Computer Science ›› 2020, Vol. 47 ›› Issue (4): 217-225.doi: 10.11896/jsjkx.191000157

• Computer Network • Previous Articles     Next Articles

Survey on Internet of Things Based on Named Data Networking Facing 5G

XIE Ying-ying1, SHI Jian1, HUANG Shuo-kang1, LEI Kai1,2   

  1. 1 Shenzhen Key Lab for Information Centric Networking & BlockChain Technology,School of Electronic and Computer Engineering,Peking University Shenzhen Graduate School,Shenzhen,Guangdong 518055,China ;
    2 Internet Research Institute(Shenzhen),Peking University,Shenzhen,Guangdong 518005,China
  • Received:2019-10-23 Online:2020-04-15 Published:2020-04-15
  • Contact: LEI Kai,born in 1976,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include Named Data Networking,knowledge graph,Blockchain and big data.
  • About author:XIE Ying-ying,born in 1994,postgraduate.Her main research interests include Internet of Things and Named Data Networking.

Abstract: Large scale Internet of Things (IoT) applications in the 5G era pose sever challenges on the network architecture in terms of heterogeneity,scalability,mobility and security.Due to the identification and location overloading problem of IP,TCP/IP based network architecture appears inefficient in addressing the challenges mentioned above.Named Data Networking (NDN) makes named content as the primary sematic and has consistency in logical topologies between network layer and application la-yer.The advantages of NDN in addressing these four challenges are reflected in the fact that naming shields the underlying hete-rogeneity,end-to-end decoupling and network layer caching provide native support for many-to-many communication and multicast,consumer mobility is supported natively by consumer driven communication pattern and content-based security is more lightweight.In this paper,future research directions of NDN based IoT were summarized.Especially,the combination of NDN and technologies including edge computing,blockchain and Software Defined Networking (SDN) to construct edge storage and computing model,centralized and distributed control model,distributed security model were proposed.

Key words: Internet of things, Named data networking, 5G, Edge computing, Software defined networking, Blockchain

CLC Number: 

