{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:25:19Z","timestamp":1760235919730,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"SEANET Technology Standardization Research System Development","award":["(Project No. XDC02070100)"],"award-info":[{"award-number":["(Project No. XDC02070100)"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Standalone Name Resolution (SNR) is an essential component of many Information-Centric Networking (ICN) infrastructures that maps and stores the mappings of IDs and locators. The delivery of data can be realized only when the name resolution process is completed correctly. It also makes the SNR become the key target of network attackers. In this paper, our research focuses on the more covert and complex Content Pollution Attack (CPA). By continuously sending invalid content to the network at a low speed, attackers will consume a lot of the resources and time of the SNR system, resulting in a serious increase in the resolution delay of normal users and further cache pollution in ICN. It is difficult to be quickly detected because the characteristics of attack are inconspicuous. To address the challenge, a register access control scheme for an SNR system based on a malicious user blacklist query is proposed. A neighbor voting algorithm is designed to discover possible attacks in the network quickly and build a blacklist of malicious users reasonably. Users on the blacklist will be restricted from accessing the ICN network during the registration phase with the resolution system. Incentives and punishments for network users are introduced to automate responses about the potential malicious behavior reports. Our scheme is more efficient as users do not have to wait for an additional system component to perform operations. In addition, our algorithm can better solve the collusion problem in the voting process when compared with the others. We experimentally evaluate our protocol to demonstrate that the probability of successful collusion attack can be reduced to less than 0.1 when the attacker ratio is 0.5.<\/jats:p>","DOI":"10.3390\/fi13100262","type":"journal-article","created":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T21:36:15Z","timestamp":1634160975000},"page":"262","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Register Access Control Scheme for SNR System to Counter CPA Attack Based on Malicious User Blacklist"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9694-8821","authenticated-orcid":false,"given":"Jia","family":"Shi","sequence":"first","affiliation":[{"name":"National Network New Media Engineering Research Center, Institute of Acoustics, Chinese Academy of Sciences, No. 21, North Fourth Ring Road, Haidian District, Beijing 100190, China"},{"name":"School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, No. 19(A), Yuquan Road, Shijingshan District, Beijing 100049, China"}]},{"given":"Xuewen","family":"Zeng","sequence":"additional","affiliation":[{"name":"National Network New Media Engineering Research Center, Institute of Acoustics, Chinese Academy of Sciences, No. 21, North Fourth Ring Road, Haidian District, Beijing 100190, China"},{"name":"School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, No. 19(A), Yuquan Road, Shijingshan District, Beijing 100049, China"}]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[{"name":"National Network New Media Engineering Research Center, Institute of Acoustics, Chinese Academy of Sciences, No. 21, North Fourth Ring Road, Haidian District, Beijing 100190, China"},{"name":"School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, No. 19(A), Yuquan Road, Shijingshan District, Beijing 100049, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,10,13]]},"reference":[{"key":"ref_1","first-page":"1021049","article-title":"A survey of information-centric networking research","volume":"16","author":"Xylomenos","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"D\u2019Ambrosio, M., Dannewitz, C., Karl, H., and Vercellone, V. (2011, January 19). MDHT: A hierarchical name resolution service for information-centric networks. Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, Toronto, ON, Canada.","DOI":"10.1145\/2018584.2018587"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Dong, L., and Wang, G. (2018, January 5\u20138). A hybrid approach for name resolution and producer selection in information centric network. Proceedings of the 2018 International Conference on Computing, Networking and Communications (ICNC), Maui, HI, USA.","DOI":"10.1109\/ICCNC.2018.8390406"},{"key":"ref_4","first-page":"10","article-title":"Research on intrinsic security in future internet architecture","volume":"1","author":"Chen","year":"2016","journal-title":"J. Cyber Secur."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Koponen, T., Chawla, M., Chun, B.-G., Ermolinskiy, A., Kim, K.H., Shenker, S., and Stoica, I. (2007, January 27\u201331). A data-oriented (and beyond) network architecture. Proceedings of the ACM SIGCOMM, Kyoto, Japan.","DOI":"10.1145\/1282380.1282402"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/2412096.2412098","article-title":"MobilityFirst: A Robust and Trustworthy Mobility- Centric Architecture for the Future Internet","volume":"16","author":"Raychaudhuri","year":"2012","journal-title":"ACM SIGMobile Mob. Comput. Commun. Rev."},{"key":"ref_7","unstructured":"Fotiou, N., Nikander, P., Trossen, D., and Polyzos, G. (2010, January 25\u201327). Developing information networking further: From PSIRP to PURSUIT. Proceedings of the International Conference on Broadband Communications, Networks and Systems, Athens, Greece."},{"key":"ref_8","unstructured":"(2021, October 08). 4WARD: Web Site (2010). Available online: http:\/\/www.4ward-project.eu."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1016\/j.comcom.2013.01.009","article-title":"Network of Information (NetInf)\u2014An information-centric networking architecture","volume":"36","author":"Ohlman","year":"2013","journal-title":"Comput. Commun."