2015
DOI: 10.1016/j.comcom.2015.09.014
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical and hash based naming with Compact Trie name management scheme for Vehicular Content Centric Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 46 publications
(24 citation statements)
references
References 20 publications
0
24
0
Order By: Relevance
“…Furthermore, the authors consider only the static nodes which limit the applicability of their naming scheme in an environment where both static and mobile nodes are present. Syed et al [11] introduced naming scheme for vehicular ad hoc networks. They only worked for vehicles.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the authors consider only the static nodes which limit the applicability of their naming scheme in an environment where both static and mobile nodes are present. Syed et al [11] introduced naming scheme for vehicular ad hoc networks. They only worked for vehicles.…”
Section: B Related Workmentioning
confidence: 99%
“…• We consider IoT based SC having heterogeneous IoT nodes (i.e., both static and mobile) to evaluate proposed naming scheme and achieve significant performance in terms of interest satisfaction rate, number of transmissions and latency, name-aggregation and security (i.e., integrity) over existing schemes [10]- [11]. The rest of the paper is organized as follows.…”
Section: Introductionmentioning
confidence: 99%
“…NDN offers a clean, simple, and scale design that can support a large amount of content exchange among vehicles and with infrastructure. Hierarchical NDN names provide a wide addressing range that can be customized by network designers and carry different application semantics [23,24]. Hence, different application properties can be integrated into the naming scheme to enhance the communication and improve users' needs.…”
Section: Ndn Advantages In Vanetsmentioning
confidence: 99%
“…Fog nodes can play a key role for adjusting the ID fragment length to collision problems do not arise. Collision problem in the naming are addressed in [16], [17], and [18]. In the proposed identity management, a collision problem occurs when two or more resources in a F2C connection use the same identifier.…”
Section: Idms Proposalmentioning
confidence: 99%