Lightweight Transmission Behavior Audit Scheme for NDN Industrial Internet Identity Resolution and Transmission Based on Blockchain
Abstract
:1. Introduction
- (1)
- Routing multi-party node trust issues in identification resolution transmission process. The identification resolution transmission process in the NDN network is vulnerable to trust issues due to semi-honest or malicious routes that may tamper with cached data and calculation results. This unreliability creates a need for local verification and reputation management by routes, resulting in data security issues.
- (2)
- Verification efficiency problem in identification resolution transmission. During the process of transmitting identification resolution data packets, there is a risk of tampering at each hop along the route. To ensure the integrity of the data packet, it may be verified by the route. However, using authentication based on digital signatures in NDN can lead to significant overheads. Similarly, performing traffic analysis locally on the router can also result in additional overheads.
- (1)
- A Blockchain Behavior Audit Scheme: We propose a lightweight identification resolution behavior auditing scheme based on blockchain to address the threats associated with NDN industrial Internet identification resolution transmission. Our scheme uses blockchain as a trusted third party to build a real storage platform that stores routing audit information. The blockchain nodes jointly complete the audit work through a contract, solving the single-point trust problem of traditional solutions.
- (2)
- A Data Compression Scheme based on Bloom Filter: To compress the data on the real storage chain, we use an improved Bloom filter, which is an efficient data structure. First, the routing behavior is recorded in a table, and then compressed using the corresponding Bloom filter. We use a counting Bloom filter to enable repeated modification of the filter and limit the output data size by limiting the number of bits. This approach significantly improves efficiency while retaining important features.
2. Related Work
- (1)
- Encrypted transmission: To protect security during message transmission, it is common practice to encrypt information, use tokens for access control, or use certificates to authenticate messages. Previous architectures have relied on asymmetric authentication mechanisms used throughout the NDN stack, however, Enguehard et al. [9] quantifies the time and energy overhead of such schemes on constrained devices, and finally came to the conclusion that its cost is too high. Compagno et al. [10] proposed a solution based on symmetric cryptography, which solved the initial authentication and key distribution problems of IoT. However, it does not consider the needs of the routing protocols. Mick et al. [11] proposed a lightweight authentication and hierarchical routing framework for device authentication security. Through nodes and basic, the shared key between facilities and equipment integrates routing and secure login into a framework, and authentication and routing can be performed at the same time, thereby reducing the consumption in the continuous process. Although the authentication is completed, data security is not considered. Kar et al. [12] use the hop count of the message to generate a public key to encrypt the information, and then the message receiver receives the message with the help of the decryption function sent by the sender, using the number of hops is decrypted as a private key to protect the security of the message. At the same time, a cooperative Stackelberg game model is used to determine the best defense strategy for the defenders and attackers. While this method is more efficient than other key schemes, a malicious node in the route can easily obtain the hop count of other layers through its forwarding table, leading to data leakage. To further enhance data security, Tariq et al. [13] proposed an NDN authentication scheme using an elliptic curve algorithm and bilinear mapping to compress public keys, sign and verify data, making it suitable for resource-constrained IoT devices with space-saving benefits. However, the scheme requires key pairs to be distributed in advance, leading to management difficulties and vulnerability to man-in-the-middle attacks during the distribution process. To further improve data security, Qu et al. [14] proposed an effective and lightweight countermeasure scheme, which consists of a token-based routing monitoring strategy (TRM), hierarchical consensus-based trust management (HCT), and popularity-based probability composed of cache and cache replacement strategy (PPC). It uses tokens to control the sending of packets, establishes a trusted environment through hierarchical consensus, and uses cache strategies to improve verification strategies. However, the disadvantage is that hierarchical trust is evaluated by core routing, and the core router is not considered an existing security issue.
