Next Article in Journal
Glyphosate Sensor Based on Nanostructured Water-Gated CuO Field-Effect Transistor
Next Article in Special Issue
Applied Machine Learning for IIoT and Smart Production—Methods to Improve Production Quality, Safety and Sustainability
Previous Article in Journal
Study of the Influence of the Backplate Position on EMAT Thickness-Measurement Signals
Previous Article in Special Issue
ECO6G: Energy and Cost Analysis for Network Slicing Deployment in Beyond 5G Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Selective Content Retrieval in Information-Centric Networking

1
Instituto de Telecomunicações, 3810-193 Aveiro, Portugal
2
Departamento de Electrónica, Telecomunicações e Informática, Universidade de Aveiro, 3810-193 Aveiro, Portugal
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(22), 8742; https://doi.org/10.3390/s22228742
Submission received: 26 September 2022 / Revised: 7 November 2022 / Accepted: 9 November 2022 / Published: 12 November 2022
(This article belongs to the Special Issue Feature Papers in the Internet of Things Section 2022)

Abstract

:
Recently, novel networking architectures have emerged to cope with the fast-evolving and new Internet utilisation patterns. Information-Centric Networking (ICN) is a prominent example of this architecture. By perceiving content as the core element of the networking functionalities, ICN opens up a whole new avenue of information exchange optimisation possibilities. This paper presents an approach that progresses the base operation of ICN and leverages content identification right at the network layer, allowing to selectively retrieve partial pieces of information from content already present in ICN in-network caches. Additionally, this proposal enables information producers to seamlessly offload some content processing tasks into the network. The concept is discussed and demonstrated through a proof-of-concept prototype targeting an Internet of Things (IoT) scenario, where consumers retrieve specific pieces of the whole information generated by sensors. The obtained results showcase reduced traffic and storage consumption at the core of the network.

1. Introduction

Over the years, we have witnessed the evolution of the Internet from its original purpose of interconnecting a reduced set of computers, to the provisioning of worldwide connectivity to more than 18 billion devices [1]. Nowadays, users are mainly interested in retrieving content and accessing services regardless of the location where they are being provided. New networking technologies have been emerging to exploit such utilisation scenarios. A prominent example lies with Information-Centric Networking (ICN) [2,3], which centres its networking functionalities around the content itself, moving away from the host-centric approach followed in current IP-based network deployments.
Parallel to this, the advances in sensor technologies have promoted the emergence of new usage scenarios under the umbrella of the Internet of Things (IoT) [4,5,6,7]. The IoT features one of the most heterogeneous type of environments, considering devices with different capabilities in terms of communication and processing resources, as well as with different ways of information representation. Additionally, IoT has been one of the many cases which have manifested high adoption capability of new technologies, such as leveraging massive Machine Type Communications (mMTC) capabilities in scenarios featuring deployments of the Fifth generation of mobile communications (5G) [8]. Consequently, it has placed a new set of stringent requirements over the underlying networking fabric, creating the need for novel ideas and solutions able to address such requirements while standing to the trial of further upcoming challenges [9].
Furthermore, the suitability of the TCP/IP stack for supporting IoT has been questioned [10], creating an appealing opportunity for the assessment of ICN as a key element in a simplified architecture towards IoT interaction. This opportunity has encouraged the utilisation of ICN concepts for addressing IoT challenges [11,12,13]. Notably, the Information-Centric Networking Research Group (ICNRG) of the Internet Research Task Force (IRTF) has identified IoT as a baseline scenario where the use of ICN could bring significant advantages compared to existing Internet protocols [14]. Moreover, the deployment of current and envisioned IoT scenarios over ICN architectures can provide valuable insight into the key enablers and extensions to the ICN base design (e.g., multi-source data retrieval [15], enhanced producer mobility [16], and priority-based forwarding [17]). Accordingly, ICN will more holistically support fully-fledged Internet mechanism requirements, opening up a whole new set of scenarios that are not feasible under the current Internet architecture.
Different ICN implementations follow different design choices (e.g., communication model, naming principles, routing, and forwarding). This work focuses on Interest-based ICN solutions, particularly on the Named Data Networking (NDN) protocol [18]. This protocol envisions consumers that express their interest in retrieving named pieces of data. In this way, the name can be seen as a data selector, where the data is distributed over the network. The primary benefit of these protocols is the availability of network caching. However, granular caching is only available if the content producer publishes data with the desired granularity. As such, although content (dis)aggregation could largely fit IoT scenarios, it defeats the benefits of ICN caching. Moreover, a desirable consequence of distributing the content over the network is to offload the data provisioning work, yet there are no mechanisms for in-network content (dis)aggregation.
Thus, the contributions of the current paper are two-fold: (i) to provide the means for selectively accessing specific parts of a given content, enabling the (dis)aggregation of IoT content while still leveraging ICN in-network caching; and (ii) to enable an in-network processing approach that allows the offloading of the (dis)aggregation process to the network itself.
These contributions are materialised and assessed through the development of a proof-of-concept prototype following the NDN principles. The assessment is performed through simulation, allowing to extend the scope of the evaluation to a larger scale.
The remainder of this paper is structured as presented in Figure 1. After this introduction, Section 2 briefly introduces NDN foundations and provides an overview of previous work relevant in the context of the paper. Section 3 exposes the motivation for the development of this work and discusses strategies for approaching the problem. Section 4 details the proposed solution and Section 5 provides the assessment of the solution by presenting and discussing the evaluation results. Finally, the conclusions are drawn in Section 6.

2. Background and Related Work

2.1. Named Data Networking

In NDN, the communication process is initiated by consumers, which send a request (i.e., an Interest packet). This packet is forwarded by intermediary nodes towards an entity holding the content, according to the information stored in the Forwarding Information Base (FIB) and following a configured forwarding strategy. The network nodes maintain a Pending Interest Table (PIT) with information about the forwarded requests. Subsequent requests for the same content are aggregated in the PIT. Responses (i.e., data packets) follow the reverse request path based on the state information stored in the PITs. When a node forwards a data packet, the Interest is considered to be satisfied, and the corresponding PIT entries are removed. Content objects are signed by the producers, ensuring both integrity and authenticity of the content and can be cached in the intermediary Content Stores (CS).

