Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 3 SI
Page No. 3294 - 3298

Energy Efficient Content Dissemination Architecture for Content Centric Network

Authors : Prasanta Kumar Roy, Sangram Ray and Mou Dasgupta

References

Aubry, E., T. Silverston and I. Chrisment, 2015. SRSC: SDN-based routing scheme for CCN. Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft’15), April 13-17, 2015, IEEE, London, England, UK., ISBN:978-1-4799-7899-1, pp: 1-5.

Bernardini, C., T. Silverston and O. Festor, 2013. Cache management strategy for CCN based on content popularity. Proceedings of the 7th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS’13), June 25-28, 2013, Springer, Barcelona, Spain, ISBN:978-3-642-38997-9, pp: 92-95.

Braun, T. and T.A. Trinh, 2013. Energy efficiency issues in information-centric networking. Proceedings of the European Conference on Energy Efficiency in Large Scale Distributed Systems, April 22-24, 2013, Springer, Vienna, Austria, ISBN:978-3-642-40516-7, pp: 271-278.

Cheng, P.C., 2001. An architecture for the internet key exchange protocol. IBM. Syst. J., 40: 721-746.
Direct Link  |  

Detti, A. and N. Blefari-Melazzi, 2011. Network Layer Solutions for a Content-Centric Internet. In: Trustworthy Internet, Salgarelli, L., G. Bianchi and N. Blefari-Melazzi (Eds.). Springer, Milan, Italy, ISBN:978-88-470-1817-4, pp: 359-369.

Diffie, W. and M. Hellman, 1976. New directions in cryptography. IEEE. Trans. Inf. Theory, 22: 644-654.
CrossRef  |  Direct Link  |  

Forouzan, B.A. and D. Mukhopadhyay, 2013. Cryptography and Network Security. McGraw-Hill Education, New York, USA.,.

Fox, A., S.D. Gribble, Y. Chawathe, E.A. Brewer and P. Gauthier, 1997. Cluster-based scalable network services. ACM. SIGOPS Operating Syst. Rev., 31: 78-91.
CrossRef  |  Direct Link  |  

Ghali, C., G. Tsudik and E. Uzun, 2014. Network-layer trust in named-data networking. ACM. SIGCOMM Comput. Commun. Rev., 44: 12-19.
CrossRef  |  Direct Link  |  

Goergen, D., T. Cholez, J. Francois and T. Engel, 2013. Security monitoring for content-centric networking. Proceedings of the 7th and 5th International Joint Workshop on Data Privacy Management (DPM) and Autonomous Spontaneous Security, September 13-14, 2012, Springer, Pisa, Italy, ISBN:978-3-642-35889-0, pp: 274-286.

Guan, J., W. Quan, C. Xu and H. Zhang, 2012. The location selection for CCN router based on the network centrality. Proceedings of the 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS’12) Vol. 2, October 30-November 1, 2012, IEEE, Hangzhou, China, ISBN:978-1-4673-1857-0, pp: 568-582.

Jacobson, V., D.K. Smetters, J.D. Thornton, M.F. Plass and N.H. Briggs et al., 2009. Networking named content. Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, December 1-4, 2009, ACM, Rome, Italy, ISBN:978-1-60558-636-6, pp: 1-12.

Ko, B.J., V. Pappas, R. Raghavendra, Y. Song and R.B. Dilmaghani et al., 2012. An information-centric architecture for data center networks. Proceedings of the 2nd Edition of the ICN Workshop on Information Centric Networking, August 17, 2012, ACM, Helsinki, Finland, ISBN:978-1-4503-1479-4, pp: 79-84.

Koponen, T., M. Chawla, B.G. Chun, A. Ermolinskiy and K.H. Kim et al., 2007. A data-oriented (and beyond) network architecture. ACM. SIGCOMM Comput. Commun. Rev., 37: 181-192.
CrossRef  |  Direct Link  |  

Nagalakshmi, V. and I. Rameshbabu, 2007. A protocol for Internet Key Exchange (IKE) using public encryption key and public signature key. Intl. J. Comput. Sci. Netw. Secur., 7: 342-346.
Direct Link  |  

Nagalakshmi, V., I.R. Babu and P.S. Avadhani, 2011. Modified protocols for Internet Key Exchange (IKE) using public encryption and signature keys. Proceedings of the 2011 IEEE 8th International Conference on Information Technology: New Generations (ITNG’11), April 11-13, 2011, IEEE, Las Vegas, Nevada, ISBN:978-1-61284-427-5, pp: 376-381.

Ray, S., R. Nandan and G.P. Biswas, 2012. ECC based IKE protocol design for internet applications. Procedia Technol., 4: 522-529.
Direct Link  |  

Smetters, D.K. and V. Jacobson, 2009. Securing network content. Bus. Manage., 1: 1-9.
Direct Link  |  

Wood, C.A. and E. Uzun, 2014. Flexible end-to-end content security in CCN. Proceedings of the 2014 IEEE 11th Conference on Consumer Communications and Networking (CCNC), January 10-13, 2014, IEEE, Las Vegas, Nevada, ISBN:978-1-4799-2355-7, pp: 858-865.

Zhang, L., D. Estrin, J. Burke, V. Jacobson and J. Thornton et al., 2010. Named Data Networking (NDN) project. Master Thesis, PARC, Palo Alto, California, USA.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved