Professional Documents
Culture Documents
PII: S0140-3664(19)31690-1
DOI: https://doi.org/10.1016/j.comcom.2020.05.003
Reference: COMCOM 6402
Please cite this article as: A. Djama, B. Djamaa and M.R. Senouci, Information-Centric
Networking solutions for the Internet of Things: A systematic mapping review, Computer
Communications (2020), doi: https://doi.org/10.1016/j.comcom.2020.05.003.
This is a PDF file of an article that has undergone enhancements after acceptance, such as the
addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive
version of record. This version will undergo additional copyediting, typesetting and review before it
is published in its final form, but we are providing this version to give early visibility of the article.
Please note that, during the production process, errors may be discovered which could affect the
content, and all legal disclaimers that apply to the journal pertain.
of
Internet of Things: A Systematic Mapping Review
Adel Djama, Badis Djamaa, Mustapha Reda Senouci
pro
Distributed and Complex Systems Lab.
Ecole Militaire Polytechnique
Algiers, Algeria
Abstract
re-
Due to the similarity between the data-driven nature of sensor and actuator
networks enabling the Internet of Things (IoT) and the data-oriented model
of Information-Centric Networks (ICN), recent research began investigating
ICN-based IoT systems. This paper provides a thorough systematic
mapping review of such research with the aim to identify their strengths,
weaknesses, and open-research issues. Thus, after introducing the IoT
lP
ecosystem, its main requirements, existing IP-based solutions, and their
limitations, the survey investigates the ICN-IoT associations that have been
proposed in the recent literature. To do so, a new taxonomy that captures
the fundamental aspects of ICN-based IoT solutions is introduced along
with a multidimensional framework that provides a comprehensive
rna
1. Introduction
of
The current Internet architecture is being transformed into a hyper
network of networks called the Internet of Things (IoT) where everyday
objects and devices are interconnected through the Internet whatever their
location (home, work, city, etc.), their form (a table, a car, a book, a
pro
sensor/actuator, etc.), and their ownership in order to create unprecedented
services and opportunities. Indeed, the IoT will connect 75 billion objects
to the Internet by 2025 [1] and promises to revolutionize our future with
new applications in smart homes, buildings, cities, commerce, agriculture,
travel and transportation, health and personal care, construction, and
industry, to name a few. These applications will create new opportunities
that help increase productivity, facilitating daily activities, enforcing
re-
security and safety, and promoting innovation. Such a multitude of
applications and number of resource-constrained heterogeneous objects,
however, raises the bar of challenges facing the design and management of
scalable, reliable and secure IoT solutions and architectures.
At first, industrials acting in the field, such as Zigbee, Z-Wave, and
LoRa Alliances started proposing proprietary vertical IoT solutions. For
lP
instance, the Zigbee Alliance is based on the IEEE 802.15.4 specification
and provides a high-level protocol allowing low-power communication of
personal or domestic constrained devices to create IoT solutions for smart
health, homes, and buildings. While such solutions showed the potential of
IoT, they resulted in creating fragmented vertical markets, built around
rna
adopt the existing Internet architecture and standards, built around the
TCP/IP network stack standardized by the IETF (Internet Engineering
Task Force). Nevertheless, the constraints of IoT environments and the
limits of its objects in terms of energy, computing, memory, and
communication resources have pushed towards adaptations. Thus, the
IETF 6LoWPAN (IPv6 over Low-power Wireless Personal Area Network)
2
Journal Pre-proof
working group was created with the aim of adapting the IPv6 protocol to
of
the constraints of connected objects. Following this, the IETF ROLL group
created new routing protocols dedicated to intelligent objects and the
CoRE group is standardizing application layer protocols. Nonetheless, there
is a fundamental discordance between the host-centric nature of the actual
pro
Internet architecture and the information-centric nature of the majority of
IoT systems, where the focus is in the generated data itself instead of its
location.
To overcome this problem, the Information-Centric Networking (ICN)
architecture [3] offers an interesting alternative thanks to its native
data-oriented nature. Indeed, ICN secret sauce resides in its capacity of
giving object names, which are managed directly at the network layer in
order to serve content queries. Also, ICN allows multihoming handling
re-
thanks to its inherent multicast/anycast support, and offers efficient
content-based security mechanisms, by embedding all security-parameters
in the content itself since its creation. Additionally, practical ICN
implementations including NetInf [4], PURSUIT [5], CCNx [6], and
NDN [7] are being deployed. For instance, NDN is implemented on a
lP
real-world testbed containing 40 nodes and 102 links, deployed over many
countries.
The aforementioned ICN characteristics provide interesting solutions to
IoT applications. Indeed, an ICN-IoT association can exploit the main
strengths of ICN architectures concerning naming, inherent security,
in-network caching, and native mobility support to address IoT
rna
3
Journal Pre-proof
of
IoT challenges has been shown building upon key ICN components, such
as naming, caching, discovery, and security. Nevertheless, this paper has
been mainly devoted to explain the emergent concept of the ICN and its
applicability to the IoT environment, while discussing the possible modes of
pro
deployment of this association, without an in-depth analysis of the reviewed
research.
The authors in [9] proposed a survey of the literature related to the ICN-
IoT solutions. Indeed, after showing the basic requirements of IoT networks
and the advantages offered by ICN, the authors discussed the feasibility of the
ICN-IoT combination, which was followed by surveying collected approaches
in this field. To this end, they proposed to classify the collected research into
four categories, reflecting the major mechanisms of ICN, namely: naming,
re-
caching, mobility, and security. Operating systems and simulation tools that
have been used in the ICN-IoT domain have been also listed in this paper.
However, this survey did not address other important intrinsic main features
offered by ICN, such as QoS support, deployment mode, fault-tolerance, load
balancing, and service differentiation.
lP
In [10], the authors review different research axes in the field of IoT
in terms of development, challenges, and future needs, and highlight the
advantages offered by ICN architectures, as a strongly recommended solution.
Beside, two use cases of applying ICN to IoT applications were discussed in
this survey, namely smart lighting and smart home. However, similarly to [9],
this study lists the research work according to the four main characteristics
rna
of ICN (caching, naming, mobility, and security) and did not identify any
other features of the surveyed studies.
Another survey analysing ICN usage in IoT networks is proposed in
[11]. The surveyed research was classified according to four application
domains, namely: smart grid, smart building, smart home, and smart
health. Besides, a comparative study, of a chosen subset, has been
conducted regarding ICN properties, including naming, caching, mobility,
Jou
routing, and security. However, these key obvious ICN features, no other
intrinsic functionalities of the investigated solutions that have been
considered in this survey.
The authors of [13], survey the ICN-based IoT solutions from the angles
of communication architectures, design issues, and research opportunities.
To this end, the authors pinpointed the inherent ICN features and their
suitability for the IoT. This is followed by a discussion of existing IoT
4
Journal Pre-proof
of
before showing the research opportunities of the integration of ICN-based
IoT with cloud computing, software-defined networks, edge computing, fog
computing, and 5G networks. Nevertheless, the survey lacks identification
and discussion of some intrinsic aspects of the reviewed literature, such as
pro
deployment mode, service model, network supported features, and
guaranteed QoS.
Besides, [12] presents a detailed state of the art on the application of the
NDN architecture in the IoT, while relying on a set of defined modules
adopted in a proposed taxonomy of related research, including device and
data naming, caching, forwarding, routing, access control, data aggregation,
device configuration and discovery. Thereafter, the authors carried out a
comparative analysis of the collected works according to the identified
re-
modules, before projecting them on the same evaluation grid to identify the
characteristics and functionalities supported by each solution. However,
some key features were not considered in this evaluation grid, such as
security, QoS, and mobility support.
Finally, the most recent collected survey [14], addresses existing ICN
lP
solutions from the IoT perspective, classified by ICN components and
aspects. Different analysis axes of the surveyed research are considered in
this study, basically related to the domain-specific applications, general
ICN-IoT issues, publish-subscribe model, QoS support, security, mobility,
interoperability with IP-based architectures, and wireless aspect of the IoT.
For each analysis axe, an in-depth discussion has been proposed for the
rna
research works, while projecting them on the same evaluation grid, with a
description and/or comparison according to the main characteristics.
Besides, research challenges and future directions related to ICN-IoT were
drawn in this survey basing on the proposed analysis. Nevertheless, despite
the rich proposed comparison approach, it can be observed that the survey
has missed some important intrinsic IoT network features, such as fault
tolerance, scalability, load balancing, and differentiation of heterogeneous
Jou
5
Journal Pre-proof
of
summarizes the existing ICN-IoT surveys in the literature, along with their
main characteristics.
pro
Features
Open research
IP-based IoT
requirements
methodology
limitations
survey
issues
IoT
Ref.
