Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    ARTICLE

    A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking

    Arif Hussain Magsi1,*, Ali Ghulam2, Saifullah Memon1, Khalid Javeed3, Musaed Alhussein4, Imad Rida5

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1445-1465, 2023, DOI:10.32604/cmc.2023.040290

    Abstract Named Data Networking (NDN) is gaining a significant attention in Vehicular Ad-hoc Networks (VANET) due to its in-network content caching, name-based routing, and mobility-supporting characteristics. Nevertheless, existing NDN faces three significant challenges, including security, privacy, and routing. In particular, security attacks, such as Content Poisoning Attacks (CPA), can jeopardize legitimate vehicles with malicious content. For instance, attacker host vehicles can serve consumers with invalid information, which has dire consequences, including road accidents. In such a situation, trust in the content-providing vehicles brings a new challenge. On the other hand, ensuring privacy and preventing unauthorized access in vehicular (VNDN) is another… More >

  • Open Access

    ARTICLE

    Push-Based Content Dissemination and Machine Learning-Oriented Illusion Attack Detection in Vehicular Named Data Networking

    Arif Hussain Magsi1, Ghulam Muhammad2,*, Sajida Karim3, Saifullah Memon1, Zulfiqar Ali4

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3131-3150, 2023, DOI:10.32604/cmc.2023.040784

    Abstract Recent advancements in the Vehicular Ad-hoc Network (VANET) have tremendously addressed road-related challenges. Specifically, Named Data Networking (NDN) in VANET has emerged as a vital technology due to its outstanding features. However, the NDN communication framework fails to address two important issues. The current NDN employs a pull-based content retrieval network, which is inefficient in disseminating crucial content in Vehicular Named Data Networking (VNDN). Additionally, VNDN is vulnerable to illusion attackers due to the administrative-less network of autonomous vehicles. Although various solutions have been proposed for detecting vehicles’ behavior, they inadequately addressed the challenges specific to VNDN. To deal with… More >

  • Open Access

    ARTICLE

    A Hierarchal Clustered Based Proactive Caching in NDN-Based Vehicular Network

    Muhammad Yasir Khan1, Muhammad Adnan1,2, Jawaid Iqbal3, Noor ul Amin1, Byeong-Hee Roh4, Jehad Ali4,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1185-1208, 2023, DOI:10.32604/csse.2023.039352

    Abstract An Information-Centric Network (ICN) provides a promising paradigm for the upcoming internet architecture, which will struggle with steady growth in data and changes in access models. Various ICN architectures have been designed, including Named Data Networking (NDN), which is designed around content delivery instead of hosts. As data is the central part of the network. Therefore, NDN was developed to get rid of the dependency on IP addresses and provide content effectively. Mobility is one of the major research dimensions for this upcoming internet architecture. Some research has been carried out to solve the mobility issues, but it still has… More >

  • Open Access

    ARTICLE

    SAFT-VNDN: A Socially-Aware Forwarding Technique in Vehicular Named Data Networking

    Amel Boudelaa1, Zohra Abdelhafidi1, Nasreddine Lagraa1, Chaker Abdelaziz Kerrache1, Muhammad Bilal2, Daehan Kwak3,*, Mohamed Bachir Yagoubi1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2495-2512, 2022, DOI:10.32604/cmc.2022.028619

    Abstract Vehicular Social Networks (VSNs) is the bridge of social networks and Vehicular Ad-Hoc Networks (VANETs). VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication protocols. Vehicular Named Data Networking (VNDN) is an auspicious communication paradigm for the challenging VSN environment since it can optimize content dissemination by decoupling contents from their physical locations. However, content dissemination and caching represent crucial challenges in VSNs due to short link lifetime and intermittent connectivity caused by vehicles’ high mobility. Our aim with this paper is to improve content delivery and… More >

  • Open Access

    ARTICLE

    A Cost-Effective Approach for NDN-Based Internet of Medical Things Deployment

    Syed Sajid Ullah1, Saddam Hussain1, Abdu Gumaei2,3,*, Mohsin S. Alhilal4, Bader Fahad Alkhamees4, Mueen Uddin5, Mabrook Al-Rakhami2