- (2)
- Routing forwarding and verification: Several scholars have developed routing forwarding and routing verification schemes based on routing. In a routing forwarding strategy, DiBenedetto et al. [15] propose selecting the next hop based on its forwarding success rate as a defense against attackers. However, discarding interest packets can hinder other routes on the path from receiving the requested data and diminish their rating as potential next-hop routes. Consequently, this approach negatively impacts the selection of subsequent routes and significantly increases the likelihood of detours. Yang et al. [16] proposed a minimization bypass scheme SmartDetour by using the reputation mechanism, and established a new probabilistic forwarding table in each route, and bypassed when the packet forwarding failed. The forwarding candidate reputation is updated, and at the same time, with the help of the reputation-based probabilistic forwarding strategy, the interface with the highest probability in the reputation selection table is used for unicast attempts. Although this method can reduce the detour distance very well, its unicast trial and error will waste more time and record a large amount of repeated information, resulting in a waste of storage space. To avoid content poisoning attacks, signature verification can be performed on each hop route, but the verification will cause a lot of overhead. Kim et al. [17] regards content detection as the main method, proposes an efficient content verification scheme, processes limited content cache segments, and adopts the LRU algorithm to reduce cache and verify repeated popular content to improve the efficiency of data verification. However, this scheme still cannot guarantee whether the router has actually verified the data. Although it has certain robustness, it is not safe when the number of attacked nodes increases. While the above solutions may detect malicious behaviors and resist attacks, they fall short in establishing a trusted environment between devices and implementing necessary authority control.
- (3)
- Blockchain technology: As a data storage and information encryption technology, blockchain provides new ideas and methods for transmission security. Lei et al. [18] implemented blockchain-based cache poisoning protection and privacy-aware access control in the NDN-based vehicle network, achieving key management, cache poisoning detection, and access control. However, this solution has limited efficiency and is only applicable to the vehicle network. In the UAV network, Alsamhi et al. [19] proposed a combination of Federated Learning (FL) and blockchain technology. They utilized blockchain to store model data and verify human-machine behavior, ensuring high-level security and data privacy. Additionally, they investigated a blockchain-based method for transmitting sensitive information and achieving collaborative consensus in a trustless environment [20]. In the domain of the medical internet, Myrzashova et al. [21] introduced a novel conceptual framework for FL based on blockchain in digital medical environments. Their approach ensured the accuracy of the overall FL result through blockchain validation. They also incentivized the donation of local data during training tasks, effectively addressing the challenges associated with confidential medical data leakage and security. This framework facilitated collaboration among multiple parties in training without the need to share or centralize datasets. However, the scenarios addressed by the aforementioned solutions do not align with those encountered in the Industrial Internet. This disparity encompasses both the quantity and nature of the data involved. Hence, it remains necessary to develop a blockchain security solution specifically tailored to the identification resolution system of the Industrial Internet. This solution aims to address the issues of untrustworthy routing and privacy breaches.
3. Model Building and Design Requirements
3.1. Industrial Internet Analysis Process Model Construction
- (1)
- Root prefix layer: Used to define the core domain or network prefix, which is related to the device’s location in the network.
- (2)
- Task type layer: Defines the IoT data namespace. Based on the required tasks it is mainly divided into two types: data collection tasks, such as the real-time collection of sensor information in the production process, and equipment status information; and instruction tasks, such as sending alarms, custom monitoring cycles, and other equipment action attributes.
- (3)
- Service layer: Defines specific service content, such as obtaining temperature, humidity, monitoring and retrieval, and device status retrieval.
- (4)
- Topological location and intra-network functional layer: Identifies the intra-network functions used, allowing for multi-source data retrieval.
3.2. Threat Model
- (1)
- Request flooding attack [24]: In this attack, an attacker floods the network with a large number of useless interest packets in a short amount of time, overwhelming the network and causing the cache table to be replaced constantly. This ultimately results in the route being unable to provide forwarding services to normal users.
- (2)
- Logo content poisoning [25]: An attacker replaces the original content with fake data, resulting in the consumer being unable to receive the legitimate data.
- (3)
- Black hole attack [26]: Malicious routers discard interest packets or returned information during the identification resolution process, which can target a specific range or device by filtering a specific name prefix. This can isolate the device, preventing it from receiving normal resolution services.
- (4)
- Data leakage: The industrial Internet transmits information in plain text without encryption, making it vulnerable to data leakage. Third-party behavior audits can also lead to production data leakage.
3.3. Design Goals
- (1)
- Trusted security solution: A security solution is necessary to solve various attacks encountered in the scene, and the trustworthiness of the solution ensures that the entire process is credible, private, and safe. The blockchain, being a distributed network security technology, is suitable for NDN IoT security scenarios. By building a blockchain system that uses blockchain as the carrier of the security solution, each device can register its identity and assets in the blockchain architecture, and each behavior can be encrypted and protected in the blockchain by the trusted device record. The corresponding table of the hash of the device ID, prefix name, and its NameCode is stored on the blockchain, and the compressed behavior is also recorded (Section 4.1). By verifying the hash of the device ID, the identity of the host can be determined.
