4.5 Article

LoICen: A novel location-based and information-centric architecture for content distribution in vehicular networks

期刊

AD HOC NETWORKS
卷 93, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.adhoc.2019.101899

关键词

Content delivery; Interest transmission; NDN; ICN; VANETs

资金

  1. NSERC Strategic OpContent Project
  2. NSERC CREATE TRANSIT Program
  3. NSERC Strategic DIVA Network Research Program
  4. Canada Research Chairs Program

向作者/读者索取更多资源

The information-centric networking (ICN) paradigm has gained increasing attention as a solution for boosting content delivery in vehicular network applications. The content-naming oriented search and in-network data caching procedures of ICN can improve content delivery by avoiding the need to determine and maintain end-to-end routing paths in vehicular networks, which is challenging due to the mobility of vehicles, and intermittent and short-lived connections between them. However, the use of the ICN paradigm in vehicular networks aggravates the broadcast storm problem, and constantly suffers from breaks in the reverse path used for content discovery and delivery. In this paper, we propose the location-based and information-centric (LoICen) architecture to improve the content request procedure and reduce the broadcast storm problem in intelligent vehicular networks. In the LoICen architecture, vehicles opportunistically obtain the location information of the vehicles that might have desired content in their cache. This location information is used whenever possible to improve content search and discovery by directing Interest packets to the area where the content may be located, mitigating the broadcast storm problem by selecting only the most suitable neighboring vehicle at each hop to continue forwarding the Interest packet, and improving content delivery by selecting more stable paths. Simulation results show that the LoICen architecture outperformed related work in terms of content delivery ratio, while reducing the delay for the content delivery and the number of transmissions of Interest packets for content search. (C) 2019 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Theory & Methods

Underwater Wireless Sensor Networks: A New Challenge for Topology Control-Based Systems

Rodolfo W. L. Coutinho, Azzedine Boukerche, Luiz F. M. Vieira, Antonio A. F. Loureiro

ACM COMPUTING SURVEYS (2018)

Article Engineering, Electrical & Electronic

Design Guidelines for Information-Centric Connected and Autonomous Vehicles

Rodolfo W. L. Coutinho, Azzedine Boukerche, Antonio A. F. Loureiro

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Engineering, Electrical & Electronic

Crowd Management: The Overlooked Component of Smart Transportation Systems

Azzedine Boukerche, Rodolfo W. L. Coutinho

IEEE COMMUNICATIONS MAGAZINE (2019)

Article Computer Science, Hardware & Architecture

Information-Centric Cognitive Radio Networks for Content Distribution in Smart Cities

Azzedine Boukerche, Rodolfo W. L. Coutinho, Antonio A. F. Loureiro

IEEE NETWORK (2019)

Article Computer Science, Hardware & Architecture

GUIDELINES FOR THE DESIGN OF VEHICULAR CLOUD INFRASTRUCTURES FOR CONNECTED AUTONOMOUS VEHICLES

Rodolfo W. L. Coutinho, Azzedine Boukerche

IEEE WIRELESS COMMUNICATIONS (2019)

Article Computer Science, Information Systems

A novel opportunistic power controlled routing protocol for internet of underwater things

Rodolfo W. L. Coutinho, Azzedine Boukerche, Antonio A. F. Loureiro

COMPUTER COMMUNICATIONS (2020)

Article Automation & Control Systems

Modeling and Analysis of a Shared Edge Caching System for Connected Cars and Industrial IoT-Based Applications

Rodolfo W. L. Coutinho, Azzedine Boukerche

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

Transfer Learning for Disruptive 5G-Enabled Industrial Internet of Things

Rodolfo W. L. Coutinho, Azzedine Boukerche

Summary: Internet of things (IoT) and 5G network are essential for industrial IoT (IIoT), which can improve the efficiency and safety of industrial activities. However, machine learning (ML) requires a large amount of high-quality data samples for training, which is difficult to obtain in IIoT applications. This article discusses the design of transfer learning (TL)-based systems to address the data scarcity issue in IIoT and explores the applications and challenges of TL in IIoT machinery and networking levels.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Automation & Control Systems

UAV-Mounted Cloudlet Systems for Emergency Response in Industrial Areas

Rodolfo W. L. Coutinho, Azzedine Boukerche

Summary: Advancements in IoT, 5G networks, and AI are empowering Industry 4.0. This article focuses on the design of UAV-assisted systems for emergency response in multiplant and industrial zones, highlighting the important contributions of UAV-mounted cloudlet systems and discussing current challenges and future research directions.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Proceedings Paper Engineering, Electrical & Electronic

