{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T07:12:39Z","timestamp":1770534759089,"version":"3.49.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T00:00:00Z","timestamp":1406505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2014,7,28]]},"abstract":"<jats:p>MobilityFirst is a future Internet architecture with mobility and trustworthiness as central design goals. Mobility means that all endpoints -- devices, services, content, and networks -- should be able to frequently change network attachment points in a seamless manner. Trustworthiness means that the network must be resilient to the presence of a small number of malicious endpoints or network routers. MobilityFirst enhances mobility by cleanly separating names or identifiers from addresses or network locations, and enhances security by representing both in an intrinsically verifiable manner, relying upon a massively scalable, distributed, global name service to bind names and addresses, and to facilitate services including device-to-service, multicast, anycast, and context-aware communication, content retrieval, and more. A key insight emerging from our experience is that a logically centralized global name service can significantly enhance mobility and security and transform network-layer functionality. Recognizing and validating this insight is the key contribution of the MobilityFirst architectural effort.<\/jats:p>","DOI":"10.1145\/2656877.2656888","type":"journal-article","created":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T20:13:24Z","timestamp":1406924004000},"page":"74-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":102,"title":["MobilityFirst"],"prefix":"10.1145","volume":"44","author":[{"given":"Arun","family":"Venkataramani","sequence":"first","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"James F.","family":"Kurose","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Dipankar","family":"Raychaudhuri","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Kiran","family":"Nagaraja","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Morley","family":"Mao","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Suman","family":"Banerjee","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,7,28]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"MobilityFirst:. http:\/\/mobilityfirst.cs.umass.edu\/.  MobilityFirst:. http:\/\/mobilityfirst.cs.umass.edu\/."},{"key":"e_1_2_1_2_1","unstructured":"Named data networking. http:\/\/www.named-data.net\/.  Named data networking. http:\/\/www.named-data.net\/."},{"key":"e_1_2_1_3_1","volume-title":"FIA meetings. http:\/\/www.nets-fia.net\/Meetings\/Fall13\/Agenda-fall-13","author":"Personal","unstructured":"Personal communication at FIA meetings. http:\/\/www.nets-fia.net\/Meetings\/Fall13\/Agenda-fall-13 .html. Personal communication at FIA meetings. http:\/\/www.nets-fia.net\/Meetings\/Fall13\/Agenda-fall-13.html."},{"key":"e_1_2_1_4_1","unstructured":"The Locator\/ID Separation Protocol (LISP). RFC 6830.  The Locator\/ID Separation Protocol (LISP). RFC 6830."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402997"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459961"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015505"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282422"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505906.2505908"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159955"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505906.2505910"},{"key":"e_1_2_1_12_1","volume-title":"USENIX USITS","author":"Cheriton D. R.","year":"2001","unstructured":"D. R. Cheriton and M. Gritter . An architecture for content routing support in the internet . In USENIX USITS , 2001 . D. R. Cheriton and M. Gritter. An architecture for content routing support in the internet. In USENIX USITS, 2001."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486023"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626333"},{"key":"e_1_2_1_15_1","volume-title":"USENIX NSDI","author":"Han D.","year":"2012","unstructured":"D. Han , A. Anand , F. Dogar , B. Li , H. Lim , M. Machado , A. Mukundan , W. Wu , A. Akella , D. G. Andersen , J. W. Byers , S. Seshan , and P. Steenkiste . XIA: Efficient Support for Evolvable Internetworking . In USENIX NSDI , 2012 . D. Han, A. Anand, F. Dogar, B. Li, H. Lim, M. Machado, A. Mukundan, W. Wu, A. Akella, D. G. Andersen, J. W. Byers, S. Seshan, and P. Steenkiste. XIA: Efficient Support for Evolvable Internetworking. In USENIX NSDI, 2012."},{"key":"e_1_2_1_16_1","volume-title":"Wireless World Research","author":"Jokela P.","year":"2004","unstructured":"P. Jokela , P. Nikander , J. Melen , J. Ylitalo , and J. Wall . Host Identity Protocol . In Wireless World Research , 2004 . P. Jokela, P. Nikander, J. Melen, J. Ylitalo, and J. Wall. Host Identity Protocol. In Wireless World Research, 2004."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402961"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/10590.10591"},{"key":"e_1_2_1_19_1","volume-title":"USENIX NSDI","author":"Li M.","year":"2009","unstructured":"M. Li , D. Agrawal , D. Ganesan , and A. Venkataramani . Block-switched Networks: A New Paradigm for Wireless Transport . In USENIX NSDI , 2009 . M. Li, D. Agrawal, D. Ganesan, and A. Venkataramani. Block-switched Networks: A New Paradigm for Wireless Transport. In USENIX NSDI, 2009."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999916.1999922"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.592101"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2080.2081"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626331"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465529.2465764"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345938"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633033"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030634"},{"key":"e_1_2_1_28_1","volume-title":"Trustworthy Internetwork. COMSNETS","author":"Venkataramani A.","year":"2013","unstructured":"A. Venkataramani , X. Tie , A. Sharma , D. Westbrook , H. Uppal , J. Kurose , and D. Raychaudhuri . Design Guidelines for a Global Name Service for a Mobility-Centric , Trustworthy Internetwork. COMSNETS , 2013 . A. Venkataramani, X. Tie, A. Sharma, D. Westbrook, H. Uppal, J. Kurose, and D. Raychaudhuri. Design Guidelines for a Global Name Service for a Mobility-Centric, Trustworthy Internetwork. COMSNETS, 2013."},{"key":"e_1_2_1_29_1","volume-title":"WINLAB","author":"Vu T.","year":"2013","unstructured":"T. Vu , A. Baid , H. Nguyen , and D. Raychaudhuri . EIR: Edge-aware Interdomain Routing Protocol for the Future Mobile Internet. Technical report , WINLAB , 2013 . T. Vu, A. Baid, H. Nguyen, and D. Raychaudhuri. EIR: Edge-aware Interdomain Routing Protocol for the Future Mobile Internet. Technical report, WINLAB, 2013."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.50"},{"key":"e_1_2_1_31_1","volume-title":"UMass SCS","author":"Yadav A.","year":"2013","unstructured":"A. Yadav , A. Venkataramani , A. Sharma , and E. Cecchet . msocket: System Support for Developing Seamlessly Mobile,Multipath, and Middlebox-Agnostic Applications. Technical report , UMass SCS , 2013 . http:\/\/web.cs.umass.edu\/publication\/. A. Yadav, A. Venkataramani, A. Sharma, and E. Cecchet. msocket: System Support for Developing Seamlessly Mobile,Multipath, and Middlebox-Agnostic Applications. Technical report, UMass SCS, 2013. http:\/\/web.cs.umass.edu\/publication\/."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2656877.2656888","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2656877.2656888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:43Z","timestamp":1750231183000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2656877.2656888"}},"subtitle":["a mobility-centric and trustworthy internet architecture"],"short-title":[],"issued":{"date-parts":[[2014,7,28]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,7,28]]}},"alternative-id":["10.1145\/2656877.2656888"],"URL":"https:\/\/doi.org\/10.1145\/2656877.2656888","relation":{},"ISSN":["0146-4833"],"issn-type":[{"value":"0146-4833","type":"print"}],"subject":[],"published":{"date-parts":[[2014,7,28]]},"assertion":[{"value":"2014-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}