[8]
[9]
[10]
7
7
7
X
X
X
X
7
7 re-
X
X
X
ICN features.
ICN inherent features (in-depth analysis),
operating systems, and simulation tools.
ICN features and ICN-IoT use cases.
X
X
X
[11] 7 X X X ICN features and ICN-IoT application areas. 7
ICN-based IoT issues, communication
[13] 7 7 7 X standards for IoT, and the integration of X
lP
ICN-based IoT with the existing architectures.
ICN-based IoT applications, ICN features
[12] 7 7 7 X (detailed analysis), service model, ICN data 7
structures, and evaluation metrics.
Domain specific IoT-ICN use cases,
general IoT–ICN issues, Publish–subscribe,
[14] 7 X 7 X X
QoS, security, mobility, synchronization,
rna
6
Journal Pre-proof
of
summarized as follows:
pro
• We present a brief overview on the ICN architecture as well as its
inherent features, which constitute its power while handling IoT
applications.
key features and promises for the IoT. Section 4 is devoted to presenting
our survey of ICN-IoT research, where a taxonomy of the literature is
proposed and a comprehensive comparative multicriteria analysis is
realized. Open research issues at both the technical and socio-economical
sides are identified and discussed in Section 5. The paper ends in Section 6
with a conclusion summarizing the key insights.
7
Journal Pre-proof
of
2.1. IoT environments
The rapid development of low-cost, miniature, connected devices, such as
tags, sensors, and actuators allowed to create innovative solutions that can be
pro
used and deployed in every domain of human life. Such devices might be in
charge of gathering information in different environments, including natural
ecosystems, buildings, and factories, as well as sending the information to one
or more remote stations. They can also monitor key physiological parameters
of our health and generate alarms of any abnormal behavior at the right time
to preserve our lives. They are also expected to make cooperative operations
and decisions, based on the collected information, and act physically in the
deployment environments.
re-
These smart objects are, generally, characterized by low computation,
memory, and storage capabilities, and may operate under severe resource
constraints such as insufficient wireless bandwidth and very limited ability
to communicate. Indeed, according to their intrinsic capabilities, the
microcontroller-based devices can be classified into five (5) classes [16], as
illustrated in Table 2. The most powerful class of such devices has a
lP
maximum of 1MiB in RAM, whereas typical classes such as C2 has only
250KiB ROM and 50KiB RAM.
Class Name RAM size Code size (Flash) Example Energy category
Class 0 (C0) 10 KiB 100 KiB ATtiny85 E1 / E2
Class 1 (C1) ∼ 10 KiB ∼ 100 KiB Waspmote E1 / E2
Class 2 (C2) ∼ 50 KiB ∼ 250 KiB iNEMO E1 / E2
Class 3 (C3) ∼ 100 KiB ∼ 500..1000 KiB M3 open node E1 / E2
Class 4 (C4) ∼ 300..1000 KiB ∼ 1000..2000 KiB A8 Open Node E1
8
Journal Pre-proof
of
may work under severe energy constraints where devices are powered by
non-replaceable batteries (E2). It should be noted that even, in the case
where nodes can be mains-powered (energy category E9), low-power
operations are required as not to create a burden on the energy bill.
pro
Additionally, smart objects are interconnected by a multitude of
communication technologies, including Power Line Communication (PLC),
Visible Light Communication (VLC), Low Power Wide Area Network
(LPWAN), and Low power Lossy Networks (LLN). The latter has been
defined by the IETF, which includes both wired and wireless networks
mainly composed of resources constrained nodes, where several standards
based on a lightweight resource consumption design have been developed,
such as IEEE 802.15.4, IEEE 802.15.4e, Bluetooth Low Energy (BLE),
re-
Wi-Fi HaLow, and Z-Wave. LPWAN technologies with low power and
long-range communication characteristics include SigFox, LoRa, and
NB-IoT.
9
Journal Pre-proof
Recently, RIOT and openWSN start gaining popularity in the IoT space
of
thanks to their unique features. For instance, RIOT provides full support of
multi-threading as well as real-time capabilities, while openWSN
implements a fully standards-compliant protocol stack for IP-based
(industrial) IoT solutions.
pro
Built around smart devices and within their platforms, IoT applications
cover today a wide range of fields, starting from embedded on-body
applications to heavy industrial ones [13]. Fig. 1 illustrates the main IoT
application domains. As can be witnessed from this figure, most of IoT
applications require a certain form of mobility support. Thus, while smart
healthcare, transportation and industrial applications require explicit
mobility support, the reminder requires implicit support since the
connection/disconnection of IoT links may make the nodes appear moving
re-
even when they are physically static.
Smart
Healthcare
Smart
lP
Agriculture
Smart
Industry
(IoT) Transportation
Smart
Grid
Smart
Smart Home
City
Jou
10
Journal Pre-proof
of
The resource limitations of connected IoT devices, along with the
unreliable nature of their communication technologies, induce several
requirements to be considered by the components of the adopted IoT
architecture [23]. In the sequel, we discuss the most prominent ones.
pro
• Naming: The deployment of IoT architectures on a wide scale
requires to assign a unique name for each node, its generated data,
and provided services. Such naming scheme must be persistent face to
the dynamic properties of IoT networks (energy depletion, mobility,
failures, etc.). In addition, it must be concise in order to take into
account the storage, processing and communication constraints. At
the same time, the naming scheme should be complete as to capture
re-
the complexity of IoT environments.
• Security and Privacy: Since IoT nodes make attached physical
entities accessible through the Internet, security becomes a major
challenge. Indeed, IoT systems involve critical infrastructures
including energy and industrial systems, along with critical data
lP
coming from smart healthcare systems, which have a direct impact on
human lives. This puts forward the critical role of security and
privacy in IoT environments. In fact, failing to protect and secure an
IoT system might prevent its adoption.
• Scalability: Proposed architectures in the IoT have to use reliable
rna
and flexible mechanisms that scale with the huge number of connected
objects and deal seamlessly with the explosion of the generated data
traffic.
• Lightweight design and Energy efficiency: As discussed above,
the nodes composing the IoT environment vary according to their
resources: computation, memory, bandwidth, energy, and storage,
which requires lightweight proposals and algorithms that could fit in
Jou
11
Journal Pre-proof
of
wireless connections. Besides, storage capabilities might be also
required for medium and long-term data collection, where preselected
storage points in the network are chosen to optimize computational
and control overhead.
pro
• Support for mobility and QoS: Architectures designed for IoT
must be able to offer reliable data communication in both ad hoc and
infrastructure modes, in addition to supporting connection failures,
mobility, and ensuring QoS in such heterogeneous networks.
the IEEE 802.15.4 MAC layer (layer 2), and similar technologies, and the
IP network layer (layer 3), as illustrated in Fig. 2. This intermediate layer
permits to build low bit-rate IP communication over constrained links and
therefore expands the capability of TCP/IP-based networks to handle IoT
requirements. The Routing Protocol for Low-Power and Lossy Networks
(RPL) [27] builds upon the 6LoWPAN adaptation layer to provide efficient
12
Journal Pre-proof
of
Constrained Application Protocol (CoAP) [28], a lightweight RESTful
protocol presents interesting mechanisms for seamless application-layer
integration and interoperabilty of heterogeneous IoT systems following
REST architectural design. It should be noted that the IETF has, recently,
pro
chartered a new working group to adopt IPv6 over LPWAN Networks.
re-
lP
Indeed, IPv4 has shown its limits for the addressing of objects on the
Internet, due to its reduced address space, which is why IPv6 has emerged
by allowing a wider range of addresses. However, because of its length,
IPv6 cannot be supported without adaptation (e.g., 6LoWPAN) by wireless
sensors/actuators.
Furthermore, address assignment and naming management require
additional burden. For instance, all IP-based solutions implicitly use two
13
Journal Pre-proof
indispensable network services, the Domain Name Service (DNS) and the
of
Dynamic Host Configuration Protocol (DHCP). The latter deals with the
assignment of IP addresses to the nodes in the network, while the former is
in charge of the correspondence between these IP addresses (level 3) and
the names of resources shared between the users (application level). These
pro
two key services related to the IP architecture require, for each, a dedicated
infrastructure, thus negatively impacting the performance of the
communication protocols and further encumbering the network functioning.
