, Cisco Visual Networking Index: Forecast and Methodology, pp.2016-2021

E. Hossain and M. Hasan, 5g cellular: key enabling technologies and research challenges, IEEE Instrumentation & Measurement Magazine, vol.18, issue.3, pp.11-21, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01121142

N. Bhushan, J. Li, D. Malladi, R. Gilmore, D. Brenner et al., Network densification: the dominant theme for wireless evolution into 5g, IEEE Communications Magazine, vol.52, issue.2, pp.82-89, 2014.

M. Patrick-kwadwo-agyapong, D. Iwamura, W. Staehle, A. Kiess, and . Benjebbour, Design considerations for a 5g network architecture, IEEE Communications Magazine, vol.52, issue.11, pp.65-75, 2014.

D. K. Van-jacobson, J. D. Smetters, . Thornton, F. Michael, . Plass et al., Networking named content, Proceedings of the 5th international conference on Emerging networking experiments and technologies, pp.1-12, 2009.

D. Le, X. Fu, and D. Hogrefe, A review of mobility support paradigms for the internet, IEEE Communications Surveys Tutorials, vol.8, issue.1, pp.38-51, 2006.

J. Hofmann, V. Rexhepi-van-der-pol, G. Sébire, and S. Parolari, 3gpp release 8. GSM/EDGE: Evolution and Performance, pp.63-99, 2011.

Y. Li, Z. Yuan, and C. Peng, A control-plane perspective on reducing data access latency in lte networks, Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, pp.56-69, 2017.

M. Zafar-ayyub-qazi, A. Walls, V. Panda, S. Sekar, S. Ratnasamy et al., A high performance packet core for next generation cellular networks, Proceedings of the Conference of the ACM Special Interest Group on Data Communication, pp.348-361, 2017.

D. Wischik, C. Raiciu, A. Greenhalgh, and M. Handley, Design, implementation and evaluation of congestion control for multipath tcp, NSDI, vol.11, pp.8-8, 2011.

G. Tyson, N. Sastry, I. Rimac, R. Cuevas, and A. Mauthe, A survey of mobility in information-centric networks: Challenges and research directions, Proc. NoM, pp.1-6, 2012.

Y. Zhang, A. Afanasyev, J. Burke, and L. Zhang, A survey of mobility support in named data networking, Proc. of IEEE INFOCOM NOM, 2016.

Y. Zhang, H. Zhang, and L. Zhang, Kite: A mobility support scheme for ndn, Proc. of ACM ICN Poster, 2014.

H. Ballani, P. Francis, and X. Zhang, A study of prefix hijacking and interception in the internet, ACM SIGCOMM Computer Communication Review, vol.37, pp.265-276, 2007.

M. Al-shurman, S. Yoo, and S. Park, Black hole attack in mobile ad hoc networks, Proceedings of the 42nd annual Southeast regional conference, pp.96-97, 2004.

M. Conti, P. Gasti, and M. Teoli, A lightweight mechanism for detection of cache pollution attacks in named data networking, Computer Networks, vol.57, issue.16, pp.3178-3191, 2013.

C. Ghali, G. Tsudik, and E. Uzun, Needle in a haystack: Mitigating content poisoning in named-data networking, Proceedings of NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014.

A. Moreno-ambrosin, M. Compagno, C. Conti, G. Ghali, and . Tsudik, Security and privacy analysis of nsf future internet architectures, 2016.

Y. Zhang, A. Afanasyev, J. Burke, and L. Zhang, A survey of mobility support in named data networking, Computer Communications Workshops (INFOCOM WKSHPS), 2016 IEEE Conference on, pp.83-88, 2016.

G. Xylomenos, N. Christopher, . Ververidis, A. Vasilios, N. Siris et al., A survey of information-centric networking research, IEEE Communications Surveys & Tutorials, vol.16, issue.2, pp.1024-1049, 2014.

L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, P. Crowley et al., Named data networking, ACM SIGCOMM Computer Communication Review, vol.44, issue.3, pp.66-73, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01182997

T. Koponen, M. Chawla, B. Chun, A. Ermolinskiy, H. Kye et al., A data-oriented (and beyond) network architecture, ACM SIGCOMM Computer Communication Review, vol.37, pp.181-192, 2007.

B. Ahlgren, D. Matteo, M. Ambrosio, I. Marchisio, C. Marsh et al., Kostas Pentikousis, Ove Strandberg, René Rembarz, and Vinicio Vercellone. Design considerations for a network of information, Proc. CoNEXT, p.66, 2008.