2.2. Caching Transient Content in NDN

In fact, the NDN caching mechanism has a prominent role in providing an increased data delivery performance and has been identified as a key enabler towards a name-based IoT [19]. However, in IoT scenarios, new information is constantly being generated and consumers are mainly interested in the latest information (i.e., transient data). To address this issue, NDN includes an optional FreshnessPeriod parameter in data packets to indicate how long a certain packet could be held in the network content stores before marking it as “non-fresh”. While “non-fresh” data is still valid, it is an indication that the producer may have issued newer data.
The caching of transient IoT content has been explored in different stages of the caching process: (i) caching strategies considering the popularity of IoT data and their lifetime [20,21]; (ii) caching replacement policies [22]; and retrieval of fresh content [23].

2.3. NDN and IoT Services at the Edge

The integration of edge computing and networking solutions has emerged as a promising technology with the potential to impact the different elements of an end-to-end system (i.e., producers, consumers, and the subjacent networking fabric). The intrinsic capabilities of NDN makes it a suitable candidate for joint edge computing and communication solutions, whereas IoT stands out as one of the scenarios that could better profit edge approaches.
In particular, NDN has been explored for processing IoT data at the edge, thus reducing the latency perceived by the users and the network overhead that would be required for unnecessary transport of raw IoT through the network core [24,25]. Edge has also been explored for fulfilling tasks that would otherwise not be feasible in constrained devices (e.g., caching and forwarding tables [26], security [27], mobility [28], and keywords-based named schemes [29]).

2.4. In-Network Processing via NDN

In addition to edge computing, in-network processing has been increasingly gaining significance, empowered by the evolution toward a programmable data plane [30] and further leveraging NDN principles towards what has been denoted as Named Function Networking (NFN) [31,32]. NFN extends NDN to support the on-demand execution of λ -functions using networking resources to satisfy complex user requests. In this context, NDN forwarding strategies play a prominent role in the execution performance of this distributed computation approach [33]. Moreover, the NFN concept has been extended towards the edge of the network to better accommodate IoT scenarios [34,35]. Furthermore, NFN has been also applied for enhanced content reachability [36]; the resulting NFN-based structured query language is considered to be an initial step towards the network-based content (dis)aggregation.
In addition, with the goal of bringing computation closer to consumers and reduce the usage of network resources while providing better latency, Named Function as Service (NFaaS) [37] takes a step forward in the execution of named functions and imports the concept of serverless architectures into the NDN domain. In the same line, RICE [38], a fundamental building part of the Computation First Networking (CFN) solution [39], enables the invocation of remote methods towards the provisioning of a distributed computing framework. These solutions take into consideration the possibility of executing long-running computations by decoupling the method invocation from the result retrieval.

2.5. Handling IoT Data

The aggregation of IoT content (as a way to save scarce resources and reduce traffic load) has been the focus of numerous research works [40]. Different aggregation techniques have been proposed impacting the performance of the network in terms of latency, throughput, and energy consumption, among others [41]. In ICN, a fundamental aspect of data aggregation for the IoT is related to the need of retrieving information from multiple sources [15] (e.g., gather the weight values from all the sensors in the wheels of a train composition). This concept is often combined with in-network processing for more advanced features [42] (e.g., retrieve the average weight carried over a train car).
Novel ICN-based frameworks have been proposed to handle IoT data with increased focus on specific criteria (e.g., security [43], flexible content retrieval [44], and data communication efficiency [45].

2.6. Critical Summary

The potential impact of NDN in IoT has been acknowledged by the research community with an increasing interest in leveraging caching mechanisms and computation (e.g., edge and in-network processing) toward providing improved data delivery performance for constrained devices. Although some of the existing solutions share our motivation, to the best of our knowledge there is no prior work that targets the selective retrieval of content as part of the forwarding process by leveraging in-network computation. In this context, the solution proposed in this paper will provide an extendable and name-independent selective content retrieval mechanism that inherently supports function offloading, through a distributed in-network processing approach. Moreover, the proposed mechanism will do so while retaining the benefits associated to NDN’s intrinsic caching mechanisms.

3. Efficient IoT Content Retrieval

The current section uses a motivational scenario to showcase the need to support efficient IoT content retrieval by enhancing the basic features of the NDN architecture. Different considerations and approaches to realise these enhancements are discussed.

3.1. Motivational Scenario

In general, IoT devices provide different information, typically generating small pieces of content. As such, the aggregation of IoT information is a shared vision for IoT content dissemination optimisation. This raises the question of how the ICN functionalities can be better leveraged for the (dis)aggregation of IoT content.
This question is the motivation for conducting this research. The foundations for the development of this work can be observed from Figure 2. The figure represents one of the scenarios of the H2020 5Growth project [8] where the information from different railroad train sensors (i.e., X, Y, and Z) is aggregated into more general content, such as “Wheel Count”, “Direction” and “Speed” (i.e., we aim to have a system that allows to seamlessly request the overall aggregated “Speed” of the train, or the current “Speed” value of independent sensors existing in a particular train car, or in a specific train wheel). The purpose of this information is to be sent through the network and absorbed by actuators, such as a railroad crossing controller that is able to lower or raise the road gate when an incoming train is detected. The scenario also considers different end-points that may be interested in different pieces of the aggregated content (e.g., the on-board speedometer consumes the speed of the train measured from the specific sensor X). The challenge ahead lies in how to enable network nodes to selectively retrieve these pieces of content from the intrinsic ICN in-network caching, reducing the extra network overhead and releasing the information producers (possibly with constrained resources) from the content processing tasks.

3.2. On NDN and Content (Dis)Aggregation

To place the previous scenario into perspective, let us consider it from a basic NDN point of view, as shown in Figure 3a. First, Consumer A requests the aggregated content of the whole train (i.e., Train Data), which is not available in the intermediary node content store and has to be provided by the information producer. Next, Consumers B and C request Train Speed and Train Speed from Sensor Z contents, respectively. Although the actual information is already available at the Edge Router (i.e., as part of the larger Weather content), the said router does not have the knowledge to extract the desired information. Consequently, these requests have to be satisfied by the Producer.
To avoid the unnecessary forwarding of requests towards the source, it is possible to add some intelligence to intermediary routers, enabling them to extract the requested information from the aggregated data available in the content store. Such behaviour is shown in Figure 3b. In this case, the requests from Consumers B and C are satisfied by the edge router, which extracts the necessary information from the cached Train Data content.
Still, with such an enhancement, the order of arrival of the incoming requests at the intermediary routers also impacts the retrieval mechanism, as represented in Figure 3c. This time, Consumers A and B request partial pieces of the aggregated Train Data content. Since the content is not available in the cache, these requests, as well as the request from Consumer C, have to be satisfied by the Producer. As a consequence, Speed from Sensor Z information is retrieved three times (i.e., it is actually included in every data packet sent by the Producer) and the Speed information is retrieved twice (i.e., it is included in the last two data packets sent by the Producer).
This highlights the need for a more advanced response strategy, one that recognises that the piece of content being requested is part of a larger aggregated content and that preemptively pushes this larger content towards the edge of the network for later processing. Two different approaches are envisioned, as shown in Figure 3d, to fulfil such a purpose: (i) the intelligence is on the Producer: the Edge Router forwards the request for the smaller piece of content, and the producer replies with the larger aggregated content (i.e. Train Data); (ii) the intelligence is on the router: the Edge Router takes the decision of extending the request to a larger piece of content (/asp/train) and the Producer responds accordingly. Notwithstanding, these kinds of approaches require more detailed agreements between the producer and the network (e.g., how much level of aggregation should be pushed into the network without an explicit request?).

3.3. Realisation Approaches

As it has been already established, the goal of this work is to provide network-assisted content (dis)aggregation in different scenarios, as befitting consumers, producers, or network operators. The balance between these three parties defines the possible targets of enhancements. As such, the current section explores different strategies for realising a mechanism that fulfils the vision presented in Section 3.2. For convenience, the proposed strategies are summarised in Figure 4.
According to the source of the (dis)aggregation information, the resulting strategies fall into two categories:
  • The producer provides detailed content (dis)aggregation information (e.g., a manifest detailing the structure of the content and how to extract the different pieces listed in such a manifest);
  • A network entity has the content (dis)aggregation intelligence (e.g., the network entity implements the extraction functionalities which are run based on the incoming requests).
Depending on the holder of the (dis)aggregation knowledge, the (dis)aggregation information strategies fall into four categories:
  • Consumer: consumers hold the (dis)aggregation knowledge and generate complex queries that identify the desired piece of content. For such an approach to work, the intermediary routers must implement and support a (dis)aggregation protocol;
  • Router: intermediary routers hold the (dis)aggregation knowledge and processes incoming Interests and return the associated data. Consumers should have the required knowledge to request pieces of content (e.g., through discovery procedures);
  • Third party: a third party entity holds the (dis)aggregation information. In this approach, the (dis)aggregation duties are offloaded to the third party entity, which must implement a (dis)aggregation protocol known to users and/or routers.
Additionally, hybrid approaches in which the dis-aggregation knowledge is spread over different networking entities are also envisioned.

4. Solution Overview

After discussing the different strategies for enabling efficient IoT content retrieval, the current section presents a solution that falls into the “Smart Router” approach. Particularly, we propose to provide the NDN intermediary nodes (or at least those at the edge of the network) with the capabilities to execute queries on cached content, thus removing this burden from the producer of the information. This section explains the design choices that guided the development of the solution, provides the implementation details of the proof-of-concept prototype, and discusses the main security concerns associated with the proposed solution.

4.1. Design Choices

As discussed earlier, the proposed solution was deployed over the NDN networking architecture. In doing so, keeping the proposed enhancements as generic as possible without affecting the NDN design principles, is a major design requirement. The solution focuses on network-assisted dis-aggregation of content, leaving the generation of the aggregated content out of the scope of the proposal, and leading to what will be denoted as the Content-in-Content (CiC) retrieval mechanism. In realising this concept, the intelligence of the network will be placed on the forwarding nodes, particularly on those at the edge of the network. The goal is to allow the processing offloading from the likely constrained IoT sensors and to have the information closer to the end-user. As for the dis-aggregation process, for simplicity, it will be assumed that the content is structured and a query language could be used for extracting the desired part of the content. Notwithstanding, the proposed mechanism should be extendable to non-structured content, relying upon more advanced content extraction functionalities (e.g., retrieve only the faces from a live stream security surveillance feed by relying on video analytics). Finally, the solution should provide enhanced operations such as the ones described in Figure 3d, and must retain backward compatibility, ensuring its interoperability, enabling scenarios featuring both enhanced and basic routers.

