{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:31:35Z","timestamp":1771518695057,"version":"3.50.1"},"reference-count":138,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004515","name":"Universiti Kebangsaan Malaysia","doi-asserted-by":"publisher","award":["FRGS\/1\/2019\/ICT03\/UKM\/02\/1"],"award-info":[{"award-number":["FRGS\/1\/2019\/ICT03\/UKM\/02\/1"]}],"id":[{"id":"10.13039\/501100004515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3201083","type":"journal-article","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T19:42:05Z","timestamp":1661283725000},"page":"90254-90270","source":"Crossref","is-referenced-by-count":32,"title":["Named Data Networking: A Survey on Routing Strategies"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9905-2075","authenticated-orcid":false,"given":"Farhan Ahmed","family":"Karim","sequence":"first","affiliation":[{"name":"Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7337-6736","authenticated-orcid":false,"given":"Azana Hafizah Mohd","family":"Aman","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1348-5804","authenticated-orcid":false,"given":"Rosilah","family":"Hassan","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8092-4665","authenticated-orcid":false,"given":"Kashif","family":"Nisar","sequence":"additional","affiliation":[{"name":"Faculty of Computing and Informatics, University Malaysia Sabah, Kota Kinabalu, Sabah, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1919-3407","authenticated-orcid":false,"given":"Mueen","family":"Uddin","sequence":"additional","affiliation":[{"name":"Cybersecurity and Data Science College of Computing and IT, University of Doha for Science and Technology, Doha, Qatar"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.02.001"},{"key":"ref2","volume-title":"How Much Data is Created on the Internet Each day?","author":"Focus","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2737524"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEI.2009.5254698"},{"key":"ref5","volume-title":"Number of Netflix Subscribers 2018","year":"2022"},{"key":"ref6","volume-title":"Netflix\u2014Managing a Still-Hot Business as Its Time Runs Out","year":"2009"},{"key":"ref7","first-page":"1","volume-title":"Cisco visual networking index (VNI), complete forecast update, 2017\u20132022","author":"Jain","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102886"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC50486.2020.9318124"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICVEE50212.2020.9243202"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3066133"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3069054"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3075317"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002932"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/sym12101674"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN48656.2020.9016516"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3046846"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s20071985"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/nigeriacomputconf45974.2019.8949670"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3022243"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/iucc\/dsci\/smartcns.2019.00166"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3014898"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2019.2899247"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2018.2876257"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.3005361"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2980385"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/tssa51342.2020.9310811"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894816"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063490"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2859-7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2020.06.014"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1738\/1\/012040"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/iccs45141.2019.9065737"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/tssa51342.2020.9310909"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102511"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2020.100419"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2935795"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2955139"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384450"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0554-z"},{"key":"ref41","article-title":"Consumer\/producer communication with application level framing in named data networking","volume-title":"2nd ACM Conf. Inf.-Centric Netw","author":"Wang"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2013.6665203"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2016.7846751"},{"key":"ref44","volume-title":"Moving to NDNx","year":"2019"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440637"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701086"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701147"},{"key":"ref48","volume-title":"Public key management in named data networking","author":"Yu","year":"2015"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2016.01.001"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.04.017"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0715-0"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2880444"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8237-5_51"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3390\/info9110264"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100353"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108232"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2317307.2317319"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2016.7590394"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA51342.2020.9310886"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CSE\/EUC.2019.00075"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2789330"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0209-8"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1700698"},{"issue":"5","key":"ref64","first-page":"1625","article-title":"MPR based secure content routing scheme for NDN-MANET","volume":"20","author":"Guo","year":"2019","journal-title":"J. Internet Technol."},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2021.04.016"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/icend.2015.7328529"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/iacc.2017.0081"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/wts.2017.7943538"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/icacccn.2018.8748851"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/iceca49313.2020.9297550"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/isco.2015.7282322"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/iccsn.2016.7587198"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.09.002"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2789330"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.7763\/IJIEE.2012.V2.88"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.11.003"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3390\/app10175759"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849267"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25017-5_48"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2013.6686541"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.04.005"},{"key":"ref82","first-page":"1","article-title":"MobileCCN: Wireless Ad-hoc content-centric networks over smartphone","volume-title":"Proc. ACM Int. Conf. Future Internet Tech. (CFI)","author":"Yao"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/WMNC.2016.7543988"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.14.9.819-825"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.3390\/fi11060139"},{"key":"ref86","first-page":"80","article-title":"A routing protocol proposal for NDN based Ad hoc networks combining proactive and reactive routing mechanism","volume-title":"Proc. 13th Adv. Int. Conf. Telecommun. (AICT)","author":"Minh"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.3390\/sym11111409"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.008"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-97774-0_33"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7785321"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990760"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8762055"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810173"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491231"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733578"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2018.8697026"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52249-0_47"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-019-0119-6"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.04.003"},{"key":"ref100","volume-title":"OSPFN: An OSPF based routing protocol for named data networking","author":"Wang","year":"2012"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5250"},{"key":"ref102","article-title":"NDVR: NDN distance vector routing","volume-title":"arXiv:2102.13584","author":"Brito","year":"2021"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2019.00057"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.049"},{"key":"ref105","volume-title":"EIGRP\u2014A fast routing protocol based on distance vectors","author":"Albrightson","year":"1994"},{"key":"ref106","volume-title":"Multi-publisher routing protocol for named data networks","author":"Mosko","year":"2016"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767345"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.3390\/s19092144"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2725238"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.08.008"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/1859983.1859986"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/APWiMob48441.2019.8964134"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2354294"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660140"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA.2017.8272942"},{"key":"ref116","article-title":"Routing and applications of vehicular named data networking","author":"Aldahlan","year":"2021"},{"key":"ref117","volume-title":"Implementation and real-world evaluation of routing protocols for wireless Ad hoc networks","author":"Lundgren","year":"2002"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2014.6882665"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28166-7_12"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.3390\/app11094064"},{"key":"ref121","volume-title":"Link-State Routing-Update Algorithm","year":"2020"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1361\/1\/012058"},{"key":"ref123","first-page":"1","article-title":"Interest flooding attack and countermeasures in named data networking","volume-title":"Proc. IFIP Netw. Conf.","author":"Afanasyev"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100216"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600230CM"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74439-1_8"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT.2017.8256727"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2134866"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-017-0014-y"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ICWT47785.2019.8978267"},{"key":"ref131","volume-title":"NDN-NP: Named Data Networking Next Phase\u2014Proposal","author":"Claffy","year":"2014"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.3390\/s20174859"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2017.1281173"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06853-6"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018600"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660141"},{"key":"ref137","volume-title":"Named data networking (NDN) project 2012\u20132013 annual report","author":"Jacobson","year":"2013"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v9i5.pp4147-4153"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09864583.pdf?arnumber=9864583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T02:01:14Z","timestamp":1710381674000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9864583\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":138,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3201083","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}