Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking

    Arif Hussain Magsi1,*, Ali Ghulam2, Saifullah Memon1, Khalid Javeed3, Musaed Alhussein4, Imad Rida5

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1445-1465, 2023, DOI:10.32604/cmc.2023.040290

    Abstract Named Data Networking (NDN) is gaining a significant attention in Vehicular Ad-hoc Networks (VANET) due to its in-network content caching, name-based routing, and mobility-supporting characteristics. Nevertheless, existing NDN faces three significant challenges, including security, privacy, and routing. In particular, security attacks, such as Content Poisoning Attacks (CPA), can jeopardize legitimate vehicles with malicious content. For instance, attacker host vehicles can serve consumers with invalid information, which has dire consequences, including road accidents. In such a situation, trust in the content-providing vehicles brings a new challenge. On the other hand, ensuring privacy and preventing unauthorized access in vehicular (VNDN) is another… More >

  • Open Access

    ARTICLE

    Push-Based Content Dissemination and Machine Learning-Oriented Illusion Attack Detection in Vehicular Named Data Networking

    Arif Hussain Magsi1, Ghulam Muhammad2,*, Sajida Karim3, Saifullah Memon1, Zulfiqar Ali4

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3131-3150, 2023, DOI:10.32604/cmc.2023.040784

    Abstract Recent advancements in the Vehicular Ad-hoc Network (VANET) have tremendously addressed road-related challenges. Specifically, Named Data Networking (NDN) in VANET has emerged as a vital technology due to its outstanding features. However, the NDN communication framework fails to address two important issues. The current NDN employs a pull-based content retrieval network, which is inefficient in disseminating crucial content in Vehicular Named Data Networking (VNDN). Additionally, VNDN is vulnerable to illusion attackers due to the administrative-less network of autonomous vehicles. Although various solutions have been proposed for detecting vehicles’ behavior, they inadequately addressed the challenges specific to VNDN. To deal with… More >

  • Open Access

    ARTICLE

    A Hierarchal Clustered Based Proactive Caching in NDN-Based Vehicular Network

    Muhammad Yasir Khan1, Muhammad Adnan1,2, Jawaid Iqbal3, Noor ul Amin1, Byeong-Hee Roh4, Jehad Ali4,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1185-1208, 2023, DOI:10.32604/csse.2023.039352

    Abstract An Information-Centric Network (ICN) provides a promising paradigm for the upcoming internet architecture, which will struggle with steady growth in data and changes in access models. Various ICN architectures have been designed, including Named Data Networking (NDN), which is designed around content delivery instead of hosts. As data is the central part of the network. Therefore, NDN was developed to get rid of the dependency on IP addresses and provide content effectively. Mobility is one of the major research dimensions for this upcoming internet architecture. Some research has been carried out to solve the mobility issues, but it still has… More >

  • Open Access

    ARTICLE

    NDN Content Poisoning Mitigation Using Bird Swarm Optimization and Trust Value

    S. V. Vijaya Karthik*, J. Arputha Vijaya Selvi

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 833-847, 2023, DOI:10.32604/iasc.2023.025404

    Abstract Information-Centric Networking (ICN) is considered a viable strategy for regulating Internet consumption using the Internet’s underlying architecture. Although Named Data Networking (NDN) and its reference-based implementation, the NDN Forwarding Daemon (NFD), are the most established ICN solutions, their vulnerability to the Content Poisoning Attack (CPA) is regarded as a severe threat that might dramatically impact this architecture. Content Poisoning can significantly minimize the impact of NDN’s universal data caching. Using verification signatures to protect against content poisoning attacks may be impractical due to the associated costs and the volume of messages sent across the network, resulting in high computational costs.… More >

  • Open Access

    ARTICLE

    SAFT-VNDN: A Socially-Aware Forwarding Technique in Vehicular Named Data Networking

    Amel Boudelaa1, Zohra Abdelhafidi1, Nasreddine Lagraa1, Chaker Abdelaziz Kerrache1, Muhammad Bilal2, Daehan Kwak3,*, Mohamed Bachir Yagoubi1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2495-2512, 2022, DOI:10.32604/cmc.2022.028619

    Abstract Vehicular Social Networks (VSNs) is the bridge of social networks and Vehicular Ad-Hoc Networks (VANETs). VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication protocols. Vehicular Named Data Networking (VNDN) is an auspicious communication paradigm for the challenging VSN environment since it can optimize content dissemination by decoupling contents from their physical locations. However, content dissemination and caching represent crucial challenges in VSNs due to short link lifetime and intermittent connectivity caused by vehicles’ high mobility. Our aim with this paper is to improve content delivery and… More >

