2022
DOI: 10.3390/s22041438
|View full text |Cite
|
Sign up to set email alerts
|

Forwarding in Energy-Constrained Wireless Information Centric Networks

Abstract: Information Centric Networks (ICNs) have been considered one of the most promising candidates to overcome the disadvantages of host-centric architectures when applied to IoT networks, having the potential to address the challenges of a smart city. One of the foundations of a smart city is its sensory capacity, which is obtained through devices associated with the IoT concept. The more sensors spread out, the greater the ability to sense the city. However, such a scale demands high energy requirements and an ef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Several approaches do not rely on a tree structure to disseminate data in wireless ad hoc networks but still attempt to minimize total energy consumption by, for example, proposing an energy-efficient sensor placement algorithm [20] or by letting a controller decide which nodes should transmit the data [21,22]. Other approaches involve the formulation of a linear programming problem that finds the most energy-efficient unicast path to reach all nodes [23], the proposal of a data-forwarding scheme that utilizes nodes' contextual information [24], or the use of a k-coverage algorithm to distribute data energy-efficiently in wireless underwater sensor networks [25].…”
Section: Related Workmentioning
confidence: 99%
“…Several approaches do not rely on a tree structure to disseminate data in wireless ad hoc networks but still attempt to minimize total energy consumption by, for example, proposing an energy-efficient sensor placement algorithm [20] or by letting a controller decide which nodes should transmit the data [21,22]. Other approaches involve the formulation of a linear programming problem that finds the most energy-efficient unicast path to reach all nodes [23], the proposal of a data-forwarding scheme that utilizes nodes' contextual information [24], or the use of a k-coverage algorithm to distribute data energy-efficiently in wireless underwater sensor networks [25].…”
Section: Related Workmentioning
confidence: 99%
“…Each PIT entry contains the name of the Interest packet and the respective interfaces through which it arrived at the node. On the other hand, the CS stores the data packets and works as a buffer managed by caching policies [3,23]. In short, in Named Data Networks the contents are independent of their physical location, such as IP addresses, being accessible from anywhere on the network.…”
Section: Named Data Networkmentioning
confidence: 99%
“…Our NDN solution was specially designed for IoT infrastructures taking advantage of mobility prediction information. In our project, we developed improvements regarding the Forwarding [3], Caching and Energy-efficiency [23], as well as exploring mobilityaware prediction capabilities [4]. For all these developments, we have used the NDN implementation available in the ndnSIM network simulator, an open source NS-3-based NDN simulator [25].…”
Section: Ndn In the Atcllmentioning
confidence: 99%
“…In NDN, content producers employ digital signatures to sign their content objects, ensuring that only legitimate requesters (Consumers) can access the specific data content (14). This security measure guarantees that content retrieval is only possible using shared public keys, while the private key remains with the content provider (15).…”
Section: Introductionmentioning
confidence: 99%