G. Tyson, A. Mauthe, S. Kaune, P. Grace, and T. Plagemann, Juno: An adaptive delivery-centric middleware, Proc. CCNC, pp.587-591, 2012.

N. Fotiou, P. Nikander, D. Trossen, C. George, and . Polyzos, Developing information networking further: From psirp to pursuit, Broadnets, pp.1-13, 2010.

I. Seskar, K. Nagaraja, S. Nelson, and D. Raychaudhuri, Mobilityfirst future internet architecture project, Proc. AINTEC, pp.1-3, 2011.

Z. Zhu, R. Wakikawa, and L. Zhang, A survey of mobility support in the internet, RFC, vol.6301, 2011.

G. Tyson, N. Sastry, and R. Cuevas, Ivica Rimac, and Andreas Mauthe. A survey of mobility in information-centric networks, Communications of the ACM, vol.56, issue.12, pp.90-98, 2013.

B. Feng, H. Zhou, and Q. Xu, Mobility support in named data networking: a survey, EURASIP Journal on Wireless Communications and Networking, vol.2016, issue.1, p.220, 2016.

F. Hermans, E. Ngai, and P. Gunningberg, Global source mobility in the contentcentric networking architecture, Proc. of ACM NoM Workshop, 2012.

X. Jiang, J. Bi, and Y. Wang, What benefits does NDN have in supporting mobility, Proc. of IEEE ISCC, 2014.

D. Li and M. C. Chuah, SCOM: A Scalable Content Centric Network Architecture with Mobility Support, Proc. of IEEE MSN, 2013.

D. Kim, J. Kim, Y. Kim, H. Yoon, and I. Yeom, Mobility support in content centric networks, Proc. of ACM ICN, 2012.

A. Afanasyev, C. Yi, L. Wang, B. Zhang, and L. Zhang, SNAMP: Secure namespace mapping to scale NDN forwarding, Proc. Computer Communication Workshops, pp.281-286, 2015.

D. Kim, J. Kim, Y. Kim, H. Yoon, and I. Yeom, End-to-end mobility support in content centric networks, International Journal of Communication Systems, vol.28, issue.6, pp.1151-1167, 2015.

J. Lee, S. Cho, and D. Kim, Device mobility management in content-centric networking, Communications Magazine, vol.50, issue.12, pp.28-34, 2012.

L. Wang, O. Waltari, and J. Kangasharju, Mobiccn: Mobility support with greedy routing in content-centric networks, Proc. of IEEE GLOBECOM, 2013.

D. Han, M. Lee, K. Cho, T. Kwon, and Y. Choi, Publisher mobility support in content centric networks, Proc. of ICOIN, 2014.

R. Ravindran, S. Lo, X. Zhang, and G. Wang, Supporting seamless mobility in named data networking, Proc. of IEEE ICC, 2012.

R. Ying, L. Hongbin, G. Deyun, Z. Huachun, and Z. Hongke, Lbma: A novel locator based mobility support approach in named data networking, China Communications, vol.11, issue.4, pp.111-120, 2014.

Y. Nishiyama, M. Ishino, Y. Koizumi, T. Hasegawa, K. Sugiyama et al., Proposal on routing-based mobility architecture for ICN-based cellular networks, Proc. Computer Communication Workshops, pp.467-472, 2016.

X. Vasilakos, A. Vasilios, . Siris, C. George, M. Polyzos et al., Proactive selective neighbor caching for enhancing mobility support in information-centric networks, Proceedings of the second edition of the ICN workshop on Informationcentric networking, pp.61-66, 2012.

G. Xylomenos, X. Vasilakos, C. Tsilopoulos, A. Vasilios, G. C. Siris et al., Caching and mobility support in a publish-subscribe internet architecture, IEEE Communications Magazine, vol.50, issue.7, 2012.

H. Farahat and H. Hassanein, Optimal caching for producer mobility support in named data networks, Communications (ICC), 2016 IEEE International Conference on, pp.1-6, 2016.

. Matheus-b-lehmann, P. Marinho, A. Barcellos, and . Mauthe, Providing producer mobility support in ndn through proactive data replication, Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP, pp.383-391, 2016.

J. Augé, G. Carofiglio, G. Grassi, L. Muscariello, G. Pau et al., Map-me: Managing anchor-less producer mobility in informationcentric networks, 2016.