Performance Evaluation of Candidate Set Selection Procedures for Underwater Sensor Networks

Rodolfo W. L. Coutinho, Azzedine Boukerche, Sergio Guercin

ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) (2019)

Article Computer Science, Hardware & Architecture

A Joint Anypath Routing and Duty-Cycling Model for Sustainable Underwater Sensor Networks

Rodolfo W. L. Coutinho, Azzedine Boukerche, Luiz F. M. Vieira, Antonio A. F. Loureiro

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Exploiting Mobility to Improve Underwater Sensor Networks

Rodolfo W. L. Coutinho, Azzedine Boukerche

PROCEEDINGS OF THE 16TH ACM INTERNATIONAL SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS (MOBIWAC'18) (2018)

Proceedings Paper Computer Science, Hardware & Architecture

Modeling Power Control and Anypath Routing in Underwater Wireless Sensor Networks

Rodolfo W. L. Coutinho, Azzedine Boukerche, Antonio A. F. Loureiro

2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC) (2018)

Proceedings Paper Computer Science, Theory & Methods

Data Collection in Underwater Wireless Sensor Networks: Research Challenges and Potential Approaches

Rodolfo W. L. Coutinho, Azzedine Boukerche

PROCEEDINGS OF THE 20TH ACM INTERNATIONAL CONFERENCE ON MODELLING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS (MSWIM'17) (2017)

Article Computer Science, Information Systems

Explainable deep learning for attack intelligence and combating cyber-physical attacks

Muna Al-Hawawreh, Nour Moustafa

Summary: Cyber-physical control loops are crucial in the industrial Internet of Things, but vulnerable to attacks. This study proposes an AI-based attack intelligence framework for identifying and extracting attack intelligence, and demonstrates its effectiveness using a real-world case.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Improved junction-based routing for VANETs using a Bio-inspired route stability approach

Youcef Azzoug, Abdelmadjid Boukra

Summary: This paper presents a novel JBR routing protocol based on swarm-inspired optimization to reduce data packet loss and introduces a concept of route stability to predict the stability degree of road segments.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Age of information optimization in cyber-physical systems with stateful packet management techniques

Paulo Cesar Prandel, Priscila Solis Barreto

Summary: This study proposes two stateful techniques, LGFS-C and LGFS-C-peak, which optimize AoI metrics by making conditional preemption decisions on packets based on system state variables. Experimental results show that both techniques achieve better optimization results than the state-of-the-art techniques and may improve CPS performance.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

A CrowdSensing-based approach for proximity detection in indoor museums with Bluetooth tags

Michele Girolami, Davide La Rosa, Paolo Barsocchi

Summary: In this work, a CrowdSensing-based proximity detection technique for visitors in an indoor museum is proposed and investigated. The technique utilizes data collected from users' smartphones, which can collect and upload Received Signal Strength (RSS) values of nearby Bluetooth tags to a backend server along with context-information. Experimental results show a clear improvement in performance when data from the crowd are exploited with the proposed architecture.

AD HOC NETWORKS (2024)

Review Computer Science, Information Systems

A review of on-device machine learning for IoT: An energy perspective

Nazli Tekin, Ahmet Aris, Abbas Acar, Selcuk Uluagac, Vehbi Cagri Gungor

Summary: This paper provides a review of existing studies on energy consumption of on-device machine learning models for IoT applications. It introduces a taxonomy to define approaches for energy-aware on-device ML models and discusses open issues for further research in this field.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

GAN-powered heterogeneous multi-agent reinforcement learning for UAV-assisted task

Yangyang Li, Lei Feng, Yang Yang, Wenjing Li

Summary: This study investigates a task offloading scheme and trajectory optimization in a multi-UAV-assisted system and proposes a heterogeneous multi-agent reinforcement learning-based approach. By training with generated environment states offline, the algorithm's performance is optimized, resulting in superior energy consumption and task latency.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

A game-theoretic approach of cyberattack resilient constraint-following control for cyber-physical systems

Xinrong Zhang, Ye-Hwa Chen, Dongsheng Zhang, Ruiying Zhao, Lei Guo

Summary: This paper proposes a game-theoretic method based on constraint following theory to enhance the control resilience of cyber-physical systems. It addresses the uncertainties, mechanical constraints, and cyberattacks that these systems may encounter. Experimental results demonstrate the resilience of the controlled system against cyberattack disturbances and other threat attacks, and simulations verify the superiority of the optimal control design parameter.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Multi-agent reinforcement learning for network routing in integrated access backhaul networks

