Zhiyi Zhang, Vishrant Vasavada, Randy King and Lixia Zhang

Over the last few years, blockchain-based technologies have flourished in many application areas. One of them is the creation of distributed ledgers where records of immutable objects are widely replicated for both transparency and availability. However, the Proof-of-Work (PoW) approach, a popular gating control that determines who can add new records into a ledger, is deemed infeasible for IoT devices with resource constraints.

In this paper, we present the design of DLedger, a private distributed ledger system designed for an experimental solar network developed by Operant Networks. DLedger records both individual customers’ solar energy production/consumption as well as all other noteworthy system events, such as certificate issuance and revocations. Compared to today’s centralized record keeping solutions, DLedger brings the benefits of information transparency and availability to both customers and the system vendor. Operant’s solar network uses the Named Data Networking (NDN) protocol, based on which DLedger controls the addition of new records using a lightweight Proof-of-Authentication (PoA). PoA leverages the properties of NDN where (i) every entity in the system possesses a name and a digital certificate, and (ii) they share the same trust anchor and thus can authenticate each other. DLedger further leverages NDN’s data-centric design to keep the ledger synchronized in a truly distributed and efficient manner.

View More Papers

coucouArray ( [post_type] => ndss-paper [post_status] => publish [posts_per_page] => 4 [orderby] => rand [tax_query] => Array ( [0] => Array ( [taxonomy] => category [field] => id [terms] => Array ( [0] => 38 ) ) ) [post__not_in] => Array ( [0] => 4778 ) )

OAuth 2.0 Authorization using Blockchain-based Tokens

Nikos Fotiou, Iakovos Pittaras, Vasilios A. Siris, Spyros Voulgaris and George C. Polyzos (Athens University of Economics and Business, Greece)

Read More

UIDS: Unikernel-based Intrusion Detection System for the Internet of...

Vittorio Cozzolino, Nikolai Schwellnus (Technical University of Munich, Germany); Aaron Yi Ding (Delft University of Technology, The Netherlands); Jörg Ott (Technical University of Munich, Germany)

Read More

Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT...

Dmitrij Lagutin, Yki Kortesniemi, Nikos Fotiou and Vasilios A. Siris

Read More

Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System

Thien Duc Nguyen, Phillip Rieger, Markus Miettinen and Ahmad-Reza Sadeghi (TU Darmstadt, Germany)

Read More

Privacy Starts with UI: Privacy Patterns and Designer Perspectives in UI/UX Practice

Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in Deceptive Multi-Stage CTF Challenges

Khalid Alasiri (School of Computing and Augmented Intelligence Arizona State University), Rakibul Hasan (School of Computing and Augmented Intelligence Arizona State University)

From Underground to Mainstream Marketplaces: Measuring AI-Enabled NSFW Deepfakes on Fiverr

Mohamed Moustafa Dawoud (University of California, Santa Cruz), Alejandro Cuevas (Princeton University), Ram Sundara Raman (University of California, Santa Cruz)