Moreover, being a host-centric architecture, where the address plays a
significant role, IP-based IoT solutions make the continuity and reliability
of communication an arduous task especially in a context of mobility or
network instability. Besides, the IP architecture uses additional protocols to
support security and heterogeneity aspects in the network, which inevitably
re-
introduces extra complexity and overhead, and is consequently not
recommended in the context of IoT. Table 4 summarizes the basic TCP/IP
support and its limitations for the IoT domain.
As shown in Table 4 and besides the adaptability efforts, the obvious
mismatch, between the host-centric nature of the TCP/IP technology and
lP
the information-centric nature of IoT systems, has sparked the scientific
community to explore other networking approaches, namely the
Information-Centric Networking (ICN), which constitutes the essence of
this study.
Networking" [3] has been considered as the foundation stone marking the
advent of ICN architectures. This new paradigm suggests, through the
decoupling of the transmitter from the receiver, to fetch data directly on
the network layer, by using application data object names instead of the
source addresses. In other words, the ICN architecture is centered on what
while the current IP architecture is centered on where.
14
Journal Pre-proof
of
IoT
TCP/IP-based support Limitations
requirements
Supported by addressing mechanisms Require a dedicated
Naming
(IPv4 or IPv6) and DNS service. infrastructure.
pro
The channel is secured not
Supported by end-to-end channel the data.
Security and securing protocols during the entire No failure of intermediate
Privacy communication session between the nodes is permitted during
transmitter and the receiver. the communication
session.
Supported by IP-based addressing and
Autonomous systems, in addition to the
Scalability reliable delivery mechanisms and content Need additional patches.
Lightweight
design and energy
networks).
re-
retrieval techniques (e.g., P2P and CDN
15
Journal Pre-proof
of
Email WWW Phone … Browser Chat …
pro
Content
IP Every Node
Chunks
Packets
re-
Figure 3: NDN and IP stack.
models for retrieving NDOs (Named Data Object): via (i) name resolution
and (ii) name-based routing. Depending on the model used in the local
network, content is published by registering a name/locator binding with a
lP
Name Resolution Service (NRS), or use a routing protocol to announce the
routing information. Via name resolution, the consumer sends the request
to the NRS, this returns the available locators of the NDO, thus the
consumer retrieves the data from the best available sources. Otherwise,
through name-based routing, the client sends directly the request, which is
forwarded to the source, besides the data is sent to the consumer when an
rna
16
Journal Pre-proof
of
name. Therefore, only two types of packets are used: Interest and Data
(Fig. 4). A consumer fetches data by sending an Interest, which
disseminates a name that identifies the targeted data. A Data packet is
transmitted only in response to an Interest and consumes that Interest.
pro
The Data packet, which follows the reverse path taken by the Interest to
get back to the consumer, can be generated by any node having the desired
data, like the producer or in-network storage: persistent storage
(repository) or temporary storage (caching router). In fact, in NDN, a
router can cache Data packets in its content store and uses them to satisfy
further requests.
Interest packet
Name re-
Identifies the data I want to receive
Nonce
optional elements to guide Interest
Data packet
Name
Identifies the data in this packet
DataSignature
Content
matching or forwarding
lP
Figure 4: NDN packets.
The PIT is used to keep track of incoming interfaces for pending Interests,
which are not yet satisfied. This information is used to bring matched data
packets back to requesters. The FIB of an NDN router and an IP router
are similar, except that the first one contains data name prefixes instead of
IP address prefixes. Thereby, the FIB, which is populated by a name-based
routing protocol, stores data name prefixes and the corresponding destination
interfaces toward potential requested data provider(s). Moreover, each NDN
router integrates a forwarding strategy module that makes the forwarding
Jou
decisions for every Interest packet according to the information stored in the
three above data structures.
In the sequel, we will discuss the main characteristics of the ICN
architecture.
17
Journal Pre-proof
of
Name Data Communication
Technologies
F01
/LAB1/COURSE1/CH1 10110…… Content Store Net Device
(CS) Interface
pro
Prefix InFaces ……
based on these names. This allows users to delimit the scope of their
queries by precisely targeting what they are looking for instead of
specifying the location, which contributes positively to support the
huge number of queries of the connected objects.
• Quality of Service: In ICN-based IoT networks, the QoS is
guaranteed by exploiting the in-network capabilities of ICN, such as
18
Journal Pre-proof
of
ICN
Advantages Main considerations in IoT
features
ICN naming schemes should adapt their
object names according to the small MTU
ICN assigns a unique, persistent, and location-independent name size of the IoT protocols (layer 2) to avoid
pro
Naming for every data and/or object. This naming scheme could be flat or packet fragmentation. In the same time,
hierarchical. they need to be generic enough and scalable
to take into consideration evolutivity of
multiple IoT applications.
By exploiting the internal storage space of the nodes in the network,
ICN tries to bring the data as close as possible to the consumers. Caching strategies must deal with the limited
Caching
This caching technique leads to enhanced performances in the memory space of the constrained IoT objects.
network, especially in terms of energy-saving and response time.
Instead of securing the entire communication channel, like
ICN-based Leightweight encryption
in IP-based infrastructure, security in ICN is content-based,
protocols should be used in the context
Security which provides each chunk of data with an auto-authentication
of IoT, which optimize CPU time and
mechanism, called a crypto-signature, that is grafted on the packet
energy consumption of constrained devices.
Stateful
Forwarding
plane
since its creation.
re-
The communication in ICN is consumer-driven, where the Interest
packet is sent by the consumer and forwarded across routers
until arriving at the first node having the matching data. Each
intermediate node keeps track of incoming interest interfaces to
answer them later. This routing mode permits to avoid some DDOS
attacks [29].
ICN forwarding strategies should be adaptive
to cope with nodes’ failures and mobility in
the context of IoT and the PIT overflow in
large IoT deployment.
locally at the network layer, without the need for third-party services,
which greatly facilitates secure content sharing among IoT nodes.
19
Journal Pre-proof
of
consumer-driven communication model enhanced by naming and
caching mechanisms, consumer mobility is supported by design, as
well as the failure or sleeping of the original data producers, as long
as any node in the IoT network that has the desired data in its cache
pro
can respond to the requests.
The proposed extension modifies CCNx protocol of the PARC project [6],
to be run as an intermediate layer on top of the MAC-layer protocols
implemented in Contiki. Besides, CCNx-Contiki offers the possibility to run
in a multi-threading environment, while supporting real-time scenarios.
Adding to that, the modularity design of its components, which allow easy
and flexible implementation covering multiple IoT use cases.
20
Journal Pre-proof
In the same context, and relying on CCNx, CCN-Lite [38] has been
of
proposed to cope with the resource constraints of IoT devices and
communication patterns. It has been integrated into several IoT operating
systems, including RIOT [21]. Integrating CCN-Lite to RIOT enables
CCN-based IoT solutions, with the support of multi-threading, energy
pro
efficiency, and real-world scenarios. Also, with this integration, CCN-Lite
can be run over multiple microcontroller-based IoT hardware (Table 2),
including ARM-, MSP430-, and AVR-based platforms.
On the other hand, ccnSim [39] has been conceived under the
Omnnet++ [40] framework in order to provide a scalable simulator of
ICN/CCN solutions. Its event-driven engine allows to assess CCN
performance in large scale scenarios with large orders of magnitude for
CCN content stores. While, it cannot be run directly on constrained IoT
re-
devices, it can be used to evaluate large scale CCN IoT deployments.
Finally, the well-known Network Simulator version 3 (NS-3) [41] has
benefited from an implementation of the NDN protocol, dubbed ndnSIM
[42]. This latter implements the basic NDN primitives, where all forwarding
and management strategies are directly transcribed from the source code of
lP
the NDN Forwarding Daemon (NFD). It is worthwhile to mention that
ndnSIM was not initially designed to run over wireless devices with reduced
capacities; however, its latest versions can be run over the IEEE 802.15.4
standard, while supporting ad hoc scenarios. Besides, ndnSIM modular
implementation allows it to be run over all NS3 data link technologies,
while seamlessly managing inter-layer operations. Also, an experimental
rna
21
Journal Pre-proof
of
implementation/
on our survey
Languages
First
Popularity
OS/
pro
Type release Main characteristics Targeted platforms
Platform
protocol
year
based
ICN
ccnSim [39]
Free
CCN/
CCNx
network
stack
Clean
Slate
re-
2013
2012
C++
C++
Multi-threading, energy
efficiency, Real-time.
Event driven, scalablity
support, parallel simulation
engine.