},{"key":"ref_10","first-page":"1","article-title":"SEANet: Architecture and Technologies of an On-site, Elastic, Autonomous Network","volume":"9","author":"Wang","year":"2020","journal-title":"J. Netw. New Media Technol."},{"key":"ref_11","unstructured":"Edwall, T. (2021, October 08). Scalable and Adaptive Internet Solutions (Sail). Available online: https:\/\/sail-project.eu\/wp-content\/uploads\/2011\/02\/SAIL-project-summary.pdf."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/j.comnet.2015.08.024","article-title":"A bottleneck-free tree-based name resolution system for Information-Centric Networking","volume":"91","author":"Louati","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"8322","DOI":"10.17148\/IJARCCE.2014.31055","article-title":"A Survey on Naming, Name Resolution and Data Routing in Information Centric Networking (ICN)","volume":"3","author":"Barakabitze","year":"2014","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.comcom.2014.09.005","article-title":"FERN: A unifying framework for name resolution across heterogeneous architectures","volume":"56","author":"Sevilla","year":"2015","journal-title":"Comput. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Hong, J., Chun, W., and Jung, H. (2015, January 1\u20133). A flat-name based routing scheme for information-centric networking. Proceedings of the 17th International Conference on Advanced Communication Technology (ICACT), Pyeonhchang, Korea.","DOI":"10.1109\/ICACT.2015.7224835"},{"key":"ref_16","first-page":"1865","article-title":"A deterministic latency name resolution framework using network partitioning for 5G-ICN integration","volume":"15","author":"Liao","year":"2019","journal-title":"Int. J. Innov. Comput. Inf. Control."},{"key":"ref_17","first-page":"6472","article-title":"Challenges and solutions for secure information centric networks: A case study of the netinf architecture","volume":"50","author":"Loo","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_18","unstructured":"Pentikousis, K., Ohlman, B., Davies, E., Spirou, S., Boggia, G., and Mahadevan, P. (2013). Information-Centric Networking: Evaluation Methodology, Available online: https:\/\/datatracker.ietf.org\/doc\/draft-irtf-icnrg-evaluation-methodology\/00\/."},{"key":"ref_19","first-page":"7379","article-title":"An integrated authentication and authorization approach for the network of information architecture","volume":"50","author":"Loo","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Aiash, M., and Loo, J. (2015, January 20\u201322). A formally verified access control mechanism for information centric networks. Proceedings of the 12th International Conference on Security and Cryptography, Colmar, France.","DOI":"10.5220\/0005566303770383"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Gouge, J., Seetharam, A., and Roy, S. (2016, January 15\u201318). On the scalability and effectiveness of a cache pollution-based DoS attack in information centric networks. Proceedings of the International Conference on Computing, Networking and Communications, Kauai, HI, USA.","DOI":"10.1109\/ICCNC.2016.7440666"},{"key":"ref_22","unstructured":"Xie, M., Widjaja, I., and Wang, H. (2012, January 25\u201330). Enhancing cache robustness for content-centric networking. Proceedings of the IEEE INFOCOM, Orlando, FL, USA."},{"key":"ref_23","first-page":"44","article-title":"Collaborative detection mechanism for low-rate cache pollution attack in named data networking","volume":"38","author":"Zhu","year":"2015","journal-title":"J. Beijing Univ. Posts Telecommun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3178","DOI":"10.1016\/j.comnet.2013.07.034","article-title":"A lightweight mechanism for detection of cache pollution attacks in Named Data Networking","volume":"57","author":"Conti","year":"2013","journal-title":"Comput. Netw."},{"key":"ref_25","first-page":"6266","article-title":"Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems","volume":"7","author":"Li","year":"2020","journal-title":"IEEE Internet J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1109\/TDSC.2018.2876257","article-title":"Detection and defense of cache pollution attacks using clustering in named data networks","volume":"17","author":"Yao","year":"2020","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1109\/JSAC.2007.071006","article-title":"Eviction of misbehaving and faulty nodes in vehicular networks","volume":"25","author":"Raya","year":"2007","journal-title":"IEEE J. Sel. Area. Commun."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Matsumoto, S., and Reischuk, R.M. (2017, January 22\u201326). IKP: Turning a PKI around with decentralized automated incentives. Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2017.57"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Lu, Z., Wang, Q., Qu, G., and Liu, Z. (2018, January 1\u20133). BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs. Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy In Computing And Communications, New York, NY, USA.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00025"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1016\/j.dcan.2020.03.001","article-title":"An efficient voting based decentralized revocation protocol for vehicular ad hoc networks","volume":"6","author":"Asghar","year":"2020","journal-title":"Digit. Commun. Netw."},{"key":"ref_31","first-page":"1511","article-title":"Analytical Modeling of Optimal Chunk Size forEfficient Transmission in Infor mation-Centric Networking","volume":"16","author":"Song","year":"2020","journal-title":"Int. J. Innov. Comput. Inf. Control."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/13\/10\/262\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:12:23Z","timestamp":1760166743000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/13\/10\/262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":31,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2021,10]]}},"alternative-id":["fi13100262"],"URL":"https:\/\/doi.org\/10.3390\/fi13100262","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2021,10,13]]}}}