{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T05:10:10Z","timestamp":1748063410730,"version":"3.41.0"},"reference-count":102,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3570736","type":"journal-article","created":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T17:46:01Z","timestamp":1747417561000},"page":"87068-87089","source":"Crossref","is-referenced-by-count":0,"title":["Cache Invalidation-Based Optimization in Next Generation Wireless Network: Taxonomy, Review, and Future Directions"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8245-4748","authenticated-orcid":false,"given":"Rajeev","family":"Tiwari","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence, Bennett University, Greater Noida, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7461-5521","authenticated-orcid":false,"given":"Sumit","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0909-2258","authenticated-orcid":false,"given":"Shashank","family":"Sheshar Singh","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5401-3507","authenticated-orcid":false,"given":"Harish Kumar","family":"Shakya","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence and Machine Learning, School of Computer Science and Engineering, Manipal University at Jaipur, Jaipur, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3510561"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3304707"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS51141.2021.9432258"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2011.03.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2008.11"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.07.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04459-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-012-0791-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2020.12.018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3455993"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2021.118086"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3145813"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2004.838218"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235305"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTECH.2011.5941897"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.60"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.83414"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-007-0071-4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2867-3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3414255"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNT.2010.39"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-024-11132-0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2702613"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3433491"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3416947"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.trb.2024.102971"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106589"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672213"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.188"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1232276"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3941-6_14"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.057"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3098459"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2007.19"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577797"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.02.020"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3447786.3456239"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2004.1356801"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2010.5645018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.37"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP.2012.6292686"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.10.013"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/191843.191844"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2001.970775"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015463328335"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2003.1235858"},{"issue":"2","key":"ref48","first-page":"119","article-title":"Energy efficient cache invalidation in a mobile environment","volume":"3","author":"Chand","year":"2005","journal-title":"J. Digit. Inf. Manage."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.30"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.08.003"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.18"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1506270.1506272"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019144304789"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/71.946652"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.03.002"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2004.1392084"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2008.118"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2012.6449945"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.39"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14478-3_5"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013616213333"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2000.875019"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.03.005"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.08.014"},{"key":"ref65","first-page":"336","article-title":"Energy-efficient caching for wireless mobile computing","volume-title":"Proc. 12th Int. Conf. Data Eng.","author":"Wu"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2285611"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2425364"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.01.020"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-0070-1"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3536"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99010-1_54"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3216122.3216147"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991053"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3163776"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3350674"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05823-x"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1266293"},{"key":"ref78","first-page":"57","article-title":"A scheme for cooperative caching in mobile peer to peer network","volume-title":"Proc. IEEE Int. parllel Distrib. Process. Symp.","author":"Shen"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-010-0438-7"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.15"},{"issue":"3","key":"ref81","first-page":"21","article-title":"Proactive approach for cooperative caching in mobile adhoc networks","volume":"7","author":"Kumar","year":"2010","journal-title":"Int. J. Comput. Sci. Issues (IJCSI)"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127776"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.028"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.5120\/3174-4276"},{"key":"ref85","first-page":"38","article-title":"Strategies for cache invalidation of location dependent data in mobile environment","volume-title":"Proc. Pdpta","author":"Kumar"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07402-2"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-020-2431-y"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03538-6"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03405-1"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-3346-1_40"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.3390\/s21217204"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849279"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.029"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.14"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3268775"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.3390\/s23104767"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2200247"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00048"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2907195"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/AECE59614.2023.10428526"},{"article-title":"Cooperative caching in vehicular networks-distributed cache invalidation using information freshness","year":"2018","author":"Jayaram","key":"ref101"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/PACT52795.2021.00024"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11006088.pdf?arnumber=11006088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T04:43:22Z","timestamp":1748061802000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11006088\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":102,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3570736","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}