Advertisement

A Distributed Control Plane for the Internet of Things Based on a Distributed Hash Table

  • Jaime Jiménez Bolonio
  • Manuel Urueña
  • Gonzalo Camarillo
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 125)

Abstract

As any other communication system, the Internet of Things (IoT) requires a functional control plane. However developing such control plane in a centralized way presents a number of challenges given the multiple stakeholders, the huge number of devices distributed worldwide, their limited connectivity, and specially that most IoT devices are battery-powered and thus must be sleeping most of the time. This paper explores the possibility of employing a distributed control plane for the IoT that leverages the intrinsic scalability and flexibility of peer-to-peer Distributed Hash Tables (DHTs). In particular, it proposes using a so-called “command mailbox” resource to remotely control sleeping sensors and actuators in an asynchronous way, while also solving important issues such as device bootstrapping and security.

Keywords

Internet of Things (IoT) Peer-to-Peer (P2P) Distributed Hash Table (DHT) REsource Location And Discovery (RELOAD) 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mazhelis, O., Luoma, E., Warma, H.: Defining an Internet-of-Things Ecosystem. In: Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2012. LNCS, vol. 7469, pp. 1–14. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  2. 2.
    Atzori, L., Iera, A., Morabito, G.: The Internet of things: A survey. Computer Networks 54(15), 2787–2805 (2010)CrossRefzbMATHGoogle Scholar
  3. 3.
    Hu, F., Rajatheva, N., Latva-aho, M., You, X.: Sensor Integration to LTE/LTE-A Network through MC-CDMA and Relaying. VTC Spring, 1–5 (2012)Google Scholar
  4. 4.
    Mäenpää, J., Bolonio, J.J., Loreto, S.: Using RELOAD and CoAP for wide area sensor and actuator networking. EURASIP Journal on Wireless Communications and Networking 2012(1), 121 (2012)CrossRefGoogle Scholar
  5. 5.
    Jennings, C., Baset, S., Schulzrinne, H., Lowekamp, B., Rescorla, E.: REsource LOcation And Discovery (RELOAD) Base Protocol. In: 2013 IETF Internet-Draft, Intended status: Standards TrackGoogle Scholar
  6. 6.
    Shelby, Z., Hartke, K., Bormann, C.: Constrained Application Protocol (CoAP). In: 2013 IETF. Internet-Draft, Intended Status: Standards Track (2013)Google Scholar
  7. 7.
    Jimenez, J., Lopez-Vega, J.M., Maenpaa, J., Camarillo, G.: A Constrained Application Protocol (CoAP) Usage for REsource LOcation And Discovery (RELOAD). In: 2013 IETF. Internet-Draft, Intended Status: Standards Track (2013)Google Scholar
  8. 8.
    Mäenpää, J., Bolonio, J.J.: Performance of REsource LOcation and Discovery (RELOAD) on Mobile Phones. In: 2010 IEEE Wireless Communications and Networking Conference (WCNC). IEEE (2010)Google Scholar
  9. 9.
    Tozlu, S., Senel, M.: Battery lifetime performance of Wi-Fi enabled sensors. In: 2012 IEEE Consumer Communications and Networking Conference (CCNC). IEEE (2012)Google Scholar
  10. 10.
    Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications 11, 17–32 (2003)Google Scholar
  11. 11.
    Rosenberg, J.: Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols. RFC 5245 IETF (2010)Google Scholar
  12. 12.
    Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: Making gnutella-like p2p systems scalable. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 407–418. ACM (2003)Google Scholar
  13. 13.
    Vial, M.: CoRE Mirror Server. Draft-vial-core-mirror-proxy-01, IETF Internet-Draft, Intended Status: Standards Track (2013)Google Scholar
  14. 14.
    Sturm, C., Dittrich, K.R., Ziegler, P.: An access control mechanism for P2P collaborations. In: Proceedings of the 2008 International Workshop on Data Management in Peer-to-Peer Systems. ACM (2008)Google Scholar
  15. 15.
    Knauf, A., Schmidt, T.C., Hege, G., Waehlisch, M.: A Usage for Shared Resources in RELOAD (ShaRe). Draft-ietf-p2psip-share-01, 2013 IETF Internet-Draft, Intended status: Standards Track (2013)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2013

Authors and Affiliations

  • Jaime Jiménez Bolonio
    • 1
  • Manuel Urueña
    • 2
  • Gonzalo Camarillo
    • 1
  1. 1.NomadicLabEricsson ResearchFinland
  2. 2.University Carlos III of MadridSpain

Personalised recommendations