Zhiyi Zhang, Vishrant Vasavada, Randy King and Lixia Zhang

Over the last few years, blockchain-based technologies have flourished in many application areas. One of them is the creation of distributed ledgers where records of immutable objects are widely replicated for both transparency and availability. However, the Proof-of-Work (PoW) approach, a popular gating control that determines who can add new records into a ledger, is deemed infeasible for IoT devices with resource constraints.

In this paper, we present the design of DLedger, a private distributed ledger system designed for an experimental solar network developed by Operant Networks. DLedger records both individual customers’ solar energy production/consumption as well as all other noteworthy system events, such as certificate issuance and revocations. Compared to today’s centralized record keeping solutions, DLedger brings the benefits of information transparency and availability to both customers and the system vendor. Operant’s solar network uses the Named Data Networking (NDN) protocol, based on which DLedger controls the addition of new records using a lightweight Proof-of-Authentication (PoA). PoA leverages the properties of NDN where (i) every entity in the system possesses a name and a digital certificate, and (ii) they share the same trust anchor and thus can authenticate each other. DLedger further leverages NDN’s data-centric design to keep the ledger synchronized in a truly distributed and efficient manner.

View More Papers

coucouArray ( [post_type] => ndss-paper [post_status] => publish [posts_per_page] => 4 [orderby] => rand [tax_query] => Array ( [0] => Array ( [taxonomy] => category [field] => id [terms] => Array ( [0] => 38 ) ) ) [post__not_in] => Array ( [0] => 4778 ) )

Identity and Privacy vs. economic efficiency in the worldwide...

Prof. Virgil Gligor (CMU), Prof. Pekka Nikander (Aalto U.), Dr. Dmitrij Lagutin (Aalto U.), Dr. Michal Krol (UCL)

Read More

Mining Threat Intelligence from Billion-scale SSH Brute-Force Attacks

Yuming Wu, Phuong Cao (University of Illinois at Urbana Champaign, USA); Alexander Withers (National Center for Supercomputing Application, USA); Zbigniew Kalbarczyk and Ravishankar Iyer (University of Illinois at Urbana Champaign, USA)

Read More

Defending Against Consumer Drone Privacy Attacks: A Blueprint for...

Lanier Watkins, Shane Sartalamacchia, Richard Bradt, Karan Dhareshwar, Harsimar Bagga (Johns Hopkins University, USA); William H. Robinson (Vanderbilt University, USA); Aviel Rubin (Johns Hopkins University, USA)

Read More

Privacy Starts with UI: Privacy Patterns and Designer Perspectives in UI/UX Practice

Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in Deceptive Multi-Stage CTF Challenges

Khalid Alasiri (School of Computing and Augmented Intelligence Arizona State University), Rakibul Hasan (School of Computing and Augmented Intelligence Arizona State University)

From Underground to Mainstream Marketplaces: Measuring AI-Enabled NSFW Deepfakes on Fiverr

Mohamed Moustafa Dawoud (University of California, Santa Cruz), Alejandro Cuevas (Princeton University), Ram Sundara Raman (University of California, Santa Cruz)