A. Azgin, R. Ravindran, and G. Wang, A scalable mobilitycentric architecture for named data networking, 2014.

F. Hermans, E. Ngai, and P. Gunningberg, Global source mobility in the content-centric networking architecture, Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design-Architecture, Algorithms, and Applications, pp.13-18, 2012.

D. Kim, J. Kim, Y. Kim, H. Yoon, and I. Yeom, Mobility support in content centric networks, Proceedings of the second edition of the ICN workshop on Information-centric networking, pp.13-18, 2012.

D. Li and M. Choo-cuah, Scom: A scalable content centric network architecture with mobility support, Mobile Ad-hoc and Sensor Networks (MSN), pp.25-32, 2013.

J. Lee, S. Cho, and D. Kim, Device mobility management in contentcentric networking, IEEE Communications Magazine, vol.50, issue.12, 2012.

L. Wang, O. Waltari, and J. Kangasharju, Mobiccn: Mobility support with greedy routing in content-centric networks, Proc. of GLOBECOM, 2013.

M. Naor and K. Nissim, Certificate revocation and certificate update, IEEE Journal on selected areas in communications, vol.18, issue.4, pp.561-570, 2000.

T. Andrew, J. Campbell, S. Gomez, and . Kim, András Gergely Valkó, Chieh-Yih Wan, and Zoltán R Turányi. Design, implementation, and evaluation of cellular ip, IEEE personal communications, vol.7, issue.4, pp.42-49, 2000.

S. Das, A. Misra, and P. Agrawal, Telemip: telecommunicationsenhanced mobile ip architecture for fast intradomain mobility, IEEE Personal Communications, vol.7, issue.4, pp.50-58, 2000.

K. Butler, T. R. Farley, P. Mcdaniel, and J. Rexford, A survey of bgp security issues and solutions, Proceedings of the IEEE, vol.98, issue.1, pp.100-122, 2010.

G. Huston, M. Rossi, and G. Armitage, Securing bgp -a literature survey, IEEE Communications Surveys & Tutorials, vol.13, issue.2, pp.199-222, 2011.

S. Kent, C. Lynn, and K. Seo, Secure border gateway protocol (s-bgp), IEEE Journal on Selected areas in Communications, vol.18, issue.4, pp.582-592, 2000.

R. White, Securing bgp through secure origin bgp (sobgp), vol.33, pp.47-53, 2003.

T. Paul-c-van-oorschot, E. Wan, and . Kranakis, On interdomain routing security and pretty secure bgp (psbgp), ACM Transactions on Information and System Security (TISSEC), vol.10, issue.3, p.11, 2007.

S. Murphy and M. Badger, Ospf with digital signatures. rfc 2154, 1997.

T. Wan, E. Kranakis, and P. Oorschot, S-rip: A secure distance vector routing protocol, International Conference on Applied Cryptography and Network Security, pp.103-119, 2004.

H. Balakrishnan, N. Venkata, S. Padmanabhan, R. H. Seshan, and . Katz, A comparison of mechanisms for improving tcp performance over wireless links, IEEE/ACM transactions on networking, vol.5, issue.6, pp.756-769, 1997.

A. Bakre and B. R. Badrinath, I-TCP: indirect TCP for mobile hosts, Proc. of IEEE ICDCS, 1995.

K. Brown and S. Singh, A network architecture for mobile computing, Proc. of IEEE INFOCOM, 1996.

S. Kopparty, S. V. Krishnamurthy, M. Faloutsos, and S. K. Tripathi, Split TCP for mobile ad hoc networks, Proc. of IEEE GLOBECOM, 2002.

C. Parsa and J. J. Garcia-luna-aceves, Improving TCP Performance over Wireless Networks at the Link Layer, Mob. Netw. Appl, vol.5, issue.1, 2000.

K. Shin, J. Kim, and S. B. Choi, Loss Recovery Scheme for TCP Using MAC MIB over Wireless Access Networks, Communications Letters, vol.15, issue.10, 2011.

H. Balakrishnan, S. Seshan, E. Amir, and R. H. Katz, Improving TCP/IP Performance over Wireless Networks, Proc. of ACM MOBICOM, 1995.

A. Desimone, M. Choo-chuah, and O. Yue, Throughput performance of transport-layer protocols over wireless lans, Global Telecommunications Conference, 1993, including a Communications Theory Mini-Conference. Technical Program Conference Record, IEEE in Houston. GLOBECOM'93, pp.542-549, 1993.

S. Biaz and N. F. Vaidya, Distinguishing congestion losses from wireless transmission losses: a negative result, Computer Communications and Networks, 1998.

Y. Tobe, Y. Tamura, A. Molano, S. Ghosh, and H. Tokuda, Achieving moderate fairness for UDP flows by path-status classification, Proc. of IEEE LCN, 2000.

S. Mascolo, C. Casetti, M. Gerla, M. Y. Sanadidi, R. Wang et al., Bandwidth Estimation for Enhanced Transport over Wireless Links, Proc. of ACM MOBICOM, 2001.

P. C. Song-cen, G. M. Cosman, and . Voelker, End-to-end differentiation of congestion and wireless losses. Networking, IEEE/ACM Transactions on, vol.11, issue.5, 2003.

M. Amadeo, A. Molinaro, and C. Campolo, Manolis Sifalakis, and Christian F. Tschudin. Transport layer design for named data wireless networking, Prof. of IEEE INFOCOM NOM, 2014.

L. Han, S. Kang, H. Kim, and H. P. In, Adaptive Retransmission Scheme for Video Streaming over Content-Centric Wireless Networks, Communications Letters, vol.17, issue.6, 2013.

K. Schneider, C. Yi, B. Zhang, and L. Zhang, A practical congestion control scheme for named data networking, Proceedings of the 2016 conference on 3rd ACM Conference on Information-Centric Networking, pp.21-30, 2016.

S. Mastorakis, A. Afanasyev, I. Moiseenko, and L. Zhang, ndnSIM 2: An updated NDN simulator for NS-3, 2016.

C. Perkins, . Ip-mobility-support-network-working, and . Group, IP Mobility Support, vol.70, 1996.

, Periscope. Video Streaming

, MAP-Me: Managing Anchor-less Producer Mobility in Content-Centric Networks, 2017.

J. Augé, G. Carofiglio, G. Grassi, L. Muscariello, G. Pau et al., MAP-Me: Managing Anchor-less Producer Mobility in ContentCentric Networks, 2016.

L. Wang, C. Hoque, A. Yi, B. Alyyan, and . Zhang, Ospfn: An ospf based routing protocol for named data networking, 2012.

A. Hoque, A. Syed-obaid-amin, B. Alyyan, L. Zhang, L. Zhang et al., Nlsr: named-data link state routing protocol, Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking, pp.15-20, 2013.

P. Francois, C. Filsfils, J. Evans, and O. Bonaventure, Achieving sub-second igp convergence in large ip networks, SIGCOMM Comput. Commun. Rev, vol.35, issue.3, pp.35-44, 2005.

N. Simulator,

A. Mcgregor and D. Smithies, Rate adaptation for 802.11 wireless networks: Minstrel, Submitted to ACM SIGCOMM 2010

, Random waypoint model

. Itu-r, Propagation data and prediction methods for the planning of short-range outdoor radiocommunication systems and radio local area networks in the frequency range 300 mhz to 100 ghz. Recommendation p, International Telecommunication Union, pp.1441-1450, 2017.

D. Krajzewicz, J. Erdmann, M. Behrisch, and L. Bieker, Recent development and applications of SUMO -Simulation of Urban MObility, International Journal On Advances in Systems and Measurements, vol.5, issue.3&4, pp.128-138, 2012.

P. Francois, C. Filsfils, J. Evans, and O. Bonaventure, Achieving sub-second igp convergence in large ip networks, ACM SIGCOMM Computer Communication Review, vol.35, issue.3, pp.35-44, 2005.

J. Cichonski, J. M. Franklin, and M. Bartock, Guide to lte security, DRAFT NIST Special Publication, pp.800-187, 2016.

D. Bhasker, 4g lte security for mobile network operators, Cyber Secur. Inf. Sys. Inf. Anal. Cent.(CSIAC), vol.1, issue.4, pp.20-29, 2013.

L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981.

B. Preneel, Cryptographic hash functions, Transactions on Emerging Telecommunications Technologies, vol.5, issue.4, pp.431-448, 1994.

. Octeon-iii-cn7020, , 2016.

C. Ghali, M. A. Schlosberg, G. Tsudik, and C. A. Wood, Interestbased access control for content centric networks, 2015.

D. Coppersmith and M. Jakobsson, Almost optimal hash sequence traversal, International Conference on Financial Cryptography, pp.102-119, 2002.

H. Balakrishnan, H. Randy, and . Katz, Explicit loss notification and wireless web performance, Proc. of IEEE GLOBECOM Internet Mini-Conference, 1998.

S. Biaz and N. F. Vaidya, Discriminating congestion losses from wireless losses using inter-arrival times at the receiver, Proc. of IEEE ASSET'99, 1999.

K. Ratnam and I. Matta, WTCP: an efficient mechanism for improving TCP performance over wireless links, Proc of IEEE ISCC, 1998.

G. Carofiglio, M. Gallo, L. Muscariello, M. Papalini, and S. Wang, Optimal Multipath Congestion Control and Request Forwarding in Information-Centric Networks, Proc. of IEEE ICNP, 2013.

V. Mhatre and K. Papagiannaki, Using smart triggers for improved user performance in 802.11 wireless networks, Proc. of ACM MobiSys, 2006.

E. Perahia and R. Stacey, Next Generation Wireless LANs 802.11n and 802.11ac, 2013.

M. Sardara, L. Muscariello, J. Augé, M. Enguehard, A. Compagno et al., Virtualized icn (vicn): towards a unified network virtualization framework for icn experimentation, Proceedings of the 4th ACM Conference on Information-Centric Networking, pp.109-115, 2017.

N. Abani, T. Braun, and M. Gerla, Proactive caching with mobility prediction under uncertainty in information-centric networks, Proceedings of the 4th ACM Conference on Information-Centric Networking, pp.88-97, 2017.

S. Keshav and . Samuel-p-morgan, Smart retransmission: Performance with overload and random losses, INFOCOM'97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol.3, pp.1131-1138, 1997.

D. Han, M. Lee, K. Cho, T. Kwon, and Y. Choi, Publisher mobility support in content centric networks, The International Conference on Information Networking 2014 (ICOIN2014), pp.214-219, 2014.

A. T. Campbell, J. Gomez, S. Kim, A. G. Valko, C. Wan et al., Design, implementation, and evaluation of cellular ip, IEEE Personal Communications, vol.7, issue.4, pp.42-49, 2000.

B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, A survey of information-centric networking, IEEE Communications Magazine, vol.50, issue.7, 2012.

B. S. Bakshi, P. Krishna, N. H. Vaidya, and D. K. Pradhan, Improving performance of tcp over wireless networks, Proceedings of the 17th International Conference on, 1997.

T. Bonald, A. Proutière, and J. W. Roberts, Statistical performance guarantees for streaming flows using expedited forwarding, INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol.2, pp.1104-1112, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01244778

P. Boothe, J. Hiebert, and R. Bush, How prevalent is prefix hijacking on the internet. NANOG36 Talk, 2006.

G. Carofiglio, L. Muscariello, M. Papalini, N. Rozhnova, and X. Zeng, Leveraging icn in-network control for loss detection and recovery in wireless mobile networks, ICN, pp.50-59, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01700797

G. Carofiglio, L. Muscariello, N. Ichele-papalini, X. Rozhnova, and . Zeng, Leveraging icn in-network control for loss detection and recovery in wireless mobile networks, ACM SIGCOMM ICN'2016, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01700797

Y. Chen, C. Hsu, and D. Huang, A pipe-assisted mobility management in named data networking networks, Network Operations and Management Symposium (APNOMS), 2014 16th Asia-Pacific, pp.1-4, 2014.

A. Compagno, X. Zeng, L. Muscariello, G. Carofiglio, and J. Augé, Secure producer mobility in information-centric network, Proc. ACM ICN, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01700774

Y. Truong-xuan-do and . Kim, Optimal provider mobility in large-scale nameddata networking, KSII Transactions on Internet & Information Systems, vol.9, issue.10, 2015.

M. Mosko, CCNx Messages in TLV Format, 2017.

D. Eastlake and T. Hansen, Us secure hash algorithms (sha and sha-based hmac and hkdf), 2011.

R. Fantacci, F. Chiti, and L. Maccari, Fast distributed bidirectional authentication for wireless sensor networks, vol.1, pp.17-24, 2008.

D. Forsberg and Y. Ohba, Basavaraj Patil, Hannes Tschofenig, and Alper Yegin. Protocol for carrying authentication for network access (pana), 2008.

B. Francis, V. Narasimhan, A. Nayak, and I. Stojmenovic, Techniques for enhancing tcp performance in wireless networks, Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, 2012.

