Information-Centric Networking (ICN): Content-Centric Networking (CCNx) and Named Data Networking (NDN) Terminology

Author(s):  
B. Wissingh ◽  
C. Wood ◽  
A. Afanasyev ◽  
L. Zhang ◽  
D. Oran ◽  
...  
2019 ◽  
Vol 11 (11) ◽  
pp. 241 ◽  
Author(s):  
Ioanna Angeliki Kapetanidou ◽  
Christos-Alexandros Sarros ◽  
Vassilis Tsaoussidis

Information-Centric Networking (ICN) has arisen as an architectural solution that responds to the needs of today’s overloaded Internet, departing from the traditional host-centric access paradigm. In this paper we focus on Named Data Networking (NDN), the most prominent ICN architecture. In the NDN framework, disseminated content is at the core of the design and providing trusted content is essential. In this paper, we provide an overview of reputation-based trust approaches, present their design trade-offs and argue that these approaches can consolidate NDN trust and security by working complementary to the existing credential-based schemes. Finally, we discuss future research directions and challenges.


2018 ◽  
Vol 14 (2) ◽  
pp. 86-112 ◽  
Author(s):  
Maroua Meddeb ◽  
Amine Dhraief ◽  
Abdelfettah Belghith ◽  
Thierry Monteil ◽  
Khalil Drira ◽  
...  

This article describes how the named data networking (NDN) has recently received a lot of attention as a potential information-centric networking (ICN) architecture for the future Internet. The NDN paradigm has a great potential to efficiently address and solve the current seminal IP-based IoT architecture issues and requirements. NDN can be used with different sets of caching algorithms and caching replacement policies. The authors investigate the most suitable combination of these two features to be implemented in an IoT environment. For this purpose, the authors first reviewed the current research and development progress in ICN, then they conduct a qualitative comparative study of the relevant ICN proposals and discuss the suitability of the NDN as a promising architecture for IoT. Finally, they evaluate the performance of NDN in an IoT environment with different caching algorithms and replacement policies. The obtained results show that the consumer-cache caching algorithm used with the Random Replacement (RR) policy significantly improve NDN content validity in an IoT environment.


Author(s):  
Nour El Houda Fethellah ◽  
Hafida Bouziane ◽  
Abdallah Chouarfia

<p>The Named Data Networking NDN is one of the most proposed architecture for the new model of Internet communications based on contents distribution, called Information-Centric Network ICN. It is widely accepted by the research community since it has become dominant in ICN design that resolves TCP-IP based Internet problems such as bandwidth, delay, location dependent and congestion. Based on location host IP addresses, TCP-IP designed for Peer-to-Peer communication P2P. NDN architecture is oriented Content Centric Networking CCN, where the data is stored on routers and distributed to users from the nearest router.  Cache capacities of routers are limited compared to forwarded contents. To move from TCP-IP model to CCN model, many papers propose several new contents distribution based architecture ICN. In this paper, we propose a novel strategy to optimize the use of network resources inspired from Network clustering and cluster head selection in MANETs. Specifically, the improved K-medoids cluster algorithm is used to divide the global network in clusters, where for each cluster; three routers are selected as content routers. The first is the main caching router as well as the second and the third are the secondary caching router. The caching router selection process relies on three relevant criteria consisting of the distance between a node and its cluster centroid, the number of neighbors, and the congestion level. Two Multi Attribute Decision–Making methods MADM are applied, namely TOPSIS and AHP. Performance analysis of our proposed strategy with the established criteria showed  � its effectiveness and strong potential.<em></em></p>


In Internet over established communication medium a packet in a network transmit data where users and data server with specific IP addresses interacted each other. Recent years, this peer to peer data communication also called as client – server data communication. Modern applications like YouTube, Social Networks and Bit Torrent have revolutionized the idea of user generated contents. The end users care only for precise data items irrespective of their sources. So, the importance is based on precise data called as named data rather than using IP addresses to recognize servers hosting a meticulous content. Likewise, necessity of IP addresses is a demanding issue persistent the Internet community. Due to content-centric networking platform, in which data has less importance, and proposed new terminology called Named Data Networking. NDN allows end users to float a new data request without any awareness about the end user host. Compare to Internet services NDN can handle security issues and user mobility, more efficiently. In this paper, we surveyed different network issues and security attacks in Named Data Networks and its counter measures and also we identified a set of current challenges in NDN for budding researchers in due course.


Information ◽  
2018 ◽  
Vol 9 (11) ◽  
pp. 264 ◽  
Author(s):  
Benjamin Rainer ◽  
Stefan Petscharnig

Many car manufacturers have recently proposed to release autonomous self-driving cars within the next few years. Information gathered by sensors (e.g., cameras, GPS, lidar, radar, ultrasonic) enable cars to drive autonomously on roads. However, in urban or high-speed traffic scenarios the information gathered by mounted sensors may not be sufficient to guarantee a smooth and safe traffic flow. Thus, information received from infrastructure and other cars or vehicles on the road is vital. Key aspects in Vehicle-To-Everything (V2X) communication are security, authenticity, and integrity which are inherently provided by Information Centric Networking (ICN). In this paper, we identify advantages and drawbacks of ICN for V2X communication. We specifically review forwarding, caching, as well as simulation aspects for V2X communication with a focus on ICN. Furthermore, we investigate existing solutions for V2X and discuss their applicability. Based on these investigations, we suggest directions for further work in context of ICN (in particular Named Data Networking) to enable V2X communication providing a secure and efficient transport platform.


2013 ◽  
Author(s):  
Charles Duan ◽  
Cynthia Grady ◽  
Paul Ohm ◽  
James Grimmelmann

Sign in / Sign up

Export Citation Format

Share Document