计算机科学 ›› 2020, Vol. 47 ›› Issue (4): 217-225.doi: 10.11896/jsjkx.191000157
谢英英1, 石涧1, 黄硕康1, 雷凯1,2
XIE Ying-ying1, SHI Jian1, HUANG Shuo-kang1, LEI Kai1,2
摘要: 在5G时代,大规模物联网应用对网络架构提出了异构性、可扩展性、移动性和安全性四大挑战。基于TCP/IP的网络架构存在IP标识与位置绑定的二义重载问题,难以应对这四大挑战。命名数据网络(Named Data Networking,NDN)将内容作为第一语义,具有网络层和应用层逻辑拓扑一致性。NDN对这四大挑战的支持分别体现在:网络层命名屏蔽了底层异构细节,端到端解耦及网络层缓存使得NDN天然支持多对多通信和广播,消费者驱动的通信模式为消费者移动性提供原生支持,面向内容的内生安全更轻量可信。文中总结了基于NDN构建物联网亟待解决的问题,并对NDN与边缘计算、软件定义网络和区块链结合来构建边缘存储和计算模型、集中式与分布式结合的控制模型、分布式安全模型提出了展望。
中图分类号:
[1]AL-FUQAHA A,GUIZANI M,MOHAMMADI M,et al.Internet of Things:a survey on enabling technologies,protocols,and applications.IEEE Communications Surveys & Tutorials,2015,17(4):2347-2376. [2]ZHU H B,YANG L X,YU Q.Investigation of technicalthought and application strategy for the internet of things.Journal on Communications,2010,31(11):2-9. [3]TURNER V,GANTZ J F,REINSEL D,et al.The digital universe of opportunities:Rich data and the increasing value of the internet of things.Journal of Telecommunications and the Digital Economy,2014,2(3):47.1-47.9. [4]XU L W,LIN W.Research on Outage Probability Performance of Mobile Multi-user Communication System[J].Journal ofLiao-cheng University (Natural Science Edition),2020,33(2):43-48. [5]ZHANG L,AFANASYEV A,BURKE J,et al.Named data networking.ACM SIGCOMM Computer Communication Review,2014,44(3):66-73. [6]JACOBSON V,SMETTERS D K,THORNTON J D,et al.Networking named content.Proc Acm Conext,2009,55(1):1-12. [7]SHI W S,ZHANG X Z,WANG Y F,et al.Edge computing:State-of-the-Art and Future Directions.Journal of Computer Research and Development,2019,56(1):69-89. [8]MCKEOWN N.Software-defined networking.INFOCOMKeynote Talk,2009,17(2):30-32. [9]PANARELLO A,TAPAS N,MERLINO G,et al.Blockchain and iot integration:A systematic survey.Sensors,2018,18(8):2575. [10]AKPAKWU G A,SILVA B J,HANCKE G P,et al.A surveyon 5G networks for the Internet of Things:Communication technologies and challenges.IEEE Access,2017,6:3619-3647. [11]PALATTELLA M R,DOHLER M,GRIECO A,et al.Internet of things in the 5G era:Enablers,architecture,and business models.IEEE Journal on Selected Areas in Communications,2016,34(3):510-527. [12]LI S,DA XU L,ZHAO S.5G Internet of Things:A survey.Journal of Industrial Information Integration,2018,10:1-9. [13]SHANG W,ZHANG L,BANNIS A,et al.Named Data Networking of Things (Invited Paper)//IEEE First International Conference on Internet-Of-Things Design and Implementation.2016:117-128. [14]AMADEO M,CAMPOLO C,QUEVEDO J,et al.Information-centric networking for the internet of things:challenges and opportunities.IEEE Network,2016,30(2):92-100. [15]LINDGREN A,ABDESSLEM F B,AHLGREN B,et al.Design choices for the IoT in Information-Centric Networks//2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).2016. [16]AKPAKWU G,SILVA B,HANCKE G P,et al.A survey on 5G networks for the Internet of Things:communication technologies and challenges.IEEE Access,2018,6(99):3619-3647. [17]3GPP.Release freeze and end dates.[2019-06-09].https://www.3gpp.org/specifications/releases. [18]RATASUK R,MANGALVEDHE N,ZHANG Y,et al.Overview of narrowband IoT in LTE Rel-13//IEEE Conference on Standards for Communicatons and Networking.IEEE,2016:1-7. [19]3GPP TS 36.300.Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN);Overall description.https://www.etsi.org/deliver/etsi_ts/136300_136399/136300/13.02.00_60/ts_136300v130200p.pdf. [20]RAZA U,KULKARNI P,SOORIYABANDARA M.Low power wide area networks:An overview.IEEE Communications Surveys & Tutorials,2017,19(2):855-873. [21]ZHANG L,ESTRIN D,BURKE J,et al.Named data networking (ndn) project.Xerox Palo Alto Research Center-PARC,2010. [22]KUSHALNAGAR N,MONTENEGRO G,SCHUMACHER C.IPv6 over low-power wireless personal area networks (6LoWPANs):overview,assumptions,problem statement,and goals.IETF,2007. [23]SHELBY Z,HARTKE K,BORMANN C.The constrained application protocol (CoAP).IETF,2014. [24]TARIQUE M,TEPE K E,ADIBI S,et al.Survey of multipath routing protocols for mobile ad hoc networks.Journal of network and computer applications,2009,32(6):1125-1143. [25]HAN H,SHAKKOTTAI S,HOLLOT C V,et al.Multi-path TCP:a joint congestion control and routing scheme to exploit path diversity in the Internet.IEEE/ACM Transactions on Networking,2006,14(6):1260-1271. [26]SHANG W,YU Y,DROMS R,et al.Challenges in IoT networking via TCP/IP architecture:Technical Report NDN-0038[R].2016. [27]ESTRIN D,FARINACCI D,HELMY A,et al.Protocol independent multicast-sparse mode (PIM-SM):Protocol specification.1998. [28]HUI J,KELSEY R.Multicast protocol for low-power and lossy networks (MPL).2016. [29]DIERKS T,RESCORLA E.The transport layer security (TLS) protocol version 1.2.IETF,2008. [30]RESCORLA E,MODADUGU N.Datagram transport layer security version 1.2.IETF,2012. [31]SELANDER G,MATTSSON J,PALOMBINI F,et al.Objectsecurity of coap (oscoap):Internet-Draft draft-ieff-core-object-security-04.Internet Engineering Task Force,2017. [32]BACCELLI E,MEHLIS C,HAHM O,et al.Information centric networking in the IoT:Experiments with NDN in the wild//Proceedings of the 1st ACM Conference on Information-Centric Networking.2014:77-86. [33]AMADEO M,CAMPOLO C,IERA A,et al.Information Centric Networking in IoT scenarios:The case of a smart home//IEEE International Conference on Communications.2015:648-653. [34]GÜNDOCˇAN C,KIETZMANN P,LENDERS M,et al.NDN,CoAP,and MQTT:A Comparative Measurement Study in the IoT//5th ACM Conference on Information-Centric Networking(ICN’18).2018. [35]ZHANG T K,SHAN S Y,XU X G,et al.Survey on Caching Techniques of Information Centric Networking.Journal of Beijing University of Posts and Telecommunications,2016,39(3):1-15. [36]PSARAS I,ASCIGIL O,RENE S,et al.Mobile data repositories at the edge//{USENIX} Workshop on Hot Topics in Edge Computing (HotEdge 18).2018. [37]PFENDER J,VALERA A,SEAH W K.Performance comparison of caching strategies for information-centric IoT//Proceedings of the 5th ACM Conference on Information-Centric Networking.2018:43-53. [38]HAHM O,BACCELLI E,SCHMIDT T C,et al.Low-power internet of things with NDN & cooperative caching//Procee-dings of the 4th ACM Conference on Information-Centric Networking.2017:98-108. [39]LEE J,KIM D.Proxy-assisted content sharing using contentcentric networking (CCN) for resource-limited mobile consumer devices.IEEE Transactions on Consumer Electronics,2011,57(2):477-483. [40]VASILAKOS X,SIRIS V A,POLYZOS G C,et al.Proactive selective neighbor caching for enhancing mobility support in information-centric networks//Edition of the Icn Workshop on Information-Centric Networking.2012:61-66. [41]JACOBSON V,BRAYNARD R L,DIEBERT T,et al.Custodian-based information sharing.Communications Magazine IEEE,2012,50(7):38-43. [42]PIAO X,Z Y,LEI K.Survey