AND ORDERING OF EVENTS IN A DISTRIBUTED SYSTEM [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1978, 21 (07) :558-565
[14]   Information-centric mobile ad hoc networks and content routing: A survey [J].
Liu, Xuan ;
Li, Zhuo ;
Yang, Peng ;
Dong, Yongqiang .
AD HOC NETWORKS, 2017, 58 :255-268
[15]  
MALKIN G, 1998, 2453 IETF RFC
[16]  
Minh NQ, 2017, ADV INT C TELECOMMUN, P80
[17]  
Rehman RA, 2016, JT IFIP WIREL MOB, P187, DOI 10.1109/WMNC.2016.7543988
[18]   Named Data Networking: A survey [J].
Saxena, Divya ;
Raychoudhury, Vaskar ;
Suri, Neeraj ;
Becker, Christian ;
Cao, Jiannong .
COMPUTER SCIENCE REVIEW, 2016, 19 :15-55
[19]   Cooperative-Filter: countering Interest flooding attacks in named data networking [J].
Wang, Kai ;
Zhou, Huachun ;
Qin, Yajuan ;
Zhang, Hongke .
SOFT COMPUTING, 2014, 18 (09) :1803-1813
[20]  
Yao S. Y., 2013, P ACM INT C FUTURE I, P1