Modularity, NFD full
(ARM, Arduino,
MSP430)
Omnet++
Medium
Medium
22
Journal Pre-proof
of
Database Total % S1 S2 Filtered %
IEEE Xplore 142 37.66 72 37 48.68
ACM Digital Library 33 8.75 15 7 9.21
pro
Science Direct 18 4.77 15 10 13.16
Springer Link 167 44.29 20 5 6.58
Others 17 4.50 17 17 22.37
Total 377 100 139 76 100
23
Journal Pre-proof
the ICN-IoT domain distributed over the years? RQ2 - Who are the
of
major contributing authors? RQ3 - Which are the most cited papers?
RQ4-Which are the major journals and conferences that publish articles
about ICN-IoT?
As a response to RQ1, which is related to the time distribution of
pro
publications, Fig. 6 shows that the research community began interest
in the application of ICN to IoT practically around 2013. Since then,
the curve has taken an ascending shape, thanks to the development
of communication standards, simulation tools, and testbed platforms
in this area. These statistics confirm the relevance of the topic, which
gradually gains ground and interest within the research community.
20 re- 18
Number of publications
17
15
15
11
10 8
lP
6
5
1
0
2013 2014 2015 2016 2017 2018 2019
rna
Year
24
Journal Pre-proof
of
Author’s name Publications count
Marica Amadeo 8
Boubakr Nour 8
pro
Maroua Meddeb 4
Sobia Arshad 3
Ikram Ud Din 2
Safdar H. Bouk 2
Cenk Gündoğan 2
Jeff Burke 2
Oliver Hahm 2
Sugang Li 2
Wentao Shangre- 2
Table 9: The most cited articles in ICN-IoT domain (based on Google Scholar).
lP
Reference [44] [8] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] [55]
Number of citations 235 196 124 122 113 109 100 79 72 51 47 40 36
Reference [56] [57] [58] [59] [60] [9] [61] [62] [63] [64] [65] [66] [67]
Number of citations 34 32 31 29 29 29 28 26 23 22 21 20 20
rna
multidimensional approach.
25
Journal Pre-proof
22
of
Others
20
18
16
14
pro
Conf erences
12
10
Journals 4
2
r
EE
er
s
ge
er
vi
AC
th
rin
IE
se
O
Sp
El
re-
Figure 7: Distribution of collected papers per database.
Studies in this category highlight the current state of the art of the ICN-
IoT research, by providing comparative analysis from different angles. Papers
identified in Section 1.1 belong to this category, which include also other
comparative studies that focus on a given characteristic of the ICN paradigm
and its applicability in IoT networks, such as caching mechanisms [68, 69],
and producer mobility support [70].
Jou
26
Journal Pre-proof
of
with evaluation
pro
9.21%
Standardization
efforts 15.79%
10.52%
re-
Figure 8: Percentage distribution of the research works related to ICN-IoT.
27
Journal Pre-proof
of
Although the previous categories are important for enabling the ICN-
based IoT, this one is the most comprehensive since the proposed solutions
are crowned by performance evaluations on dedicated simulators, testbeds,
or real deployment platforms. Some Representative papers are introduced
pro
below.
The research work presented in [44] is one of the first studies that have
addressed the application of ICN in the IoT environment. Various
mechanisms were proposed in this work, especially relating to routing and
caching, which have been evaluated experimentally on an Automation
Building platform. Routing and forwarding have been also addressed in
many papers in this category, such as [49] where authors provide an
re-
NDN-based framework for reliably retrieving data from multiple sources to
reply to the same interest. In [75], the authors propose a geographic
interest forwarding scheme aiming to minimize overhead and energy
consumption in a WSN. Moreover, new approaches were proposed based on
the other intrinsic features of ICN and their benefits for the IoT, including
security handling [47, 76, 54], mobility support [77, 78, 63], caching
lP
[51, 53, 56], and naming schemes [50, 66, 79].
Finally, applicability of ICN to industrial IoT has been also investigated
in [80] where a solution adapting ICN properties to the well-known TSCH
wireless link-layer technology has been proposed. Fig. 9 lists the collected
research in the ICN-IoT domain along with their counts according to the five
proposed categories.
rna
28
Journal Pre-proof
of
efforts (Total: 7) [34], [35], [36]
pro
ICN-IoT Challenges and [45], [72], [82], [59],
research works benefits (Total: 8) [23], [46], [71], [83]
ICN-based
IoT solutions [84], [73], [63],
without evaluation [67], [85], [65], [86]
re- (Total: 7)
• Clean slate: This mode aims to completely replace the existing IP-
based infrastructure with the emerging ICN architecture at all network
levels (local, edge, and core network).
Jou
29
Journal Pre-proof
of
Proof of Concept / Analytical evaluation
Performance Evaluation
Testbed
Simulation / Emulation
DiffServ
pro
hop-count
Bandwidth / Overhead
Throughput
Energy
CPU
ICN-IoT
literature
Supported Features
re- Load balancing
Memory / Storage
Scalability
Network layer (Layer 3)
Mobility
Security
Routing / Forwarding
Data aggregation
Contribution scope / domain of interest
MAC layer (Layer 2) In-network processing
Constrained devices
Caching
lP
Infrastructure Without (ad hoc)
Naming
With
Publish / Subscribe
Service Mode Pull
Request / Response
Push
Coexistence/IP
Overlay/IP
rna
Deployment Mode
Underlay/IP
Clean Slate
simultaneously.
30
Journal Pre-proof
of
modes is illustrated in Fig. 11. We can observe that the Clean Slate
deployment mode predominates in the collected ICN-IoT research. For
instance, paper [75] presents a geographic interest forwarding scheme in the
context of a standalone WSN, where networking is purely based on a clean
pro
slate NDN technology, while paper [65] proposes a security protocol for IoT
devices, which allows delivering reliable communications based on a mesh
topology of secure devices embedded in a clean slate ICN network. Also,
authors in [102] present a near cache placement strategy for IoT, based on a
multi-objective minimization problem, while considering a clean slate ICN
architecture, and authors of [67] propose an NDN-based integration solution
for IoT, for disseminating high-level knowledge derived from raw sensor
data to consumers, through NDN clean slate deployment mode. Beside, [53]
re-
proposes a CCN-based caching mechanism in an IoT environment, while
measuring energy and bandwidth consumption impact, in a clean slate
CCN deployment architecture, whereas authors in [88] conceive a privacy
solution for E-Health application, based on a Clean Slate NDN architecture.
Concerning the underlay/IP mode, paper [79] proposes a multiple-layer
lP
naming scheme in an ICN-based network which is bridged to the global
Internet and the cloud through a border router, hence enabling ICN
deployment as an underlay/IP architecture; and [97] proposes the
integration of an NDN-based IoT network to the IP-based cloud, as an
underlay, via a translation gateway ICN-to-MQTT. Also, [84] designs a
Smart monitoring and control solution for smart home applications, by
rna
31
Journal Pre-proof
of
layer in the context of LoWPAN. Also, in [101], a Named Networking
Control Protocol (NNCP) for IoT is designed, while presenting the possible
coexistence with IP-based networks; whereas in [103], an ICN-TCP/IP
coexistence approach is presented at a local network, based on network
pro
function virtualization technology, which consists of defining a set of regions
and virtual control functions to assist content delivery between these
different regions. Table 10 summarizes the contributions and characteristics
of representative main references in each mode of this dimension with a
focus on the targeted features.
Deployment
mode
References
based cloud.
Combination of ICN routing and TSCH time slot reservation for IoT
[84], [80], [93], Routing,
Underlay [80] application, which is bridged, as an underlay, to the Internet via
[97], [60], [79], MAC layer.
/IP gateways.
[64], [108]
NDN-based publish subscribe architecture, connected to the MQTT-
[97] Mobility.
IP-based network via translation gateway.
Standardized Naming scheme for ICN-based IoT application, while
[79] connected to the global cloud and Internet using edge things Naming.
(gateways).
Global ICN-based data management and service provisioning In-network
[58]
Overlay framework, as an overlay on IP-based IoT applications. processing.
[58], [47]
/IP NDN-based architecture for BMS (Building Management Systems), Naming,
[47]
as an overlay on a legacy TCP/IP-based IoT network. Security.
Design of an ICN convergence layer for LLN networks, where NDN Naming,
[96]
Jou
32
Journal Pre-proof
of
Underlay / IP
16.32%
Overlay / IP
pro
4.08%
6.12% 73.47%
Coexistence / IP
Clean Slate
re-
Figure 11: Deployment modes of surveyed ICN-based IoT solutions.
