Abstract
Due to CCN has the advantages of content-centric, unstructured, chunk-level and multipath, the Content Centric Mobile Ad-hoc Network (CCMANET) applies the advantages of Content Centric Network (CCN) to Mobile Ad-hoc Network (MANET). The method solves the problems of low efficiency and unstable in transmission, which caused by nodes movement, dynamical changes of topology, limited node capacity, instability of wireless channel. This paper provides an overview of the existing technologies in CCMANET. Firstly, the paper introduces the basic principle and the new features of CCMANET. Secondly, the key techniques, such as caching, routing, mobility management and security are visited. From this, some important remaining challenges are raised.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Conti, M., Giordano, S.: Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Commun. Mag. 52(1), 85–96 (2014)
Chandravanshi, K., Mishra, D.K.: Minimization of routing overhead on the bases of multipath and destination distance estimation mechanism under MANET. IEEE Commun. Mag. 46(11), 55–61 (2017)
Tran, T.X., Hajisami, A., Pandey, P., et al.: Collaborative mobile edge computing in 5G networks: new paradigms, scenarios, and challenges. IEEE Commun. Mag. 55(4), 54–61 (2017)
Chen, K., Shen, H., Zhang, H.: Leveraging social networks for P2P content-based file sharing in disconnected MANETs. IEEE Trans. Mob. Comput. 13(2), 235–249 (2014)
Singal, G., Laxmi, V., Gaur, M.S., et al.: Moralism: mobility prediction with link stability based multicast routing protocol in MANETs. Wirel. Netw. 23(3), 663–679 (2017)
Vijayalakshmi, M., Sreenivasarao, D.: Dynamic quality of service stability based multicast routing protocol for MANETs (DQSMRP). In: International Conference on Computer Science, Information Technology and Applications, pp. 159–173 (2017)
Li, B., Ma, M., Yang, X.: Perceptive forwarding in content-centric networks. IEEE Access 99, 1 (2017)
Yao, S., Zhang, X., Lao, F.: MobileCCN: wireless ad-hoc content-centric networks over smartphone. In: Proceeding of ACM International Conference on Future Internet Technologies, 5–7 June, pp. 1–2 (2013)
Bosunia, M.R., Kwon, S., Jeong, S.H.: A CCN-based multi-source and multi-path transport mechanism for wireless mobile networks. In: IEEE International Conference on Information Networking, pp. 30–34 (2017)
Jia, S., Xu, C., Vasilakos, A.V.: Reliability-oriented ant colony optimization-based mobile peer-to-peer VoD solution in MANETs. Wirel. Netw. 20(5), 1185–1202 (2014)
Guo, H., Wang, X., Cheng, H., et al.: A routing defense mechanism using evolutionary game theory for Delay Tolerant Networks. Appl. Soft Comput. 38, 469–476 (2016)
Zettervall, S.L., Lu, J., Kuang, X., et al.: IP075. Elective open abdominal aortic aneurysm repair following prior EVAR with unsatisfactory results is not associated with increased mortality or major morbidity. J. Vasc. Surg. 65(6), 76S (2017)
Liu, S., Ölveczky, P.C., Meseguer, J.: A framework for mobile ad hoc networks in real-time maude. In: Escobar, S. (ed.) WRLA 2014. LNCS, vol. 8663, pp. 162–177. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12904-4_9
Yuan, M., Yang, Z., Huang, G., et al.: Feature selection by maximizing correlation information for integrated high-dimensional protein data. Pattern Recogn. Lett. 92, 17–24 (2017)
Chen, H.L., Lou, L.: Contact expectation based routing for delay tolerant networks. Ad Hoc Netw. 36, 244–257 (2016)
Li, S., Hu, D., Fang, W., et al.: Protocol oblivious forwarding (POF): software-defined networking with enhanced programmability. IEEE Netw. 31(2), 58–66 (2017)
Hines, P.D.H., Dobson, I., Rezaei, P.: Cascading power outages propagate locally in an influence graph that is not the actual grid topology. IEEE Trans. Power Syst. 32(2), 958–967 (2017)
Ren, F., Qin, Y., Zhou, H., et al.: Mobility management scheme based on software defined controller for content-centric networking. In: IEEE Computer Communications Workshops, pp. 193–198 (2016)
Chen, Y., Qu, Z., Rastogi, V.: System and Method for Proxy-Based Data Access Mechanism in Enterprise Mobility Management. US20170076103 (2017)
Guo, J., Chen, I.R., Tsai, J.J.P.: A hierarchical cloud architecture for integrated mobility, service, and trust management of service-oriented IoT systems. In: IEEE Sixth International Conference on Innovative Computing Technology, pp. 72–77 (2017)
Ramadza, I., Ozegovic, J., Pekic, V.: Class based tunnel exclusion router architecture. In: IEEE International Conference on Software, Telecommunications and Computer Networks, pp. 274–278 (2015)
Hassouna, M., Barry, B., Bashier, E.: A new level 3 trust hierarchal certificateless public key cryptography scheme in the random oracle model. Int. J. Netw. Secur. 19, 551–558 (2017)
Wang, G.Q., Tong, W.: System and method for a context layer switch. US, US9319311 (2016)
Younes, E.B.E.I., Fatna, E.M., Nisrine, M.: A security approach for social networks based on honeypots. In: IEEE International Colloquium on Information Science and Technology, pp. 638–643 (2017)
Tan, Y., Zhu, S.: Efficient name lookup scheme based on hash and character trie in named data networking. In: IEEE Web Information System and Application Conference, pp. 130–135 (2015)
Acknowledgements
This work was supported by the Foundation for National Key R&D Program of China plan under Grant 2016YFC0801800.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Huo, Y., Fan, W., Liu, Y., Li, D. (2018). An Overview of CCMANET: Content Centric MANET. In: Li, B., Shu, L., Zeng, D. (eds) Communications and Networking. ChinaCom 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 237. Springer, Cham. https://doi.org/10.1007/978-3-319-78139-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-78139-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78138-9
Online ISBN: 978-3-319-78139-6
eBook Packages: Computer ScienceComputer Science (R0)