2012
DOI: 10.1109/mcom.2012.6384448
|View full text |Cite
|
Sign up to set email alerts
|

Device mobility management in content-centric networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
56
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 104 publications
(57 citation statements)
references
References 9 publications
1
56
0
Order By: Relevance
“…Among the mobility management protocols proposed for ICN [5,6,18,21,23,24,30,34], Kite [34] is the only one that takes into account security in its design and protects the network against prefix hijacking. Specifically, authors propose to sign traced interests (which corresponds to our Interest Updates) using the producer's private key, in order to handle mobility in a secure fashion.…”
Section: Related Workmentioning
confidence: 99%
“…Among the mobility management protocols proposed for ICN [5,6,18,21,23,24,30,34], Kite [34] is the only one that takes into account security in its design and protects the network against prefix hijacking. Specifically, authors propose to sign traced interests (which corresponds to our Interest Updates) using the producer's private key, in order to handle mobility in a secure fashion.…”
Section: Related Workmentioning
confidence: 99%
“…Most of schemes [25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][41][42][43][44] adopt the PS fundamental principle to support NDN mobility. However, they distinguish themselves from the way coping with the locator and from the optimization for the MH handover procedure.…”
Section: The Corresponding Schemesmentioning
confidence: 99%
“…Locator based: These works [25][26][27][28][29][30] are similar in the mechanism of mobility support, just as the PS fundamental principle depicted. However, in [25], the locator is separated from the content name and inserts in the Interest as a new field, while in [26][27][28][29][30], the locator acts like a tunnel header of the Interest or a new added prefix of the content name.…”
Section: The Corresponding Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…This acts as a relay, forwarding through tunneling both interests to the producer, and data packets coming back. For instance in [22] the producer changes its prefix after each movement and then sends an update message to its anchor to notify it of the change. In such context, anchor's placement is critical for the performance of the approach.…”
Section: Introductionmentioning
confidence: 99%