{"id":161,"date":"2023-07-24T14:43:59","date_gmt":"2023-07-24T06:43:59","guid":{"rendered":"http:\/\/www.ndnlab.com\/?p=161"},"modified":"2023-07-24T14:43:59","modified_gmt":"2023-07-24T06:43:59","slug":"%e8%ae%ba%e6%96%87%e5%88%86%e4%ba%ab-blockchain-based-cache-poisoning-security-protection-and-privacy-aware-access-control-in-ndn-vehicular-edge-computing-networks","status":"publish","type":"post","link":"https:\/\/www.ndnlab.com\/?p=161","title":{"rendered":"\u8bba\u6587\u5206\u4eab\u2014\u2014Blockchain-Based Cache Poisoning Security Protection and Privacy-Aware Access Control in NDN Vehicular Edge Computing Networks"},"content":{"rendered":"\n<p>\u51fa\u5904\uff1aJournal of Grid Computing (SCI Q1, IF: 3.808, ISSN 1570-7873, 42\/307), 2020.07, (To be Published)\uff1b<\/p>\n\n\n\n<p>\u4f5c\u8005\uff1aKai Lei, Qichao Zhang, Junjun Lou, Bo Bai, Kuai Xu<\/p>\n\n\n\n<p>\u6458\u8981\uff1a\u4eba\u5de5\u667a\u80fd\u3001\u5927\u6570\u636e\u3001\u79fb\u52a8\u8fb9\u7f18\u8ba1\u7b97\u548c\u5d4c\u5165\u5f0f\u7cfb\u7edf\u7684\u6700\u65b0\u8fdb\u5c55\u6210\u529f\u63a8\u52a8\u4e86\u667a\u80fd\u6c7d\u8f66\u548c\u8f66\u8f86\u8fb9\u7f18\u8ba1\u7b97\u7684\u51fa\u73b0\u548c\u91c7\u7528\uff0c\u8fd9\u5c06\u6539\u5584\u9053\u8def\u5b89\u5168\u3001\u4ea4\u901a\u62e5\u5835\u548c\u8f66\u8f86\u5c3e\u6c14\u6392\u653e\u3002 \u9ad8\u673a\u52a8\u6027\u3001ad-hoc \u7f51\u7edc\u62d3\u6251\u548c\u591a\u6837\u5316\u7684\u8f66\u8054\u7f51 (V2X) \u7ed9\u57fa\u4e8e TCP\/IP \u7684\u8f66\u8054\u7f51\u5e26\u6765\u4e86\u5de8\u5927\u6311\u6218\u3002 \u9274\u4e8e\u79fb\u52a8\u81ea\u7ec4\u7ec7\u7f51\u7edc\u73af\u5883\u4e2d\u5f39\u6027\u901a\u4fe1\u7684\u72ec\u7279\u7279\u6027\u548c\u4f18\u52bf\uff0c\u547d\u540d\u6570\u636e\u7f51\u7edc (NDN) \u5df2\u6210\u4e3a\u652f\u6301\u8f66\u8f86\u8fb9\u7f18\u8ba1\u7b97 (VEC) \u4f5c\u4e3a\u5e95\u5c42\u7f51\u7edc\u67b6\u6784\u7684\u81ea\u7136\u9009\u62e9\u3002 \u7136\u800c\uff0c\u5f00\u53d1\u57fa\u4e8e NDN \u7684 VEC \u7f51\u7edc\u4ecd\u7136\u5b58\u5728\u5404\u79cd\u5b89\u5168\u548c\u9690\u79c1\u6311\u6218\uff0c\u4f8b\u5982\u5bc6\u94a5\u7ba1\u7406\u3001\u7f13\u5b58\u4e2d\u6bd2\u3001\u8bbf\u95ee\u63a7\u5236\u3002 \u5728\u672c\u6587\u4e2d\uff0c\u6211\u4eec\u5728\u57fa\u4e8e NDN \u7684 VEC \u7f51\u7edc\u4e2d\u5f15\u5165\u4e86\u4e00\u79cd\u57fa\u4e8e\u533a\u5757\u94fe\u7684\u65b0\u578b\u5b89\u5168\u67b6\u6784\uff0c\u4ee5\u7cfb\u7edf\u5730\u5e94\u5bf9\u8fd9\u4e9b\u5b89\u5168\u6311\u6218\u3002 \u66f4\u5177\u4f53\u5730\u8bf4\uff0c\u6211\u4eec\u901a\u8fc7\u91c7\u7528\u8f7b\u91cf\u7ea7\u4f46\u7a33\u5065\u7684\u59d4\u6258\u5171\u8bc6\u7b97\u6cd5\u5728 