  • Open Access

    ARTICLE

    Research on the Method of Implementing Named Data Network Interconnection Based on IP Network

    Yabin Xu1,2,*, Lufa Qin2, Xiaowei Xu3

    Journal of Cyber Security, Vol.4, No.1, pp. 41-55, 2022, DOI:10.32604/jcs.2022.028265

    Abstract In order to extend the application scope of NDN and realize the transmission of different NDNs across IP networks, a method for interconnecting NDN networks distributed in different areas with IP networks is proposed. Firstly, the NDN data resource is located by means of the DNS mechanism, and the gateway IP address of the NDN network where the data resource is located is found. Then, the transmission between different NDNs across the IP network is implemented based on the tunnel technology. In addition, in order to achieve efficient and fast NDN data forwarding, we have added a small number of… More >

  • Open Access

    ARTICLE

    A Cost-Effective Approach for NDN-Based Internet of Medical Things Deployment

    Syed Sajid Ullah1, Saddam Hussain1, Abdu Gumaei2,3,*, Mohsin S. Alhilal4, Bader Fahad Alkhamees4, Mueen Uddin5, Mabrook Al-Rakhami2

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 233-249, 2022, DOI:10.32604/cmc.2022.017971

    Abstract Nowadays, healthcare has become an important area for the Internet of Things (IoT) to automate healthcare facilities to share and use patient data anytime and anywhere with Internet services. At present, the host-based Internet paradigm is used for sharing and accessing healthcare-related data. However, due to the location-dependent nature, it suffers from latency, mobility, and security. For this purpose, Named Data Networking (NDN) has been recommended as the future Internet paradigm to cover the shortcomings of the traditional host-based Internet paradigm. Unfortunately, the novel breed lacks a secure framework for healthcare. This article constructs an NDN-Based Internet of Medical Things… More >

  • Open Access

    ARTICLE

    Research on Detection Method of Interest Flooding Attack in Named Data Networking

    Yabin Xu1,2,*, Peiyuan Gu2, Xiaowei Xu3

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 113-127, 2021, DOI:10.32604/iasc.2021.018895

    Abstract In order to effectively detect interest flooding attack (IFA) in Named Data Networking (NDN), this paper proposes a detection method of interest flooding attack based on chi-square test and similarity test. Firstly, it determines the detection window size based on the distribution of information name prefixes (that is information entropy) in the current network traffic. The attackers may append arbitrary random suffix to a certain prefix in the network traffic, and then send a large number of interest packets that cannot get the response. Targeted at this problem, the sensitivity of chi-square test is used to detect the change of… More >

  • Open Access

    ARTICLE

    A Lightweight Anonymous Device Authentication Scheme for Information-Centric Distribution Feeder Microgrid

    Anhao Xiang, Jun Zheng*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2141-2158, 2021, DOI:10.32604/cmc.2021.018808

    Abstract Distribution feeder microgrid (DFM) built based on existing distributed feeder (DF), is a promising solution for modern microgrid. DFM contains a large number of heterogeneous devices that generate heavy network traffice and require a low data delivery latency. The information-centric networking (ICN) paradigm has shown a great potential to address the communication requirements of smart grid. However, the integration of advanced information and communication technologies with DFM make it vulnerable to cyber attacks. Adequate authentication of grid devices is essential for preventing unauthorized accesses to the grid network and defending against cyber attacks. In this paper, we propose a new… More >

  • Open Access

    ARTICLE

    A Secure NDN Framework for Internet of Things Enabled Healthcare

    Syed Sajid Ullah1, Saddam Hussain1,*, Abdu Gumaei2,3, Hussain AlSalman2,4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 223-240, 2021, DOI:10.32604/cmc.2021.014413

    Abstract Healthcare is a binding domain for the Internet of Things (IoT) to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet. The current IP-based Internet architecture suffers from latency, mobility, location dependency, and security. The Named Data Networking (NDN) has been projected as a future internet architecture to cope with the limitations of IP-based Internet. However, the NDN infrastructure does not have a secure framework for IoT healthcare information. In this paper, we proposed a secure NDN framework for IoT-enabled Healthcare (IoTEH). In the proposed work, we adopt the services of Identity-Based Signcryption… More >

Displaying 1-10 on page 1 of 11. Per Page