  • TP393
[1]AL-FUQAHA A,GUIZANI M,MOHAMMADI M,et al.Internet of Things:a survey on enabling technologies,protocols,and applications.IEEE Communications Surveys & Tutorials,2015,17(4):2347-2376.
[2]ZHU H B,YANG L X,YU Q.Investigation of technicalthought and application strategy for the internet of things.Journal on Communications,2010,31(11):2-9.
[3]TURNER V,GANTZ J F,REINSEL D,et al.The digital universe of opportunities:Rich data and the increasing value of the internet of things.Journal of Telecommunications and the Digital Economy,2014,2(3):47.1-47.9.
[4]XU L W,LIN W.Research on Outage Probability Performance of Mobile Multi-user Communication System[J].Journal ofLiao-cheng University (Natural Science Edition),2020,33(2):43-48.
[5]ZHANG L,AFANASYEV A,BURKE J,et al.Named data networking.ACM SIGCOMM Computer Communication Review,2014,44(3):66-73.
[6]JACOBSON V,SMETTERS D K,THORNTON J D,et al.Networking named content.Proc Acm Conext,2009,55(1):1-12.
[7]SHI W S,ZHANG X Z,WANG Y F,et al.Edge computing:State-of-the-Art and Future Directions.Journal of Computer Research and Development,2019,56(1):69-89.
[8]MCKEOWN N.Software-defined networking.INFOCOMKeynote Talk,2009,17(2):30-32.
[9]PANARELLO A,TAPAS N,MERLINO G,et al.Blockchain and iot integration:A systematic survey.Sensors,2018,18(8):2575.
[10]AKPAKWU G A,SILVA B J,HANCKE G P,et al.A surveyon 5G networks for the Internet of Things:Communication technologies and challenges.IEEE Access,2017,6:3619-3647.
[11]PALATTELLA M R,DOHLER M,GRIECO A,et al.Internet of things in the 5G era:Enablers,architecture,and business models.IEEE Journal on Selected Areas in Communications,2016,34(3):510-527.
[12]LI S,DA XU L,ZHAO S.5G Internet of Things:A survey.Journal of Industrial Information Integration,2018,10:1-9.
[13]SHANG W,ZHANG L,BANNIS A,et al.Named Data Networking of Things (Invited Paper)//IEEE First International Conference on Internet-Of-Things Design and Implementation.2016:117-128.
[14]AMADEO M,CAMPOLO C,QUEVEDO J,et al.Information-centric networking for the internet of things:challenges and opportunities.IEEE Network,2016,30(2):92-100.
[15]LINDGREN A,ABDESSLEM F B,AHLGREN B,et al.Design choices for the IoT in Information-Centric Networks//2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).2016.
[16]AKPAKWU G,SILVA B,HANCKE G P,et al.A survey on 5G networks for the Internet of Things:communication technologies and challenges.IEEE Access,2018,6(99):3619-3647.
[17]3GPP.Release freeze and end dates.[2019-06-09].https://www.3gpp.org/specifications/releases.
[18]RATASUK R,MANGALVEDHE N,ZHANG Y,et al.Overview of narrowband IoT in LTE Rel-13//IEEE Conference on Standards for Communicatons and Networking.IEEE,2016:1-7.
[19]3GPP TS 36.300.Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN);Overall description.https://www.etsi.org/deliver/etsi_ts/136300_136399/136300/13.02.00_60/ts_136300v130200p.pdf.
[20]RAZA U,KULKARNI P,SOORIYABANDARA M.Low power wide area networks:An overview.IEEE Communications Surveys & Tutorials,2017,19(2):855-873.
[21]ZHANG L,ESTRIN D,BURKE J,et al.Named data networking (ndn) project.Xerox Palo Alto Research Center-PARC,2010.
[22]KUSHALNAGAR N,MONTENEGRO G,SCHUMACHER C.IPv6 over low-power wireless personal area networks (6LoWPANs):overview,assumptions,problem statement,and goals.IETF,2007.
[23]SHELBY Z,HARTKE K,BORMANN C.The constrained application protocol (CoAP).IETF,2014.
[24]TARIQUE M,TEPE K E,ADIBI S,et al.Survey of multipath routing protocols for mobile ad hoc networks.Journal of network and computer applications,2009,32(6):1125-1143.
[25]HAN H,SHAKKOTTAI S,HOLLOT C V,et al.Multi-path TCP:a joint congestion control and routing scheme to exploit path diversity in the Internet.IEEE/ACM Transactions on Networking,2006,14(6):1260-1271.
[26]SHANG W,YU Y,DROMS R,et al.Challenges in IoT networking via TCP/IP architecture:Technical Report NDN-0038[R].2016.
[27]ESTRIN D,FARINACCI D,HELMY A,et al.Protocol independent multicast-sparse mode (PIM-SM):Protocol specification.1998.
[28]HUI J,KELSEY R.Multicast protocol for low-power and lossy networks (MPL).2016.
[29]DIERKS T,RESCORLA E.The transport layer security (TLS) protocol version 1.2.IETF,2008.
[30]RESCORLA E,MODADUGU N.Datagram transport layer security version 1.2.IETF,2012.
[31]SELANDER G,MATTSSON J,PALOMBINI F,et al.Objectsecurity of coap (oscoap):Internet-Draft draft-ieff-core-object-security-04.Internet Engineering Task Force,2017.
[32]BACCELLI E,MEHLIS C,HAHM O,et al.Information centric networking in the IoT:Experiments with NDN in the wild//Proceedings of the 1st ACM Conference on Information-Centric Networking.2014:77-86.
[33]AMADEO M,CAMPOLO C,IERA A,et al.Information Centric Networking in IoT scenarios:The case of a smart home//IEEE International Conference on Communications.2015:648-653.
[34]GÜNDOCˇAN C,KIETZMANN P,LENDERS M,et al.NDN,CoAP,and MQTT:A Comparative Measurement Study in the IoT//5th ACM Conference on Information-Centric Networking(ICN’18).2018.
[35]ZHANG T K,SHAN S Y,XU X G,et al.Survey on Caching Techniques of Information Centric Networking.Journal of Beijing University of Posts and Telecommunications,2016,39(3):1-15.
[36]PSARAS I,ASCIGIL O,RENE S,et al.Mobile data repositories at the edge//{USENIX} Workshop on Hot Topics in Edge Computing (HotEdge 18).2018.
[37]PFENDER J,VALERA A,SEAH W K.Performance comparison of caching strategies for information-centric IoT//Proceedings of the 5th ACM Conference on Information-Centric Networking.2018:43-53.
