计算机科学 ›› 2020, Vol. 47 ›› Issue (4): 217-225.doi: 10.11896/jsjkx.191000157

• 计算机网络 • 上一篇    下一篇

面向5G的命名数据网络物联网研究综述

谢英英1, 石涧1, 黄硕康1, 雷凯1,2   

  1. 1 北京大学深圳研究生院信息工程学院深圳市内容中心网络与区块链重点实验室广东 深圳518055;
    2 北京大学互联网研究院(深圳) 广东 深圳518055
  • 收稿日期:2019-10-23 出版日期:2020-04-15 发布日期:2020-04-15
  • 通讯作者: 雷凯(leik@pkusz.edu.cn)

Survey on Internet of Things Based on Named Data Networking Facing 5G

XIE Ying-ying1, SHI Jian1, HUANG Shuo-kang1, LEI Kai1,2   

  1. 1 Shenzhen Key Lab for Information Centric Networking & BlockChain Technology,School of Electronic and Computer Engineering,Peking University Shenzhen Graduate School,Shenzhen,Guangdong 518055,China ;
    2 Internet Research Institute(Shenzhen),Peking University,Shenzhen,Guangdong 518005,China
  • Received:2019-10-23 Online:2020-04-15 Published:2020-04-15
  • Contact: LEI Kai,born in 1976,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include Named Data Networking,knowledge graph,Blockchain and big data.
  • About author:XIE Ying-ying,born in 1994,postgraduate.Her main research interests include Internet of Things and Named Data Networking.

摘要: 在5G时代,大规模物联网应用对网络架构提出了异构性、可扩展性、移动性和安全性四大挑战。基于TCP/IP的网络架构存在IP标识与位置绑定的二义重载问题,难以应对这四大挑战。命名数据网络(Named Data Networking,NDN)将内容作为第一语义,具有网络层和应用层逻辑拓扑一致性。NDN对这四大挑战的支持分别体现在:网络层命名屏蔽了底层异构细节,端到端解耦及网络层缓存使得NDN天然支持多对多通信和广播,消费者驱动的通信模式为消费者移动性提供原生支持,面向内容的内生安全更轻量可信。文中总结了基于NDN构建物联网亟待解决的问题,并对NDN与边缘计算、软件定义网络和区块链结合来构建边缘存储和计算模型、集中式与分布式结合的控制模型、分布式安全模型提出了展望。

关键词: 物联网, 命名数据网络, 5G, 边缘计算, 软件定义网络, 区块链

Abstract: Large scale Internet of Things (IoT) applications in the 5G era pose sever challenges on the network architecture in terms of heterogeneity,scalability,mobility and security.Due to the identification and location overloading problem of IP,TCP/IP based network architecture appears inefficient in addressing the challenges mentioned above.Named Data Networking (NDN) makes named content as the primary sematic and has consistency in logical topologies between network layer and application la-yer.The advantages of NDN in addressing these four challenges are reflected in the fact that naming shields the underlying hete-rogeneity,end-to-end decoupling and network layer caching provide native support for many-to-many communication and multicast,consumer mobility is supported natively by consumer driven communication pattern and content-based security is more lightweight.In this paper,future research directions of NDN based IoT were summarized.Especially,the combination of NDN and technologies including edge computing,blockchain and Software Defined Networking (SDN) to construct edge storage and computing model,centralized and distributed control model,distributed security model were proposed.

Key words: Internet of things, Named data networking, 5G, Edge computing, Software defined networking, Blockchain

中图分类号: 

  • TP393
[1]AL-FUQAHA A,GUIZANI M,MOHAMMADI M,et al.Internet of Things:a survey on enabling technologies,protocols,and applications.IEEE Communications Surveys & Tutorials,2015,17(4):2347-2376.
[2]ZHU H B,YANG L X,YU Q.Investigation of technicalthought and application strategy for the internet of things.Journal on Communications,2010,31(11):2-9.
[3]TURNER V,GANTZ J F,REINSEL D,et al.The digital universe of opportunities:Rich data and the increasing value of the internet of things.Journal of Telecommunications and the Digital Economy,2014,2(3):47.1-47.9.
[4]XU L W,LIN W.Research on Outage Probability Performance of Mobile Multi-user Communication System[J].Journal ofLiao-cheng University (Natural Science Edition),2020,33(2):43-48.
[5]ZHANG L,AFANASYEV A,BURKE J,et al.Named data networking.ACM SIGCOMM Computer Communication Review,2014,44(3):66-73.
[6]JACOBSON V,SMETTERS D K,THORNTON J D,et al.Networking named content.Proc Acm Conext,2009,55(1):1-12.
[7]SHI W S,ZHANG X Z,WANG Y F,et al.Edge computing:State-of-the-Art and Future Directions.Journal of Computer Research and Development,2019,56(1):69-89.
[8]MCKEOWN N.Software-defined networking.INFOCOMKeynote Talk,2009,17(2):30-32.
[9]PANARELLO A,TAPAS N,MERLINO G,et al.Blockchain and iot integration:A systematic survey.Sensors,2018,18(8):2575.
[10]AKPAKWU G A,SILVA B J,HANCKE G P,et al.A surveyon 5G networks for the Internet of Things:Communication technologies and challenges.IEEE Access,2017,6:3619-3647.
[11]PALATTELLA M R,DOHLER M,GRIECO A,et al.Internet of things in the 5G era:Enablers,architecture,and business models.IEEE Journal on Selected Areas in Communications,2016,34(3):510-527.
[12]LI S,DA XU L,ZHAO S.5G Internet of Things:A survey.Journal of Industrial Information Integration,2018,10:1-9.
[13]SHANG W,ZHANG L,BANNIS A,et al.Named Data Networking of Things (Invited Paper)//IEEE First International Conference on Internet-Of-Things Design and Implementation.2016:117-128.
[14]AMADEO M,CAMPOLO C,QUEVEDO J,et al.Information-centric networking for the internet of things:challenges and opportunities.IEEE Network,2016,30(2):92-100.
[15]LINDGREN A,ABDESSLEM F B,AHLGREN B,et al.Design choices for the IoT in Information-Centric Networks//2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).2016.
[16]AKPAKWU G,SILVA B,HANCKE G P,et al.A survey on 5G networks for the Internet of Things:communication technologies and challenges.IEEE Access,2018,6(99):3619-3647.
[17]3GPP.Release freeze and end dates.[2019-06-09].https://www.3gpp.org/specifications/releases.
[18]RATASUK R,MANGALVEDHE N,ZHANG Y,et al.Overview of narrowband IoT in LTE Rel-13//IEEE Conference on Standards for Communicatons and Networking.IEEE,2016:1-7.
[19]3GPP TS 36.300.Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN);Overall description.https://www.etsi.org/deliver/etsi_ts/136300_136399/136300/13.02.00_60/ts_136300v130200p.pdf.
[20]RAZA U,KULKARNI P,SOORIYABANDARA M.Low power wide area networks:An overview.IEEE Communications Surveys & Tutorials,2017,19(2):855-873.
[21]ZHANG L,ESTRIN D,BURKE J,et al.Named data networking (ndn) project.Xerox Palo Alto Research Center-PARC,2010.
[22]KUSHALNAGAR N,MONTENEGRO G,SCHUMACHER C.IPv6 over low-power wireless personal area networks (6LoWPANs):overview,assumptions,problem statement,and goals.IETF,2007.
[23]SHELBY Z,HARTKE K,BORMANN C.The constrained application protocol (CoAP).IETF,2014.