of mobility management technologies based on Named Data Networking.Application Research of Computers,2017,34(4):961-964. [43]GHASEMI C,YOUSEFI H,SHIN K G,et al.On the Granularity of Trie-Based Data Structures for Name Lookups and Updates.IEEE/ACM Transactions on Networking,2019,27(2):777-789. [44]ASCIGIL O,REÑÉ S,XYLOMENOS G,et al.A keyword-based ICN-IoT platform//ACM Conference on Information-Centric Networking.2017:22-28. [45]PAPALINI M.Tagnet:A scalable tag-based information-centric network.Università della Svizzera italiana,2015. [46]SHANG W,YU Y,WANG L,et al.A survey of distributeddataset synchronization in Named Data Networking:Technical Report NDN-0053[R].2017. [47]SHANG W,WANG Z,AFANASYEV A,et al.Breaking Out of the Cloud:Local Trust Management and Rendezvous in Named Data Networking of Things//International Conference on Internet-Of-Things Design and Implementation.2017:3-13. [48]TIAN H,FAN S S,LV X C,et al.Mobile Edge Computing for 5G Requirements.Journal of Beijing University of Posts and Telecommunications,2017,40(2):1-10. [49]MTIBAA A,TOURANI R,MISRA S,et al.Towards EdgeComputing over Named Data Networking.2018 IEEE International Conference on Edge Computing (EDGE).2018:117-120. [50]KRÒL M,PSARAS I.NFaaS:named function as a service.Proceedings of the 4th ACM Conference on Information-Centric Networking,2017:134-144. [51]KRÒL M,HABAK K,ORAN D,et al.Rice:Remote method invocation in icn//Proceedings of the 5th ACM Conference on Information-Centric Networking.2018:1-11. [52]AHMED S H,BOUK S H,KIM D,et al.Named data networking for software defined vehicular networks.IEEE Communications Magazine,2017,55(8):60-66. [53]SALSANO S,BLEFARI-MELAZZI N,DETTI A,et al.Information centric networking over SDN and OpenFlow:Architectural aspects and experiments on the OFELIA testbed.Computer Networks,2013,57(16):3207-3221. [54]JIN T,ZHANG X,LIU Y,et al.BlockNDN:A bitcoin blockchain decentralized system over named data networking//2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).2017:75-80. [55]LOU J,ZHANG Q,QI Z,et al.A blockchain-based key management scheme for named data networking//2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).2018:141-146. |
[1] | 李辉, 李秀华, 熊庆宇, 文俊浩, 程路熙, 邢镔. 边缘计算助力工业互联网:架构、应用与挑战[J]. 计算机科学, 2021, 48(1): 1-10. |
[2] | 刘通, 方璐, 高洪皓. 边缘计算中任务卸载研究综述[J]. 计算机科学, 2021, 48(1): 11-15. |
[3] | 梁俊斌, 田凤森, 蒋婵, 王天舒. 物联网中多设备多服务器的移动边缘计算任务卸载技术综述[J]. 计算机科学, 2021, 48(1): 16-25. |
[4] | 于天琪, 胡剑凌, 金炯, 羊箭锋. 基于移动边缘计算的车载CAN网络入侵检测方法[J]. 计算机科学, 2021, 48(1): 34-39. |
[5] | 马堉银, 郑万波, 马勇, 刘航, 夏云霓, 郭坤银, 陈鹏, 刘诚武. 一种基于深度强化学习与概率性能感知的边缘计算环境多工作流卸载方法[J]. 计算机科学, 2021, 48(1): 40-48. |
[6] | 毛莺池, 周彤, 刘鹏飞. 基于延迟接受的多用户任务卸载策略[J]. 计算机科学, 2021, 48(1): 49-57. |
[7] | 唐文君, 刘岳, 陈荣. 移动边缘计算中的动态用户分配方法[J]. 计算机科学, 2021, 48(1): 58-64. |
[8] | 余雪勇, 陈涛. 边缘计算场景中基于虚拟映射的隐私保护卸载算法[J]. 计算机科学, 2021, 48(1): 65-71. |
[9] | 高基旭, 王珺. 一种基于遗传算法的多边缘协同计算卸载方案[J]. 计算机科学, 2021, 48(1): 72-80. |
[10] | 杨紫淇, 蔡英, 张皓晨, 范艳芳. 基于负载均衡的VEC服务器联合计算任务卸载方案[J]. 计算机科学, 2021, 48(1): 81-88. |
[11] | 单美静, 秦龙飞, 张会兵. L-YOLO:适用于车载边缘计算的实时交通标识检测模型[J]. 计算机科学, 2021, 48(1): 89-95. |
[12] | 郦睿翔, 毛莺池, 郝帅. 基于近似匹配的移动边缘计算缓存管理方法[J]. 计算机科学, 2021, 48(1): 96-102. |
[13] | 郭飞雁, 唐兵. 基于用户延迟感知的移动边缘服务器放置方法[J]. 计算机科学, 2021, 48(1): 103-110. |
[14] | 张艳梅, 楼胤成. 基于深度神经网络的庞氏骗局合约检测方法[J]. 计算机科学, 2021, 48(1): 273-279. |
[15] | 邵炜晖, 王宁, 韩传峰, 许维胜. 基于区块链的一体化应急应战机制[J]. 计算机科学, 2021, 48(1): 287-294. |
|