NDN \u4e0a\u8bbe\u8ba1\u548c\u5b9e\u73b0\u4e86\u4e00\u4e2a\u9ad8\u6548\u7684\u533a\u5757\u94fe\u7cfb\u7edf\uff0c\u5e76\u8fdb\u884c\u4e86\u5927\u91cf\u5b9e\u9a8c\u6765\u8bc4\u4f30\u5bc6\u94a5\u7ba1\u7406\u534f\u8bae\u3001\u7f13\u5b58\u4e2d\u6bd2\u9632\u5fa1\u65b9\u6848\u548c\u57fa\u4e8e NDN \u7684 VEC \u7684\u8bbf\u95ee\u63a7\u5236\u7b56\u7565\u7684\u6027\u80fd\u6548\u7387 \u7f51\u7edc\u3002 \u636e\u6211\u4eec\u6240\u77e5\uff0c\u672c\u6587\u662f\u9996\u6b21\u7cfb\u7edf\u5730\u8bbe\u8ba1\u5b9e\u7528\u4e14\u9ad8\u6548\u7684\u57fa\u4e8e\u533a\u5757\u94fe\u7684\u5b89\u5168\u67b6\u6784\uff0c\u4ee5\u5728 NDN VEC \u7f51\u7edc\u4e2d\u63d0\u4f9b\u5bc6\u94a5\u7ba1\u7406\u3001\u7f13\u5b58\u4e2d\u6bd2\u5b89\u5168\u4fdd\u62a4\u548c\u9690\u79c1\u611f\u77e5\u8bbf\u95ee\u63a7\u5236\u3002<\/p>\n\n\n\n<p>\u4e0b\u8f7d\u94fe\u63a5\uff1a<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10723-020-09531-1\">https:\/\/link.springer.com\/article\/10.1007\/s10723-020-09531-1<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u51fa\u5904\uff1aJournal of Grid Computing (SCI Q1, IF: 3.808, ISSN 1570-7873, 42\/307), 2020.07, (To be Published)\uff1b \u4f5c\u8005\uff1aKai Lei, Qichao Zhang, Junjun Lou, Bo Bai, Kuai Xu \u6458\u8981\uff1a\u4eba\u5de5\u667a\u80fd\u3001\u5927\u6570\u636e\u3001\u79fb\u52a8\u8fb9\u7f18\u8ba1\u7b97\u548c\u5d4c\u5165\u5f0f\u7cfb\u7edf\u7684\u6700\u65b0\u8fdb\u5c55\u6210\u529f\u63a8\u52a8\u4e86\u667a\u80fd\u6c7d\u8f66\u548c\u8f66\u8f86\u8fb9\u7f18\u8ba1\u7b97\u7684\u51fa\u73b0\u548c\u91c7\u7528\uff0c\u8fd9\u5c06\u6539\u5584\u9053\u8def\u5b89\u5168\u3001\u4ea4\u901a\u62e5\u5835\u548c\u8f66\u8f86\u5c3e\u6c14\u6392\u653e\u3002 \u9ad8\u673a\u52a8\u6027\u3001ad-ho &hellip; <a href=\"https:\/\/www.ndnlab.com\/?p=161\">\u7ee7\u7eed\u9605\u8bfb <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4,6],"tags":[],"class_list":["post-161","post","type-post","status-publish","format-standard","hentry","category-icn","category-blockchain","category-weilaiwangluo"],"_links":{"self":[{"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=\/wp\/v2\/posts\/161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=161"}],"version-history":[{"count":1,"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=\/wp\/v2\/posts\/161\/revisions"}],"predecessor-version":[{"id":162,"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=\/wp\/v2\/posts\/161\/revisions\/162"}],"wp:attachment":[{"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}