SCIENCE CHINA Information Sciences, Volume 64 , Issue 8 : 182301(2021) https://doi.org/10.1007/s11432-020-3016-x

A novel identity resolution system design based on Dual-Chord algorithm for industrial Internet of Things

More info
  • ReceivedMay 20, 2020
  • AcceptedJul 23, 2020
  • PublishedJun 1, 2021



This work was supported by Natural Science Foundation of Beijing (Grant No. 4212004), National Key Research and Development Program of China (Grant No. 2019YFB1804403), and MIIT of China 2019 (Innovative Identification and Resolution System for Industrial Internet of Things).


[1] Wang K, Wang Y, Sun Y. Green Industrial Internet of Things Architecture: An Energy-Efficient Perspective. IEEE Commun Mag, 2016, 54: 48-54 CrossRef Google Scholar

[2] Li Z, Kang J, Yu R. Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things. IEEE Trans Ind Inf, 2017, : 1-1 CrossRef Google Scholar

[3] Xu L D, He W, Li S. Internet of Things in Industries: A Survey. IEEE Trans Ind Inf, 2014, 10: 2233-2243 CrossRef Google Scholar

[4] Hossain M S, Muhammad G. Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring. Comput Networks, 2016, 101: 192-202 CrossRef Google Scholar

[5] Louis Columbus. IIoT Will Overcome Adoption Barriers, Soar To 200 Billion dollars By 2021. Forbes. 2019. https://www.forbes.com/sites/louiscolumbus/2019/03/13/iiot-will-overcome-adoption-barriers-soar-to-200b-by-2021/#387523453513. Google Scholar

[6] Qin E, Long Y, Zhang C H, et al. Cloud computing and the Internet of Things: technology innovation in automobile service. In: Proceedings of International Conference on Human Interface and the Management of Information. Berlin: Springer, 2013. Google Scholar

[7] Traub K, Armenio F, Barthel H, et al. The GS1 EPC global architecture framework version 1.6. GS1 EPCglobal, Technical Report GS 1, 2014. Google Scholar

[8] Identification system for Internet of things $-$ Entity code: GB/T31866-2015. (2015-09-11)[2019-08-16]. https://euagenda.eu/upload/publications/identifiers-in-internet-of-things-iot.pdf. Google Scholar

[9] Sun S, Lannom L, Boesch B. Handle system overview: RFC 3650. Technical report, The Internet Society (ISOC)$-$ IETF, 2003. https://tools.ietf.org/html/rfc3650. Google Scholar

[10] Bo C, Wang D. Design and implementation of efficient distributed name service in EPC network. In: Proceedings of IEEE Conference Anthology, 2013. Google Scholar

[11] Li Y, Tang K, Gao F. Object Information Processing Method and Apparatus, and ORS Application Gateway: U.S. Patent Application 15/513,662. 2017-10-26. Google Scholar

[12] Yan Z W, Kong N, Tian Y, et al. A universal object name resolution scheme for IoT. In: Proceedings of 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing. 2013. Google Scholar

[13] Sun S, Reilly S, Lannom L. Handle system namespace and service definition: RFC 3651 . IETF, (2003-11-11)[2019-08-16]. https://datatracker.ietf.org/doc/rfc3651/. Google Scholar

[14] Lannom S S S R L, Petrone J. Handle system protocol (ver 2.1) specification: RFC 3652. IETF, (2003-11-11)[2019-08-16]. https://tools.ietf.org/html/rfc3652. Google Scholar

[15] UID Center. Ubiquitous ID architecture. 2006. https://www.uidcenter.org/wp-content/themes/wp.vicuna/pdf/UID-CO00002-0.00.24_en.pdf. Google Scholar

[16] UID Center. Ubiquitous code: ucode. 2009. https://www.uidcenter.org/wp-content/themes/wp.vicuna/pdf/UID-00010-01.A0.10_en.pdf. Google Scholar

[17] ISO/IEC. Information technology - Open systems interconnection - Object identifier resolution system (ORS): ISO/IEC 29168-1. 2011. https://www.iso.org/obp/ui/#iso:std:45247:en. Google Scholar

[18] Ding D, Li M B, Zhu Zhu. Object naming service supporting heterogeneous object code identification for IoT system. In: Proceedings of 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), 2018. Google Scholar

