{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T00:57:34Z","timestamp":1771030654466,"version":"3.50.1"},"reference-count":112,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"USM RUI","award":["1001\/PKOMP\/811336"],"award-info":[{"award-number":["1001\/PKOMP\/811336"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2919534","type":"journal-article","created":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:27Z","timestamp":1559245827000},"page":"71827-71858","source":"Crossref","is-referenced-by-count":81,"title":["Survey on the Incorporation of NDN\/CCN in IoT"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4324-2651","authenticated-orcid":false,"given":"Ahed","family":"Aboodi","sequence":"first","affiliation":[]},{"given":"Tat-Chee","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Gian-Chand","family":"Sodhy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"CCNx for contiki: Implementation details","author":"saadallah","year":"2012"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970748"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2014.6882665"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2017.37"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366345"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486023"},{"key":"ref37","year":"0","journal-title":"Ccn-lite"},{"key":"ref36","year":"2017","journal-title":"NDN Forwarding Process"},{"key":"ref35","year":"2012","journal-title":"CCNx - PARC"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/RIOT.2015.7104902"},{"key":"ref28","year":"2014","journal-title":"NDN Technical Memo Naming Conventions"},{"key":"ref27","article-title":"Fetching content in Named Data Networking with embedded manifests","author":"moiseenko","year":"2014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4108\/icst.simutools.2014.254630"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502049"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI.2015.44"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7437030"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.05.385"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.06.007"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.358967"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.cosrev.2016.01.001","article-title":"Named data networking: A survey","volume":"19","author":"saxena","year":"2016","journal-title":"Comput Sci Rev"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491227"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2873343"},{"key":"ref50","author":"de","year":"2010","journal-title":"Building Automation Routing Requirements in Low Power and Lossy Networks"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2012.01.003"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970725"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2016.08.007"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444734"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248395"},{"key":"ref55","article-title":"IPv6 home networking architecture principles","author":"chown","year":"2013"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2491691"},{"key":"ref53","first-page":"1102","article-title":"Information-centric networking based homenet","author":"ravindran","year":"2013","journal-title":"Proc IFIP\/IEEE IM Workshop 5th Int Workshop Manage Future Internet (ManFI)"},{"key":"ref52","article-title":"Draft-ma-core-dhcp-pd-01&#x2013;dhcp option for CoAP proxy discovery","author":"ma","year":"2012"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref3","author":"zhang","year":"2010","journal-title":"Named Data Networking Project"},{"key":"ref6","article-title":"A survey of information-centric networking (draft)","author":"ahlgren","year":"2011","journal-title":"Proc Dagstuhl Seminar 10492 Inf Centric Netw"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00063"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ComManTel.2013.6482384"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"key":"ref46","year":"2018","journal-title":"FreeRTOS A FREE open source RTOS for small embedded real time systems"},{"key":"ref45","first-page":"115","article-title":"TinyOS: An operating system for sensor networks","author":"levis","year":"2007","journal-title":"Ambient Intelligence"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2013.63"},{"key":"ref47","year":"2018","journal-title":"Berkeley&#x2019;s OpenWSN Project"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7849061"},{"key":"ref41","first-page":"123","article-title":"CCN-WSN&#x2014;A lightweight, flexible content-centric networking protocol for wireless sensor networks","author":"ren","year":"2013","journal-title":"Proc IEEE Int Conf Intell Sensors Sensor Netw Inf Process"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.058"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2505901"},{"key":"ref73","first-page":"1","article-title":"TCCN: Tag-assisted content centric networking for Internet of Things","author":"song","year":"2015","journal-title":"Proc IEEE Int Symp World of Wireless Mobile and Multimedia Networks (WoWMoM)"},{"key":"ref72","first-page":"166","article-title":"OnboardICNg: A secure protocol for on-boarding IoT devices in ICN","author":"compagno","year":"2016","journal-title":"Proc IEEE Int Conf Netw"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2725238"},{"key":"ref70","year":"2017","journal-title":"Node js"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.4108\/eai.19-8-2015.2260888"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298309"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654770"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849279"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.3390\/su10072576"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417355"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2014.34"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970726"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6843232"},{"key":"ref63","article-title":"Authenticated lighting control using named data networking","author":"burke","year":"2012"},{"key":"ref64","article-title":"Publish-subscribe communication in building management systems over named data networking","author":"shang","year":"2018"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057193"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2354294"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.jnca.2016.01.016","article-title":"A secure IoT management architecture based on information-centric networking","volume":"63","author":"suarez","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384449"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6704479"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2015.57"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1278972.1278992"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.03.009"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2597850"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808417"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2015.103"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2013.6686486"},{"key":"ref106","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.comcom.2016.03.011","article-title":"On the application of contextual IoT service discovery in Information Centric Networks","volume":"89","author":"quevedo","year":"2016","journal-title":"Comput Commun"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ChiCC.2016.7553733"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3007748.3007760"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2764889"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660148"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2723843"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-3-642-40552-5_19","article-title":"Efficient data aggregation with CCNx in wireless sensor networks","volume":"8115","author":"teubler","year":"2013","journal-title":"Advances in Communication Networking"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2017.8228157"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893262"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2230411"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355230"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2781372"},{"key":"ref99","first-page":"671","article-title":"Packet routing in dynamically changing networks: A reinforcement learning approach","author":"boyan","year":"1993","journal-title":"Proc 6th Int Conf Neural Inf Process"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.087"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6994403"},{"key":"ref10","year":"2018","journal-title":"Comet Project Overview"},{"key":"ref11","author":"ain","year":"2009","journal-title":"D2 3-Architecture Definition Component Descriptions and Requirements"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2642194"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986623"},{"key":"ref14","article-title":"NFD developer&#x2019;s guide","author":"afanasyev","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660144"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2018.00046"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.058"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-TW.2016.7520967"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.801752"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2014.7119766"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.12.002"},{"key":"ref19","article-title":"ICN baseline scenarios","author":"pentikousis","year":"2013"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2677922"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1145\/98460.98525","article-title":"An approximate analysis of the LRU and FIFO buffer replacement schemes","volume":"18","author":"dan","year":"1990","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22572-2_23"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-131X(199705)16:3<147::AID-FOR652>3.0.CO;2-X"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2015.7158165"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849267"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015EDL8244"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08726307.pdf?arnumber=8726307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T17:20:31Z","timestamp":1643304031000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8726307\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":112,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2919534","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}