2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) 2019
DOI: 10.1109/nigeriacomputconf45974.2019.8949670
|View full text |Cite
|
Sign up to set email alerts
|

Mobility Support Challenges for the Integration of 5G and IoT in Named Data Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…For Femtocell Users (FUs) [24], they suggested a combined channel distribution and energyaware algorithm using cerebral non-orthogonal multiple Access Radio. The aim is to optimize the FU's volume of secure QoS policy.…”
Section: Related Workmentioning
confidence: 99%
“…For Femtocell Users (FUs) [24], they suggested a combined channel distribution and energyaware algorithm using cerebral non-orthogonal multiple Access Radio. The aim is to optimize the FU's volume of secure QoS policy.…”
Section: Related Workmentioning
confidence: 99%
“…If the obtained solution is sufficient, it returns the list of certificates (lines 14-15); otherwise, the certification process proceeds by evaluating each inner rule that is not verified yet (lines [16][17][18][19][20][21]. The certification process then checks if all the inner rule evaluations have been verified; if yes, it generates and returns a certificate to the client, otherwise, it returns an empty list (lines [22][23][24][25][26][27][28][29]. Finally, the client receives the list of certificates (line 33).…”
Section: B Certification Processmentioning
confidence: 99%
“…It can support an effective Quality of Service (QoS) approach, where network functioning is adapted to evolving conditions, increasing network trustworthiness and quality. It complements modern composite applications based on microservices, paving the way to a new generation of certified compositions tightly intertwined with networking technologies [4], [5], [25], [26]. It also supports advanced auditing and monitoring of ICN attacks such as cache poisoning and pollution thanks to the continuous certification evidence.…”
Section: Introductionmentioning
confidence: 97%
“…Interest can be dropped on certain circumstances depending on the forwarding strategy, e.g., the congestion of upstream links or security breaches by suspecting interest to be part of DoS. Once the data producer receives an interest request from the home router and its PIT, and finds the required content, it will forward the data packets back through the interface that received the interest to the downstream interface recorded in PIT [32,33].…”
Section: Related Workmentioning
confidence: 99%