4.2. Proof-of-Concept Prototype

The proof-of-concept prototype was developed using the NDN C++ library with eXperimental eXtensions (ndn-cxx) and the NDN Forwarding Daemon (NFD) implementations (version 0.6.5).
In our proposal, content selection queries are embedded into the Interest packets, using the ApplicationParameters field. This field can carry an arbitrary amount of information and is used to parametrise the request for Data. The intention of this field is to allow consumers to customise the Data they are willing to receive. As such, this field is processed by the information Producer. The purpose of this field matches the requirements of this work, and as such we propose to let intermediary nodes interpret and process it.
To provide enhanced nodes with the ability to analyse this field, the processing functionalities were implemented as part of the forwarding decision, and therefore all the logic was included in a new forwarding strategy. The forwarding strategy in the NDN architecture determines whether, when, and where to forward an Interest packet. The proposed strategy is based on the well known best-route strategy (/localhost/nfd/strategy/best-route) provided as part of the NFD implementation [46]. Following this approach not only ensures backward compatibility but also allows the decision of which prefixes will support this novel functionality. The operation of the new strategy mainly differs from the original one in the process of satisfying an Interest, as shown in Figure 5a. Before satisfying an Interest, it is checked whether the optional ApplicationParameters field is present and the original data packet is processed accordingly, potentially generating a new data packet with the resulting information, as shown in Figure 5b. The producer should be aware of whether it is serving a CiC-enabled prefix; if that is the case it sends the aggregated content (i.e., disregard the ApplicationParameters) and offloads the processing to the network.
By following this design, the proposed mechanism inherently supports the request for a larger piece of information. By neglecting the ApplicationParameters field for CiC-enabled prefixes, the producer will reply with the data identified in the Interest name, leaving the content selection functionality to the edge networking entities. This approach is in line with the concepts sketched in Figure 3d. To better illustrate the operation of the proposed solution, Figure 6 shows the message sequence diagram that results from putting all the previous concepts together into a sample scenario. In this scenario, the /asp prefix is associated with the CiC forwarding strategy enabled at the Edge Router, while the Router node does not have CiC enhancements. First, Consumer A requests (Message 1) a piece of the Train Data content (i.e., just the train speed information) by including a query in the ApplicationParameters field. Since the content is not available at the intermediary content stores, the Edge Router and the Router forward the Interest towards the Producer (Messages 2–3). Since the producer knows that the prefix /asp is CiC-enabled, it replies with the complete Train Data content (Message 4), which is forwarded by the Router towards the Edge Router (Message 5). Before satisfying the pending Interest, the Edge Router checks whether it contains a query embedded in the ApplicationParameters field, processes the original content and generates a new data packet with the extracted information (Message 6). Subsequent requests (Messages 7 and 9) are analysed, and in the presence of a query, the same approach is followed, or otherwise, the complete content is provided.
To showcase the selective content retrieval, it is assumed that the content to be retrieved is in JSON format, which is a common format to provide structured IoT content. Notwithstanding, the main operational principles are generic and could be extended to other types of content. Accordingly, JSON Path [47], a query language for reducing and extracting JSON information, is used by the consumers to specify the desired pieces of content. This query is later executed by the enhanced routers to extract the desired information. The jsoncons (https://danielaparker.github.io/jsoncons/—(accessed on September 2022)) header-only library was used to implement the JSON-related functionalities in the developed prototype.

4.3. Security Considerations

Information security and privacy are major concerns when considering the deployment of any networking solution. Requirements such as access control, confidentiality, integrity, and authenticity are fundamental to fostering the wide adoption of any particular solution. This becomes particularly relevant when considering scenarios, such as the IoT, which tightly couple the physical and digital worlds [48]. Although ICN takes security into consideration by design [49], there is still a large set of requirements to be addressed to securely support the IoT [50].
In the particular context of the current proposal, there are other security challenges associated with the execution of in-network function execution for ICN that should be taken into account, as highlighted in Refs. [36,51]. The two major security shortcomings related to our work have to do with trust and access control.
Intermediary nodes are allowed to process cached data and produce “new” data. This breaks the original ICN signature verification process since the signer of the information will not be its producer. To address this issue we envision solutions relying on schematised trust [52] and the use of local trust anchors [53].
The possibility of selectively accessing individual pieces of content also challenges access control mechanisms. For example, in our scenario, while a particular consumer may not have access rights for the whole Train Data information, it may be allowed to check temperature-related data. As such, in addition to name-based access control [54,55], fine-grained access control policies regarding the content itself should be enforced.
However, these security-related mechanisms fall into general concerns of the NDN operation itself and as such, it should be the target of deeper efforts particularly focused on those aspects. For that reason, the proper design and enforcement of security mechanisms are left out of the scope of this paper.

5. Evaluation

The proposed solution promises to impact the retrieval of content in the following aspects: (i) reduce the traffic load by lowering the amount of information exchanged between the edge of the network and the information producers; (ii) better leverage cached content by extracting partial information from the content, when possible; and (iii) provide content processing at the network layer. Consequently, the evaluation targets these aspects by answering the following research questions:
(1)
How does the proposed mechanism affect the amount of information exchanged between the edge of the network and the information producers?
  • Answered by analysing the number of hops followed by data packets before reaching the consumers.
(2)
How does it impact the overall cache utilisation?
  • Answered by determining the space used for storing content in all the network content stores.
(3)
How do applications perceive the effects of the mechanism?
  • Answered by determining the processing delay as observed by the applications (i.e., end-to-end application delay).
To analyse these metrics and to properly answer the corresponding research question, different network topology sizes should be taken into consideration. Additionally, to better assess the impact of the proposed solution in terms of cache utilisation, different freshness values should be considered. As such, a simulation-based evaluation better fits the assessment requirements. Accordingly, the developed proof-of-concept prototype was ported to the ndnSIM [56] simulation tool version 2.7.

5.1. Simulation Set-Up

The simulation scenario features a variable-depth binary tree topology. As represented in Figure 7a, the node at the root of the tree is the information producer, with the following layers being composed by NDN routers and the last layer by information consumers. The layer of routers closer to the consumers (i.e., edge layer) is provided with the CiC forwarding strategy. Consumers send randomly distributed Interests, during the 20 s of simulation, at a rate of 10 Interests/s. In addition, for every Interest, which query to be included in the Interest is randomly chosen (i.e., to request one of the following: (i) speed; (ii) direction; (iii) wheel_count; (iv) full content). The content generated by the producer is JSON-encoded information, as depicted in Figure 7b. Three different freshness values are considered: (i) 0 s—which means that content from a cache is never suitable; (ii) 50 s—which means that the content is cached once and remains suitable for the whole duration of the simulation; (iii) 10 s—which forces the cache to be refreshed once during the duration of the simulation. Table 1 summarises the key parameters used for setting up the simulation. To establish a baseline for comparison, a scenario following the same operational configuration, but with no CiC enhancements, was also simulated.

5.2. Results and Discussion

The simulation results are presented in Figure 8. As discussed earlier, three different metrics were evaluated, each answering one of the outlined research questions, and each of them calculated for different topology depths and data freshness values. The first one comprises the average cache utilisation (Figure 8a), which takes into account all the bytes inserted in each of the network content stores divided by the total number of caching nodes. The second refers to the average hop count followed by data packets (Figure 8b), calculated as the sum of the number of hops for each data packet received by the consumers divided by the total number of those data packets. The third considers the average application delay (Figure 8c), calculated by averaging the end-to-end application delay from all the issued requests.
As expected, the content store utilisation (Figure 8a) is larger in the non-CiC scenarios. This is due to the fact that the individual pieces of content are retrieved from the source and cached individually, in contrast with the CiC scenarios where only the complete Train Data content is exchanged over the network. The freshness has no impact on this metric because the updated content replaces the older content, but still, the amount of used space remains the same.
For the freshness value of 0, which means that the caching is completely neglected, it can be seen from Figure 8b that the average number of hops is roughly the same number of hops between the producer and the consumers (i.e., the depth of the binary tree minus 1). On the other hand, as soon as the cached content is suitable for retrieval, the CiC approach outperforms the base solution.
Finally, as expected, the application delay (Figure 8c) is larger on the CiC approach. The reason behind this is that while in the non-CiC approach the processing work of the producer is cached in individual packets, in the CiC approach the Edge Router has to perform this processing on every request. Notwithstanding, the CiC could be further extended to explore the trade-off between space and processing, allowing the Edge Router to cache the locally processed data and, as such, outperform the non-CiC approach (i.e., because of fewer hops and the consequent network delay).
It is important to highlight that, besides the savings in terms of network utilisation (average number of hops), the most critical impact of the proposed mechanism is that the processing is performed at the network itself, thus saving the precious resources from the possibly constrained IoT devices.

6. Conclusions and Future Directions

This paper discussed the ability for retrieving particular pieces of content from within other content, with particular emphasis on its application in an IoT scenario. Different strategies for realising such an approach were presented. A novel Content in Content forwarding strategy was designed and implemented, which enabled the network to extract the requested information from larger pieces of content, through the exploitation of the ApplicationParameters field of Interest packets. The developed proof-of-concept prototype was ported to the ndnSIM simulator to assess the impact of the proposed mechanism. For evaluation purposes, a use case scenario in which JSON encoded information is generated by sensors and partially retrieved by interested parties, was followed. The results showcase the suitability of the proposed approach.
Furthermore, we are now witnessing how digitalization efforts, such as Industry 4.0, have profoundly refactored how communications are being perceived by a myriad of different vertical sectors. As a result, such actors are, on the one hand, not only converting and integrating new ways and technologies for information inter-exchange into their businesses, but also, on the other hand, producing new utilisation and consolidation requirements towards such technologies. These requirements will help shape the next generations of IoT solutions, by not only incorporating the principles of newly established Internet architecture designs, but also by further extending them with new operational capabilities on their own. This stands as a great opportunity for more clean-slate oriented network designs to come forward, becoming established as a strong proposition towards the IoT value chain. As a result, such designs themselves will not only need to evolve considering incremental enhancements of their own key capabilities, but they will have to increasingly target higher degrees of flexibility that render them capable of being integrated in widely different application scenarios. This comes as a key addition to the already on-going efforts targeting interoperability between these new systems and well established architectures, such as IP [57].
Concretely, IoT composes heterogeneously rich environments, manifesting a plethora of available in-networking resources operating at cloud, edge, and fog levels, targeting improved QoS/QoE and resource efficiency [58]. The design produced in this paper contributed to such extensions by creating the basis for the utilization of NDN in the context of in-network computing and seamless orchestration of network micro-services at the edge for realizing increasingly complex and demanding IoT utilisation scenarios. In future works, we plan to extend this study by further analysing the highlighted trade-offs between caching and computation, as well as by considering different types of content, including unstructured IoT information.