33
Journal Pre-proof
80 73.77
of
60
40
%
pro
20 18.03
8.2
0
Pull Push Pub-Sub
re-
polling, all destined to handle periodic or event-triggered data transmission
in the network, which is not supported by the original NDN proposal.
Furthermore, the authors of [108] provide classification and
prioritization of IoT traffic supported through NDN, where push
communication mode is adopted for time and event-based traffic, related to
lP
the different types of used sensors; whereas in [63] authors suggest adapting
and modifying of MobilityFirst ICN instance, to apply it in a
service-oriented IoT communication. For that, the push model is solicited
for sending notifications in a timely and efficient manner.
Besides, paper [56] presents an ICN-based Smart Collaborative Caching
scheme for IoT, where Publish-Subscribe communication model is adopted
rna
within clustered IoT nodes at the level of fog computing; and finally, authors
in [64] address the case of ICN-based IoT architecture for ambient assisted
living application, in which the Publish-Subscribe communication model has
been used to enable push-based services, through a subscription for different
topics offered by the edge nodes in the network.
Table 11 summarizes the main references and characteristics related to
this dimension. It identifies the targeted application use-cases by each work
Jou
4.3.3. Infrastructure
This dimension reflects whether the infrastructure mode adopted by the
proposed solutions is: ad-hoc or with infrastructure, including if constrained
nodes are supported or not by the architecture.
34
Journal Pre-proof
of
Service Main
References Targeted use cases Pros Cons
model Ref.
[84], [73], [63], [67], [85],
pro
[65], [86], [53], [87],
[88], [54], [57], [89],
[51], [90], [91], [92], -Natively supported -No support for
[80], [93], [75], [94], -Smart Healthcare. by ICN architecture. producer mobility.
[92]
Pull [95], [66], [61], [96], -Ambient Assisted -Reduces overhead and -Not suited for dynamic
[63]
[50], [44], [98], [99], Living. energy consumption in networks, event-driven or
[100], [60], [79], [58], the network. time constrained applications.
[49], [101], [47], [48],
[64], [102], [103], [104],
[105], [106], [107], [108]
-Not natively supported
-Suited for event-
by ICN implementations
driven IoT applications
Push
[84], [63], [91], [92],
[93], [75], [66], [50],
[52], [62], [108]
re-
[52] -NDN-IoT.
[108]
(Alert/Notification).
-Saves network energy
and supports nodes
mobility.
(NDN and
supported
by the most prominent
ICN instantiations
-Support producer (NDN and CCN).
mobility since FIBs are -Requires modifications
lP
-Fog Computing. dynamically populated. and/or adaptations of some
Publish- [56] -Ambient -Enhance response internal ICN primitives
[86], [97], [100], [56] [64]
Subscribe [64] Assisted Living. time in the network. (Extra packet types
-Suited for time and additional fields in
constrained Interest and Data packets)
applications. -Increase overhead of
exchanged packets and
energy consumption in the
network.
rna
35
Journal Pre-proof
of
the authors design a robust ICN-based forwarding solution, while targeting
ad hoc mode of IEEE 802.11-based networks. Table 12 summarizes the
infrastructure modes adopted by ICN-IoT solutions along with
representative references and their main characteristics.
pro
Without (ad hoc)
52.50% 47.50%
With re-
lP
Figure 13: Infrastructure mode employed in ICN-based IoT solutions.
36
Journal Pre-proof
of
routing, and forwarding.
Statistical analysis concerning the contribution scope, shown in Fig. 14,
reveals that the most targeted features are located at the network layer,
namely: routing/forwarding and naming mechanisms followed by security
pro
and caching strategies. Besides, in-network processing and mobility are the
least investigated topics. It should also be noted that we have registered a
low number of papers interested in the MAC-layer.
40
34.69 34.69
30
re- 22.45
20.41
%
20
10.2
10 8.16
6.12
0
lPg
ng
ty
r
ng
ye
in
rit
sin
ili
hi
di
la
am
cu
ob
es
ac
ar
AC
Se
oc
N
rw
M
C
pr
M
Fo
rk
g/
wo
tin
et
ou
-n
R
In
rna
37
Journal Pre-proof
of
simultaneous data retrieval and discovery schemes in an ICN-IoT
architecture, based on semantic aggregation of routing table information.
The MAC layer scope has been also been targeted by the ICN-IoT
research comunity. For instance, the authors of [96] propose an adaptation
pro
layer to cope with the small size of LowPAN packets at the MAC layer. The
authors of [80] have developed a MAC layer solution based on both TSCH
timeslot reservations and ICN Interest multi-hop routing to deliver energy
efficiency in an IoT network, without invoking cross-layer operations.
Table 13 summarizes the contribution scopes of collected ICN-based IoT
solutions along with their main proprieties, characteristics, and challenges.
Fig. 15. It is clear from these statistics that the identified network features
are weakly considered by the majority of solutions (around less than 6.8%).
The followings discuss the most important collected studies that consider a
set of these important features.
Authors of [91] design a scalable NDN-based smart home lighting solution
using an Interest filtering technique. Also, A hybrid naming scheme for
CCN-based IoT has been proposed in [66], which provides scalability thanks
Jou
38
Journal Pre-proof
of
Contribution
References Main properties
scope
Collected research propose solution to cope with the
pro
underlying IoT MAC technologies, by the introduction of
MAC layer [80], [96], [101]
adaptive layers (between layer 2 and 3) or the adaptation
of the existing IoT MAC solutions.
[85], [88], [54], [57],
Hierarchical, flat, attribute-based and hybrid naming
[91], [92], [93], [66],
schemes are adopted by ICN-IoT solutions to insure
Naming [61], [96], [50], [99],
efficient resources naming, while fitting with IoT
[100], [79], [47],
requirements (unique, persistent, and lightweight names).
[64], [104]
Content placement and replacement schemes are proposed
[53], [89], [51], [94],
by surveyed ICN-IoT solutions, where caching strategies
Caching [98], [62], [56],
re-
[102], [105], [107]
are basically based on the content itself or on some internal
information related to the caching node.
Since consumer mobility is supported by design in ICN
architecture, the surveyed literature propose in this scope to
handle producer mobility in different ways, for instance by
Mobility [63], [97], [64], [106]
exploiting dedicated ICN examples such as MobilityFirst
[63], or via registration services to a specific nodes in a
clustered networks [64].
lP
Surveyed solutions in this contribution scope, propose
[73], [63], [65], [86], ICN-based IoT security schemes, including privacy, trust
Security [88], [54], [95], [66], management, authentication, and secured routing, which
[60], [47], [48] are based either on the content or on the device in the
network.
Thanks to ICN caching capacity, in-network processing
In-network
and aggregation of received data have been enabled and
processing/ [57], [93], [100],
addressed by surveyed literature in this scope. The goal
rna
plan. Finally, article [104] presents a unified hybrid ICN naming scheme that
combines hierarchical and attribute-value components in order to provide
build-in scalability for smart IoT applications.
39
Journal Pre-proof
12
of
10.2
10
8.16
8
pro
6
%
4
2.04
2
0
Fault-tolerance Scalability Load balancing
re-
Figure 15: Supported features of ICN-based IoT solutions.
On the other hand, an NDN-based adaptation layer for LLNs has been
provided in [96], to enable coexistence with IPv6, while guaranteeing high
reliability in faulty networks. Also, authors in [97] carry out a study about
lP
the integration of NDN-based IoT network to the IP-based cloud, by mean
of translation gateways while handling deployment in the large scale.
With regards to load balancing, authors in [58] propose a mobile edge
cloud for Information-Centric IoT services, while taking into account load
balancing and intermittency parameters to cope with the constrained
resources and link instability of IoT networks. Besides, a keywords-based
rna
data retrieval technique and local processing solution for ICN-based IoT, is
provided by [57], which guarantees load balancing in number of function
executions in the network. Table 14 summarizes supported features
considered by ICN-IoT solutions and their key properties along with the
targeted architecture and features.
40
Journal Pre-proof
of
Supported Archit-
Ref. Key properties/Summary Targeted Features
features ecture
NDN-based smart home lighting IoT solution, which
[91] Naming, Routing. NDN.
guarantees scalability based on Interest filtering technique.
pro
Hybrid naming scheme for CCN-based IoT, which provides
[66] scalability thanks to the hierarchical components of the used Naming, Security. CCN.
names.
Scalability Scalable framework for a lightweight authentication and Security, Routing,
[60] NDN.
hierarchical routing in NDN-based IoT. In-network processing.
