How to see through the Fog? Using Peer to Peer (P2P) for the Internet of Things

dc.contributor.authorTracey, David
dc.contributor.authorSreenan, Cormac J.
dc.date.accessioned2020-02-17T12:54:18Z
dc.date.available2020-02-17T12:54:18Z
dc.date.issued2019-04
dc.date.updated2020-02-17T12:46:55Z
dc.description.abstractThe Internet of Things (IoT) faces the challenge of scaling to handle tens of billions of connected devices. This challenge is made more difficult by the range of constituent IoT parts from Cloud-based applications to constrained nodes in Wireless Sensor Networks (WSNs). Achieving the desired scale and interoperability requires an architecture for IoT that is scalable and allows seamless operation across networks and devices. This paper considers the requirements for IoT and considers a number of existing architectural approaches and the emergence of Fog computing. It proposes that Fog computing architectures must cater for the flow of data from constrained sensor nodes to powerful applications. It considers the suitability of a Peer to Peer (P2P) approach for Fog computing. Using a prototype implementation, it demonstrates how a Holistic Peer to Peer (HPP) architecture and application layer protocol meet the requirements set for IoT.en
dc.description.statusPeer revieweden
dc.description.versionAccepted Versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.citationTracey, D. and Sreenan, C. (2019) 'How to see through the Fog? Using Peer to Peer (P2P) for the Internet of Things', 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15-18 April, pp. 47-52. doi: 10.1109/WF-IoT.2019.8767275en
dc.identifier.doi10.1109/WF-IoT.2019.8767275en
dc.identifier.endpage52en
dc.identifier.isbn978-1-5386-4980-0
dc.identifier.startpage47en
dc.identifier.urihttps://hdl.handle.net/10468/9655
dc.language.isoenen
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en
dc.relation.urihttps://ieeexplore.ieee.org/document/8767275
dc.rights© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en
dc.subjectCloud computingen
dc.subjectInternet of Thingsen
dc.subjectOpen systemsen
dc.subjectPeer-to-peer computingen
dc.subjectProtocolsen
dc.subjectWireless sensor networksen
dc.subjectSeamless operationen
dc.subjectFog computing architecturesen
dc.subjectApplication layer protocolen
dc.subjectConnected devicesen
dc.subjectConstrained nodesen
dc.subjectInteroperabilityen
dc.subjectPeer to peer approachen
dc.subjectIoTen
dc.subjectCloud-based applicationsen
dc.subjectWSNen
dc.subjectData flowen
dc.subjectConstrained sensor nodesen
dc.subjectHolistic P2P architectureen
dc.subjectHPP architectureen
dc.subjectComputer architectureen
dc.subjectEdge computingen
dc.subjectInternet of Things(IoT)en
dc.subjectRESTFul Styleen
dc.subjectFog Computingen
dc.subjectWireless Sensor Network (WSN)en
dc.subjectPeer to Peer (P2P)en
dc.titleHow to see through the Fog? Using Peer to Peer (P2P) for the Internet of Thingsen
dc.typeConference itemen
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
InteropArchPaperUpdate.pdf
Size:
537.49 KB
Format:
Adobe Portable Document Format
Description:
Accepted version
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.71 KB
Format:
Item-specific license agreed upon to submission
Description: