, Cisco Visual Networking Index: Forecast and Methodology, pp.2016-2021
5g cellular: key enabling technologies and research challenges, IEEE Instrumentation & Measurement Magazine, vol.18, issue.3, pp.11-21, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01121142
Network densification: the dominant theme for wireless evolution into 5g, IEEE Communications Magazine, vol.52, issue.2, pp.82-89, 2014. ,
Design considerations for a 5g network architecture, IEEE Communications Magazine, vol.52, issue.11, pp.65-75, 2014. ,
Networking named content, Proceedings of the 5th international conference on Emerging networking experiments and technologies, pp.1-12, 2009. ,
A review of mobility support paradigms for the internet, IEEE Communications Surveys Tutorials, vol.8, issue.1, pp.38-51, 2006. ,
, 3gpp release 8. GSM/EDGE: Evolution and Performance, pp.63-99, 2011.
A control-plane perspective on reducing data access latency in lte networks, Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, pp.56-69, 2017. ,
A high performance packet core for next generation cellular networks, Proceedings of the Conference of the ACM Special Interest Group on Data Communication, pp.348-361, 2017. ,
Design, implementation and evaluation of congestion control for multipath tcp, NSDI, vol.11, pp.8-8, 2011. ,
A survey of mobility in information-centric networks: Challenges and research directions, Proc. NoM, pp.1-6, 2012. ,
A survey of mobility support in named data networking, Proc. of IEEE INFOCOM NOM, 2016. ,
Kite: A mobility support scheme for ndn, Proc. of ACM ICN Poster, 2014. ,
A study of prefix hijacking and interception in the internet, ACM SIGCOMM Computer Communication Review, vol.37, pp.265-276, 2007. ,
Black hole attack in mobile ad hoc networks, Proceedings of the 42nd annual Southeast regional conference, pp.96-97, 2004. ,
A lightweight mechanism for detection of cache pollution attacks in named data networking, Computer Networks, vol.57, issue.16, pp.3178-3191, 2013. ,
Needle in a haystack: Mitigating content poisoning in named-data networking, Proceedings of NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014. ,
Security and privacy analysis of nsf future internet architectures, 2016. ,
A survey of mobility support in named data networking, Computer Communications Workshops (INFOCOM WKSHPS), 2016 IEEE Conference on, pp.83-88, 2016. ,
A survey of information-centric networking research, IEEE Communications Surveys & Tutorials, vol.16, issue.2, pp.1024-1049, 2014. ,
Named data networking, ACM SIGCOMM Computer Communication Review, vol.44, issue.3, pp.66-73, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01182997
A data-oriented (and beyond) network architecture, ACM SIGCOMM Computer Communication Review, vol.37, pp.181-192, 2007. ,
Kostas Pentikousis, Ove Strandberg, René Rembarz, and Vinicio Vercellone. Design considerations for a network of information, Proc. CoNEXT, p.66, 2008. ,
Juno: An adaptive delivery-centric middleware, Proc. CCNC, pp.587-591, 2012. ,
Developing information networking further: From psirp to pursuit, Broadnets, pp.1-13, 2010. ,
Mobilityfirst future internet architecture project, Proc. AINTEC, pp.1-3, 2011. ,
A survey of mobility support in the internet, RFC, vol.6301, 2011. ,
Ivica Rimac, and Andreas Mauthe. A survey of mobility in information-centric networks, Communications of the ACM, vol.56, issue.12, pp.90-98, 2013. ,
Mobility support in named data networking: a survey, EURASIP Journal on Wireless Communications and Networking, vol.2016, issue.1, p.220, 2016. ,
Global source mobility in the contentcentric networking architecture, Proc. of ACM NoM Workshop, 2012. ,
What benefits does NDN have in supporting mobility, Proc. of IEEE ISCC, 2014. ,
SCOM: A Scalable Content Centric Network Architecture with Mobility Support, Proc. of IEEE MSN, 2013. ,
Mobility support in content centric networks, Proc. of ACM ICN, 2012. ,
SNAMP: Secure namespace mapping to scale NDN forwarding, Proc. Computer Communication Workshops, pp.281-286, 2015. ,
End-to-end mobility support in content centric networks, International Journal of Communication Systems, vol.28, issue.6, pp.1151-1167, 2015. ,
Device mobility management in content-centric networking, Communications Magazine, vol.50, issue.12, pp.28-34, 2012. ,
Mobiccn: Mobility support with greedy routing in content-centric networks, Proc. of IEEE GLOBECOM, 2013. ,
Publisher mobility support in content centric networks, Proc. of ICOIN, 2014. ,
Supporting seamless mobility in named data networking, Proc. of IEEE ICC, 2012. ,
Lbma: A novel locator based mobility support approach in named data networking, China Communications, vol.11, issue.4, pp.111-120, 2014. ,
Proposal on routing-based mobility architecture for ICN-based cellular networks, Proc. Computer Communication Workshops, pp.467-472, 2016. ,
Proactive selective neighbor caching for enhancing mobility support in information-centric networks, Proceedings of the second edition of the ICN workshop on Informationcentric networking, pp.61-66, 2012. ,
Caching and mobility support in a publish-subscribe internet architecture, IEEE Communications Magazine, vol.50, issue.7, 2012. ,
Optimal caching for producer mobility support in named data networks, Communications (ICC), 2016 IEEE International Conference on, pp.1-6, 2016. ,
Providing producer mobility support in ndn through proactive data replication, Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP, pp.383-391, 2016. ,
Map-me: Managing anchor-less producer mobility in informationcentric networks, 2016. ,
A scalable mobilitycentric architecture for named data networking, 2014. ,
Global source mobility in the content-centric networking architecture, Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design-Architecture, Algorithms, and Applications, pp.13-18, 2012. ,
Mobility support in content centric networks, Proceedings of the second edition of the ICN workshop on Information-centric networking, pp.13-18, 2012. ,
Scom: A scalable content centric network architecture with mobility support, Mobile Ad-hoc and Sensor Networks (MSN), pp.25-32, 2013. ,
Device mobility management in contentcentric networking, IEEE Communications Magazine, vol.50, issue.12, 2012. ,
Mobiccn: Mobility support with greedy routing in content-centric networks, Proc. of GLOBECOM, 2013. ,
Certificate revocation and certificate update, IEEE Journal on selected areas in communications, vol.18, issue.4, pp.561-570, 2000. ,
András Gergely Valkó, Chieh-Yih Wan, and Zoltán R Turányi. Design, implementation, and evaluation of cellular ip, IEEE personal communications, vol.7, issue.4, pp.42-49, 2000. ,
Telemip: telecommunicationsenhanced mobile ip architecture for fast intradomain mobility, IEEE Personal Communications, vol.7, issue.4, pp.50-58, 2000. ,
A survey of bgp security issues and solutions, Proceedings of the IEEE, vol.98, issue.1, pp.100-122, 2010. ,
Securing bgp -a literature survey, IEEE Communications Surveys & Tutorials, vol.13, issue.2, pp.199-222, 2011. ,
Secure border gateway protocol (s-bgp), IEEE Journal on Selected areas in Communications, vol.18, issue.4, pp.582-592, 2000. ,
Securing bgp through secure origin bgp (sobgp), vol.33, pp.47-53, 2003. ,
On interdomain routing security and pretty secure bgp (psbgp), ACM Transactions on Information and System Security (TISSEC), vol.10, issue.3, p.11, 2007. ,
Ospf with digital signatures. rfc 2154, 1997. ,
S-rip: A secure distance vector routing protocol, International Conference on Applied Cryptography and Network Security, pp.103-119, 2004. ,
A comparison of mechanisms for improving tcp performance over wireless links, IEEE/ACM transactions on networking, vol.5, issue.6, pp.756-769, 1997. ,
I-TCP: indirect TCP for mobile hosts, Proc. of IEEE ICDCS, 1995. ,
A network architecture for mobile computing, Proc. of IEEE INFOCOM, 1996. ,
Split TCP for mobile ad hoc networks, Proc. of IEEE GLOBECOM, 2002. ,
Improving TCP Performance over Wireless Networks at the Link Layer, Mob. Netw. Appl, vol.5, issue.1, 2000. ,
Loss Recovery Scheme for TCP Using MAC MIB over Wireless Access Networks, Communications Letters, vol.15, issue.10, 2011. ,
Improving TCP/IP Performance over Wireless Networks, Proc. of ACM MOBICOM, 1995. ,
Throughput performance of transport-layer protocols over wireless lans, Global Telecommunications Conference, 1993, including a Communications Theory Mini-Conference. Technical Program Conference Record, IEEE in Houston. GLOBECOM'93, pp.542-549, 1993. ,
Distinguishing congestion losses from wireless transmission losses: a negative result, Computer Communications and Networks, 1998. ,
Achieving moderate fairness for UDP flows by path-status classification, Proc. of IEEE LCN, 2000. ,
Bandwidth Estimation for Enhanced Transport over Wireless Links, Proc. of ACM MOBICOM, 2001. ,
End-to-end differentiation of congestion and wireless losses. Networking, IEEE/ACM Transactions on, vol.11, issue.5, 2003. ,
Manolis Sifalakis, and Christian F. Tschudin. Transport layer design for named data wireless networking, Prof. of IEEE INFOCOM NOM, 2014. ,
Adaptive Retransmission Scheme for Video Streaming over Content-Centric Wireless Networks, Communications Letters, vol.17, issue.6, 2013. ,
A practical congestion control scheme for named data networking, Proceedings of the 2016 conference on 3rd ACM Conference on Information-Centric Networking, pp.21-30, 2016. ,
ndnSIM 2: An updated NDN simulator for NS-3, 2016. ,
, IP Mobility Support, vol.70, 1996.
, Periscope. Video Streaming
, MAP-Me: Managing Anchor-less Producer Mobility in Content-Centric Networks, 2017.
MAP-Me: Managing Anchor-less Producer Mobility in ContentCentric Networks, 2016. ,
Ospfn: An ospf based routing protocol for named data networking, 2012. ,
Nlsr: named-data link state routing protocol, Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking, pp.15-20, 2013. ,
Achieving sub-second igp convergence in large ip networks, SIGCOMM Comput. Commun. Rev, vol.35, issue.3, pp.35-44, 2005. ,
,
Rate adaptation for 802.11 wireless networks: Minstrel, Submitted to ACM SIGCOMM 2010 ,
, Random waypoint model
Propagation data and prediction methods for the planning of short-range outdoor radiocommunication systems and radio local area networks in the frequency range 300 mhz to 100 ghz. Recommendation p, International Telecommunication Union, pp.1441-1450, 2017. ,
Recent development and applications of SUMO -Simulation of Urban MObility, International Journal On Advances in Systems and Measurements, vol.5, issue.3&4, pp.128-138, 2012. ,
Achieving sub-second igp convergence in large ip networks, ACM SIGCOMM Computer Communication Review, vol.35, issue.3, pp.35-44, 2005. ,
Guide to lte security, DRAFT NIST Special Publication, pp.800-187, 2016. ,
4g lte security for mobile network operators, Cyber Secur. Inf. Sys. Inf. Anal. Cent.(CSIAC), vol.1, issue.4, pp.20-29, 2013. ,
Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981. ,
Cryptographic hash functions, Transactions on Emerging Telecommunications Technologies, vol.5, issue.4, pp.431-448, 1994. ,
, , 2016.
Interestbased access control for content centric networks, 2015. ,
Almost optimal hash sequence traversal, International Conference on Financial Cryptography, pp.102-119, 2002. ,
Explicit loss notification and wireless web performance, Proc. of IEEE GLOBECOM Internet Mini-Conference, 1998. ,
Discriminating congestion losses from wireless losses using inter-arrival times at the receiver, Proc. of IEEE ASSET'99, 1999. ,
WTCP: an efficient mechanism for improving TCP performance over wireless links, Proc of IEEE ISCC, 1998. ,
Optimal Multipath Congestion Control and Request Forwarding in Information-Centric Networks, Proc. of IEEE ICNP, 2013. ,
Using smart triggers for improved user performance in 802.11 wireless networks, Proc. of ACM MobiSys, 2006. ,
Next Generation Wireless LANs 802.11n and 802.11ac, 2013. ,
Virtualized icn (vicn): towards a unified network virtualization framework for icn experimentation, Proceedings of the 4th ACM Conference on Information-Centric Networking, pp.109-115, 2017. ,
Proactive caching with mobility prediction under uncertainty in information-centric networks, Proceedings of the 4th ACM Conference on Information-Centric Networking, pp.88-97, 2017. ,
Smart retransmission: Performance with overload and random losses, INFOCOM'97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol.3, pp.1131-1138, 1997. ,
Publisher mobility support in content centric networks, The International Conference on Information Networking 2014 (ICOIN2014), pp.214-219, 2014. ,
Design, implementation, and evaluation of cellular ip, IEEE Personal Communications, vol.7, issue.4, pp.42-49, 2000. ,
A survey of information-centric networking, IEEE Communications Magazine, vol.50, issue.7, 2012. ,
Improving performance of tcp over wireless networks, Proceedings of the 17th International Conference on, 1997. ,
Statistical performance guarantees for streaming flows using expedited forwarding, INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol.2, pp.1104-1112, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01244778
How prevalent is prefix hijacking on the internet. NANOG36 Talk, 2006. ,
Leveraging icn in-network control for loss detection and recovery in wireless mobile networks, ICN, pp.50-59, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01700797
Leveraging icn in-network control for loss detection and recovery in wireless mobile networks, ACM SIGCOMM ICN'2016, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01700797
A pipe-assisted mobility management in named data networking networks, Network Operations and Management Symposium (APNOMS), 2014 16th Asia-Pacific, pp.1-4, 2014. ,
Secure producer mobility in information-centric network, Proc. ACM ICN, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01700774
Optimal provider mobility in large-scale nameddata networking, KSII Transactions on Internet & Information Systems, vol.9, issue.10, 2015. ,
CCNx Messages in TLV Format, 2017. ,
Us secure hash algorithms (sha and sha-based hmac and hkdf), 2011. ,
Fast distributed bidirectional authentication for wireless sensor networks, vol.1, pp.17-24, 2008. ,
Basavaraj Patil, Hannes Tschofenig, and Alper Yegin. Protocol for carrying authentication for network access (pana), 2008. ,
Techniques for enhancing tcp performance in wireless networks, Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, 2012. ,
Impact of traffic mix on caching performance in a content-centric network, Computer Communications Workshops (INFOCOM WKSHPS), 2012 IEEE Conference on, pp.310-315, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00666169
A modeling approach to federated identity and access management, Special interest tracks and posters of the 14th international conference on World Wide Web, pp.1156-1157, 2005. ,
Towards a quantitative comparison of location-independent network architectures, ACM SIG-COMM Computer Communication Review, vol.44, issue.4, pp.259-270, 2015. ,
Practical accounting in content-centric networking, Network Operations and Management Symposium (NOMS), pp.436-444, 2016. ,
Increasing availability and security of an authentication service, IEEE Journal on Selected Areas in Communications, vol.11, issue.5, pp.657-662, 1993. ,
DOI : 10.1109/49.223866
Reducing the cost of security in link-state routing, Network and Distributed System Security, 1997. Proceedings., 1997 Symposium on, pp.93-99, 1997. ,
Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks, Ad hoc networks, vol.1, issue.1, pp.175-192, 2003. ,
Efficient constructions for oneway hash chains, International Conference on Applied Cryptography and Network Security, pp.423-441, 2005. ,
DOI : 10.21236/ada461109
URL : http://www.dtic.mil/dtic/tr/fulltext/u2/a461109.pdf
Random waypoint mobility model in cellular networks, Wireless Networks, vol.13, issue.2, pp.177-188, 2007. ,
Optimal Multipath Congestion Control and Request Forwarding in Information-Centric Networks, Proc. of IEEE ICNP, 2013. ,
DOI : 10.1109/icnp.2013.6733576
Congestion avoidance and control, ACM SIGCOMM computer communication review, vol.18, pp.314-329, 1988. ,
Ipoque internet study, 2009. ,
Phas: A prefix hijack alert system, USENIX Security symposium, vol.1, 2006. ,
Partial path extension scheme for mobile content source in content-centric networking (ccn), EURASIP Journal on Wireless Communications and Networking, vol.2015, issue.1, p.212, 2015. ,
DOI : 10.1186/s13638-015-0436-9
URL : https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-015-0436-9
Network-layer assisted mechanism to optimize authentication delay during handoff in 802.11 networks, Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous, pp.1-8, 2007. ,
The venn of identity: Options and issues in federated identity management, IEEE Security & Privacy, vol.6, issue.2, 2008. ,
Low latency low loss streaming using in-network coding and caching, IEEE INFOCOM, 2017. ,
DOI : 10.1109/infocom.2017.8057026
URL : https://hal.archives-ouvertes.fr/hal-01437074
Origin authentication in interdomain routing, Computer Networks, vol.50, issue.16, pp.2953-2980, 2006. ,
Delayed duplicate-acknowledgements: A proposal to improve performance of tcp on wireless links, 1998. ,
Navigo: Interest forwarding by geolocations in vehicular named data networking, 2015. ,
DOI : 10.1109/wowmom.2015.7158165
URL : https://hal.archives-ouvertes.fr/hal-01182994
, NSF Named-Data Networking, 2010.
Multipath congestion control in content-centric networks, Proc. of IEEE INFOCOM NOMEN, 2013. ,
DOI : 10.1109/infcomw.2013.6970718
, Supporting evolved packet core for one million mobile subscribers with four intel xeon processor-based servers
Skip lists: a probabilistic alternative to balanced trees, Communications of the ACM, vol.33, issue.6, pp.668-676, 1990. ,
DOI : 10.1145/78973.78977
URL : http://www.cs.uiowa.edu/~ghosh/skip.pdf
Detecting bogus bgp route information: Going beyond prefix hijacking, Security and Privacy in Communications Networks and the Workshops, pp.381-390, 2007. ,
Caching and mobility support in a publish-subscribe internet architecture, IEEE Communications Magazine, vol.50, issue.7, pp.52-58, 2012. ,
A Framework for Loop-Free Convergence, RFC, vol.5715, 2010. ,
IP Mobility Support for IPv4, Revised. RFC 5944 (Proposed Standard), 2010. ,
Realizing quality of service guarantees in multiservice networks, Performance and Management of Complex Communication Networks, pp.277-293 ,
, , 1998.
Engineering for quality of service. Self-Similar Network Traffic and Performance Evaluation, 401420, 2000. ,
Dynamic adaptive video streaming: Towards a systematic comparison of icn and tcp/ip, IEEE Transactions on Multimedia, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01613519
Non-congestion packet loss detection for tcp error recovery using wireless links, IEE Proceedings, vol.146, issue.4, 1999. ,
Demo overview: fully decentralised authentication scheme for icn in disaster scenarios, Proceedings of the 1st international conference on Information-centric networking, pp.191-192, 2014. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
Fundamental design issues for the future internet, IEEE Journal on, vol.13, issue.7, pp.1176-1188, 1995. ,
Authentication on the edge: Distributed authentication for a global open wi-fi network ,
Micro-hip a hip-based micro-mobility solution, Communications Workshops, 2008. ICC Workshops' 08. IEEE International Conference on, pp.430-435, 2008. ,
Measuring isp topologies with rocketfuel, ACM SIGCOMM Computer Communication Review, vol.32, pp.133-145, 2002. ,
A survey of mobility in information-centric networks: Challenges and research directions, Proc. of NOM, NoM '12, 2012. ,
,
Networking named content, Proc. of ACM CoNEXT '09 ,
Security in mobile ad hoc networks: challenges and solutions, IEEE wireless communications, vol.11, issue.1, pp.38-47, 2004. ,
Improving end-to-end performance of tcp over mobile internetworks, Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on, 1994. ,
Schematizing trust in named data networking, Proceedings of the 2nd International Conference on Information-Centric Networking, pp.177-186, 2015. ,
DOI : 10.1145/2810156.2810170
ispy: Detecting ip prefix hijacking on my own, IEEE/ACM Transactions on Networking (TON), vol.18, issue.6, pp.1815-1828, 2010. ,
DOI : 10.1109/tnet.2010.2066284
URL : http://www.ece.purdue.edu/~ychu/publications/sigcomm08_ispy.pdf
A light-weight distributed scheme for detecting ip prefix hijacks in real-time, ACM SIGCOMM Computer Communication Review, vol.37, pp.277-288, 2007. ,
Act: audio conference tool over named data networking, Proceedings of the ACM SIGCOMM workshop on Information-centric networking, pp.68-73, 2011. ,
, NS-3. NS-3 simulator