NDN-based cooperative caching mechanism for IoT, which
[62] Caching. NDN.
provides energy efficiency in a large scale deployment scenario.
A unified hybrid ICN naming scheme, combining hierarchical
[104] and attribute-value components, for smart IoT applications, Naming. ICN.
while insuring build-in scalability.
A NDN-based adaptation layer for LLNs, to enable coexistence
[96] with IPv6, while guaranteeing high reliability in faulty MAC layer, Naming. NDN.
Fault
tolerance/
Intermittency
[97]
[44]
networks.
re-
Integrating NDN-based IoT network to the IP-based cloud, by
mean of translation gateways ICN-to-MQTT, while handling
large scale deployment of the proposed solution.
NDN-based reactive optimistic routing mechanism, that have
been evaluated experimentally, while supporting producer
Mobility.
Routing.
NDN.
NDN.
disconnection in the network (intermittency).
A service provisioning Framework, combining the ICN-based
global Cloud and the IP-based local mobile Cloud, while
[58] In-network processing. ICN.
tolerating disconnections due to nodes mobility in the IoT
lP
network.
An ICN keywords-based data retrieval and local processing
Load Naming, Routing,
[57] solution for IoT, which provides load distribution in number ICN.
balancing In-network processing.
of function executions in the network.
QoS support.
Paper [99] presents a novel NDN-based architecture at the edge network
to support IoT nodes, while considering service provisioning time and
number of data packets as QoS parameters. Besides, [105] proposes a cache
replacement policy for NDN-based IoT networks, where retrieval time,
bandwidth, and hop-count were considered as a QoS metrics. Furthermore,
authors in [93] present an efficient ICN-based data dissemination approach
41
Journal Pre-proof
60 55.1
of
40
30.61 28.57 28.57
pro
%
20
10.2 12.24
2 4.08 2.04
0
gy
t
y
e
/O tio
hr P U
rv
un
pu
ag
nc
ea
Se
er
ra
or
co
gh
rh
te
C
En
iff
re- St
La
p-
ve
s
ou
D
es
y/
ho
e/
cc
or
tim
T
Su
th
em
id
l
M
va
nd
rie
Ba
et
R
42
Journal Pre-proof
of
Guaranteed
QoS References Targeted domains Main characteristics
parameter
[87], [88], [54], [57],
pro
Time constrained
[89], [51], [90], [91],
IoT scenarios, smart
[80], [93], [75], [94], Rapid content delivery of proposed mechanisms,
Retrieval healthcare , industrial
[66], [61], [96], [99], while relying on ICN-based network layer strengths,
time/Latency IoT, WSNs, smart
[60], [79], [58], [49], especially caching and adaptive forwarding features.
city, VANETs, smart
[48], [56], [102], [103],
lighting.
[105], [107], [108]
[65], [53], [54], [51], Less energy consumption to extend the longevity
Smart healthcare,
[92], [80], [93], [75], of the ICN-based IoT network, mainly composed of
Energy Smart Home, smart
[96], [50], [44], [98], power-constrained devices, while fitting in the green
city.
[60], [62], [107] networking perspective.
[54], [92], [93], [66],
Connected vehicles, Increase content delivery ratio, to cope with the
[96], [97], [50], [52],
Success ratio
Bandwidth/
Overhead
[99], [49], [101], [56],
[64], [106]
[65], [53], [87], [88],
[51], [44], [100], [49],
[64], [103], [105], [106],
[107], [108]
re-
safety
applications
Smart
Ambient
Critical
healthcare,
Assisted
Living application.
unreliable transmission medium and the nodes
mobility in challenging ICN-IoT scenarios.
Increase access medium availability, particularly in
wireless scenarios, by exploiting the ICN main
strengths, such as naming and statefull forwarding,
to alleviate packet traffic in the network.
Memory/ [65], [51], [50], [62],
Lightweight solutions and mechanisms that fit with
Storage [104]
Smart Home, Wireless constrained-resource devices in the IoT, which are
IoT. basically based on ICN native services, namely
lP
CPU [65], [104]
naming, caching, and in-network processing.
Reduce hop-count of exchanged packets, in order
to improve effectiveness and reliability, by soliciting
[90], [75], [98], [102], ICN and NDN-based
hop-count fewer resources in the IoT network, which is made
[105], [107] IoT
possible thanks to caching and naming mechanisms
of ICN.
Thanks to the inherent Anycast/Multicast ICN
IoT multimedia support, the collected solutions propose to enhance
Throughput [80], [93]
streaming scenarios. the quality of transmission in the network, while
rna
Concerning the used tools, Fig. 18 presents the main platforms used in
Jou
evaluating the reviewed literature. It is clear from this figure that ndnSIM
is the de-facto evaluation tool used in around 55%, thanks to its full
support of ICN mechanisms. This is followed by IoT-specific platforms such
as RIOT, ccnSim, and Contiki OS, respectively, due to their ability to
capture IoT device and network constraints. Other simulation tools
including NS3, TheOne simulator, Icarus, PyNDN-Arduino, SocialCCNSim,
43
Journal Pre-proof
80
70.83
of
60
pro
40
%
20.83
20
8.33
0
Simulation/Emulation Testbed Analytical evaluation
re-
Figure 17: Performances evaluation of ICN-based IoT proposed solutions.
MATLAB, were also used sporadically. Together, they count for more than
27%.
lP
Others
3.03% Contiki-OS/CCNx-Contiki
54.55%
Jou
ndnSIM
44
Journal Pre-proof
of each evaluation method. One main finding form this table is that the
of
average number of deployed nodes is relatively low, which is in the order of
a hundreds for both simulations and testbeds.
pro
While the above section introduced and discussed each dimension alone,
the majority of reviewed papers fall under different categories, which
necessitates a new comparison approach based on the proposed
multidimensional framework, presented in Table 17. Indeed, the reviewed
articles are projected according to several dimensions, while considering the
same evaluation grid, in order to deliver a coherent and relevant vision of
the offered functionalities, proposed mechanisms, and scope of the
contribution of each paper.
re-
This innovative and rich multidimensional projection is not based only on
the core strengths of ICN caching, naming, mobility, and security mechanisms
as adopted in the existing ICN-IoT surveys, but also brings several axes of
comparison. Our objective is to give a refined and clear vision on the existing
literature in this field, and to subsequently be able to identify the research
directions, at a finer degree of granularity.
lP
For instance, it is clearly showed in Table 17 that clean slate deployment
mode predominates ICN-based IoT solutions. This can be due to the fact that
this mode does not require any connection to other non-ICN-based networks,
and is therefore relatively easy to design. Besides, the table also puts forward
the fact that most of the reviewed literature follows the pull communication
rna
model because of its native support within the ICN paradigm, while a few of
them are interested to the push mode and even less to the hybrid one. Finally,
and because of the distributed and infrastructure-less characteristics of the
majority of IoT applications, ad hoc architectures dominates the research in
this field.
On the other hand, Table 17 reveals that the contribution scope of
existing ICN-IoT literature is very limited. Indeed, it mainly targets
Jou
routing, forwarding and naming. The table also highlights the fact that less
features are considered by existing work in the field. For instance, fault
tolerance is only considered by less than 10%, while load balancing count
for around 2% of the surveyed literature. Similar conclusions can be drawn
w.r.t QoS definition in ICN-IoT services that only counts for around 2%,
comparatively to that of latency, which is addressed by more than 55% of
the works.
45
Journal Pre-proof
of
Evaluation Approach #References Ref. Targeted platform #Nodes Cost
[56] / 600
[64] ndnSIM 100
[102] / 100
pro
[103] ndnSIM 13
[104] ndnSIM 64
[105] ccnSim 260
[106] ccnSim 260
[107] ndnSIM 40
[108] MATLAB 1000
[79] / /
[58] TheOne simulator 30
[49] ndnSIM 80
[101] ndnSIM 4
[52] ndnSIM 2
Simulation 31
re- [98]
[99]
[100]
[60]
[93]
/
ndnSIM
ndnSIM
ndnSIM
NS3
70
50
21
100
10
Meduim
[84] / 5
[73] / /
Theoretical Analysis 4 Low
[65] / 3
[90] / /
46
Journal Pre-proof
Finally, the table also brings out that most of the existing literature is
of
evaluated through simulations, which might not capture the behavior of the
evaluated solutions under realistic real-world scenarios. Also, despite a few
value peaks, the average size of evaluated networks is considered low for many
real-world IoT applications.
pro
In summary, our analysis of this table, according to each comparative
dimension, has revealed several important aspects in the ICN-IoT domain.
