scholarly journals Contextual dimensions for cache replacement schemes in information-centric networks: a systematic review

2021 ◽  
Vol 7 ◽  
pp. e418
Author(s):  
Stéfani Pires ◽  
Artur Ziviani ◽  
Leobino N. Sampaio

In recent years, information-centric networks (ICNs) have gained attention from the research and industry communities as an efficient and reliable content distribution network paradigm, especially to address content-centric and bandwidth-needed applications together with the heterogeneous requirements of emergent networks, such as the Internet of Things (IoT), Vehicular Ad-hoc NETwork (VANET) and Mobile Edge Computing (MEC). In-network caching is an essential part of ICN architecture design, and the performance of the overall network relies on caching policy efficiency. Therefore, a large number of cache replacement strategies have been proposed to suit the needs of different networks. The literature extensively presents studies on the performance of the replacement schemes in different contexts. The evaluations may present different variations of context characteristics leading to different impacts on the performance of the policies or different results of most suitable policies. Conversely, there is a lack of research efforts to understand how the context characteristics influence policy performance. In this direction, we conducted an extensive study of the ICN literature through a Systematic Literature Review (SLR) process to map reported evidence of different aspects of context regarding the cache replacement schemes. Our main findings contribute to the understanding of what is a context from the perspective of cache replacement policies and the context characteristics that influence cache behavior. We also provide a helpful classification of policies based on context dimensions used to determine the relevance of contents. Further, we contribute with a set of cache-enabled networks and their respective context characteristics that enhance the cache eviction process.

2018 ◽  
Vol 150 ◽  
pp. 06038 ◽  
Author(s):  
Mohammed Ali Hezam Al Junaid ◽  
A.A. Syed ◽  
Mohd Nazri Mohd Warip ◽  
Ku Nurul Fazira Ku Azir ◽  
Nurul Hidayah Romli

Vehicular Ad Hoc Network (VANET) is a pillar of the envisioned Intelligent Transport System (ITS) and a subset of Mobile Ad Hoc Network that grants the communication in between the vehicles alongside with the absence of established communication infrastructure. Exposure to vulnerabilities of Vehicular Ad-Hoc Network (VANET) has been shown to be related to its nature of the environmental. For this reason, VANET security becomes a critical challenge that need to be resolved. In this paper, we assess the VANET security issues and discuss the challenges in VANET. Equally important, we comparatively review the security requirements, the type of attacks and capabilities of attackers present in VANET.


2014 ◽  
Vol 556-562 ◽  
pp. 5852-5854
Author(s):  
Ying Wei

The internet of things perception and recognition by the ubiquitous information to the physical world. Ad Hoc provide suitable network environment to the internet of things, whose routing protocol Protect data transmission efficient and reliable. This paper not only analyzes the particularity of Ad Hoc network technology in the Internet of Things, but also simulates AODV and DSDV in test environment to analysis the communication performance in the internet of things.


2020 ◽  
Vol 9 (1) ◽  
pp. 1532-1535

The vehicular ad hoc network is the network in which vehicles can move from one location to another without help of driver. The vehicle ad hoc network has two type of communication which is vehicles to vehicle and vehicle to road side units. The internet of things is the technology in which source can transmit sensed information over the internet. This research work is based on the vehicle of internet things. In the vehicles of internet things, the vehicles are connected with each other through internet. The various techniques of data aggregation in vehicle of things are reviewed in this paper and analyzed in terms of certain parameters


Author(s):  
Haitham Shiaibth Chasib ◽  
Saddam Raheem Salih ◽  
Israa Jaber Khalaf Al-Ogaili

<span>Delay and node capacity are incompatible mobile ad hoc constraints because of the network's versatility and self-disciplined design. </span><span>It is a challenging problem to maximize the trade-off between the above mobility correlation factors. </span><span>This manuscript proposes an adaptive multi-hop routing (A.M.R.) for mobile ad-hoc network (MANET) to minimize the trade-off by integrating the internet of things (IoT). IoT nodes' smart computing and offloading abilities are extended to ad-hoc nodes to improve routing and transmission. Dor MANET nodes in route exploration, neighbor selection, and data transmission, the beneficial features of IoT include enhanced decision making. The traditional routing protocols use IoT at the time of the neighbor discovery process in updating the routing table and localization. </span><span>The harmonizing technologies with their extended support improve the performance of MANETs has been estimated. The proposed method achieves better throughput (14.16 Mbps), delay (0.118), packet drop (126), and overhead (36 packets) when compared to existing methods.</span>


2020 ◽  
Vol 17 (5) ◽  
pp. 2216-2221
Author(s):  
K. Pradeepa ◽  
R. Saravanan ◽  
N. Bharathiraja

In multi-hop ad hoc network, the network organization exhaustively relies on the trust relationship that exists between the participating mobile nodes of the network. Secure and trustworthy mechanisms are necessary for enforcing collaboration between the mobile nodes. Further, the malicious adversaries that intentionally injure or compromise network functionality during the process of multi-hop communication need to be detected and isolated from the network. Specifically, malicious adversaries like selfish nodes and root node attacks that exploits the network resources without rendering cooperation in routing or packet forwarding is a major challenge that need to be handled. The core aim of this proposed Link Stability Inspired Hopping Technique concentrates on the classification of mobile nodes into malicious and benevolent nodes based on the computation of link stability factor. This discrimination between the mobile nodes is achieved by the computation of Contention count, Signal strength, Hop determination, Link energy availability and normalized multi-objective optimization function for facilitating the elimination of malicious adversaries so as to improve the rate of data dissemination in the network. The interactions between the mobile nodes are periodically monitored for testing its link stability based on which the mobile nodes may be identified as co-operative and malicious.


2014 ◽  
Vol 989-994 ◽  
pp. 4598-4602
Author(s):  
Yang Xu

In order to popularize the intelligent monitoring in households, this thesis is aimed to conduct researches on“Household Monitoring System based on the Internet of Things (IOT)”and starts with the design of this system. General technology concerning household video monitoring and home appliance controlling in computers, mobile phones, etc. is explored in this thesis and a household monitoring system based on IOT is set up. According to experiments, the household monitoring system has various functions such as operating once plugged, ad hoc network, various and interactive controlling methods and friendly serial ports.


Sign in / Sign up

Export Citation Format

Share Document