计算机科学 ›› 2020, Vol. 47 ›› Issue (4): 217-225.doi: 10.11896/jsjkx.191000157

所属专题: 网络通信 物联网技术 虚拟专题

• 计算机网络 • 上一篇    下一篇

面向5G的命名数据网络物联网研究综述

谢英英1, 石涧1, 黄硕康1, 雷凯1,2   

  1. 1 北京大学深圳研究生院信息工程学院深圳市内容中心网络与区块链重点实验室广东 深圳518055;
    2 北京大学互联网研究院(深圳) 广东 深圳518055
  • 收稿日期:2019-10-23 出版日期:2020-04-15 发布日期:2020-04-15
  • 通讯作者: 雷凯(leik@pkusz.edu.cn)

Survey on Internet of Things Based on Named Data Networking Facing 5G

XIE Ying-ying1, SHI Jian1, HUANG Shuo-kang1, LEI Kai1,2   

  1. 1 Shenzhen Key Lab for Information Centric Networking & BlockChain Technology,School of Electronic and Computer Engineering,Peking University Shenzhen Graduate School,Shenzhen,Guangdong 518055,China ;
    2 Internet Research Institute(Shenzhen),Peking University,Shenzhen,Guangdong 518005,China
  • Received:2019-10-23 Online:2020-04-15 Published:2020-04-15
  • Contact: LEI Kai,born in 1976,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include Named Data Networking,knowledge graph,Blockchain and big data.
  • About author:XIE Ying-ying,born in 1994,postgraduate.Her main research interests include Internet of Things and Named Data Networking.

摘要: 在5G时代,大规模物联网应用对网络架构提出了异构性、可扩展性、移动性和安全性四大挑战。基于TCP/IP的网络架构存在IP标识与位置绑定的二义重载问题,难以应对这四大挑战。命名数据网络(Named Data Networking,NDN)将内容作为第一语义,具有网络层和应用层逻辑拓扑一致性。NDN对这四大挑战的支持分别体现在:网络层命名屏蔽了底层异构细节,端到端解耦及网络层缓存使得NDN天然支持多对多通信和广播,消费者驱动的通信模式为消费者移动性提供原生支持,面向内容的内生安全更轻量可信。文中总结了基于NDN构建物联网亟待解决的问题,并对NDN与边缘计算、软件定义网络和区块链结合来构建边缘存储和计算模型、集中式与分布式结合的控制模型、分布式安全模型提出了展望。

关键词: 5G, 边缘计算, 命名数据网络, 区块链, 软件定义网络, 物联网

Abstract: Large scale Internet of Things (IoT) applications in the 5G era pose sever challenges on the network architecture in terms of heterogeneity,scalability,mobility and security.Due to the identification and location overloading problem of IP,TCP/IP based network architecture appears inefficient in addressing the challenges mentioned above.Named Data Networking (NDN) makes named content as the primary sematic and has consistency in logical topologies between network layer and application la-yer.The advantages of NDN in addressing these four challenges are reflected in the fact that naming shields the underlying hete-rogeneity,end-to-end decoupling and network layer caching provide native support for many-to-many communication and multicast,consumer mobility is supported natively by consumer driven communication pattern and content-based security is more lightweight.In this paper,future research directions of NDN based IoT were summarized.Especially,the combination of NDN and technologies including edge computing,blockchain and Software Defined Networking (SDN) to construct edge storage and computing model,centralized and distributed control model,distributed security model were proposed.