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 233-249, 2022, DOI:10.32604/cmc.2022.017971

    Abstract Nowadays, healthcare has become an important area for the Internet of Things (IoT) to automate healthcare facilities to share and use patient data anytime and anywhere with Internet services. At present, the host-based Internet paradigm is used for sharing and accessing healthcare-related data. However, due to the location-dependent nature, it suffers from latency, mobility, and security. For this purpose, Named Data Networking (NDN) has been recommended as the future Internet paradigm to cover the shortcomings of the traditional host-based Internet paradigm. Unfortunately, the novel breed lacks a secure framework for healthcare. This article constructs an NDN-Based Internet of Medical Things… More >

  • Open Access

    ARTICLE

    Research on Detection Method of Interest Flooding Attack in Named Data Networking

    Yabin Xu1,2,*, Peiyuan Gu2, Xiaowei Xu3

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 113-127, 2021, DOI:10.32604/iasc.2021.018895

    Abstract In order to effectively detect interest flooding attack (IFA) in Named Data Networking (NDN), this paper proposes a detection method of interest flooding attack based on chi-square test and similarity test. Firstly, it determines the detection window size based on the distribution of information name prefixes (that is information entropy) in the current network traffic. The attackers may append arbitrary random suffix to a certain prefix in the network traffic, and then send a large number of interest packets that cannot get the response. Targeted at this problem, the sensitivity of chi-square test is used to detect the change of… More >

  • Open Access

    ARTICLE

    A Lightweight Anonymous Device Authentication Scheme for Information-Centric Distribution Feeder Microgrid

    Anhao Xiang, Jun Zheng*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2141-2158, 2021, DOI:10.32604/cmc.2021.018808

    Abstract Distribution feeder microgrid (DFM) built based on existing distributed feeder (DF), is a promising solution for modern microgrid. DFM contains a large number of heterogeneous devices that generate heavy network traffice and require a low data delivery latency. The information-centric networking (ICN) paradigm has shown a great potential to address the communication requirements of smart grid. However, the integration of advanced information and communication technologies with DFM make it vulnerable to cyber attacks. Adequate authentication of grid devices is essential for preventing unauthorized accesses to the grid network and defending against cyber attacks. In this paper, we propose a new… More >

  • Open Access

    ARTICLE

    A Secure NDN Framework for Internet of Things Enabled Healthcare

    Syed Sajid Ullah1, Saddam Hussain1,*, Abdu Gumaei2,3, Hussain AlSalman2,4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 223-240, 2021, DOI:10.32604/cmc.2021.014413

    Abstract Healthcare is a binding domain for the Internet of Things (IoT) to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet. The current IP-based Internet architecture suffers from latency, mobility, location dependency, and security. The Named Data Networking (NDN) has been projected as a future internet architecture to cope with the limitations of IP-based Internet. However, the NDN infrastructure does not have a secure framework for IoT healthcare information. In this paper, we proposed a secure NDN framework for IoT-enabled Healthcare (IoTEH). In the proposed work, we adopt the services of Identity-Based Signcryption… More >

  • Open Access

    ARTICLE

    A Cache Replacement Policy Based on Multi-Factors for Named Data Networking

    Meiju Yu1, Ru Li1, *, Yuwen Chen2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 321-336, 2020, DOI:10.32604/cmc.2020.010831

    Abstract Named Data Networking (NDN) is one of the most excellent future Internet architectures and every router in NDN has the capacity of caching contents passing by. It greatly reduces network traffic and improves the speed of content distribution and retrieval. In order to make full use of the limited caching space in routers, it is an urgent challenge to make an efficient cache replacement policy. However, the existing cache replacement policies only consider very few factors that affect the cache performance. In this paper, we present a cache replacement policy based on multi-factors for NDN (CRPM), in which the content… More >

Displaying 1-10 on page 1 of 9. Per Page