C. Fricker, P. Robert, J. Roberts, and N. Sbihi, Impact of traffic mix on caching performance in a content-centric network, Computer Communications Workshops (INFOCOM WKSHPS), 2012 IEEE Conference on, pp.310-315, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00666169

M. Gaedke, J. Meinecke, and M. Nussbaumer, A modeling approach to federated identity and access management, Special interest tracks and posters of the 14th international conference on World Wide Web, pp.1156-1157, 2005.

Z. Gao, A. Venkataramani, S. James-f-kurose, and . Heimlicher, Towards a quantitative comparison of location-independent network architectures, ACM SIG-COMM Computer Communication Review, vol.44, issue.4, pp.259-270, 2015.

C. Ghali, G. Tsudik, A. Christopher, E. Wood, and . Yeh, Practical accounting in content-centric networking, Network Operations and Management Symposium (NOMS), pp.436-444, 2016.

L. Gong, Increasing availability and security of an authentication service, IEEE Journal on Selected Areas in Communications, vol.11, issue.5, pp.657-662, 1993.
DOI : 10.1109/49.223866

R. Hauser, T. Przygienda, and G. Tsudik, Reducing the cost of security in link-state routing, Network and Distributed System Security, 1997. Proceedings., 1997 Symposium on, pp.93-99, 1997.

Y. Hu, D. B. Johnson, and A. Perrig, Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks, Ad hoc networks, vol.1, issue.1, pp.175-192, 2003.

Y. Hu, M. Jakobsson, and A. Perrig, Efficient constructions for oneway hash chains, International Conference on Applied Cryptography and Network Security, pp.423-441, 2005.
DOI : 10.21236/ada461109

URL : http://www.dtic.mil/dtic/tr/fulltext/u2/a461109.pdf

E. Hyytiä and J. Virtamo, Random waypoint mobility model in cellular networks, Wireless Networks, vol.13, issue.2, pp.177-188, 2007.

G. Carofiglio, M. Gallo, L. Muscariello, M. Papalini, and S. Wang, Optimal Multipath Congestion Control and Request Forwarding in Information-Centric Networks, Proc. of IEEE ICNP, 2013.
DOI : 10.1109/icnp.2013.6733576

. Van-jacobson, Congestion avoidance and control, ACM SIGCOMM computer communication review, vol.18, pp.314-329, 1988.

H. Schulze and K. Mochalski, Ipoque internet study, 2009.

M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang et al., Phas: A prefix hijack alert system, USENIX Security symposium, vol.1, 2006.

J. Lee and D. Kim, Partial path extension scheme for mobile content source in content-centric networking (ccn), EURASIP Journal on Wireless Communications and Networking, vol.2015, issue.1, p.212, 2015.
DOI : 10.1186/s13638-015-0436-9

URL : https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-015-0436-9

M. Rafa, A. Lopez, Y. Dutta, H. Ohba, A. Schulzrinne et al., Network-layer assisted mechanism to optimize authentication delay during handoff in 802.11 networks, Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous, pp.1-8, 2007.

E. Maler and D. Reed, The venn of identity: Options and issues in federated identity management, IEEE Security & Privacy, vol.6, issue.2, 2008.

K. Matsuzono, H. Asaeda, and T. Turletti, Low latency low loss streaming using in-network coding and caching, IEEE INFOCOM, 2017.
DOI : 10.1109/infocom.2017.8057026

URL : https://hal.archives-ouvertes.fr/hal-01437074

P. Mcdaniel, W. Aiello, K. Butler, and J. Ioannidis, Origin authentication in interdomain routing, Computer Networks, vol.50, issue.16, pp.2953-2980, 2006.

M. Miten and V. Nitin, Delayed duplicate-acknowledgements: A proposal to improve performance of tcp on wireless links, 1998.

G. Grassi, D. Pesavento, G. Pau, L. Zhang, and S. Fdida, Navigo: Interest forwarding by geolocations in vehicular named data networking, 2015.
DOI : 10.1109/wowmom.2015.7158165

URL : https://hal.archives-ouvertes.fr/hal-01182994

V. Jacobson, NSF Named-Data Networking, 2010.

G. Carofiglio, M. Gallo, L. Muscariello, and L. Papalini, Multipath congestion control in content-centric networks, Proc. of IEEE INFOCOM NOMEN, 2013.
DOI : 10.1109/infcomw.2013.6970718

, Supporting evolved packet core for one million mobile subscribers with four intel xeon processor-based servers

W. Pugh, Skip lists: a probabilistic alternative to balanced trees, Communications of the ACM, vol.33, issue.6, pp.668-676, 1990.
DOI : 10.1145/78973.78977

URL : http://www.cs.uiowa.edu/~ghosh/skip.pdf

J. Qiu, L. Gao, S. Ranjan, and A. Nucci, Detecting bogus bgp route information: Going beyond prefix hijacking, Security and Privacy in Communications Networks and the Workshops, pp.381-390, 2007.

