named data networking
Recently Published Documents


TOTAL DOCUMENTS

736
(FIVE YEARS 285)

H-INDEX

34
(FIVE YEARS 8)

2022 ◽  
pp. 1-26
Author(s):  
Hengshuo Liang ◽  
Lauren Burgess ◽  
Weixian Liao ◽  
Chao Lu ◽  
Wei Yu

The advance of internet of things (IoT) techniques enables a variety of smart-world systems in energy, transportation, home, and city infrastructure, among others. To provide cost-effective data-oriented service, internet of things search engines (IoTSE) have received growing attention as a platform to support efficient data analytics. There are a number of challenges in designing efficient and intelligent IoTSE. In this chapter, the authors focus on the efficiency issue of IoTSE and design the named data networking (NDN)-based approach for IoTSE. To be specific, they first design a simple simulation environment to compare the IP-based network's performance against named data networking (NDN). They then create four scenarios tailored to study the approach's resilience to address network issues and scalability with the growing number of queries in IoTSE. They implement the four scenarios using ns-3 and carry out extensive performance evaluation to determine the efficacy of the approach concerning network resilience and scalability. They also discuss some remaining issues that need further research.


2021 ◽  
Vol 9 (2) ◽  
pp. 339-356
Author(s):  
Dependra Dhakal ◽  
Arpan Gautam ◽  
Sudipta Dey ◽  
Kalpana Sharma

Named Data Networking (NDN) is a model that has been proposed by many researchers to alter the long-established IP based networking model. It derives the content centric approach rather than host-based approach. This is gaining even more traction in the wireless network and is able to replace the conventional IP-based networking. Up to now, NDN has proven to be fruitful when used with certain limitations in vehicular networks. Vehicular networks deal with exchanging information across fast moving complex vehicle network topology. The sending and receiving of information in such a scenario acts as a challenge and thus requires an effective forwarding strategy to address this problem. Different research work has provided with multiple forwarding strategy that solves the current problem up to some limit but further research work is still longed for to get an optimum solution. This paper provides a brief survey on current existing forwarding strategies related to vehicular networks using NDN as well as providing information on various resources and technologies used in it.


2021 ◽  
pp. 139-147
Author(s):  
Dependra Dhakal ◽  
Mohit Rathor ◽  
Sudipta Dey ◽  
Prantik Dey ◽  
Kalpana Sharma

Author(s):  
Tianyuan Yu ◽  
Philipp Moll ◽  
Zhiyi Zhang ◽  
Alexander Afanasyev ◽  
Lixia Zhang

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Qudsia Saleem ◽  
Ikram Ud Din ◽  
Ahmad Almogren ◽  
Ibrahim Alkhalifa ◽  
Hasan Ali Khattak ◽  
...  

The detection of secure vehicles for content placement in vehicle to vehicle (V2V) communications makes a challenging situation for a well-organized dynamic nature of vehicular ad hoc networks (VANET). With the increase in the demand of efficient and adoptable content delivery, information-centric networking (ICN) can be a promising solution for the future needs of the network. ICN provides a direct retrieval of content through its unique name, which is independent of locations. It also performs better in content retrieval with its in-network caching and named-based routing capabilities. Since vehicles are mobile devices, it is very crucial to select a caching node, which is secure and reliable. The security of data is quite important in the vehicular named data networking (VNDN) environment due to its vital importance in saving the life of drivers and pedestrians. To overcome the issue of security and reduce network load in addition to detect a malicious activity, we define a blockchain-based distributive trust model to achieve security, trust, and privacy of the communicating entities in VNDN, named secure vehicle communication caching (SVC-caching) mechanism for the placement of on-demand data. The proposed trust management mechanism is decentralized in nature, which is used to select a trustworthy node for cluster-based V2V communications in the VNDN environment. The SVC-caching strategy is simulated in the NS-2 simulator. The results are evaluated based on one-hop count, delivery ratio, cache hit ratio, and malicious node detection. The results demonstrate that the proposed technique improves the performance based on the selected parameters.


Sign in / Sign up

Export Citation Format

Share Document