Named Data Networking (NDN) uses public-key based identities and trust models to achieve data-centric security. Each NDN data packet is signed by its producer, and any data …
• Publish every public key record in a tamper-proof blockchain• Majority rule→ As long as the attacker cannot compromise half or more of the validators, an invalid public key record …