Key words: 5G, Blockchain, Edge computing, Internet of things, Named data networking, Software defined networking

中图分类号: 

  • TP393
[1]AL-FUQAHA A,GUIZANI M,MOHAMMADI M,et al.Internet of Things:a survey on enabling technologies,protocols,and applications.IEEE Communications Surveys & Tutorials,2015,17(4):2347-2376.
[2]ZHU H B,YANG L X,YU Q.Investigation of technicalthought and application strategy for the internet of things.Journal on Communications,2010,31(11):2-9.
[3]TURNER V,GANTZ J F,REINSEL D,et al.The digital universe of opportunities:Rich data and the increasing value of the internet of things.Journal of Telecommunications and the Digital Economy,2014,2(3):47.1-47.9.
[4]XU L W,LIN W.Research on Outage Probability Performance of Mobile Multi-user Communication System[J].Journal ofLiao-cheng University (Natural Science Edition),2020,33(2):43-48.
[5]ZHANG L,AFANASYEV A,BURKE J,et al.Named data networking.ACM SIGCOMM Computer Communication Review,2014,44(3):66-73.
[6]JACOBSON V,SMETTERS D K,THORNTON J D,et al.Networking named content.Proc Acm Conext,2009,55(1):1-12.
[7]SHI W S,ZHANG X Z,WANG Y F,et al.Edge computing:State-of-the-Art and Future Directions.Journal of Computer Research and Development,2019,56(1):69-89.
[8]MCKEOWN N.Software-defined networking.INFOCOMKeynote Talk,2009,17(2):30-32.
[9]PANARELLO A,TAPAS N,MERLINO G,et al.Blockchain and iot integration:A systematic survey.Sensors,2018,18(8):2575.
[10]AKPAKWU G A,SILVA B J,HANCKE G P,et al.A surveyon 5G networks for the Internet of Things:Communication technologies and challenges.IEEE Access,2017,6:3619-3647.
[11]PALATTELLA M R,DOHLER M,GRIECO A,et al.Internet of things in the 5G era:Enablers,architecture,and business models.IEEE Journal on Selected Areas in Communications,2016,34(3):510-527.
[12]LI S,DA XU L,ZHAO S.5G Internet of Things:A survey.Journal of Industrial Information Integration,2018,10:1-9.
[13]SHANG W,ZHANG L,BANNIS A,et al.Named Data Networking of Things (Invited Paper)//IEEE First International Conference on Internet-Of-Things Design and Implementation.2016:117-128.
[14]AMADEO M,CAMPOLO C,QUEVEDO J,et al.Information-centric networking for the internet of things:challenges and opportunities.IEEE Network,2016,30(2):92-100.
[15]LINDGREN A,ABDESSLEM F B,AHLGREN B,et al.Design choices for the IoT in Information-Centric Networks//2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).2016.
[16]AKPAKWU G,SILVA B,HANCKE G P,et al.A survey on 5G networks for the Internet of Things:communication technologies and challenges.IEEE Access,2018,6(99):3619-3647.
[17]3GPP.Release freeze and end dates.[2019-06-09].https://www.3gpp.org/specifications/releases.
[18]RATASUK R,MANGALVEDHE N,ZHANG Y,et al.Overview of narrowband IoT in LTE Rel-13//IEEE Conference on Standards for Communicatons and Networking.IEEE,2016:1-7.
[19]3GPP TS 36.300.Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN);Overall description.https://www.etsi.org/deliver/etsi_ts/136300_136399/136300/13.02.00_60/ts_136300v130200p.pdf.
[20]RAZA U,KULKARNI P,SOORIYABANDARA M.Low power wide area networks:An overview.IEEE Communications Surveys & Tutorials,2017,19(2):855-873.
[21]ZHANG L,ESTRIN D,BURKE J,et al.Named data networking (ndn) project.Xerox Palo Alto Research Center-PARC,2010.
[22]KUSHALNAGAR N,MONTENEGRO G,SCHUMACHER C.IPv6 over low-power wireless personal area networks (6LoWPANs):overview,assumptions,problem statement,and goals.IETF,2007.
[23]SHELBY Z,HARTKE K,BORMANN C.The constrained application protocol (CoAP).IETF,2014.