[24]TARIQUE M,TEPE K E,ADIBI S,et al.Survey of multipath routing protocols for mobile ad hoc networks.Journal of network and computer applications,2009,32(6):1125-1143.
[25]HAN H,SHAKKOTTAI S,HOLLOT C V,et al.Multi-path TCP:a joint congestion control and routing scheme to exploit path diversity in the Internet.IEEE/ACM Transactions on Networking,2006,14(6):1260-1271.
[26]SHANG W,YU Y,DROMS R,et al.Challenges in IoT networking via TCP/IP architecture:Technical Report NDN-0038[R].2016.
[27]ESTRIN D,FARINACCI D,HELMY A,et al.Protocol independent multicast-sparse mode (PIM-SM):Protocol specification.1998.
[28]HUI J,KELSEY R.Multicast protocol for low-power and lossy networks (MPL).2016.
[29]DIERKS T,RESCORLA E.The transport layer security (TLS) protocol version 1.2.IETF,2008.
[30]RESCORLA E,MODADUGU N.Datagram transport layer security version 1.2.IETF,2012.
[31]SELANDER G,MATTSSON J,PALOMBINI F,et al.Objectsecurity of coap (oscoap):Internet-Draft draft-ieff-core-object-security-04.Internet Engineering Task Force,2017.
[32]BACCELLI E,MEHLIS C,HAHM O,et al.Information centric networking in the IoT:Experiments with NDN in the wild//Proceedings of the 1st ACM Conference on Information-Centric Networking.2014:77-86.
[33]AMADEO M,CAMPOLO C,IERA A,et al.Information Centric Networking in IoT scenarios:The case of a smart home//IEEE International Conference on Communications.2015:648-653.
[34]GÜNDOCˇAN C,KIETZMANN P,LENDERS M,et al.NDN,CoAP,and MQTT:A Comparative Measurement Study in the IoT//5th ACM Conference on Information-Centric Networking(ICN’18).2018.
[35]ZHANG T K,SHAN S Y,XU X G,et al.Survey on Caching Techniques of Information Centric Networking.Journal of Beijing University of Posts and Telecommunications,2016,39(3):1-15.
[36]PSARAS I,ASCIGIL O,RENE S,et al.Mobile data repositories at the edge//{USENIX} Workshop on Hot Topics in Edge Computing (HotEdge 18).2018.
[37]PFENDER J,VALERA A,SEAH W K.Performance comparison of caching strategies for information-centric IoT//Proceedings of the 5th ACM Conference on Information-Centric Networking.2018:43-53.
[38]HAHM O,BACCELLI E,SCHMIDT T C,et al.Low-power internet of things with NDN & cooperative caching//Procee-dings of the 4th ACM Conference on Information-Centric Networking.2017:98-108.
[39]LEE J,KIM D.Proxy-assisted content sharing using contentcentric networking (CCN) for resource-limited mobile consumer devices.IEEE Transactions on Consumer Electronics,2011,57(2):477-483.
[40]VASILAKOS X,SIRIS V A,POLYZOS G C,et al.Proactive selective neighbor caching for enhancing mobility support in information-centric networks//Edition of the Icn Workshop on Information-Centric Networking.2012:61-66.
[41]JACOBSON V,BRAYNARD R L,DIEBERT T,et al.Custodian-based information sharing.Communications Magazine IEEE,2012,50(7):38-43.
[42]PIAO X,Z Y,LEI K.Survey of mobility management technologies based on Named Data Networking.Application Research of Computers,2017,34(4):961-964.
[43]GHASEMI C,YOUSEFI H,SHIN K G,et al.On the Granularity of Trie-Based Data Structures for Name Lookups and Updates.IEEE/ACM Transactions on Networking,2019,27(2):777-789.
[44]ASCIGIL O,REÑÉ S,XYLOMENOS G,et al.A keyword-based ICN-IoT platform//ACM Conference on Information-Centric Networking.2017:22-28.
[45]PAPALINI M.Tagnet:A scalable tag-based information-centric network.Università della Svizzera italiana,2015.