[38]HAHM O,BACCELLI E,SCHMIDT T C,et al.Low-power internet of things with NDN & cooperative caching//Procee-dings of the 4th ACM Conference on Information-Centric Networking.2017:98-108.
[39]LEE J,KIM D.Proxy-assisted content sharing using contentcentric networking (CCN) for resource-limited mobile consumer devices.IEEE Transactions on Consumer Electronics,2011,57(2):477-483.
[40]VASILAKOS X,SIRIS V A,POLYZOS G C,et al.Proactive selective neighbor caching for enhancing mobility support in information-centric networks//Edition of the Icn Workshop on Information-Centric Networking.2012:61-66.
[41]JACOBSON V,BRAYNARD R L,DIEBERT T,et al.Custodian-based information sharing.Communications Magazine IEEE,2012,50(7):38-43.
[42]PIAO X,Z Y,LEI K.Survey of mobility management technologies based on Named Data Networking.Application Research of Computers,2017,34(4):961-964.
[43]GHASEMI C,YOUSEFI H,SHIN K G,et al.On the Granularity of Trie-Based Data Structures for Name Lookups and Updates.IEEE/ACM Transactions on Networking,2019,27(2):777-789.
[44]ASCIGIL O,REÑÉ S,XYLOMENOS G,et al.A keyword-based ICN-IoT platform//ACM Conference on Information-Centric Networking.2017:22-28.
[45]PAPALINI M.Tagnet:A scalable tag-based information-centric network.Università della Svizzera italiana,2015.
[46]SHANG W,YU Y,WANG L,et al.A survey of distributeddataset synchronization in Named Data Networking:Technical Report NDN-0053[R].2017.
[47]SHANG W,WANG Z,AFANASYEV A,et al.Breaking Out of the Cloud:Local Trust Management and Rendezvous in Named Data Networking of Things//International Conference on Internet-Of-Things Design and Implementation.2017:3-13.
[48]TIAN H,FAN S S,LV X C,et al.Mobile Edge Computing for 5G Requirements.Journal of Beijing University of Posts and Telecommunications,2017,40(2):1-10.
[49]MTIBAA A,TOURANI R,MISRA S,et al.Towards EdgeComputing over Named Data Networking.2018 IEEE International Conference on Edge Computing (EDGE).2018:117-120.
[50]KRÒL M,PSARAS I.NFaaS:named function as a service.Proceedings of the 4th ACM Conference on Information-Centric Networking,2017:134-144.
[51]KRÒL M,HABAK K,ORAN D,et al.Rice:Remote method invocation in icn//Proceedings of the 5th ACM Conference on Information-Centric Networking.2018:1-11.
[52]AHMED S H,BOUK S H,KIM D,et al.Named data networking for software defined vehicular networks.IEEE Communications Magazine,2017,55(8):60-66.
[53]SALSANO S,BLEFARI-MELAZZI N,DETTI A,et al.Information centric networking over SDN and OpenFlow:Architectural aspects and experiments on the OFELIA testbed.Computer Networks,2013,57(16):3207-3221.
[54]JIN T,ZHANG X,LIU Y,et al.BlockNDN:A bitcoin blockchain decentralized system over named data networking//2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).2017:75-80.
[55]LOU J,ZHANG Q,QI Z,et al.A blockchain-based key management scheme for named data networking//2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).2018:141-146.
[1] LI Hui, LI Xiu-hua, XIONG Qing-yu, WEN Jun-hao, CHENG Lu-xi, XING Bin. Edge Computing Enabling Industrial Internet:Architecture,Applications and Challenges [J]. Computer Science, 2021, 48(1): 1-10.
[2] LIU Tong, FANG Lu, GAO Hong-hao. Survey of Task Offloading in Edge Computing [J]. Computer Science, 2021, 48(1): 11-15.
[3] LIANG Jun-bin, TIAN Feng-sen, JIANG Chan, WANG Tian-shu. Survey on Task Offloading Techniques for Mobile Edge Computing with Multi-devices and Multi-servers in Internet of Things [J]. Computer Science, 2021, 48(1): 16-25.
[4] YU Tian-qi, HU Jian-ling, JIN Jiong, YANG Jian-feng. Mobile Edge Computing Based In-vehicle CAN Network Intrusion Detection Method [J]. Computer Science, 2021, 48(1): 34-39.
[5] MA Yu-yin, ZHENG Wan-bo, MA Yong, LIU Hang, XIA Yun-ni, GUO Kun-yin, CHEN Peng, LIU Cheng-wu. Multi-workflow Offloading Method Based on Deep Reinforcement Learning and ProbabilisticPerformance-awarein Edge Computing Environment [J]. Computer Science, 2021, 48(1): 40-48.
[6] MAO Ying-chi, ZHOU Tong, LIU Peng-fei. Multi-user Task Offloading Based on Delayed Acceptance [J]. Computer Science, 2021, 48(1): 49-57.
[7] TANG Wen-jun, LIU Yue, CHEN Rong. User Allocation Approach in Dynamic Mobile Edge Computing [J]. Computer Science, 2021, 48(1): 58-64.
[8] YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71.
[9] GAO Ji-xu, WANG Jun. Multi-edge Collaborative Computing Unloading Scheme Based on Genetic Algorithm [J]. Computer Science, 2021, 48(1): 72-80.
[10] YANG Zi-qi, CAI Ying, ZHANG Hao-chen, FAN Yan-fang. Computational Task Offloading Scheme Based on Load Balance for Cooperative VEC Servers [J]. Computer Science, 2021, 48(1): 81-88.
[11] SHAN Mei-jing, QIN Long-fei, ZHANG Hui-bing. L-YOLO:Real Time Traffic Sign Detection Model for Vehicle Edge Computing [J]. Computer Science, 2021, 48(1): 89-95.
[12] LI Rui-xiang, MAO Ying-chi, HAO Shuai. Cache Management Method in Mobile Edge Computing Based on Approximate Matching [J]. Computer Science, 2021, 48(1): 96-102.
[13] GUO Fei-yan, TANG Bing. Mobile Edge Server Placement Method Based on User Latency-aware [J]. Computer Science, 2021, 48(1): 103-110.
[14] ZHANG Yan-mei, LOU Yin-cheng. Deep Neural Network Based Ponzi Scheme Contract Detection Method [J]. Computer Science, 2021, 48(1): 273-279.
[15] SHAO Wei-hui, WANG Ning, HAN Chuan-feng, XU Wei-sheng. Integrated Emergency-Defense System Based on Blockchain [J]. Computer Science, 2021, 48(1): 287-294.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .