2019
DOI: 10.1109/access.2019.2925885
|View full text |Cite
|
Sign up to set email alerts
|

Design and Performance Evaluation of Content-Oriented Communication System for IoT Network: A Case Study of Named Node Networking for Real-Time Video Streaming System

Abstract: Information-Centric Networking (ICN) was born in an era that more and more users are shifting their interests to the content itself rather than the location where contents are stored. This paradigm shift in the usage patterns of the Internet, along with the urgent needs for content naming, pervasive caching, better security, and mobility support, has prompted researchers to consider a radical change to the Internet architecture. However, ICN is still in its infancy and development stage, and many issues still … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
9

Relationship

4
5

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…In the era of big data, the security of information content and storage has received much attention [26], [27], as one of the important means to solve cloud security in the field of cloud computing, there are many research achievements in cloud access control, mainly includes three aspects. First, in terms of the access control model of cloud computing, including task-based, attribute-based, usage control (UCON) based and Bell-LaPadula (BLP) based access control models.…”
Section: Related Workmentioning
confidence: 99%
“…In the era of big data, the security of information content and storage has received much attention [26], [27], as one of the important means to solve cloud security in the field of cloud computing, there are many research achievements in cloud access control, mainly includes three aspects. First, in terms of the access control model of cloud computing, including task-based, attribute-based, usage control (UCON) based and Bell-LaPadula (BLP) based access control models.…”
Section: Related Workmentioning
confidence: 99%
“…We can even conduct telemedicine consultations through mobile devices at home. Most medical images used in Internet of Medical Things are grayscale images in which lesion information is quickly recognized by experienced doctors [1,2]. However, it is difficult for patients and residents to interpret medical images such as x-rays, CT scans and MRIs.…”
Section: Introductionmentioning
confidence: 99%
“…The associate editor coordinating the review of this manuscript and approving it for publication was Amr Tolba . these medical images can now be presented on ambulancemounted intelligent systems for fast and accurate diagnosis with the development of artificial intelligence technology [2]- [4], mobile communication technology [5]- [8], the and Internet of Things [9]- [11]. However, the pixels of these medical images have been already fixed in the process of image production.…”
Section: Introductionmentioning
confidence: 99%