Advertisement

An Overview of CCMANET: Content Centric MANET

  • Yuehua Huo
  • Weiqiang Fan
  • Yinlong Liu
  • Dong Li
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 237)

Abstract

Due to CCN has the advantages of content-centric, unstructured, chunk-level and multipath, the Content Centric Mobile Ad-hoc Network (CCMANET) applies the advantages of Content Centric Network (CCN) to Mobile Ad-hoc Network (MANET). The method solves the problems of low efficiency and unstable in transmission, which caused by nodes movement, dynamical changes of topology, limited node capacity, instability of wireless channel. This paper provides an overview of the existing technologies in CCMANET. Firstly, the paper introduces the basic principle and the new features of CCMANET. Secondly, the key techniques, such as caching, routing, mobility management and security are visited. From this, some important remaining challenges are raised.

Keywords

CCMANET Content centric network MANET Routing Mobility management Security 

Notes

Acknowledgements

This work was supported by the Foundation for National Key R&D Program of China plan under Grant 2016YFC0801800.

References

  1. 1.
    Conti, M., Giordano, S.: Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Commun. Mag. 52(1), 85–96 (2014)CrossRefGoogle Scholar
  2. 2.
    Chandravanshi, K., Mishra, D.K.: Minimization of routing overhead on the bases of multipath and destination distance estimation mechanism under MANET. IEEE Commun. Mag. 46(11), 55–61 (2017)Google Scholar
  3. 3.
    Tran, T.X., Hajisami, A., Pandey, P., et al.: Collaborative mobile edge computing in 5G networks: new paradigms, scenarios, and challenges. IEEE Commun. Mag. 55(4), 54–61 (2017)CrossRefGoogle Scholar
  4. 4.
    Chen, K., Shen, H., Zhang, H.: Leveraging social networks for P2P content-based file sharing in disconnected MANETs. IEEE Trans. Mob. Comput. 13(2), 235–249 (2014)CrossRefGoogle Scholar
  5. 5.
    Singal, G., Laxmi, V., Gaur, M.S., et al.: Moralism: mobility prediction with link stability based multicast routing protocol in MANETs. Wirel. Netw. 23(3), 663–679 (2017)CrossRefGoogle Scholar
  6. 6.
    Vijayalakshmi, M., Sreenivasarao, D.: Dynamic quality of service stability based multicast routing protocol for MANETs (DQSMRP). In: International Conference on Computer Science, Information Technology and Applications, pp. 159–173 (2017)Google Scholar
  7. 7.
    Li, B., Ma, M., Yang, X.: Perceptive forwarding in content-centric networks. IEEE Access 99, 1 (2017)Google Scholar
  8. 8.
    Yao, S., Zhang, X., Lao, F.: MobileCCN: wireless ad-hoc content-centric networks over smartphone. In: Proceeding of ACM International Conference on Future Internet Technologies, 5–7 June, pp. 1–2 (2013)Google Scholar
  9. 9.
    Bosunia, M.R., Kwon, S., Jeong, S.H.: A CCN-based multi-source and multi-path transport mechanism for wireless mobile networks. In: IEEE International Conference on Information Networking, pp. 30–34 (2017)Google Scholar
  10. 10.
    Jia, S., Xu, C., Vasilakos, A.V.: Reliability-oriented ant colony optimization-based mobile peer-to-peer VoD solution in MANETs. Wirel. Netw. 20(5), 1185–1202 (2014)CrossRefGoogle Scholar
  11. 11.
    Guo, H., Wang, X., Cheng, H., et al.: A routing defense mechanism using evolutionary game theory for Delay Tolerant Networks. Appl. Soft Comput. 38, 469–476 (2016)CrossRefGoogle Scholar
  12. 12.
    Zettervall, S.L., Lu, J., Kuang, X., et al.: IP075. Elective open abdominal aortic aneurysm repair following prior EVAR with unsatisfactory results is not associated with increased mortality or major morbidity. J. Vasc. Surg. 65(6), 76S (2017)CrossRefGoogle Scholar
  13. 13.
    Liu, S., Ölveczky, P.C., Meseguer, J.: A framework for mobile ad hoc networks in real-time maude. In: Escobar, S. (ed.) WRLA 2014. LNCS, vol. 8663, pp. 162–177. Springer, Cham (2014).  https://doi.org/10.1007/978-3-319-12904-4_9Google Scholar
  14. 14.
    Yuan, M., Yang, Z., Huang, G., et al.: Feature selection by maximizing correlation information for integrated high-dimensional protein data. Pattern Recogn. Lett. 92, 17–24 (2017)CrossRefGoogle Scholar
  15. 15.
    Chen, H.L., Lou, L.: Contact expectation based routing for delay tolerant networks. Ad Hoc Netw. 36, 244–257 (2016)CrossRefGoogle Scholar
  16. 16.
    Li, S., Hu, D., Fang, W., et al.: Protocol oblivious forwarding (POF): software-defined networking with enhanced programmability. IEEE Netw. 31(2), 58–66 (2017)CrossRefGoogle Scholar
  17. 17.
    Hines, P.D.H., Dobson, I., Rezaei, P.: Cascading power outages propagate locally in an influence graph that is not the actual grid topology. IEEE Trans. Power Syst. 32(2), 958–967 (2017)Google Scholar
  18. 18.
    Ren, F., Qin, Y., Zhou, H., et al.: Mobility management scheme based on software defined controller for content-centric networking. In: IEEE Computer Communications Workshops, pp. 193–198 (2016)Google Scholar
  19. 19.
    Chen, Y., Qu, Z., Rastogi, V.: System and Method for Proxy-Based Data Access Mechanism in Enterprise Mobility Management. US20170076103 (2017)Google Scholar
  20. 20.
    Guo, J., Chen, I.R., Tsai, J.J.P.: A hierarchical cloud architecture for integrated mobility, service, and trust management of service-oriented IoT systems. In: IEEE Sixth International Conference on Innovative Computing Technology, pp. 72–77 (2017)Google Scholar
  21. 21.
    Ramadza, I., Ozegovic, J., Pekic, V.: Class based tunnel exclusion router architecture. In: IEEE International Conference on Software, Telecommunications and Computer Networks, pp. 274–278 (2015)Google Scholar
  22. 22.
    Hassouna, M., Barry, B., Bashier, E.: A new level 3 trust hierarchal certificateless public key cryptography scheme in the random oracle model. Int. J. Netw. Secur. 19, 551–558 (2017)Google Scholar
  23. 23.
    Wang, G.Q., Tong, W.: System and method for a context layer switch. US, US9319311 (2016)Google Scholar
  24. 24.
    Younes, E.B.E.I., Fatna, E.M., Nisrine, M.: A security approach for social networks based on honeypots. In: IEEE International Colloquium on Information Science and Technology, pp. 638–643 (2017)Google Scholar
  25. 25.
    Tan, Y., Zhu, S.: Efficient name lookup scheme based on hash and character trie in named data networking. In: IEEE Web Information System and Application Conference, pp. 130–135 (2015)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  • Yuehua Huo
    • 1
  • Weiqiang Fan
    • 2
  • Yinlong Liu
    • 3
  • Dong Li
    • 1
  1. 1.Center of Modern Education TechnologyChina University of Mining and Technology, BeijingBeijingChina
  2. 2.School of Mechanical Electronic and Information EngineeringChina University of Mining and Technology, BeijingBeijingChina
  3. 3.Institute of Information EngineeringChinese Academy of SciencesBeijingChina

Personalised recommendations