- (2)
- Lightweight behavior audit: Uploading device behavior records to the blockchain and using blockchain contracts to conduct behavior audits with the help of the non-repudiation, openness, and transparency of the blockchain can enable audit results to be traced and verified. In the process of monitoring equipment behavior, the use of Bloom filter technology and improved compression methods can compress behavior records to achieve high compression rates and improve verification efficiency.
4. Lightweight Audit Scheme Based on Blockchain
4.1. Privacy Protection Behavior Audit Scheme
4.1.1. Authentication Stage
4.1.2. Behavior Audit Stage
Algorithm 1 Bloom filter data compression algorithm |
Input: input Behavior record , Bloom filter length l, random number Output: output Compressed behavior record
|
Algorithm 2 Comparison of Behavioral Records |
Input: Abnormal record Output: record verification result T
|
4.1.3. Feedback Stage
4.2. Data Compression Scheme Based on Bloom Filter
4.2.1. Forwarding Behavior Table
4.2.2. Data Compression Scheme Using Improved Bloom Filter
5. Safety Analysis and Experimental Evaluation
5.1. Security Analysis
- (1)
- Flood attack: The flooding attack is initiated by the attacker from the consumer side. By sending a large number of interest packet requests in a short period of time, the network load increases, or the PIT table overflows, and other users’ normal requests cannot be responded to. Its characteristic is that the number of interest requests from the same interface increases sharply in a short period of time, and it is quite different from normal interest packets, and most of them are meaningless requests. On the chain, the transaction volume from the device has increased dramatically (because every behavior record is a transaction), and the gas consumption is abnormal. When this happens, it indicates that the network is suffering from an Interest flood attack, and the device under attack can be identified by looking up the device name in the record. At this time, the message requester submits because he cannot obtain the corresponding reply. At this time, two situations will occur. There is no relevant information about the interest packet in the blockchain, that is, , there is , but no reply is received. In both cases, the corresponding attacked route can be found. In both cases, the corresponding attacked route can be found. The first one is its adjacent router, and the second one records the route connected to the last forwarding port face. Two types record the route of the last forwarding port face connection.
- (2)
- Black Hole Attack: A black hole attack occurs when an attacker discards all received information of a specific prefix during data transmission. Consumer requests that cannot be responded to will submit a review request to the blockchain. If , but was not obtained after forwarding, it is considered that the is suffering from a black hole attack. Since the interest packet and the data packet in the record are stored in pairs, when the data of the reply packet matching the prefix in the record is all 0, it is considered that the suffers from a black hole attack. At this time, the attacker can be identified based on the RouterID.
- (3)
- Content Poisoning Attack: In a content poisoning attack, the data received by the consumer is abnormal because the attacker replies with abnormal content. Since the behavior information is compressed by the hash function, when the data changes, , but . Therefore, we can find specific attackers by comparing the interest packets provided by consumers with the hashes of the content.
- (4)
- Privacy Protection: Since only the device name is stored on the blockchain after hash mapping, and . Additionally, due to the characteristics of the hash function, and . The hash value cannot restore the original data, making it safe to disclose on the blockchain.
- (5)
- Formal Analysis Of Smart Contracts: The use of formal methods is a mathematical technique for modeling, designing, and testing software and hardware systems to ensure they are built correctly, which is suitable for ensuring the security of smart contracts [29]. We employ the formal modeling method introduced in [30] to verify the execution environment’s integrity and effectiveness of the smart contract behavior. To simulate the execution of the audit contract, we model the interaction between user behavior and the audit contract. The audit parameter (InterestPacket, DataPacket) is utilized, and the audit function is invoked through Audit Call. The simulation demonstrates that the user achieves a 100% success rate when interacting with the audit contract.
5.2. Experimental Evaluation
6. Conclusions and Future Directions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Hail, M.A. IoT-NDN: An IoT architecture via named data netwoking (NDN). In Proceedings of the 2019 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), Bali, Indonesia, 1–3 July 2019; pp. 74–80. [Google Scholar]
- Aboodi, A.; Wan, T.C.; Sodhy, G.C. Survey on the Incorporation of NDN/CCN in IoT. IEEE Access 2019, 7, 71827–71858. [Google Scholar] [CrossRef]
- Zhang, L.; Estrin, D.; Burke, J.; Jacobson, V.; Thornton, J.D.; Smetters, D.K.; Zhang, B.; Tsudik, G.; Claffy, K.; Krioukov, D.; et al. Named Data Networking (NDN) Project; Technical Report NDN-0001; Xerox Palo Alto Research Center-PARC: Palo Alto, CA, USA, 2010; Volume 157, p. 158. [Google Scholar]
- Buragohain, M.; Nandi, S. Demystifying security on NDN: A survey of existing attacks and open research challenges. In The “Essence” of Network Security: An End-to-End Panorama; Springer: Berlin/Heidelberg, Germany, 2021; pp. 241–261. [Google Scholar]
- Chatterjee, T.; Ruj, S.; Bit, S.D. Security issues in named data networks. Computer 2018, 51, 66–75. [Google Scholar] [CrossRef]
- Kumar, N.; Singh, A.K.; Aleem, A.; Srivastava, S. Security attacks in named data networking: A review and research directions. J. Comput. Sci. Technol. 2019, 34, 1319–1350. [Google Scholar] [CrossRef]
- Yaga, D.; Mell, P.; Roby, N.; Scarfone, K. Blockchain technology overview. arXiv 2019, arXiv:1906.11078. [Google Scholar]
- Luo, L.; Guo, D.; Ma, R.T. Optimizing bloom filter: Challenges, solutions, and comparisons. IEEE Commun. Surv. Tutor. 2018, 21, 1912–1949. [Google Scholar] [CrossRef] [Green Version]
- Enguehard, M.; Droms, R.; Rossi, D. On the cost of secure association of information centricthings. In Proceedings of the 3rd ACM Conference on Information-Centric Networking, Kyoto, Japan, 26–28 September 2016; pp. 207–208. [Google Scholar]
- Compagno, A.; Conti, M.; Droms, R. Onboardicng: A secure protocol for on-boarding iot devices in icn. In Proceedings of the 3rd ACM Conference on Information-Centric Networking, Kyoto, Japan, 26–28 September 2016; pp. 166–175. [Google Scholar]
- Mick, T.; Tourani, R.; Misra, S. LASeR: Lightweight authentication and secured routing for NDN IoT in smart cities. IEEE Internet Things J. 2017, 5, 755–764. [Google Scholar] [CrossRef]
- Kar, P.; Misra, S.; Mandal, A.K.; Wang, H. SOS: NDN Based Service-Oriented Game-Theoretic Efficient Security Scheme for IoT Networks. IEEE Trans. Netw. Serv. Manag. 2021, 18, 3197–3208. [Google Scholar] [CrossRef]
- Huang, H.; Wu, Y.; Xiao, F.; Malekian, R. An efficient signature scheme based on mobile edge computing in the NDN-IoT environment. IEEE Trans. Comput. Soc. Syst. 2021, 8, 1108–1120. [Google Scholar] [CrossRef]
- Qu, D.; Lv, G.; Qu, S.; Shen, H.; Yang, Y.; Heng, Z. An effective and lightweight countermeasure scheme to multiple network attacks in NDN. IEEE/ACM Trans. Netw. 2021, 30, 515–528. [Google Scholar] [CrossRef]
- DiBenedetto, S.; Papadopoulos, C. Mitigating poisoned content with forwarding strategy. In Proceedings of the 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, 10–14 April 2016; pp. 164–169. [Google Scholar]
- Yang, N.; Chen, K.; Wang, M. SmartDetour: Defending blackhole and content poisoning attacks in IoT NDN networks. IEEE Internet Things J. 2021, 8, 12119–12136. [Google Scholar] [CrossRef]
- Kim, D.; Bi, J.; Vasilakos, A.V.; Yeom, I. Security of cached content in NDN. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2933–2944. [Google Scholar] [CrossRef]
- Lei, K.; Fang, J.; Zhang, Q.; Lou, J.; Du, M.; Huang, J.; Wang, J.; Xu, K. Blockchain-based cache poisoning security protection and privacy-aware access control in NDN vehicular edge computing networks. J. Grid Comput. 2020, 18, 593–613. [Google Scholar] [CrossRef]
- Alsamhi, S.H.; Almalki, F.A.; Afghah, F.; Hawbani, A.; Shvetsov, A.V.; Lee, B.; Song, H. Drones’ edge intelligence over smart environments in B5G: Blockchain and federated learning synergy. IEEE Trans. Green Commun. Netw. 2021, 6, 295–312. [Google Scholar] [CrossRef]
- Alsamhi, S.H.; Shvetsov, A.V.; Shvetsova, S.V.; Hawbani, A.; Guizani, M.; Alhartomi, M.A.; Ma, O. Blockchain-Empowered Security and Energy Efficiency of Drone Swarm Consensus for Environment Exploration. IEEE Trans. Green Commun. Netw. 2023, 7, 328–338. [Google Scholar] [CrossRef]
- Myrzashova, R.; Alsamhi, S.H.; Shvetsov, A.V.; Hawbani, A.; Wei, X. Blockchain Meets Federated Learning in Healthcare: A Systematic Review with Challenges and Opportunities. IEEE Internet Things J. 2023. [Google Scholar] [CrossRef]
- Nour, B.; Sharif, K.; Li, F.; Moungla, H.; Liu, Y. A unified hybrid information-centric naming scheme for IoT applications. Comput. Commun. 2020, 150, 103–114. [Google Scholar] [CrossRef]
- Simon, W.A.; Ray, V.; Levisse, A.; Ansaloni, G.; Zapater, M.; Atienza, D. Exact neural networks from inexact multipliers via fibonacci weight encoding. In Proceedings of the 2021 58th ACM/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 5–9 December 2021; pp. 805–810. [Google Scholar]
- Jeet, R.; Arun Raj Kumar, P. A survey on interest packet flooding attacks and its countermeasures in named data networking. Int. J. Inf. Secur. 2022, 21, 1163–1187. [Google Scholar] [CrossRef]
- Gündoğan, C.; Amsüss, C.; Schmidt, T.C.; Wählisch, M. Content Object Security in the Internet of Things: Challenges, Prospects, and Emerging Solutions. IEEE Trans. Netw. Serv. Manag. 2021, 19, 538–553. [Google Scholar] [CrossRef]
- Anjum, A.; Olufowobi, H. Towards Mitigating Blackhole Attack in NDN-Enabled IoT. In Proceedings of the 2023 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 6–8 January 2023; pp. 1–6. [Google Scholar]
- Sabir, Z.; Amine, A. NDN vs TCP/IP: Which One Is the Best Suitable for Connected Vehicles? In Recent Advances in Mathematics and Technology, Proceedings of the First International Conference on Technology, Engineering, and Mathematics, Kenitra, Morocco, 26–27 March 2018; Springer: Berlin/Heidelberg, Germany, 2020; pp. 151–159. [Google Scholar]
- Geravand, S.; Ahmadi, M. Bloom filter applications in network security: A state-of-the-art survey. Comput. Netw. 2013, 57, 4047–4064. [Google Scholar] [CrossRef]
- Krichen, M.; Lahami, M.; Al-Haija, Q.A. Formal Methods for the Verification of Smart Contracts: A Review. In Proceedings of the 2022 15th International Conference on Security of Information and Networks (SIN), Sousse, Tunisia, 11–13 November 2022; pp. 1–8. [Google Scholar] [CrossRef]
- Abdellatif, T.; Brousmiche, K.L. Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors Models. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018; pp. 1–5. [Google Scholar] [CrossRef] [Green Version]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
He, Y.; Ma, Y.; Hu, Q.; Zhou, Z.; Xiao, K.; Wang, C. Lightweight Transmission Behavior Audit Scheme for NDN Industrial Internet Identity Resolution and Transmission Based on Blockchain. Electronics 2023, 12, 2538. https://doi.org/10.3390/electronics12112538
He Y, Ma Y, Hu Q, Zhou Z, Xiao K, Wang C. Lightweight Transmission Behavior Audit Scheme for NDN Industrial Internet Identity Resolution and Transmission Based on Blockchain. Electronics. 2023; 12(11):2538. https://doi.org/10.3390/electronics12112538
Chicago/Turabian StyleHe, Yunhua, Yuliang Ma, Qing Hu, Zhihao Zhou, Ke Xiao, and Chao Wang. 2023. "Lightweight Transmission Behavior Audit Scheme for NDN Industrial Internet Identity Resolution and Transmission Based on Blockchain" Electronics 12, no. 11: 2538. https://doi.org/10.3390/electronics12112538
APA StyleHe, Y., Ma, Y., Hu, Q., Zhou, Z., Xiao, K., & Wang, C. (2023). Lightweight Transmission Behavior Audit Scheme for NDN Industrial Internet Identity Resolution and Transmission Based on Blockchain. Electronics, 12(11), 2538. https://doi.org/10.3390/electronics12112538