In the next section, we will summarize the lessons learned from our
multidimensional analysis of ICN-IoT literature, and identify the open
research issues.
47
Journal Pre-proof
of
Deployment Service Infrastructure Contribution scope Supported Guaranteed Performance
Dimension
Ref. Mode Model domain of interest Features QoS Evaluation
Network layer (layer 3)
Clean Slate
Underlay / IP
Overlay / IP
Coexistence / IP
Publish / Subscribe
Constrained devices
Memory / Storage
CPU
Throughput
Bandwidth / Overhead
hop-count
Testbed
With
Scalability
DiffServ
Simulation / Emulation
Load balancing
Pull
Intermittent Network
Analytical evaluation
Success ratio (PDR:
Routing / Forwarding
Proof of Concept/
Fault-tolerance/
Data aggregation
pro
Mobility
Security
Caching
Naming
[84] X X X X X 5
[73] X X X X
[63] X X X X X X X
[67] X X X
[85] X X X X
[65] X X X X X X X X X X 3
[86] X X X X X X
[53] X X X X X X X X 23
[87] X X X X X X X 118
[88]
[54]
[57]
[89]
[51]
[90]
[91]
[92]
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
re- X
X
X
X
X
X
X
X
X
X X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
5/2
1111
100 / 9
35
68
/
[80] X X X X X X X X X X 10
[93] X X X X X X X X X X X X 10
[75] X X X X X X X X X X 125
lP
[94] X X X X X X 15
[95] X X X X X X /
[66] X X X X X X X X X X 63
[61] X X X X X X /
[96] X X X X X X X X X X 12
[97] X X X X X X X X 5
[50] X X X X X X X X X X 19
[44] X X X X X X X X 60
[52] X X X X X X 2
[98] X X X X X X X X 70
rna
[99] X X X X X X X X 50
[100] X X X X X X X X 21
[60] X X X X X X X X X X X 100
[62] X X X X X X X X X X 1000 / 300
[79] X X X X X X /
[58] X X X X X X X 30
[49] X X X X X X X X 80
[101] X X X X X X X 4
[47] X X X X X 4
[48] X X X X X X 5
[56] X X X X X X X 600
[64] X X X X X X X X X 100
[102] X X X X X X X 100
[103] X X X X X X X 13
Jou
[104] X X X X X X X X 64
[105] X X X X X X X X 260
[106] X X X X X X X X 260
[107] X X X X X X X X X 40
[108] X X X X X X X X X 1000
48
Journal Pre-proof
of
constrained resources especially in terms of energy, calculation, and storage.
Regarding contribution scope, further studies should explore mobility,
caching, and in-network processing mechanisms. This is not only for their
major role in the preservation of the network’s resources, but also for the
pro
insurance of network operations in the context of communication links
instability, mobility and failures. Contributions on the MAC layer scope
should be also explored, particularly in terms of adaptation of ICN
communication stack to the link-layer constraints of IoT communication
technologies.
Regarding the QoS dimension, additional studies should be conducted to
take into account the following QoS parameters: memory, CPU, and storage
capacity, on the node plane, and bandwidth, throughput, DiffServ, and hop-
re-
count, on the network plane. In addition, special attention should be paid to
handle important network features, such as load balancing, fault tolerance,
and scalability, because of their capital role in improving both the reliability
and the lifetime of IoT networks.
Finally, the validation of the proposed ICN-based IoT mechanisms is
lP
done, mainly, by simulation, with a small portion on testbeds. In both
cases, however, only a reduced number of nodes, was considered. Thus, we
recommend that future research work should increase the number of nodes
used during performance evaluation, to prove efficiency and scalability of the
proposed mechanisms.
To sum up, we can say that research works in the ICN-IoT field are still
rna
49
Journal Pre-proof
of
Dimension
Main observations Open research issues / Recommendations
(see Table 17)
Exploring other hybrid ICN/IP deployment modes,
Deployment ICN clean slate is the most namely: overlay/IP, underlay/IP, and coexistence/IP,
pro
Mode used deployment mode. which are easier to deploy in the real world with the
existing IP infrastructure.
The push communication model should be more
Pull model is the most adopted explored because of its usefulness in several IoT
Service Model
communication service. scenarios, where the inherent ICN pull model is not
suited.
Ad hoc architecture is
more explored than the
Hybrid infrastructure deployment should be addressed
Infrastructure infrastructure one, while
by future research works.
constrained resources are
considered.
Contribution
Scope
Routing/Forwardingre-
Naming mechanisms are more
and
50
Journal Pre-proof
of
multidimensional framework has been provided.
Based on the proposed framework, an in-depth comparative analysis of
existing ICN-IoT studies has been carried out. As an outcome, the paper
draws recommendations about open research issues that require the
pro
attention of the community. Such issues include the lack of standardization
efforts, hybrid ICN/IP deployments, push-based communications, efficient
caching schemes, and QoS traffic handling solutions. Besides,
socio-economical factors are hindering the wide adoption of ICN in IoT
environments and require extensive efforts and investigations. As a
consequence, and apart from the very active research in the field, there are
still important obstacles to be overcome in order to transform ICN-based
IoT research into reality.
re-
lP
rna
Jou
51
Journal Pre-proof
References
of
[1] IoT: number of connected devices worldwide 2012-2025,
2019. https://www.statista.com/statistics/471264/
iot-number-of-connected-devices-worldwide/.
pro
[2] R. Ravindran, Y. Zhang, L. A. Grieco, A. Lindgren, J. Burke,
B. Ahlgren, A. Azgin, Design Considerations for Applying ICN
to IoT, Internet-Draft draft-irtf-icnrg-icniot-02, Internet Engineering
Task Force, 2018. Work in Progress.
[3] V. Jacobson, A new way to look at networking, google tech talk, 2006.
[4] C. Dannewitz, D. Kutscher, B. Ohlman, S. Farrell, B. Ahlgren, H. Karl,
re-
Network of information (netinf) - an information-centric networking
architecture, Computer Communications 36 (2013) 721 – 735.
[5] N. Fotiou, P. Nikander, D. Trossen, G. C. Polyzos, Developing
information networking further: From psirp to pursuit, in:
International Conference on Broadband Communications, Networks
and Systems, Springer, pp. 1–13.
lP
[6] project ccnx roadmap, 2019. https://www.parc.com/blog/
project-ccnx-announces-the-ccnx-v1-0-protocol-roadmap/.
[7] V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs,
R. L. Braynard, Networking named content, in: Proceedings of the
rna
52
Journal Pre-proof
of
centric networking in internet of things: A survey, Wireless Personal
Communications 105 (2019) 87–103.
pro
[13] I. U. Din, H. Asmat, M. Guizani, A review of information centric
network-based internet of things: communication architectures, design
issues, and research opportunities, Multimedia Tools and Applications
78 (2019) 30241–30256.
53
Journal Pre-proof
of
operating system for tiny networked sensors, in: 29th Annual IEEE
International Conference on Local Computer Networks, pp. 455–462.
[21] RIOT operating system, 2019. http://www.riot-os.org/.
pro
[22] T. Watteyne, X. Vilajosana, B. Kerkez, F. Chraim, K. Weekly,
Q. Wang, S. Glaser, K. Pister, Openwsn: a standards-based low-
power wireless development environment, Transactions on Emerging
Telecommunications Technologies 23 (2012) 480–493.
[23] A. Djama, B. Djamaa, M. R. Senouci, Tcp/ip and icn networking
technologies for the internet of things: A comparative study, in:
2019 International Conference on Networking and Advanced Systems
re-
(ICNAS), IEEE, pp. 1–6.
[24] LWIG working group, 2019. https://datatracker.ietf.org/wg/
lwig/about/.
[25] W. Shang, Y. Yu, R. Droms, L. Zhang, Challenges in iot networking
lP
via tcp/ip architecture, NDN Project, NDN-0038 (Tech. Rep.) (2016).
[26] I. Ishaq, D. Carels, G. Teklemariam, J. Hoebeke, F. Abeele, E. Poorter,
I. Moerman, P. Demeester, Ietf standardization in the field of the
internet of things (iot): a survey, Journal of Sensor and Actuator
Networks 2 (2013) 235–287.
rna
named-data.net/tutorials/milcom2017.
