IEEE Access (Jan 2019)

Design of an Internet of Brain Things Network Security System Based on ICN

  • Yin Jingtao,
  • Zhao Li,
  • Qian Junlei

DOI
https://doi.org/10.1109/ACCESS.2018.2886571
Journal volume & issue
Vol. 7
pp. 1694 – 1705

Abstract

Read online

Network data traffic has increased dramatically with the rapid development of the Internet of Brain Things, and the host-based IP network Internet of Brain Things architecture is gradually unable to adapt to the new situation, and the information-centric network (ICN) centered on the information is proposed as a new network architecture. ICN-based Internet of Brain Things has greater flexibility to ensure scalable and efficient content distribution based on large-scale data transmission efficiency. With deep research on ICN, the key issue currently faced is the Internet of Brain Things network security problem based on ICN network, which is of great significance to the future development of the Internet of Brain Things network security. Aiming at this problem, and according to the research needs at this stage, this paper first analyzes the current research status of ICN network security based on ICN, and focuses on the attack and privacy issues in the current Internet of Brain Things operation mechanism. Then, according to the security requirements of ICN-based Internet of Brain Things integrity, confidentiality, availability, authentication and rights management, the ICN-based Internet of Brain Things network and security architecture is designed. From the perspective of mitigating attacks and protecting privacy, an interval-based authentication and a popularity-based caching mechanism are designed. Finally, in order to further verify the system performance, this paper is equipped with the simulation platform in ndnSIM environment to simulate the ICN-based Internet of Brain Things network security’s overall security architecture and its authentication and caching mechanism. The system performance is evaluated by four technical indicators: round-trip time delay, network throughput, cache hit rate, and request success rate. The results show that the architecture and mechanism have good network security performance.

Keywords