2018
DOI: 10.4018/ijswis.2018040105
|View full text |Cite
|
Sign up to set email alerts
|

Named Data Networking

Abstract: This article describes how the named data networking (NDN) has recently received a lot of attention as a potential information-centric networking (ICN) architecture for the future Internet. The NDN paradigm has a great potential to efficiently address and solve the current seminal IP-based IoT architecture issues and requirements. NDN can be used with different sets of caching algorithms and caching replacement policies. The authors investigate the most suitable combination of these two features to be implemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…As the years continued into 2018, three peer reviewed NDNs focused on energy, architecture, security, and vehicular. A review cover on energy conversation Host Centric Networking (HCN) focused on MANET [26], and a profound explanation of the architecture of IoT cover by [27] focused on consumer caching algorithm using the Random Replacement policy (consequently, reviewing security and vehicular [28] involved the security parameter for vehicular NDN also being discussed). The last review article from 2018 covered energy, architecture, and security [29][30][31][32][33].…”
Section: Current Review Trendmentioning
confidence: 99%
“…As the years continued into 2018, three peer reviewed NDNs focused on energy, architecture, security, and vehicular. A review cover on energy conversation Host Centric Networking (HCN) focused on MANET [26], and a profound explanation of the architecture of IoT cover by [27] focused on consumer caching algorithm using the Random Replacement policy (consequently, reviewing security and vehicular [28] involved the security parameter for vehicular NDN also being discussed). The last review article from 2018 covered energy, architecture, and security [29][30][31][32][33].…”
Section: Current Review Trendmentioning
confidence: 99%
“…The Internet of Things, in which "things" stands as a collection of diverse controllable, recognizable, and addressable devices on the internet, constitutes connected devices with the primary task of collecting and sharing information with its peers. According to one study, applications of IoT devices are increasing in data day by day, and by 2025, there will be approximately 64 billion IoT devices [11,13,14]. These devices will have some kind of communication and sharing of data, and when this occurs, there is an obvious threat of attacks and malware in these devices.…”
Section: Type Of Attacks On Iot and Iiot Devicesmentioning
confidence: 99%
“…Hypervisor code and the kernel mode for integrity and control, a non-physical platform for increased key-based access, and local security authority are among the four components of the virtual secure mode. The local security authority (LSA) component is responsible for protecting user credentials and authentication within a private hypervisor environment [13]. As a result, people with local admin privileges are unable to view the hashed passwords of registered users.…”
Section: Application Hardening Techniquementioning
confidence: 99%