Skip to main content
. 2018 Nov 15;18(11):3957. doi: 10.3390/s18113957

Table 1.

Summary of ICN-based Vehicular Communications Research [9].

ICN Module Reference Contributions Challenge
Security Wang et al. [55] Integrity checks on the basis of Analyzing security threats
public key infrastructure (PKI)
Mobility Tyson et al. [40] Native mobility support Two key differences of vehicular ICN
Routing Amadeo et al. [56] Collision avoidance Techniques to avoid the explosion of ICN data structures
Amadeo et al. [29] Selective flooding scheme Selection of dynamic outgoing interfaces
Naming Yan et al. [57] Hierarchical naming schemes Agreement on common naming
Quan et al. [58] Flat naming scheme Agreement on common naming
Caching Yu et al. [59] Caching unsolicited contents Smart scope-based caching strategies