Shahaf Yamin, Haim H. Permuter

Summary: This study examines the problem of downlink wireless routing in integrated access backhaul (IAB) networks and proposes a multi-agent reinforcement learning algorithm for joint routing optimization. Experimental results demonstrate the effectiveness of the algorithm in achieving near-centralized performance.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

UAV-assisted finite block-length backscatter: Performance analysis and optimization

Phuong T. Tran, Le Thi Thanh Huyen, Ba Cao Nguyen, Huu Minh Nguyen, Tran Manh Hoang

Summary: This paper introduces and investigates a system utilizing an unmanned aerial vehicle (UAV) to assist terrestrial backscattering devices (BDs) in wireless energy charging and data transmission. The study considers energy efficiency (EE) and age-of-information (AoI) in performance assessment, and solves an optimization problem to maximize EE and minimize transmit power. Analytical and simulation results show that optimizing packet length and UAV altitude can achieve the best performance.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Distributed Physical-layer Network Coding MAC protocol

Mohammed Aissaoui, Chiraz Houaidia, Adrien Van Den Bossche, Thierry Val, Leila Azouz Saidane

Summary: This paper proposes a distributed MAC protocol that supports PNC in static multi-hop wireless networks. The protocol's advantages over conventional CSMA/CA and PNCOPP MAC protocols are demonstrated through practical testing and numerical results.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Intrusion detection system for cyberattacks in the Internet of Vehicles environment

Mohamed Selim Korium, Mohamed Saber, Alexander Beattie, Arun Narayanan, Subham Sahoo, Pedro H. J. Nardelli

Summary: This paper presents a novel framework for intrusion detection in the Internet of Vehicles environment, specifically designed to detect cyberattacks on vehicles. The proposed system uses machine learning to detect abnormal behavior by analyzing network traffic. Experimental results demonstrate the effectiveness of the system in terms of accuracy and speed.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Fairness-aware task offloading and load balancing with delay constraints for Power Internet of Things

Xue Li, Xiaojuan Chen, Guohua Li

Summary: This study proposes a two-tier cooperative edge network model for Power Internet of Things (PIoT) and introduces a fairness indicator based on the Theil index. By formulating a fairness and delay guaranteed task offloading and load balancing optimization problem, the research demonstrates that cooperation at the edge can significantly improve the performance of PIoT.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

A novel hierarchical distributed vehicular edge computing framework for supporting intelligent driving

Kun Yang, Peng Sun, Dingkang Yang, Jieyu Lin, Azzedine Boukerche, Liang Song

Summary: The focus of this research is to effectively coordinate the limited computing power of various components in intelligent transportation systems (ITS) and provide reliable support for resource-intensive applications through efficient resource allocation methods in the highly dynamic Internet-of-Vehicles environment. A novel joint computing and communication resource scheduling method is proposed, which includes a hierarchical three-layer Vehicular Edge Computing (VEC) framework and onboard joint computation offloading and transmission scheduling policy. Extensive simulation tests and ablation experiments demonstrate the effectiveness and stability of the proposed method in achieving stable performance and reducing scheduling overhead, improving resource utilization, and minimizing data transmission delay caused by vehicle motion.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Self-reconfigurable partial mesh using ZigBee control board towards fail-proof and reliable home area networking

Rakesh Das, Jitendra Nath Bera

Summary: This paper focuses on the development of a highly reliable customized home area networking (HAN) to provide a robust communication network for smart home owners. The proposed HAN utilizes a multi-gateway-based partial mesh networking topology with ZigBee control boards to enable remote monitoring and control of individual appliances within the home. The introduction of active and pseudo gateway concept enhances the reliability of the HAN by automatically reconfiguring in case of failure. Experimental verification demonstrates the fail-proof and reliable nature of the proposed HAN with alternate routes and activation of pseudo gateway as active gateway.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Realization of maximum flow in DTN and application in CGR

Changhao Li, Huanjing Li, Tao Wu, Lei Yan, Suzhi Cao

Summary: The maximum flow problem based on a contact graph in Delay-Tolerant Networking (DTN) is important for routing and data planning. Existing algorithms cannot be directly applied to topological networks with time series changes. This paper proposes a method of dismantling and reconstructing the graph to solve the maximum flow problem in a continuously changing network. The method discretizes time on different nodes to reduce the scale of the graph, optimizing data transmission, improving data delivery rate, and reducing link occupation.

AD HOC NETWORKS (2024)