[19] Evdokimov S, Fabian B, Kunz S, et al. Comparison of discovery service architectures for the Internet of Things. In: Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2010. 237--244. Google Scholar

[20] Schollmeier R. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In: Proceedings of the 1st International Conference on Peer-to-Peer Computing (P2P'01), Lingkoping, 2001. 101--102. Google Scholar

[21] Xu H, Wang S P, Wang R C. P2P ONS: a distributed object naming service architecture based on P2P for EPC network. In: Proceedings of Advances in Information Sciences and Service Sciences, 2011, 3: 37--47. Google Scholar

[22] Li J. A construction approach of small world network in large distributed system. In: Proceedings of the 2nd International Conference on Modeling, Simulation and Visualization Methods (WMSVM), 2010. 42--45. Google Scholar

[23] Milgram S. The small world problem. Psychology Today, 1967, 1: 61. Google Scholar

[24] Beverly R, Afergan M. Machine learning for efficient neighbor selection in unstructured P2P networks. In: Proceedings of the 2nd USENIX Workshop on Tackling Computer Systems Problems With Machine Learning Techniques, Berkeley, 2007. 1--6. Google Scholar

[25] Noble W S. What is a support vector machine? Nature Biotech, 2006, 24: 1565--1567. Google Scholar

[26] Woungang I, Tseng F H, Lin Y H. MR-Chord: Improved Chord Lookup Performance in Structured Mobile P2P Networks. IEEE Syst J, 2015, 9: 743-751 CrossRef ADS Google Scholar

[27] Singh M, Kumar C, Nath P. Mobility pattern based Chord (MP-Chord) for enhanced lookup performance in mobile P2P networks. Wireless Personal Communications, 2019. Google Scholar

[28] Zhao W, Liu X, Zhang S, et al. Hierarchical P2P based RFID code resolution network: structure, tools and application. In: Proceedings of International Symposium on Computer Network and Multimedia Technology, Wuhan, 2009. 1--7. Google Scholar

[29] Sun D-P, Wang Y-T. Improvement of Chord routing algorithm. Mechanical & Electrical Engineering Magazine, 2007, 12: 30. Google Scholar

[30] Amirazodi N, Saghiri A M, Meybodi M. An adaptive algorithm for super-peer selection considering peer's capacity in mobile peer-to-peer networks based on learning automata. Peer-to-Peer Netw Appl, 2018, 11: 74-89 CrossRef Google Scholar

[31] Montresor A, Jelasity M. PeerSim: a scalable P2P simulator. In: Proceedings of 2009 IEEE 9th International Conference on Peer-to-Peer Computing, Seattle, 2009. 99--100. Google Scholar

[32] Kazmi I, Bukhari S F Y. PeerSim: an efficient & scalable testbed for heterogeneous cluster-based P2P network protocols. In: Proceedings of 2011 UkSim 13th International Conference on Computer Modelling and Simulation, Cambridge, 2011. 420--425. Google Scholar

[33] Dinh T T A, Lees M, Theodoropoulos G, et al. Large scale distributed simulation of P2P networks. In: Proceedings of the 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), Toulouse, 2008. 499--507. Google Scholar

  • Figure 1

    ONS service query flow chart.

  • Figure 2

    (Color online) Small world model of P2P network.

  • Figure 3

    (Color online) Model diagram of two-level identification analysis system based on improved Chord algorithm.

  • Figure 4

    Workflow diagram of two-level identity resolution system.

  • Figure 5

    File structure of simulation code.

  • Table 1  

    Table 1Dual Chord routing table description

    Table itemDefinition
    Finger[$k$]($N+2k$)mod $2^{m}$ ($0~\leq~k~<~m$)
    R_Finger[$k$]($N~-~2k~+~2m$) mod 2$m$ ($0~\leqslant~k<m$)
    SuccessorNext node in identifier ring
    PredecessorThe previous node in the identifier ring
  • Table 2  

    Table 2Cache table

    Table itemDefinition
    KeyThe resource keyword of the identifier to be queried after Hashing operation
    NodeIDStore the node ID to be queried, that is, the node IP address is hashed
    Node.IPStoring the IP of the node to be identified for query

Contact and support