Author Contributions

Conceptualization, J.Q. and D.C.; methodology, J.Q. and D.C.; software, J.Q.; validation, J.Q.; investigation, J.Q. and D.C.; resources, J.Q. and D.C.; data curation, J.Q.; writing—original draft preparation, J.Q.; writing—review and editing, J.Q. and D.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by FCT/MCTES through national funds and, when applicable, co-funded EU funds under the project UIDB/50008/2020-UIDP/50008/2020.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cisco. Cisco Visual Networking Index: Forecast and Trends, 2017–2022. Technical Report. 2018. Available online: https://twiki.cern.ch/twiki/pub/HEPIX/TechwatchNetwork/HtwNetworkDocuments/white-paper-c11-741490.pdf (accessed on 1 September 2022).
  2. Ahlgren, B.; Dannewitz, C.; Imbrenda, C.; Kutscher, D.; Ohlman, B. A survey of information-centric networking. IEEE Commun. Mag. 2012, 50, 26–36. [Google Scholar] [CrossRef]
  3. Xylomenos, G.; Ververidis, C.; Siris, V.; Fotiou, N.; Tsilopoulos, C.; Vasilakos, X.; Katsaros, K.; Polyzos, G. A Survey of Information-Centric Networking Research. IEEE Commun. Surv. Tutor. 2014, 16, 1024–1049. [Google Scholar] [CrossRef]
  4. Atzori, L.; Iera, A.; Morabito, G. The Internet of Things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
  5. Miorandi, D.; Sicari, S.; Pellegrini, F.D.; Chlamtac, I. Internet of things: Vision, applications and research challenges. Ad Hoc Netw. 2012, 10, 1497–1516. [Google Scholar] [CrossRef] [Green Version]
  6. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
  7. Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
  8. Papagianni, C.; Mangues-Bafalluy, J.; Bermudez, P.; Barmpounakis, S.; Vleeschauwer, D.; Brenes, J.; Zeydan, E.; Casetti, C.; Guimarães, C.; Murillo, P.; et al. 5Growth: AI-driven 5G for Automation in Vertical Industries. In Proceedings of the European Conference on Networks and Communications—EuCNC, Dubrovnik, Croatia, 15–18 June 2020. [Google Scholar]
  9. Stankovic, J.A. Research Directions for the Internet of Things. IEEE Internet Things J. 2014, 1, 3–9. [Google Scholar] [CrossRef]
  10. Shang, W.; Yu, Y.; Droms, R.; Zhang, L. Challenges in IoT Networking via TCP/IP Architecture. NDN, Technical Report NDN-0038. 2016. Available online: https://named-data.net/wp-content/uploads/2016/02/ndn-0038-1-challenges-iot.pdf (accessed on 1 September 2022).
  11. Ravindran, R.; Zhang, Y.; Grieco, L.A.; Lindgren, A.; Burke, J.; Ahlgren, B.; Azgin, A. Design Considerations for Applying ICN to IoT. Internet-Draft draft-irtf-icnrg-icniot-03, Internet Engineering Task Force. May 2019. Work in Progress. Available online: https://datatracker.ietf.org/doc/html/draft-irtf-icnrg-icniot-03 (accessed on 1 September 2022).
  12. Amadeo, M.; Campolo, C.; Quevedo, J.; Corujo, D.; Molinaro, A.; Iera, A.; Aguiar, R.L.; Vasilakos, A.V. Information-centric networking for the internet of things: Challenges and opportunities. IEEE Netw. 2016, 30, 92–100. [Google Scholar] [CrossRef]
  13. Nour, B.; Sharif, K.; Li, F.; Biswas, S.; Moungla, H.; Guizani, M.; Wang, Y. A survey of Internet of Things communication using ICN: A use case perspective. Comput. Commun. 2019, 142–143, 95–123. [Google Scholar] [CrossRef]
  14. Pentikousis, K.; Ohlman, B.; Corujo, D.; Boggia, G.; Tyson, G.; Davies, E.; Molinaro, A.; Eum, S. Information-Centric Networking: Baseline Scenarios. RFC 7476 (Informational). 2015. Available online: https://www.rfc-editor.org/rfc/rfc7476.html (accessed on 1 September 2022).
  15. Amadeo, M.; Campolo, C.; Molinaro, A. Multi-Source Data Retrieval in IoT via Named Data Networking. In Proceedings of the 1st International Conference on Information-Centric Networking, INC’14, Paris, France, 24–26 September 2014; ACM: New York, NY, USA, 2014; pp. 67–76. [Google Scholar] [CrossRef]
  16. Meddeb, M.; Dhraief, A.; Belghith, A.; Monteil, T.; Drira, K.; Gannouni, S. AFIRM: Adaptive forwarding based link recovery for mobility support in NDN/IoT networks. Future Gener. Comput. Syst. 2018, 87, 351–363. [Google Scholar] [CrossRef]
  17. Muralidharan, S.; Roy, A.; Saxena, N. MDP-IoT: MDP based interest forwarding for heterogeneous traffic in IoT-NDN environment. Future Gener. Comput. Syst. 2018, 79, 892–908. [Google Scholar] [CrossRef]
  18. Zhang, L.; Afanasyev, A.; Burke, J.; Jacobson, V.; Crowley, P.; Papadopoulos, C.; Wang, L.; Zhang, B. Named Data Networking. ACM SIGCOMM Comput. Commun. Rev. 2014, 44, 66–73. [Google Scholar] [CrossRef]
  19. Quevedo, J.; Corujo, D.; Aguiar, R. A Case for ICN Usage in IoT Environments. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 2770–2775. [Google Scholar] [CrossRef]
  20. Amadeo, M.; Ruggeri, G.; Campolo, C.; Molinaro, A.; Mangiullo, G. Caching Popular and Fresh IoT Contents at the Edge via Named Data Networking. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 610–615. [Google Scholar] [CrossRef]
  21. Amadeo, M.; Campolo, C.; Ruggeri, G.; Molinaro, A. Beyond Edge Caching: Freshness and Popularity Aware IoT Data Caching via NDN at Internet-Scale. IEEE Trans. Green Commun. Netw. 2022, 6, 352–364. [Google Scholar] [CrossRef]
  22. Meddeb, M.; Dhraief, A.; Belghith, A.; Monteil, T.; Drira, K.; Mathkour, H. Least fresh first cache replacement policy for NDN-based IoT networks. Pervasive Mob. Comput. 2019, 52, 60–70. [Google Scholar] [CrossRef]
  23. Quevedo, J.; Corujo, D.; Aguiar, R. Consumer Driven Information Freshness Approach for Content Centric Networking. In Proceedings of the 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 27 April–2 May 2014; pp. 482–487. [Google Scholar] [CrossRef]
