Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT

To achieve a fully connected network in Internet of Things (IoT) there are number of challenges that have to be overcome. Among those, a big challenge is how to keep all of the devices accessible everywhere and every time. In the IoT network, the assumption is that each IoT device can be reached by any client at any given time. In practice, this is not always possible and without a proper mechanism the nodes behind a NAT are unable to communicate with each other directly, and their addresses have to be shared through a trusted third party. This challenge becomes harder by taking into consideration that most NAT traversal approaches have been developed prior to rising of the IoT, without taking into account the constrained nature of the participating devices and mostly depend on a centralized entity. In this paper we proposed the Distributed Address Table (DAT), a decentralized, secure and lightweight address distribution model that allows any two nodes to get the addresses of the other end without relying on a trusted third party. Structured Peer-to-Peer (P2P) overlay by utilizing Distributed Hash Table (DHT) technique is generated as its underlying communication scheme to ensure that all participating devices are accessible at any given time. This is achieved through simple, yet secure and efficient decentralized model. The DAT adopts the edge/fog computing paradigms to ensure a decentralized address distribution. The results showed that the proposed model is efficient. In addition, the security properties of the proposed model have been defined and proved.

[1]  Dan Wing,et al.  Session Traversal Utilities for NAT (STUN) , 2020, RFC.

[2]  Mudar Sarem,et al.  Netlet: A simple and versatile network middleware for peer-to-peer application program , 2017, Comput. Electr. Eng..

[3]  Márk Jelasity,et al.  PeerSim: A scalable P2P simulator , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.

[4]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[5]  George Tsirtsis,et al.  Network Address Translation - Protocol Translation (NAT-PT) , 2000, RFC.

[6]  Carsten Bormann,et al.  CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.

[7]  Daniel C. Burnett,et al.  WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web , 2012 .

[8]  Amir H. Payberah,et al.  NATCloud: cloud-assisted NAT-traversal service , 2016, SAC.

[9]  Donald E. Eastlake,et al.  US Secure Hash Algorithms (SHA and HMAC-SHA) , 2006, RFC.

[10]  Amr Rizk,et al.  A measurement study on the application-level performance of LTE , 2014, 2014 IFIP Networking Conference.

[11]  Dan Wing,et al.  Session Traversal Utilities for NAT (STUN) , 2020 .

[12]  Philip Matthews,et al.  Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN) , 2020 .

[13]  Stuart Cheshire,et al.  DNS-Based Service Discovery , 2013, RFC.

[14]  Peter Ligeti,et al.  A Decentralized and Scalable Model for Resource Discovery in IoT Network , 2019, 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[15]  Dan Wing,et al.  Universal Plug and Play (UPnP) Internet Gateway Device - Port Control Protocol Interworking Function (IGD-PCP IWF) , 2013, RFC.

[16]  Anne-Marie Kermarrec,et al.  NAT-resilient Gossip Peer Sampling , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.

[17]  Dan Wing,et al.  Port Control Protocol (PCP) , 2013, RFC.

[18]  Dmitry Namiot,et al.  On data transfer between mobile web clients , 2015 .

[19]  Anupam Datta,et al.  Device microagent for IoT home gateway: a lightweight plug-n-play architecture , 2018, SIGBED.

[20]  Sung Woo Cho P2P-based Mobile Social Networks , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[21]  Ahmed Khattab,et al.  Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey , 2018, 2018 International Conference on Computer and Applications (ICCA).

[22]  Prashant J. Shenoy,et al.  Latency-aware virtual desktops optimization in distributed clouds , 2017, Multimedia Systems.

[23]  Hong Linh Truong,et al.  MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[24]  Satish Narayana Srirama,et al.  TCP Hole Punching Approach to Address Devices in Mobile Networks , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[25]  Taieb Znati,et al.  Modeling Churn in P2P Networks , 2007, 40th Annual Simulation Symposium (ANSS'07).

[26]  Nenghai Yu,et al.  Distributed Hash Table , 2013, SpringerBriefs in Computer Science.

[27]  Jonathan D. Rosenberg,et al.  Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols , 2010, RFC.

[28]  Nenghai Yu,et al.  A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications , 2013 .

[29]  Stuart Cheshire,et al.  NAT Port Mapping Protocol (NAT-PMP) , 2013, RFC.

[30]  Jorge Crichigno,et al.  Decentralized Distribution of PCP Mappings Over Blockchain for End-to-End Secure Direct Communications , 2019, IEEE Access.

[31]  Nirdosh Bhatnagar Mathematical Principles of the Internet, Two Volume Set , 2018 .

[32]  Luis Rodero-Merino,et al.  Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.

[33]  Christoph Reich,et al.  Lamred: Location-Aware and Privacy Preserving Multi-Layer Resource Discovery for IoT , 2021, Acta Cybern..

[34]  Paul Francis,et al.  The IP Network Address Translator (NAT) , 1994, RFC.

[35]  Jeremy Singer,et al.  Peer-to-peer secure updates for heterogeneous edge devices , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[36]  Raúl Jiménez,et al.  Sub-second lookups on a large-scale Kademlia-based overlay , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.