[24]TARIQUE M,TEPE K E,ADIBI S,et al.Survey of multipath routing protocols for mobile ad hoc networks.Journal of network and computer applications,2009,32(6):1125-1143.
[25]HAN H,SHAKKOTTAI S,HOLLOT C V,et al.Multi-path TCP:a joint congestion control and routing scheme to exploit path diversity in the Internet.IEEE/ACM Transactions on Networking,2006,14(6):1260-1271.
[26]SHANG W,YU Y,DROMS R,et al.Challenges in IoT networking via TCP/IP architecture:Technical Report NDN-0038[R].2016.
[27]ESTRIN D,FARINACCI D,HELMY A,et al.Protocol independent multicast-sparse mode (PIM-SM):Protocol specification.1998.
[28]HUI J,KELSEY R.Multicast protocol for low-power and lossy networks (MPL).2016.
[29]DIERKS T,RESCORLA E.The transport layer security (TLS) protocol version 1.2.IETF,2008.
[30]RESCORLA E,MODADUGU N.Datagram transport layer security version 1.2.IETF,2012.
[31]SELANDER G,MATTSSON J,PALOMBINI F,et al.Objectsecurity of coap (oscoap):Internet-Draft draft-ieff-core-object-security-04.Internet Engineering Task Force,2017.
[32]BACCELLI E,MEHLIS C,HAHM O,et al.Information centric networking in the IoT:Experiments with NDN in the wild//Proceedings of the 1st ACM Conference on Information-Centric Networking.2014:77-86.
[33]AMADEO M,CAMPOLO C,IERA A,et al.Information Centric Networking in IoT scenarios:The case of a smart home//IEEE International Conference on Communications.2015:648-653.
[34]GÜNDOCˇAN C,KIETZMANN P,LENDERS M,et al.NDN,CoAP,and MQTT:A Comparative Measurement Study in the IoT//5th ACM Conference on Information-Centric Networking(ICN’18).2018.
[35]ZHANG T K,SHAN S Y,XU X G,et al.Survey on Caching Techniques of Information Centric Networking.Journal of Beijing University of Posts and Telecommunications,2016,39(3):1-15.
[36]PSARAS I,ASCIGIL O,RENE S,et al.Mobile data repositories at the edge//{USENIX} Workshop on Hot Topics in Edge Computing (HotEdge 18).2018.
[37]PFENDER J,VALERA A,SEAH W K.Performance comparison of caching strategies for information-centric IoT//Proceedings of the 5th ACM Conference on Information-Centric Networking.2018:43-53.
[38]HAHM O,BACCELLI E,SCHMIDT T C,et al.Low-power internet of things with NDN & cooperative caching//Procee-dings of the 4th ACM Conference on Information-Centric Networking.2017:98-108.
[39]LEE J,KIM D.Proxy-assisted content sharing using contentcentric networking (CCN) for resource-limited mobile consumer devices.IEEE Transactions on Consumer Electronics,2011,57(2):477-483.
[40]VASILAKOS X,SIRIS V A,POLYZOS G C,et al.Proactive selective neighbor caching for enhancing mobility support in information-centric networks//Edition of the Icn Workshop on Information-Centric Networking.2012:61-66.
[41]JACOBSON V,BRAYNARD R L,DIEBERT T,et al.Custodian-based information sharing.Communications Magazine IEEE,2012,50(7):38-43.
[42]PIAO X,Z Y,LEI K.Survey of mobility management technologies based on Named Data Networking.Application Research of Computers,2017,34(4):961-964.
[43]GHASEMI C,YOUSEFI H,SHIN K G,et al.On the Granularity of Trie-Based Data Structures for Name Lookups and Updates.IEEE/ACM Transactions on Networking,2019,27(2):777-789.
[44]ASCIGIL O,REÑÉ S,XYLOMENOS G,et al.A keyword-based ICN-IoT platform//ACM Conference on Information-Centric Networking.2017:22-28.
[45]PAPALINI M.Tagnet:A scalable tag-based information-centric network.Università della Svizzera italiana,2015.
[46]SHANG W,YU Y,WANG L,et al.A survey of distributeddataset synchronization in Named Data Networking:Technical Report NDN-0053[R].2017.
[47]SHANG W,WANG Z,AFANASYEV A,et al.Breaking Out of the Cloud:Local Trust Management and Rendezvous in Named Data Networking of Things//International Conference on Internet-Of-Things Design and Implementation.2017:3-13.
[48]TIAN H,FAN S S,LV X C,et al.Mobile Edge Computing for 5G Requirements.Journal of Beijing University of Posts and Telecommunications,2017,40(2):1-10.
[49]MTIBAA A,TOURANI R,MISRA S,et al.Towards EdgeComputing over Named Data Networking.2018 IEEE International Conference on Edge Computing (EDGE).2018:117-120.
[50]KRÒL M,PSARAS I.NFaaS:named function as a service.Proceedings of the 4th ACM Conference on Information-Centric Networking,2017:134-144.
[51]KRÒL M,HABAK K,ORAN D,et al.Rice:Remote method invocation in icn//Proceedings of the 5th ACM Conference on Information-Centric Networking.2018:1-11.
[52]AHMED S H,BOUK S H,KIM D,et al.Named data networking for software defined vehicular networks.IEEE Communications Magazine,2017,55(8):60-66.
[53]SALSANO S,BLEFARI-MELAZZI N,DETTI A,et al.Information centric networking over SDN and OpenFlow:Architectural aspects and experiments on the OFELIA testbed.Computer Networks,2013,57(16):3207-3221.
[54]JIN T,ZHANG X,LIU Y,et al.BlockNDN:A bitcoin blockchain decentralized system over named data networking//2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).2017:75-80.
[55]LOU J,ZHANG Q,QI Z,et al.A blockchain-based key management scheme for named data networking//2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).2018:141-146.
[1] 孙慧婷, 范艳芳, 马孟晓, 陈若愚, 蔡英.
VEC中基于动态定价的车辆协同计算卸载方案
Dynamic Pricing-based Vehicle Collaborative Computation Offloading Scheme in VEC
计算机科学, 2022, 49(9): 242-248. https://doi.org/10.11896/jsjkx.210700166
[2] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[3] 于滨, 李学华, 潘春雨, 李娜.
基于深度强化学习的边云协同资源分配算法
Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning
计算机科学, 2022, 49(7): 248-253. https://doi.org/10.11896/jsjkx.210400219
[4] 张翀宇, 陈彦明, 李炜.
边缘计算中面向数据流的实时任务调度算法
Task Offloading Online Algorithm for Data Stream Edge Computing
计算机科学, 2022, 49(7): 263-270. https://doi.org/10.11896/jsjkx.210300195
[5] 李梦菲, 毛莺池, 屠子健, 王瑄, 徐淑芳.
基于深度确定性策略梯度的服务器可靠性任务卸载策略
Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient
计算机科学, 2022, 49(7): 271-279. https://doi.org/10.11896/jsjkx.210600040
[6] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[7] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[8] 袁昊男, 王瑞锦, 郑博文, 吴邦彦.
基于Fabric的电子病历跨链可信共享系统设计与实现
Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric
计算机科学, 2022, 49(6A): 490-495. https://doi.org/10.11896/jsjkx.210500063
[9] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[10] 张翕然, 刘万平, 龙华.
物联网僵尸网络病毒的传播动力学模型与分析
Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things
计算机科学, 2022, 49(6A): 738-743. https://doi.org/10.11896/jsjkx.210300212
[11] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[12] 方韬, 杨旸, 陈佳馨.
D2D辅助移动边缘计算下的卸载策略优化
Optimization of Offloading Decisions in D2D-assisted MEC Networks
计算机科学, 2022, 49(6A): 601-605. https://doi.org/10.11896/jsjkx.210200114
[13] 刘漳辉, 郑鸿强, 张建山, 陈哲毅.
多无人机使能移动边缘计算系统中的计算卸载与部署优化
Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems
计算机科学, 2022, 49(6A): 619-627. https://doi.org/10.11896/jsjkx.210600165
[14] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[15] 谢万城, 李斌, 代玥玥.
空中智能反射面辅助边缘计算中基于PPO的任务卸载方案
PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing
计算机科学, 2022, 49(6): 3-11. https://doi.org/10.11896/jsjkx.220100249
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!