scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Effective peer-to-peer design for supporting range query in Internet of Things applications

15 Jan 2020-Computer Communications (Elsevier)-Vol. 150, pp 506-518
TL;DR: This paper proposes an effective P2P solution for efficient handling of range queries in IoT (RQIOT), which employs a data distribution model based on both consistent and order-preserving hashing and introduces a novel scheme for capacity management of the involved devices.
About: This article is published in Computer Communications.The article was published on 2020-01-15. It has received 8 citations till now. The article focuses on the topics: Scalability & Data management.
Citations
More filters
Journal ArticleDOI
TL;DR: An agent-based algorithm for achieving a distributed resources organization in an IoT environment using a similarity-based overlay network of agents allows building informed resource selection/discovery services, therefore more efficient, in a highly dynamic and, basically, unstructured environment.
Abstract: Traditional information management approaches in distributed systems are most often unsuitable for modern Internet of Things (IoT) environments due to the huge amount and the extreme dynamism of the entities involved. Smart objects (enhanced devices or IoT services belonging to a smart system) interact and maintain relations which need of effective and efficient handling mechanisms better to meet users and services requirements. This article proposes an agent-based algorithm for achieving a distributed resources organization in an IoT environment. Software agents, representing each a single smart object, execute a set of local computations simultaneously, enabling an organized structure to emerge at global level. A natural language processing approach, able to capture the semantic context and represent objects with high-dimensional vectors, was exploited to map the IoT objects, so enabling advanced agents’ operations. The emerging organized virtual structure, i.e., a similarity-based overlay network of agents, allows building informed resource selection/discovery services, therefore more efficient, in a highly dynamic and, basically, unstructured environment. Preliminary results confirm the validity of the approach.

31 citations

Journal ArticleDOI
TL;DR: An Advanced Segmented Dimension Extraction (ASDE) with Heterogeneous Internet of things procedural (HIoT) aspects with relevance of algorithms for automatic recognition of fine-tuned disease nodes in the isolated leaf image is proposed.

23 citations

Journal ArticleDOI
TL;DR: P2P networks have been used in many applications, especially in data sharing and resource utilization, and the performance suggests that the proposed system can perform better for load balancing and security in the P2P network.

9 citations

Journal ArticleDOI
TL;DR: In this paper , the authors propose a recommendation system based on the Doc2Vec neural model, which, starting from text documents describing the resources, provides real-valued vectors mapping them.
Abstract: Abstract Identifying user requirements and preferences on the basis of the current context, is one of main challenges of the Internet of Things (IoT) paradigm. Users, services and applications interact maintaining, often unreliable, relations which need of smart management systems to satisfy their demands. Traditional information handling approaches in distributed systems are most often unsuitable for modern Smart Environments due to the huge amount and the extreme dynamism of the entities involved. This paper proposes NARIoT platform that allows building recommendation systems in IoT environment. The approach relies on vector representations of IoT resources obtained by using of a word embedding tool, the Doc2Vec neural model, which, starting from text documents describing the resources, provides real-valued vectors mapping them. The vectors are handled through intelligent agents, which self-organize themselves creating an ordered virtual structure, so enabling informed mechanisms of information filtering. In particular, an ordered overlay network emerges from the autonomous, parallel and decentralized work of intelligent agents, thus enabling efficient recommendation operations. The experimental validation confirms the effectiveness of the approach and provides very encouraging results.

8 citations

References
More filters
Proceedings ArticleDOI
27 Aug 2001
TL;DR: Results from theoretical analysis, simulations, and experiments show that Chord is scalable, with communication cost and the state maintained by each node scaling logarithmically with the number of Chord nodes.
Abstract: A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto a node. Data location can be easily implemented on top of Chord by associating a key with each data item, and storing the key/data item pair at the node to which the key maps. Chord adapts efficiently as nodes join and leave the system, and can answer queries even if the system is continuously changing. Results from theoretical analysis, simulations, and experiments show that Chord is scalable, with communication cost and the state maintained by each node scaling logarithmically with the number of Chord nodes.

10,286 citations

Book ChapterDOI
TL;DR: Pastry as mentioned in this paper is a scalable, distributed object location and routing substrate for wide-area peer-to-peer ap- plications, which performs application-level routing and object location in a po- tentially very large overlay network of nodes connected via the Internet.
Abstract: This paper presents the design and evaluation of Pastry, a scalable, distributed object location and routing substrate for wide-area peer-to-peer ap- plications. Pastry performs application-level routing and object location in a po- tentially very large overlay network of nodes connected via the Internet. It can be used to support a variety of peer-to-peer applications, including global data storage, data sharing, group communication and naming. Each node in the Pastry network has a unique identifier (nodeId). When presented with a message and a key, a Pastry node efficiently routes the message to the node with a nodeId that is numerically closest to the key, among all currently live Pastry nodes. Each Pastry node keeps track of its immediate neighbors in the nodeId space, and notifies applications of new node arrivals, node failures and recoveries. Pastry takes into account network locality; it seeks to minimize the distance messages travel, according to a to scalar proximity metric like the number of IP routing hops. Pastry is completely decentralized, scalable, and self-organizing; it automatically adapts to the arrival, departure and failure of nodes. Experimental results obtained with a prototype implementation on an emulated network of up to 100,000 nodes confirm Pastry's scalability and efficiency, its ability to self-organize and adapt to node failures, and its good network locality properties.

7,423 citations

Proceedings ArticleDOI
27 Aug 2001
TL;DR: The concept of a Content-Addressable Network (CAN) as a distributed infrastructure that provides hash table-like functionality on Internet-like scales is introduced and its scalability, robustness and low-latency properties are demonstrated through simulation.
Abstract: Hash tables - which map "keys" onto "values" - are an essential building block in modern software systems. We believe a similar functionality would be equally valuable to large distributed systems. In this paper, we introduce the concept of a Content-Addressable Network (CAN) as a distributed infrastructure that provides hash table-like functionality on Internet-like scales. The CAN is scalable, fault-tolerant and completely self-organizing, and we demonstrate its scalability, robustness and low-latency properties through simulation.

6,703 citations

Journal ArticleDOI
TL;DR: The relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber- physical world, are explored and existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development.
Abstract: Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to enable computing services devices deployed at network edge, aiming to improve the user’s experience and resilience of the services in case of failures. With the advantage of distributed architecture and close to end-users, fog/edge computing can provide faster response and greater quality of service for IoT applications. Thus, fog/edge computing-based IoT becomes future infrastructure on IoT development. To develop fog/edge computing-based IoT infrastructure, the architecture, enabling techniques, and issues related to IoT should be investigated first, and then the integration of fog/edge computing and IoT should be explored. To this end, this paper conducts a comprehensive overview of IoT with respect to system architecture, enabling technologies, security and privacy issues, and present the integration of fog/edge computing and IoT, and applications. Particularly, this paper first explores the relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber-physical world. Then, existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development. To investigate the fog/edge computing-based IoT, this paper also investigate the relationship between IoT and fog/edge computing, and discuss issues in fog/edge computing-based IoT. Finally, several applications, including the smart grid, smart transportation, and smart cities, are presented to demonstrate how fog/edge computing-based IoT to be implemented in real-world applications.

2,057 citations

Journal ArticleDOI
TL;DR: In this article, a similar functionality would be equally valuable to large distributed systems, such as large-scale software systems, where the hash tables are an essential building block in modern software systems.
Abstract: Hash tables - which map "keys" onto "values" - are an essential building block in modern software systems. We believe a similar functionality would be equally valuable to large distributed systems....

1,254 citations