How to see through the Fog? Using Peer to Peer (P2P) for the Internet of Things

Research output: Chapter in Book/Report/Conference proceedingsChapterpeer-review

Abstract

The Internet of Things (IoT) faces the challenge of scaling to handle tens of billions of connected devices. This challenge is made more difficult by the range of constituent IoT parts from Cloud-based applications to constrained nodes in Wireless Sensor Networks (WSNs). Achieving the desired scale and interoperability requires an architecture for IoT that is scalable and allows seamless operation across networks and devices. This paper considers the requirements for IoT and considers a number of existing architectural approaches and the emergence of Fog computing. It proposes that Fog computing architectures must cater for the flow of data from constrained sensor nodes to powerful applications. It considers the suitability of a Peer to Peer (P2P) approach for Fog computing. Using a prototype implementation, it demonstrates how a Holistic Peer to Peer (HPP) architecture and application layer protocol meet the requirements set for IoT.

Original languageEnglish
Title of host publicationIEEE 5th World Forum on Internet of Things, WF-IoT 2019 - Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages47-52
Number of pages6
ISBN (Electronic)9781538649800
DOIs
Publication statusPublished - Apr 2019
Event5th IEEE World Forum on Internet of Things, WF-IoT 2019 - Limerick, Ireland
Duration: 15 Apr 201918 Apr 2019

Publication series

NameIEEE 5th World Forum on Internet of Things, WF-IoT 2019 - Conference Proceedings

Conference

Conference5th IEEE World Forum on Internet of Things, WF-IoT 2019
Country/TerritoryIreland
CityLimerick
Period15/04/1918/04/19

Keywords

  • Fog Computing
  • Internet of Things(IoT)
  • Peer to Peer (P2P)
  • RESTFul Style
  • Wireless Sensor Network (WSN)

Fingerprint

Dive into the research topics of 'How to see through the Fog? Using Peer to Peer (P2P) for the Internet of Things'. Together they form a unique fingerprint.

Cite this