Towards a Peer-to-Peer Communication Model for Mobile Telecare Services

Author(s):  
Akio Sashima ◽  
Koichi Kurumatani
Author(s):  
Dipti Chauhan ◽  
Jay Kumar Jain

Internet of things (IoT) is a collection of smart equipment that creates a smart world. It has not just changed the way we interact with important devices but has also enhanced the potential of these devices. A major limitation of IoT is that it relies on centralized communication models. Traditional IoT solutions require high infrastructure and maintenance costs, which result in scalability problems. Moreover, the vulnerability of cloud servers and their failure can affect the IoT system. There is still no one platform that connects all devices. The peer-to-peer communication model instead of the standard server/client one can be the sustainable solution the IoT industry is looking for. The major challenge with the peer-to-peer networks is security. This is where the use of blockchain in IoT can help the IoT industry scale up in a sustainable way. Indeed, blockchain and IoT together can handle a portion of IoT's greatest difficulties. The main objective of this chapter is to provide an overview of IoT and Blockchain in Indian perspectives.


Author(s):  
Fabio L. L. de Mendonca ◽  
Dayanne F. da Cunha ◽  
Bruno J. G. Praciano ◽  
Mateus da Rosa Zanatta ◽  
Joao Paulo C. L. da Costa ◽  
...  

Author(s):  
Xianghan Zheng ◽  
Vladimir Oleshchuk

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both the academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, the decentralization features come to the cost of the reduced manageability and create new concerns. Until now, the main focus of research was on the availability of the network and systems, while few attempts are put on protecting privacy. In this chapter, we investigate on P2PSIP security issues and introduce two enhancement solutions: central based security and distributed trust security, both of which have their own advantages and disadvantages. After that, we study appropriate combination of these two approaches to get optimized protection. Our design is independent of the DHT (Distributed Hash Table) overlay technology. We take the Chord overlay as the example, and then, analyze the system in several aspects: security & privacy, number-of the hops, message flows, etc.


Author(s):  
Fabian Stäber ◽  
Gerald Kunzmann ◽  
Jörg P. Müller

Decentralized peer-to-peer systems fit well as the underlying infrastructure for IP-telephony, as they provide the scalability for a large number of participants, and are able to handle the limited storage and bandwidth capabilities on the clients. We studied a commercial peer-to-peer-based decentralized communication platform supporting video communication, voice communication, instant messaging, et cetera. One of the requirements of the communication platform is the implementation of a user directory, allowing users to search for other participants. In this chapter, we present the Extended Prefix Hash Tree algorithm that enables the implementation of a user directory on top of the peer-to-peer communication platform in a fully decentralized way. We evaluate the performance of the algorithm with a real-world phone book. The results can be transferred to other scenarios where support for range queries is needed in combination with the decentralization, self-organization, and resilience of an underlying peer-to-peer infrastructure.


Sign in / Sign up

Export Citation Format

Share Document