[46]SHANG W,YU Y,WANG L,et al.A survey of distributeddataset synchronization in Named Data Networking:Technical Report NDN-0053[R].2017.
[47]SHANG W,WANG Z,AFANASYEV A,et al.Breaking Out of the Cloud:Local Trust Management and Rendezvous in Named Data Networking of Things//International Conference on Internet-Of-Things Design and Implementation.2017:3-13.
[48]TIAN H,FAN S S,LV X C,et al.Mobile Edge Computing for 5G Requirements.Journal of Beijing University of Posts and Telecommunications,2017,40(2):1-10.
[49]MTIBAA A,TOURANI R,MISRA S,et al.Towards EdgeComputing over Named Data Networking.2018 IEEE International Conference on Edge Computing (EDGE).2018:117-120.
[50]KRÒL M,PSARAS I.NFaaS:named function as a service.Proceedings of the 4th ACM Conference on Information-Centric Networking,2017:134-144.
[51]KRÒL M,HABAK K,ORAN D,et al.Rice:Remote method invocation in icn//Proceedings of the 5th ACM Conference on Information-Centric Networking.2018:1-11.
[52]AHMED S H,BOUK S H,KIM D,et al.Named data networking for software defined vehicular networks.IEEE Communications Magazine,2017,55(8):60-66.
[53]SALSANO S,BLEFARI-MELAZZI N,DETTI A,et al.Information centric networking over SDN and OpenFlow:Architectural aspects and experiments on the OFELIA testbed.Computer Networks,2013,57(16):3207-3221.
[54]JIN T,ZHANG X,LIU Y,et al.BlockNDN:A bitcoin blockchain decentralized system over named data networking//2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).2017:75-80.
[55]LOU J,ZHANG Q,QI Z,et al.A blockchain-based key management scheme for named data networking//2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).2018:141-146.
[1] 李辉, 李秀华, 熊庆宇, 文俊浩, 程路熙, 邢镔. 边缘计算助力工业互联网:架构、应用与挑战[J]. 计算机科学, 2021, 48(1): 1-10.
[2] 刘通, 方璐, 高洪皓. 边缘计算中任务卸载研究综述[J]. 计算机科学, 2021, 48(1): 11-15.
[3] 梁俊斌, 田凤森, 蒋婵, 王天舒. 物联网中多设备多服务器的移动边缘计算任务卸载技术综述[J]. 计算机科学, 2021, 48(1): 16-25.
[4] 于天琪, 胡剑凌, 金炯, 羊箭锋. 基于移动边缘计算的车载CAN网络入侵检测方法[J]. 计算机科学, 2021, 48(1): 34-39.
[5] 马堉银, 郑万波, 马勇, 刘航, 夏云霓, 郭坤银, 陈鹏, 刘诚武. 一种基于深度强化学习与概率性能感知的边缘计算环境多工作流卸载方法[J]. 计算机科学, 2021, 48(1): 40-48.
[6] 毛莺池, 周彤, 刘鹏飞. 基于延迟接受的多用户任务卸载策略[J]. 计算机科学, 2021, 48(1): 49-57.
[7] 唐文君, 刘岳, 陈荣. 移动边缘计算中的动态用户分配方法[J]. 计算机科学, 2021, 48(1): 58-64.
[8] 余雪勇, 陈涛. 边缘计算场景中基于虚拟映射的隐私保护卸载算法[J]. 计算机科学, 2021, 48(1): 65-71.
[9] 高基旭, 王珺. 一种基于遗传算法的多边缘协同计算卸载方案[J]. 计算机科学, 2021, 48(1): 72-80.
[10] 杨紫淇, 蔡英, 张皓晨, 范艳芳. 基于负载均衡的VEC服务器联合计算任务卸载方案[J]. 计算机科学, 2021, 48(1): 81-88.
[11] 单美静, 秦龙飞, 张会兵. L-YOLO:适用于车载边缘计算的实时交通标识检测模型[J]. 计算机科学, 2021, 48(1): 89-95.
[12] 郦睿翔, 毛莺池, 郝帅. 基于近似匹配的移动边缘计算缓存管理方法[J]. 计算机科学, 2021, 48(1): 96-102.
[13] 郭飞雁, 唐兵. 基于用户延迟感知的移动边缘服务器放置方法[J]. 计算机科学, 2021, 48(1): 103-110.
[14] 张艳梅, 楼胤成. 基于深度神经网络的庞氏骗局合约检测方法[J]. 计算机科学, 2021, 48(1): 273-279.
[15] 邵炜晖, 王宁, 韩传峰, 许维胜. 基于区块链的一体化应急应战机制[J]. 计算机科学, 2021, 48(1): 287-294.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75 .
[2] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[3] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[4] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[5] 史雯隽,武继刚,罗裕春. 针对移动云计算任务迁移的快速高效调度算法[J]. 计算机科学, 2018, 45(4): 94 -99 .
[6] 周燕萍,业巧林. 基于L1-范数距离的最小二乘对支持向量机[J]. 计算机科学, 2018, 45(4): 100 -105 .
[7] 刘博艺,唐湘滟,程杰仁. 基于多生长时期模板匹配的玉米螟识别方法[J]. 计算机科学, 2018, 45(4): 106 -111 .
[8] 耿海军,施新刚,王之梁,尹霞,尹少平. 基于有向无环图的互联网域内节能路由算法[J]. 计算机科学, 2018, 45(4): 112 -116 .
[9] 崔琼,李建华,王宏,南明莉. 基于节点修复的网络化指挥信息系统弹性分析模型[J]. 计算机科学, 2018, 45(4): 117 -121 .
[10] 王振朝,侯欢欢,连蕊. 抑制CMT中乱序程度的路径优化方案[J]. 计算机科学, 2018, 45(4): 122 -125 .