2019
DOI: 10.1109/jsyst.2018.2862913
|View full text |Cite
|
Sign up to set email alerts
|

Network-Coding Approach for Information-Centric Networking

Abstract: The current internet architecture is inefficient in fulfilling the demands of newly emerging internet applications. To address this issue, several over-the-top (OTT) application-level solutions have been employed, making the overall architecture very complex. Information-centric-networking (ICN) architecture has emerged as a promising alternative solution. The ICN architecture decouples the content from the host at the network level and supports the temporary storage of content in an innetwork cache. Fundament… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…In [11], the authors presented a security framework for the copyrighted video streaming in ICN based on linear random coding. It is proven that the linear random coding alone improves the performance of ICN [12]. However in [11], each video was encrypted with a large number of symmetric encryption keys, such that each video frame was encrypted with a unique symmetric encryption key.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [11], the authors presented a security framework for the copyrighted video streaming in ICN based on linear random coding. It is proven that the linear random coding alone improves the performance of ICN [12]. However in [11], each video was encrypted with a large number of symmetric encryption keys, such that each video frame was encrypted with a unique symmetric encryption key.…”
Section: Related Workmentioning
confidence: 99%
“…This concludes that M and P j also satisfy the liveness, weak agreement, and non-injective agreement. Consequently, (11), (12), and the jurisdiction rule conclude G1, i.e.,…”
mentioning
confidence: 95%
“…In L4C2 nodes, request network coded packets in case of data packet losses only. Bilal et al [21] proposed an algebraic framework of Network coding over NDN.…”
Section: Network Coding and Ndnmentioning
confidence: 99%
“…Recently, several studies have shown that network coding can also offer benefits to ICN [10][11][12][13][14][15][16][17][18][19][20][21], as network coding can be employed in ICN to effectively utilize multiple paths and reduce the complexity of the cache coordination. However, due to the ICN caching strategy, the same coded block may be cached by multiple CRs on its forwarding path and provided to the same consumer at a later time in response to their multicast requests [22].…”
Section: Introductionmentioning
confidence: 99%