An efficient content source verification scheme for multi-receiver in NDN-based Internet of Things

Internet of Things (IoT) is a heterogeneous environment where multiple devices/consumers can interest/request for the same chunk of content at the same time with the need for source authenticity. According to the current NDN policy, only one user can verify the content authenticity using a digital s...

Full description

Saved in:
Bibliographic Details
Main Authors: Hussain, Saddam, Ullah, Syed Sajid, Ali, Ihsan
Format: Article
Published: Kluwer (now part of Springer) 2022
Subjects:
Online Access:http://eprints.um.edu.my/42438/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Internet of Things (IoT) is a heterogeneous environment where multiple devices/consumers can interest/request for the same chunk of content at the same time with the need for source authenticity. According to the current NDN policy, only one user can verify the content authenticity using a digital signature. However, the digital signature is generated for one particular user whose public key and identity have been used. As the content can be cached and multicast to all the users whose interest is awaiting in the Pending Interest Table (PIT). Unfortunately, only one user is able to verify the content authenticity while the rest can just receive the content. To solve this, we designed a novel multi-cast signature solution for NDN-based IoT networks in which the consumers can verify the source of the content provider. The proposed scheme obeys the forwarding and caching policy of NDN. Besides, the designed scheme can prevent cache pollution attacks, content poisoning attacks, denial of service attacks, and interest flooding attacks. For efficiency, we compared our newly designed scheme with some Identity-Based Signature (IBS) in terms of computation time and communication overhead. The results show significant improvements in both computation time and communication overhead. In addition, we also validate the designed scheme using the familiar security validation tool AVISPA. Finally, we provide a robust application scenario of the designed scheme on NDN-based IoT.