Security
|
Wang et al. [55] |
Integrity checks on the basis of |
Analyzing security threats |
public key infrastructure (PKI) |
|
Mobility
|
Tyson et al. [40] |
Native mobility support |
Two key differences of vehicular ICN |
Routing
|
Amadeo et al. [56] |
Collision avoidance |
Techniques to avoid the explosion of ICN data structures |
|
Amadeo et al. [29] |
Selective flooding scheme |
Selection of dynamic outgoing interfaces |
Naming
|
Yan et al. [57] |
Hierarchical naming schemes |
Agreement on common naming |
|
Quan et al. [58] |
Flat naming scheme |
Agreement on common naming |
Caching
|
Yu et al. [59] |
Caching unsolicited contents |
Smart scope-based caching strategies |