[PDF][PDF] Blockchain-based decentralized public key management for named data networking

K Yang, JJ Sunny, L Wang - The international conference on …, 2018 - web0.cs.memphis.edu
Named Data Networking (NDN) uses public-key based identities and trust models to
achieve data-centric security. Each NDN data packet is signed by its producer, and any data …

A blockchain-based key management scheme for named data networking

J Lou, Q Zhang, Z Qi, K Lei - 2018 1st IEEE international …, 2018 - ieeexplore.ieee.org
Named Data Networking is built with security which requires each named Data object to be
digitally signed by its producer. Thus, the NDN project has proposed a key management …

Blockchain-based key management system in named data networking: A survey

M Kharjana, FH Pohrmen, SC Sahana… - Journal of Network and …, 2023 - Elsevier
Abstract The Named Data Networking is a popular future internet architecture designed
around the content name. This data-centric network architecture sought to improve routing …

An advanced hierarchical identity-based security mechanism by blockchain in named data networking

B Li, M Ma - Journal of Network and Systems Management, 2023 - Springer
Named data networking (NDN) has been viewed as a promising future Internet architecture
due to its data-centric design. It requires a new security model that is orienting data but not …

Hierarchical identity-based security mechanism using blockchain in named data networking

B Li, M Ma, R Xia - 2020 3rd International Conference on Hot …, 2020 - ieeexplore.ieee.org
Named Data Networking (NDN) with the data-centric design has been viewed as a
promising future Internet architecture. It requires a new security model orienting data but not …

Security bootstrapping for securing data plane and control plane in named data networking

CS Park, WS Park, S Woo - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
Among several information-centric networking architectures envisioned thus far, named data
networking (NDN) offers name-based forwarding, in-network caching, and content-based …

Data authentication mechanism using blockchain's proof-of-trust mechanism in named data networking

A Rosli, S Hassan, MH Omar - AIP Conference Proceedings, 2023 - pubs.aip.org
Blockchain is regarded as an approach that can increase the level of trust in the networking
environment since its recorded transaction details using cryptographic techniques that make …

LIVE: Lightweight integrity verification and content access control for named data networking

Q Li, X Zhang, Q Zheng, R Sandhu… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Named data networking (NDN) is a new paradigm for the future Internet wherein interest and
data packets carry content names rather than the current IP paradigm of source and …

Enabling blockchain applications over named data networking

J Guo, M Wang, B Chen, S Yu… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
Blockchain can be used to ensure trust in a decentralized environment in which no trusted
authority is available. Its original idea is to collect transactions in a block, and to chain the …

A blockchain-based decentralized public key infrastructure for information-centric networks

J Shi, X Zeng, R Han - Information, 2022 - mdpi.com
How to achieve secure content distribution and accountability in information-centric
networking (ICN) is a crucial problem. Subscribers need to verify whether the data came …