Skip to main content

A Distributed Control Plane for the Internet of Things Based on a Distributed Hash Table

  • Conference paper
Mobile Networks and Management (MONAMI 2013)

Abstract

As any other communication system, the Internet of Things (IoT) requires a functional control plane. However developing such control plane in a centralized way presents a number of challenges given the multiple stakeholders, the huge number of devices distributed worldwide, their limited connectivity, and specially that most IoT devices are battery-powered and thus must be sleeping most of the time. This paper explores the possibility of employing a distributed control plane for the IoT that leverages the intrinsic scalability and flexibility of peer-to-peer Distributed Hash Tables (DHTs). In particular, it proposes using a so-called “command mailbox” resource to remotely control sleeping sensors and actuators in an asynchronous way, while also solving important issues such as device bootstrapping and security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mazhelis, O., Luoma, E., Warma, H.: Defining an Internet-of-Things Ecosystem. In: Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2012. LNCS, vol. 7469, pp. 1–14. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  2. Atzori, L., Iera, A., Morabito, G.: The Internet of things: A survey. Computer Networks 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  3. Hu, F., Rajatheva, N., Latva-aho, M., You, X.: Sensor Integration to LTE/LTE-A Network through MC-CDMA and Relaying. VTC Spring, 1–5 (2012)

    Google Scholar 

  4. Mäenpää, J., Bolonio, J.J., Loreto, S.: Using RELOAD and CoAP for wide area sensor and actuator networking. EURASIP Journal on Wireless Communications and Networking 2012(1), 121 (2012)

    Article  Google Scholar 

  5. Jennings, C., Baset, S., Schulzrinne, H., Lowekamp, B., Rescorla, E.: REsource LOcation And Discovery (RELOAD) Base Protocol. In: 2013 IETF Internet-Draft, Intended status: Standards Track

    Google Scholar 

  6. Shelby, Z., Hartke, K., Bormann, C.: Constrained Application Protocol (CoAP). In: 2013 IETF. Internet-Draft, Intended Status: Standards Track (2013)

    Google Scholar 

  7. Jimenez, J., Lopez-Vega, J.M., Maenpaa, J., Camarillo, G.: A Constrained Application Protocol (CoAP) Usage for REsource LOcation And Discovery (RELOAD). In: 2013 IETF. Internet-Draft, Intended Status: Standards Track (2013)

    Google Scholar 

  8. Mäenpää, J., Bolonio, J.J.: Performance of REsource LOcation and Discovery (RELOAD) on Mobile Phones. In: 2010 IEEE Wireless Communications and Networking Conference (WCNC). IEEE (2010)

    Google Scholar 

  9. Tozlu, S., Senel, M.: Battery lifetime performance of Wi-Fi enabled sensors. In: 2012 IEEE Consumer Communications and Networking Conference (CCNC). IEEE (2012)

    Google Scholar 

  10. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications 11, 17–32 (2003)

    Google Scholar 

  11. Rosenberg, J.: Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols. RFC 5245 IETF (2010)

    Google Scholar 

  12. Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: Making gnutella-like p2p systems scalable. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 407–418. ACM (2003)

    Google Scholar 

  13. Vial, M.: CoRE Mirror Server. Draft-vial-core-mirror-proxy-01, IETF Internet-Draft, Intended Status: Standards Track (2013)

    Google Scholar 

  14. Sturm, C., Dittrich, K.R., Ziegler, P.: An access control mechanism for P2P collaborations. In: Proceedings of the 2008 International Workshop on Data Management in Peer-to-Peer Systems. ACM (2008)

    Google Scholar 

  15. Knauf, A., Schmidt, T.C., Hege, G., Waehlisch, M.: A Usage for Shared Resources in RELOAD (ShaRe). Draft-ietf-p2psip-share-01, 2013 IETF Internet-Draft, Intended status: Standards Track (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Jiménez Bolonio, J., Urueña, M., Camarillo, G. (2013). A Distributed Control Plane for the Internet of Things Based on a Distributed Hash Table. In: Pesch, D., Timm-Giel, A., Calvo, R.A., Wenning, BL., Pentikousis, K. (eds) Mobile Networks and Management. MONAMI 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 125. Springer, Cham. https://doi.org/10.1007/978-3-319-04277-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04277-0_9

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04276-3

  • Online ISBN: 978-3-319-04277-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics