{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T08:57:10Z","timestamp":1762333030404,"version":"build-2065373602"},"reference-count":40,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T00:00:00Z","timestamp":1710201600000},"content-version":"vor","delay-in-days":71,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p>Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP\/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data\u2010oriented trust instead of the host\u2010oriented trust. This paper proposes a new secure solution in the NDNs named Secure Mechanism supported by Certificateless Digital Signature and Blockchain (CLDS\u2010B). The CLDS\u2010B scheme employs a certificateless digital signature to guarantee the authentication and integrity of data. On the one hand, the key escrow problem has been solved to eliminate the risks of compromised private key generators; on the other hand, the data name has been bound to the public key to prevent the false public key. Moreover, the blockchain is used to manage cryptographic information. Each domain designates an information service entity to join the blockchain so that the consumer could retrieve the cryptographic information public parameter in the local domain if necessary. Furthermore, due to the decentralization of the blockchain, the CLDS\u2010B would be robust to resist the single\u2010node failure. Simulation results show that the CLDS\u2010B scheme outperforms a classic NDN scheme, although it shows slightly inferior to the other secure NDN scheme. The security verification and analysis show that the CLDS\u2010B would resist the key escrow attack. The CLDS\u2010B would be a competitive solution in scenarios with a high\u2010security level.<\/jats:p>","DOI":"10.1049\/2024\/6616095","type":"journal-article","created":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:05:06Z","timestamp":1710263106000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking"],"prefix":"10.1049","volume":"2024","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2984-0882","authenticated-orcid":false,"given":"Bing","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4391-0406","authenticated-orcid":false,"given":"Mingxuan","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1438-7018","authenticated-orcid":false,"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2024,3,12]]},"reference":[{"key":"e_1_2_12_1_2","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"e_1_2_12_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2966924"},{"key":"e_1_2_12_3_2","doi-asserted-by":"crossref","unstructured":"BertinoE.andNabeelM. Securing named data networks: challenges and the way forward SACMAT \u201918: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies June 2018 Indianapolis Indiana USA Association for Computing Machinery 51\u201359 https:\/\/doi.org\/10.1145\/3205977.3205996 2-s2.0-85049315434.","DOI":"10.1145\/3205977.3205996"},{"key":"e_1_2_12_4_2","doi-asserted-by":"crossref","unstructured":"FreetD.andAgrawalR. An overview of architectural and security considerations for named data networking (NDN) MEDES: Proceedings of the 8th International Conference on Management of Digital EcoSystems November 2016 Biarritz France Association for Computing Machinery 52\u201357 https:\/\/doi.org\/10.1145\/3012071.3012092 2-s2.0-85009787264.","DOI":"10.1145\/3012071.3012092"},{"key":"e_1_2_12_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1006971"},{"key":"e_1_2_12_6_2","doi-asserted-by":"crossref","unstructured":"ShamirA. Identity-based cryptosystems and signature schemes Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science 1985 Springer Berlin Heidelberg 47\u201353 https:\/\/doi.org\/10.1007\/3-540-39568-7_5 2-s2.0-85020598353.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"e_1_2_12_7_2","doi-asserted-by":"crossref","unstructured":"Al-RiyamiS. S.andPatersonK. G. Certificateless public key cryptography 2894 Advances in Cryptology - ASIACRYPT 2003. ASIACRYPT 2003. Lecture Notes in Computer Science 2003 Springer Berlin Heidelberg 452\u2013473 https:\/\/doi.org\/10.1007\/978-3-540-40061-5_29.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"e_1_2_12_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-022-09689-x"},{"volume-title":"Deploying Key Management on NDN Testbed","year":"2013","author":"Bian C.","key":"e_1_2_12_9_2"},{"key":"e_1_2_12_10_2","doi-asserted-by":"crossref","unstructured":"LiB. MaM. andXiaR. Hierarchical identity-based security mechanism using blockchain in named data networking 2020 3rd International Conference on Hot Information-Centric Networking (HotICN) December 2020 Hefei China IEEE 148\u2013153 https:\/\/doi.org\/10.1109\/HotICN50779.2020.9350821.","DOI":"10.1109\/HotICN50779.2020.9350821"},{"volume-title":"Public Key Management in Named Data Networking","year":"2015","author":"Yu Y.","key":"e_1_2_12_11_2"},{"key":"e_1_2_12_12_2","doi-asserted-by":"crossref","unstructured":"YuT. XieH. LiuS. MaX. JiaX. andZhangL. CertRevoke: a certificate revocation framework for named data networking ICN \u201922: Proceedings of the 9th ACM Conference on Information-Centric Networking September 2022 Osaka Japan Association for Computing Machinery 80\u201390 https:\/\/doi.org\/10.1145\/3517212.3558079.","DOI":"10.1145\/3517212.3558079"},{"key":"e_1_2_12_13_2","doi-asserted-by":"crossref","unstructured":"ZhangZ. AfanasyevA. andZhangL. NDNCERT: universal usable trust management for NDN ICN \u201917: Proceedings of the 4th ACM Conference on Information-Centric Networking September 2017 Berlin Germany Association for Computing Machinery 178\u2013179 https:\/\/doi.org\/10.1145\/3125719.3132090 2-s2.0-85032474901.","DOI":"10.1145\/3125719.3132090"},{"key":"e_1_2_12_14_2","doi-asserted-by":"crossref","unstructured":"TehraniP. F. OsterweilE. SchmidtT. C. andW\u00e4hlischM. SoK: public key and namespace management in NDN ICN \u201922: Proceedings of the 9th ACM Conference on Information-Centric Networking September 2022 Osaka Japan Association for Computing Machinery 67\u201379 https:\/\/doi.org\/10.1145\/3517212.3558085.","DOI":"10.1145\/3517212.3558085"},{"key":"e_1_2_12_15_2","doi-asserted-by":"crossref","unstructured":"HamdaneB. SerhrouchniA. FadlallahA. andEl FatmiS. G. Named-data security scheme for named data networking 2012 Third International Conference on The Network of the Future (NOF) November 2012 Tunis Tunisia IEEE 1\u20136 https:\/\/doi.org\/10.1109\/NOF.2012.6464002 2-s2.0-84874726338.","DOI":"10.1109\/NOF.2012.6464002"},{"key":"e_1_2_12_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.06.001"},{"key":"e_1_2_12_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995080"},{"key":"e_1_2_12_18_2","doi-asserted-by":"crossref","unstructured":"LiB. MaM. ZhangY. andLaiF. Access control supported by information service entity in named data networking 2022 5th International Conference on Hot Information-Centric Networking (HotICN) November 2022 Guangzhou China IEEE 30\u201335 https:\/\/doi.org\/10.1109\/HotICN57539.2022.10036170.","DOI":"10.1109\/HotICN57539.2022.10036170"},{"key":"e_1_2_12_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/s17051001"},{"key":"e_1_2_12_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794991"},{"key":"e_1_2_12_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2894108"},{"key":"e_1_2_12_22_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9960264"},{"key":"e_1_2_12_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3233180"},{"key":"e_1_2_12_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3240426"},{"key":"e_1_2_12_25_2","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2021.2017800"},{"key":"e_1_2_12_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100504"},{"key":"e_1_2_12_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00623-2"},{"key":"e_1_2_12_28_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4412"},{"key":"e_1_2_12_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102669"},{"key":"e_1_2_12_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102698"},{"key":"e_1_2_12_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941913"},{"key":"e_1_2_12_32_2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4093"},{"key":"e_1_2_12_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3076209"},{"key":"e_1_2_12_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063490"},{"key":"e_1_2_12_35_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.017971"},{"key":"e_1_2_12_36_2","doi-asserted-by":"crossref","unstructured":"RaoC. M. PrasunaG. ChapalaH. K. JeebaratnamN. NavullaD. andVermaA. Designing a reliable and cost-effective internet of medical things (IoMT) topology to minimize the maintenance and deployment cost 2023 Fifth International Conference on Electrical Computer and Communication Technologies (ICECCT) February 2023 Erode India IEEE 1\u20137 https:\/\/doi.org\/10.1109\/ICECCT56650.2023.10179776.","DOI":"10.1109\/ICECCT56650.2023.10179776"},{"key":"e_1_2_12_37_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3976093"},{"key":"e_1_2_12_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3138808.3138812"},{"key":"e_1_2_12_39_2","unstructured":"ZhangY. Abilene traf_c matrices 2015 http:\/\/www.cs.utexas.edu\/users\/yzhang\/research\/AbileneTM."},{"key":"e_1_2_12_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.01.001"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ietis\/2024\/6616095.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ietis\/2024\/6616095.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/2024\/6616095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T08:51:08Z","timestamp":1762332668000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/2024\/6616095"}},"subtitle":[],"editor":[{"given":"Youwen","family":"Zhu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1049\/2024\/6616095"],"URL":"https:\/\/doi.org\/10.1049\/2024\/6616095","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"type":"print","value":"1751-8709"},{"type":"electronic","value":"1751-8717"}],"subject":[],"published":{"date-parts":[[2024,1]]},"assertion":[{"value":"2023-08-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-02-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-03-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6616095"}}