[30] D. Lagutin, K. Visala, S. Tarkoma, Publish/subscribe for internet:
PSIRP perspective, in: G. Tselentis, A. Galis, A. Gavras, S. Krco,
V. Lotz, E. P. B. Simperl, B. Stiller, T. B. Zahariadis (Eds.), Towards
the Future Internet - Emerging Trends from European Research, IOS
Press, 2010, pp. 75–84.
54
Journal Pre-proof
of
Considerations for Information-Centric Networking (ICN), Internet-
Draft draft-irtf-icnrg-deployment-guidelines-05, Internet Engineering
Task Force, 2019. Work in Progress.
pro
R. Ravindran, G. Wang, ICN based Architecture for IoT, Internet-
Draft draft-zhang-icnrg-icniot-architecture-01, Internet Engineering
Task Force, 2017. Work in Progress.
[35] Proposal for initiating a new work item on PoC for IoT Data as
a Service using ICN in IMT-2020, 2018. https://www.itu.int/md/
lP
T17-SG13-C-0333.
55
Journal Pre-proof
of
Information centric networking in the iot: Experiments with ndn in
the wild, in: Proceedings of the 1st ACM Conference on Information-
Centric Networking, ACM-ICN ’14, Association for Computing
Machinery, New York, NY, USA, 2014, p. 77–86.
pro
[45] W. Shang, A. Bannis, T. Liang, Z. Wang, Y. Yu, A. Afanasyev,
J. Thompson, J. Burke, B. Zhang, L. Zhang, Named data networking of
things (invited paper), in: 2016 IEEE First International Conference on
Internet-of-Things Design and Implementation (IoTDI), pp. 117–128.
[46] M. Amadeo, C. Campolo, A. Iera, A. Molinaro, Named data
networking for iot: An architectural perspective, in: 2014 European
re-
Conference on Networks and Communications (EuCNC), pp. 1–5.
[47] W. Shang, Q. Ding, A. Marianantoni, J. Burke, L. Zhang, Securing
building management systems using named data networking, IEEE
Network 28 (2014) 50–56.
[48] J. Burke, P. Gasti, N. Nathan, G. Tsudik, Securing instrumented
lP
environments over content-centric networking: the case of lighting
control and ndn, in: 2013 IEEE Conference on Computer
Communications Workshops (INFOCOM WKSHPS), pp. 394–398.
[49] M. Amadeo, C. Campolo, A. Molinaro, Multi-source data retrieval
in iot via named data networking, in: Proceedings of the 1st
rna
56
Journal Pre-proof
of
1–5.
pro
[54] J. Suarez, J. Quevedo, I. Vidal, D. Corujo, J. Garcia-Reinoso, R. L.
Aguiar, A secure iot management architecture based on information-
centric networking, Journal of Network and Computer Applications 63
(2016) 190–204.
[56] F. Song, Z.-Y. Ai, J.-J. Li, G. Pau, M. Collotta, I. You, H.-K.
Zhang, Smart collaborative caching for information-centric iot in fog
computing, Sensors 17 (2017) 2512.
lP
[57] O. Ascigil, S. Reñé, G. Xylomenos, I. Psaras, G. Pavlou, A keyword-
based icn-iot platform, in: Proceedings of the 4th ACM Conference on
Information-Centric Networking, ICN ’17, Association for Computing
Machinery, New York, NY, USA, 2017, p. 22–28.
rna
57
Journal Pre-proof
of
with compact trie name management scheme for vehicular content
centric networks, Computer Communications 71 (2015) 73–83.
[62] O. Hahm, E. Baccelli, T. C. Schmidt, M. Wählisch, C. Adjih,
L. Massoulié, Low-power internet of things with ndn & cooperative
pro
caching, in: Proceedings of the 4th ACM Conference on Information-
Centric Networking, ICN ’17, Association for Computing Machinery,
New York, NY, USA, 2017, p. 98–108.
[63] J. Chen, S. Li, H. Yu, Y. Zhang, D. Raychaudhuri, R. Ravindran,
H. Gao, L. Dong, G. Wang, H. Liu, Exploiting icn for realizing service-
oriented communication in iot, IEEE Communications Magazine 54
(2016) 24–30. re-
[64] B. Nour, K. Sharif, F. Li, H. Moungla, A distributed icn-based
iot network architecture: An ambient assisted living application case
study, in: GLOBECOM 2017 - 2017 IEEE Global Communications
Conference, pp. 1–6.
lP
[65] A. Compagno, M. Conti, R. Droms, Onboardicng: A secure protocol
for on-boarding iot devices in icn, in: Proceedings of the 3rd
ACM Conference on Information-Centric Networking, ACM-ICN ’16,
Association for Computing Machinery, New York, NY, USA, 2016, p.
166–175.
rna
58
Journal Pre-proof
of
(AICCSA), pp. 1117–1124.
pro
[71] B. Nour, K. Sharif, F. Li, Y. Wang, Security and Privacy Challenges
in Information-Centric Wireless Internet of Things Networks, 2019.
Working paper or preprint.
[72] R. Sofia, P. Mendes, Icn applicability in iot: The need for push-based
communication, 2018.
re-
[73] S. Sicari, A. Rizzardi, L. A. Grieco, A. Coen-Porisini, A secure
icn-iot architecture, in: 2017 IEEE international conference on
communications workshops (ICC workshops), IEEE, pp. 259–264.
59
Journal Pre-proof
of
and Applications, Springer, pp. 289–301.
pro
Mobility and Security (NTMS), IEEE, pp. 1–5.
centric networking (icn) naming for internet of things (iot): The case
of smart campus, in: Proceedings of the International Conference on
Future Networks and Distributed Systems, ICFNDS ’17, Association
for Computing Machinery, New York, NY, USA, 2017.
60
Journal Pre-proof
of
strategy for content delivery in wireless information-centric networks,
Computer Communications 109 (2017) 104–116.
[88] R. Boussada, B. Hamdaney, M. E. Elhdhili, S. Argoubi, L. A. Saidane,
A secure and privacy-preserving solution for iot over ndn applied to e-
pro
health, in: 2018 14th International Wireless Communications & Mobile
Computing Conference (IWCMC), IEEE, pp. 817–822.
[89] M. Naeem, R. Ali, B.-S. Kim, S. Nor, S. Hassan, A periodic caching
strategy solution for the smart city in information-centric internet of
things, Sustainability 10 (2018) 2576.
[90] L. Dong, G. Wang, Consumer oriented iot data discovery and
re-
retrieval in information centric networks, in: 2017 IEEE 28th Annual
International Symposium on Personal, Indoor, and Mobile Radio
Communications (PIMRC), IEEE, pp. 1–7.
[91] U. D. Silva, A. Lertsinsrubtavee, A. Sathiaseelan, C. Molina-Jiménez,
K. Kanchanasut, Deploying an information centric smart lighting
lP
system in the wild, CoRR abs/1607.05784 (2016).
[92] D. Saxena, V. Raychoudhury, Design and verification of an ndn-based
safety-critical application: A case study with smart healthcare, ieee
transactions on systems, man, and cybernetics: systems 49 (2017) 991–
1005.
rna
61
Journal Pre-proof
of
named-data networking for low power iot networks, in: 2019 IFIP
Networking Conference (IFIP Networking), IEEE, pp. 1–9.
pro
networking for the industrial iot, in: Proceedings of the 4th ACM
Conference on Information-Centric Networking, ICN ’17, Association
for Computing Machinery, New York, NY, USA, 2017, p. 214–215.
1–6.
62
Journal Pre-proof
of
information-centric naming scheme for iot applications, Computer
Communications 150 (2020) 103 – 114.
pro
iot networks, Pervasive and Mobile Computing 52 (2019) 60 – 70.
re-
[107] I. U. Din, S. Hassan, A. Almogren, F. Ayub, M. Guizani, Puc:
Packet update caching for energy efficient iot-based information-centric
networking, Future Generation Computer Systems (2019).
63
Journal Pre-proof
Highlights
of
• This work contributes a comprehensive systematic mapping review of the
pro
ICN-based IoT solutions.
• A new taxonomy of existing ICN-based IoT research is devised based on
a multidimensional vision.
• A rich critical in-depth multidimensional analysis of the reviewed litera-
ture is provided.
• For each comparison dimension, potential open research issues are identi-
fied and recommendations for future direction are presented.
re-
lP
rna
Jou
1
Journal Pre-proof
Declaration of interests
☒ The authors declare that they have no known competing financial interests or personal relationships
that could have appeared to influence the work reported in this paper.
of
☐The authors declare the following financial interests/personal relationships which may be considered
as potential competing interests:
pro
re-
lP
rna
Jou