  24. Papageorgiou, A.; Cheng, B.; Kovacs, E. Real-Time Data Reduction at the Network Edge of Internet-of-Things Systems. In Proceedings of the 2015 11th International Conference on Network and Service Management (CNSM), Barcelona, Spain, 9–13 November 2015; pp. 284–291. [Google Scholar] [CrossRef]
  25. Amadeo, M.; Campolo, C.; Molinaro, A.; Ruggeri, G. IoT Data Processing at the Edge with Named Data Networking. In Proceedings of the European Wireless 2018; 24th European Wireless Conference, Catania, Italy, 2–4 May 2018; pp. 1–6. [Google Scholar]
  26. Wang, X.; Cai, S. Edge-Assisted NDN-Based IoT Framework With Provider and Consumer Mobility Support. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1713–1725. [Google Scholar] [CrossRef]
  27. Huang, H.; Wu, Y.; Xiao, F.; Malekian, R. An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment. IEEE Trans. Comput. Soc. Syst. 2021, 8, 1108–1120. [Google Scholar] [CrossRef]
  28. Wang, X.; Wang, X.; Li, Y. NDN-based IoT with Edge computing. Future Gener. Comput. Syst. 2021, 115, 397–405. [Google Scholar] [CrossRef]
  29. Ascigil, O.; Reñé, S.; Xylomenos, G.; Psaras, I.; Pavlou, G. A Keyword-Based ICN-IoT Platform. In Proceedings of the 4th ACM Conference on Information-Centric Networking, ICN’17, Berlin, Germany, 26–28 September 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 22–28. [Google Scholar] [CrossRef] [Green Version]
  30. Sapio, A.; Abdelaziz, I.; Aldilaijan, A.; Canini, M.; Kalnis, P. In-Network Computation is a Dumb Idea Whose Time Has Come. In Proceedings of the 16th ACM Workshop on Hot Topics in Networks, HotNets-XVI, Palo Alto, CA, USA, 30 November–1 December 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 150–156. [Google Scholar] [CrossRef] [Green Version]
  31. Tschudin, C.; Sifalakis, M. Named Functions and Cached Computations. In Proceedings of the 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 10–13 January 2014; pp. 851–857. [Google Scholar] [CrossRef]
  32. Sifalakis, M.; Kohler, B.; Scherb, C.; Tschudin, C. An Information Centric Network for Computing the Distribution of Computations. In Proceedings of the 1st ACM Conference on Information-Centric Networking, ACM-ICN ’14, Paris, France, 24–26 September 2014; ACM: New York, NY, USA, 2014; pp. 137–146. [Google Scholar] [CrossRef] [Green Version]
  33. Scherb, C.; Marxer, C.; Tschudin, C. Execution Plans for Serverless Computing in Information Centric Networking. In Proceedings of the 1st ACM CoNEXT Workshop on Emerging In-Network Computing Paradigms, ENCP’19, Orlando, FL, USA, 9 December 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 34–40. [Google Scholar] [CrossRef]
  34. Scherb, C.; Grewe, D.; Wagner, M.; Tschudin, C. Resolution Strategies for Networking the IoT at the Edge via Named Functions. In Proceedings of the 2018 15th IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 12–15 January 2018; pp. 1–6. [Google Scholar] [CrossRef]
  35. Mtibaa, A.; Tourani, R.; Misra, S.; Burke, J.; Zhang, L. Towards Edge Computing over Named Data Networking. In Proceedings of the 2018 IEEE International Conference on Edge Computing (EDGE), San Francisco, CA, USA, 2–7 July 2018; pp. 117–120. [Google Scholar] [CrossRef]
  36. Marxer, C.; Tschudin, C. Improved Content Addressability through Relational Data Modeling and In-Network Processing Elements. In Proceedings of the 4th ACM Conference on Information-Centric Networking, ICN’17, Berlin, Germany, 26–28 September 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 29–35. [Google Scholar] [CrossRef]
  37. Król, M.; Psaras, I. NFaaS: Named Function as a Service. In Proceedings of the 4th ACM Conference on Information-Centric Networking, ICN’17, Berlin, Germany, 26–28 September 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 134–144. [Google Scholar] [CrossRef]
  38. Król, M.; Habak, K.; Oran, D.; Kutscher, D.; Psaras, I. RICE: Remote Method Invocation in ICN. In Proceedings of the 5th ACM Conference on Information-Centric Networking, ICN’18, Boston, MA, USA, 21–23 September 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 1–11. [Google Scholar] [CrossRef]
  39. Król, M.; Mastorakis, S.; Oran, D.; Kutscher, D. Compute First Networking: Distributed Computing Meets ICN. In Proceedings of the 6th ACM Conference on Information-Centric Networking, ICN’19, Macao, China, 24–26 September 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 67–77. [Google Scholar] [CrossRef] [Green Version]
  40. Pourghebleh, B.; Navimipour, N.J. Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research. J. Netw. Comput. Appl. 2017, 97, 23–34. [Google Scholar] [CrossRef]
  41. Rahman, H.; Ahmed, N.; Hussain, I. Comparison of Data Aggregation Techniques in Internet of Things (IoT). In Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 23–25 March 2016; pp. 1296–1300. [Google Scholar] [CrossRef]
  42. Nour, B.; Sharif, K.; Li, F.; Moungla, H.; Liu, Y. A unified hybrid information-centric naming scheme for IoT applications. Comput. Commun. 2020, 150, 103–114. [Google Scholar] [CrossRef]
  43. Suarez, J.; Quevedo, J.; Vidal, I.; Corujo, D.; Garcia-Reinoso, J.; Aguiar, R.L. A secure IoT management architecture based on Information-Centric Networking. J. Netw. Comput. Appl. 2016, 63, 190–204. [Google Scholar] [CrossRef]
  44. Rehman, M.A.U.; Ullah, R.; Kim, B.S. NINQ: Name-Integrated Query Framework for Named-Data Networking of Things. Sensors 2019, 19, 2906. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  45. Dudeja, R.K.; Singh Bali, R.; Aujla, G.S. An Efficient Data Communication Framework for Named Data Networking in IoT-Edge Ecosystem. In Proceedings of the 2021 IEEE Globecom Workshops (GC Wkshps), Madrid, Spain, 7–11 December 2021; pp. 1–6. [Google Scholar] [CrossRef]