G. Xylomenos, X. Vasilakos, C. Tsilopoulos, V. A. Siris, and G. C. Polyzos, Caching and mobility support in a publish-subscribe internet architecture, IEEE Communications Magazine, vol.50, issue.7, pp.52-58, 2012.

M. Shand and S. Bryant, A Framework for Loop-Free Convergence, RFC, vol.5715, 2010.

C. Perkins, IP Mobility Support for IPv4, Revised. RFC 5944 (Proposed Standard), 2010.

W. James and . Roberts, Realizing quality of service guarantees in multiservice networks, Performance and Management of Complex Communication Networks, pp.277-293

. Springer, , 1998.

. Jw-roberts, Engineering for quality of service. Self-Similar Network Traffic and Performance Evaluation, 401420, 2000.

J. Samain, G. Carofiglio, L. Muscariello, M. Papalini, M. Sardara et al., Dynamic adaptive video streaming: Towards a systematic comparison of icn and tcp/ip, IEEE Transactions on Multimedia, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01613519

N. K. Samaraweera, Non-congestion packet loss detection for tcp error recovery using wireless links, IEE Proceedings, vol.146, issue.4, 1999.

J. Seedorf, D. Gill, B. Kutscher, D. Schiller, and . Kohlweyer, Demo overview: fully decentralised authentication scheme for icn in disaster scenarios, Proceedings of the 1st international conference on Information-centric networking, pp.191-192, 2014.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.

S. Shenker, Fundamental design issues for the future internet, IEEE Journal on, vol.13, issue.7, pp.1176-1188, 1995.

J. Singh, Authentication on the edge: Distributed authentication for a global open wi-fi network

S. Jy-hon and J. Wang, Micro-hip a hip-based micro-mobility solution, Communications Workshops, 2008. ICC Workshops' 08. IEEE International Conference on, pp.430-435, 2008.

N. Spring, R. Mahajan, and D. Wetherall, Measuring isp topologies with rocketfuel, ACM SIGCOMM Computer Communication Review, vol.32, pp.133-145, 2002.

G. Tyson, N. Sastry, I. Rimac, R. Cuevas, and A. Mauthe, A survey of mobility in information-centric networks: Challenges and research directions, Proc. of NOM, NoM '12, 2012.

. Todo, . Todo, . Todo, and . Todo,

D. K. Van-jacobson, J. D. Smetters, M. F. Thornton, N. H. Plass, R. L. Briggs et al., Networking named content, Proc. of ACM CoNEXT '09

H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, Security in mobile ad hoc networks: challenges and solutions, IEEE wireless communications, vol.11, issue.1, pp.38-47, 2004.

R. Yavatkar and N. Bhagawat, Improving end-to-end performance of tcp over mobile internetworks, Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on, 1994.

Y. Yu, A. Afanasyev, D. Clark, V. Jacobson, and L. Zhang, Schematizing trust in named data networking, Proceedings of the 2nd International Conference on Information-Centric Networking, pp.177-186, 2015.
DOI : 10.1145/2810156.2810170

Z. Zhang, Y. Zhang, C. Hu, M. Mao, and R. Bush, ispy: Detecting ip prefix hijacking on my own, IEEE/ACM Transactions on Networking (TON), vol.18, issue.6, pp.1815-1828, 2010.
DOI : 10.1109/tnet.2010.2066284

URL : http://www.ece.purdue.edu/~ychu/publications/sigcomm08_ispy.pdf

C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis, A light-weight distributed scheme for detecting ip prefix hijacks in real-time, ACM SIGCOMM Computer Communication Review, vol.37, pp.277-288, 2007.

Z. Zhu, S. Wang, X. Yang, V. Jacobson, and L. Zhang, Act: audio conference tool over named data networking, Proceedings of the ACM SIGCOMM workshop on Information-centric networking, pp.68-73, 2011.

, NS-3. NS-3 simulator