Centrality-Based On-Path Caching Strategies in NDN-Based Internet of Things: A Survey
The substantial growth in data volume has led to considerable technological obstacles on
the Internet. In order to address the high volume of Internet traffic, the research community …
the Internet. In order to address the high volume of Internet traffic, the research community …
A systematic survey on content caching in ICN and ICN-IoT: Challenges, approaches and strategies
Context: Data traffic increased in recent years due to the expansion of IoT (Internet of
Things) applications, and most IoT applications follow a content-oriented paradigm. The host …
Things) applications, and most IoT applications follow a content-oriented paradigm. The host …
A machine-learning-based approach for autonomous IoT security
Machine learning techniques are proven valuable for the Internet of things (IoT) due to
intelligent and cost-effective computing processes. In recent decades, wireless sensor …
intelligent and cost-effective computing processes. In recent decades, wireless sensor …
A classification of the enabling techniques for low latency and reliable communications in 5G and beyond: AI-enabled edge caching
Various advanced and mission-critical applications are enabled by the emerging
technologies in fifth-generation (5G) mobile communication systems. To ensure improved …
technologies in fifth-generation (5G) mobile communication systems. To ensure improved …
Edge Caching in Fog‐Based Sensor Networks through Deep Learning‐Associated Quantum Computing Framework
Fog computing (FC) based sensor networks have emerged as a propitious archetype for
next‐generation wireless communication technology with caching, communication, and …
next‐generation wireless communication technology with caching, communication, and …
Caching Strategies for the Metaverse: Taxonomy, Open Challenges, and Future Research Directions.
The metaverse, which is considered to be the next evolutionary stage of the Internet, has
captured the attention of both academia and industry. Its primary goal is to establish a …
captured the attention of both academia and industry. Its primary goal is to establish a …
Memcached: an experimental study of DDoS attacks for the wellbeing of IoT applications
Distributed denial-of-service (DDoS) attacks are significant threats to the cyber world
because of their potential to quickly bring down victims. Memcached vulnerabilities have …
because of their potential to quickly bring down victims. Memcached vulnerabilities have …
EABC: Energy-aware Centrality-based Caching for Named Data Networking in the IoT
X He, H Liu, W Li, A Valera… - 2024 IEEE 25th …, 2024 - ieeexplore.ieee.org
Named Data Networking (NDN) is an information-centric internet architecture that delivers
packets based on the name of the content in the packet. A key component of NDN is the …
packets based on the name of the content in the packet. A key component of NDN is the …
QoS improvement using in-network caching based on clustering and popularity heuristics in CCN
Content-Centric Networking (CCN) has emerged as a potential Internet architecture that
supports name-based content retrieval mechanism in contrast to the current host location …
supports name-based content retrieval mechanism in contrast to the current host location …
Dynamic Partitioning and Popularity based Caching for Optimized Performance in content-centric fog networks: DPPCOP
With the massive growth of information generation, processing, and distribution in the
Internet of Things (IoT), the existing cloud architectures need to be designed more effectively …
Internet of Things (IoT), the existing cloud architectures need to be designed more effectively …