  46. Afanasyev, A.; Shi, J.; Zhang, B.; Zhang, L.; Moi-seenko, I.; Yu, Y.; Shang, W.; Li, Y.; Mastorakis, S.; Newberry, E.; et al. NFD Developers Guide. Technical Report NDN-0021. 2021. Available online: https://named-data.net/wp-content/uploads/2021/07/ndn-0021-11-nfd-guide.pdf (accessed on 1 September 2022).
  47. Goessner, S. JSONpath-Xpath for JSON. 2007. Available online: https://goessner.net/articles/JsonPath/ (accessed on 1 September 2022).
  48. Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28. [Google Scholar] [CrossRef]
  49. Zhang, Z.; Yu, Y.; Zhang, H.; Newberry, E.; Mastorakis, S.; Li, Y.; Afanasyev, A.; Zhang, L. An Overview of Security Support in Named Data Networking. IEEE Commun. Mag. 2018, 56, 62–68. [Google Scholar] [CrossRef]
  50. Nour, B.; Sharif, K.; Li, F.; Wang, Y. Security and Privacy Challenges in Information-Centric Wireless Internet of Things Networks. IEEE Secur. Priv. 2019, 18, 35–45. [Google Scholar] [CrossRef] [Green Version]
  51. Krol, M.; Marxer, C.; Grewe, D.; Psaras, I.; Tschudin, C. Open Security Issues for Edge Named Function Environments. IEEE Commun. Mag. 2018, 56, 69–75. [Google Scholar] [CrossRef]
  52. Yu, Y.; Afanasyev, A.; Clark, D.; Claffy, k.; Jacobson, V.; Zhang, L. Schematizing Trust in Named Data Networking. In Proceedings of the 2nd ACM Conference on Information-Centric Networking, ACM-ICN’15, San Francisco, CA, USA, 30 September–2 October 2015; Association for Computing Machinery: New York, NY, USA, 2015; pp. 177–186. [Google Scholar] [CrossRef]
  53. Shang, W.; Wang, Z.; Afanasyev, A.; Burke, J.; Zhang, L. Breaking out of the Cloud: Local Trust Management and Rendezvous in Named Data Networking of Things. In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, IoTDI’17, Pittsburgh, PA, USA, 18–21 April 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 3–13. [Google Scholar] [CrossRef]
  54. Zhang, Z.; Yu, Y.; Afanasyev, A.; Burke, J.; Zhang, L. NAC: Name-Based Access Control in Named Data Networking. In Proceedings of the 4th ACM Conference on Information-Centric Networking, ICN’17, Berlin, Germany, 26–28 September 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 186–187. [Google Scholar] [CrossRef]
  55. Marxer, C.; Tschudin, C. Schematized Access Control for Data Cubes and Trees. In Proceedings of the 4th ACM Conference on Information-Centric Networking, ICN’17, Berlin, Germany, 26–28 September 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 170–175. [Google Scholar] [CrossRef] [Green Version]
  56. Mastorakis, S.; Afanasyev, A.; Zhang, L. On the Evolution of ndnSIM: An Open-Source Simulator for NDN Experimentation. ACM Comput. Commun. Rev. 2017, 47, 19–33. [Google Scholar] [CrossRef]
  57. Guimarães, C.; Quevedo, J.; Ferreira, R.; Corujo, D.; Aguiar, R.L. Exploring interoperability assessment for Future Internet Architectures roll out. J. Netw. Comput. Appl. 2019, 136, 38–56. [Google Scholar] [CrossRef]
  58. Kianpisheh, S.; Taleb, T. A Survey on In-network Computing: Programmable Data Plane And Technology Specific Applications. IEEE Commun. Surv. Tutor. 2022, 47, 19–33. [Google Scholar] [CrossRef]
Figure 1. Paper organization.
Figure 1. Paper organization.
Sensors 22 08742 g001
Figure 2. Motivational scenario: IoT data (dis)aggregation.
Figure 2. Motivational scenario: IoT data (dis)aggregation.
Sensors 22 08742 g002
Figure 3. NDN strategies for selective content retrieval: (a) Simple Request; (b) Advanced Request; (c) Simple Response; (d) Advance Response.
Figure 3. NDN strategies for selective content retrieval: (a) Simple Request; (b) Advanced Request; (c) Simple Response; (d) Advance Response.
Sensors 22 08742 g003
Figure 4. Dis(aggregation) strategies.
Figure 4. Dis(aggregation) strategies.
Sensors 22 08742 g004
Figure 5. CiC forwarding: (a) Interest processing pipeline; (b) Data processing pipeline.
Figure 5. CiC forwarding: (a) Interest processing pipeline; (b) Data processing pipeline.
Sensors 22 08742 g005
Figure 6. CiC Forwarding: message sequence diagram.
Figure 6. CiC Forwarding: message sequence diagram.
Sensors 22 08742 g006
Figure 7. Simulation details: (a) Simulation topology (depth = 3); (b) JSON Train Data content.
Figure 7. Simulation details: (a) Simulation topology (depth = 3); (b) JSON Train Data content.
Sensors 22 08742 g007
Figure 8. Evaluation results for different metrics and freshness values: (a) Average cache utilisation; (b) Average number of hops per data packet; (c) Average application level delay.
Figure 8. Evaluation results for different metrics and freshness values: (a) Average cache utilisation; (b) Average number of hops per data packet; (c) Average application level delay.
Sensors 22 08742 g008
Table 1. Simulation set-up parameters.
Table 1. Simulation set-up parameters.
ParameterValue
Channel Data Rate1 Mbps
Latency10 ms
Interest Rate10 Interests/s
CS Size100 packets
CS Replacement PolicyLRU
Freshness[0, 10, 50] s
Topology depth(3, 12)
Simulation Duration20 s
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Quevedo, J.; Corujo, D. Selective Content Retrieval in Information-Centric Networking. Sensors 2022, 22, 8742. https://doi.org/10.3390/s22228742

AMA Style

Quevedo J, Corujo D. Selective Content Retrieval in Information-Centric Networking. Sensors. 2022; 22(22):8742. https://doi.org/10.3390/s22228742

Chicago/Turabian Style

Quevedo, José, and Daniel Corujo. 2022. "Selective Content Retrieval in Information-Centric Networking" Sensors 22, no. 22: 8742. https://doi.org/10.3390/s22228742

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop