Engagée à connecter le monde

SDG DIGITAL

A trust-aware cluster-based communication architecture for vehicular named data networking

A trust-aware cluster-based communication architecture for vehicular named data networking

Authors: Chaker Abdelaziz Kerrache
Status: Final
Date of publication: 10 May 2022
Published in: ITU Journal on Future and Evolving Technologies, Volume 3 (2022), Issue 1, Pages 1-10
Article DOI : https://doi.org/10.52953/GNEI4222
Abstract:
Information-centric Networking (ICN) is a new networking paradigm that aims to solve the problem of the traditional TCP/IP-based Internet. Content-centric Networking (CCN) and Named Data Networking (NDN), both based on the Interest/Data communication paradigm, are two of the most well-known and specialized implementations of ICN. In contrast to typical networks, NDN enables intrinsic security, which ensures data security rather than communication channel security. Each response/data packet in transit has a signature on the contents of the data to ensure security. As a result, an invalid signature indicates an unauthenticated data packet. This ongoing hierarchical authentication verification approach causes a significant delay while providing the appropriate security levels. As a result, in a highly mobile environment with delay-sensitive applications like Vehicular Ad hoc Networks (VANETs), such a technique is neither viable nor scalable. We present a unique Trust-Aware Cluster-based Communication Architecture (TACCA) for Vehicular Named Data Networking in this study, which aims to improve the security of NDN-driven VANETs (VNDN). It separates the route segments into clusters and chooses cluster heads based on their trustworthiness and proximity to the center location. The selected cluster heads are then in charge of disseminating interest packets to prevent the broadcast storm problem. Once the data producer has been located, the data is returned to the requester in the quickest and most secure manner possible. Simultaneously, the intermediate vehicles decided whether or not to verify the data's validity based on their subjective perceptions of the data's producer's conduct. As a result, the calculation complexity and time are reduced. Our idea is able to maintain vanilla NDN security standards while lowering the produced end-to-end latency by more than three times, according to simulation data. As a result, the proposed TACCA is more suited to mobile networks(...)

Keywords: Named data networking, security, trust management, vehicular named data networks, vehicular networks
Rights: © International Telecommunication Union, available under the CC BY-NC-ND 3.0 IGO license.
electronic file
DetailArticlePrix
anglais
PDF format  
GratuitTéléchargement