Next Article in Journal
IoT Health Devices: Exploring Security Risks in the Connected Landscape
Next Article in Special Issue
Constraint-Aware Federated Scheduling for Data Center Workloads
Previous Article in Journal
Secure Adaptive Context-Aware ABE for Smart Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient Non-DHT-Based RC-Based Architecture for Fog Computing in Healthcare 4.0

1
Department of Computer Science, Southeast Missouri State University, Cape Girardeau, MO 63701, USA
2
Department of Computer Science, School of Computing Sciences and Engineering, University of Southern Mississippi, Hattiesburg, MS 39406, USA
3
Department of Computer Science, School of Computing, Southern Illinois University, Carbondale, IL 62901, USA
*
Author to whom correspondence should be addressed.
IoT 2023, 4(2), 131-149; https://doi.org/10.3390/iot4020008
Submission received: 1 March 2023 / Revised: 20 April 2023 / Accepted: 27 April 2023 / Published: 10 May 2023
(This article belongs to the Special Issue Cloud and Edge Computing Systems for IoT)

Abstract

:
Cloud-computing capabilities have revolutionized the remote processing of exploding volumes of healthcare data. However, cloud-based analytics capabilities are saddled with a lack of context-awareness and unnecessary access latency issues as data are processed and stored in remote servers. The emerging network infrastructure tier of fog computing can reduce expensive latency by bringing storage, processing, and networking closer to sensor nodes. Due to the growing variety of medical data and service types, there is a crucial need for efficient and secure architecture for sensor-based health-monitoring devices connected to fog nodes. In this paper, we present publish/subscribe and interest/resource-based non-DHT-based peer-to-peer (P2P) RC-based architecture for resource discovery. The publish/subscribe communication model provides a scalable way to handle large volumes of data and messages in real time, while allowing fine-grained access control to messages, thus enabling heightened security. Our two − level overlay network consists of (1) a transit ring containing group-heads representing a particular resource type, and (2) a completely connected group of peers. Our theoretical analysis shows that our search latency is independent of the number of peers. Additionally, the complexity of the intra-group data-lookup protocol is constant, and the complexity of the inter-group data lookup is O(n), where n is the total number of resource types present in the network. Overall, it therefore allows the system to handle large data throughput in a flexible, cost-effective, and secure way for medical IoT systems.

1. Introduction

In the past two decades, electronic gadgets have become an integral part of human life, with the incorporation of artificial intelligence and machine learning making them “smart” devices. One area where this is particularly relevant is in healthcare, where smart devices are being used for health monitoring, diagnosis, and even treatment. The interconnection of these medical devices, known as the Internet of Medical Things (IoMT), allows remote monitoring capabilities with fewer hospital visits for patients. The market for smart health devices is expected to grow at an average rate of 16.2% between 2020 and 2027. Advancements in the IoMT have made preliminary diagnostics possible at the patient’s home, shifting healthcare from a hospital-centric to a home-centric service.
The introduction of Healthcare 4.0 standards in the healthcare industry has led to the integration of various technologies such as the Internet of Things (IoT), big data analysis, artificial intelligence (AI), robotics, continuous data sensing, cloud computing, and real-time actuators to create digital healthcare products, technologies, services, and enterprises. This shift in the healthcare industry requires various applications to meet the dynamic demands of the industry, and involves procuring and developing well-equipped, efficient, concise, and cost-effective solutions to the problems of the healthcare industry. These technologies are leading towards revolutionizing healthcare systems, enabling them to provide real-time support to patients, aiming at the early prediction and prevention of diseases.
Despite the advantages, there are significant challenges associated with this paradigm shift. The architecture of healthcare applications and devices that rely on sensors collecting data on clouds can be constrained by delays in communication between sensors and clouds, and the high cost of storing and transferring large amounts of data on cloud-based storage. Additionally, the data associated with these healthcare applications may be time-sensitive, along with privacy concerns, especially for storage with third-party cloud service providers. Furthermore, network failures or congestion can disrupt communication between sensors and cloud services, which could risk a patient’s life. The security of personal health information has previously been addressed in several studies [1,2,3,4].
To solve these latency, privacy, and scalability issues, fog computing combined with cloud-based data analytics for healthcare data has become a reasonable solution. Fog computing acts as an interface between IoT sensors/actuators and cloud services, and uses edge devices/networking devices with limited resources that may limit their ability to analyze large datasets and add to processing time. It leverages a distributed data-processing architecture closer to the sensor nodes, significantly reducing latency, where complex jobs are divided into simpler ones to reduce processing time and efficiently analyze the data received. However, fog computing performs initial processing on sensed data by bringing a complete or partial set of cloud services to the edge/fog devices.
Due to resource constraints, not every fog device can render complete services. Therefore, a single cloud-based service or API may be located at a single edge device or distributed among different devices. This placement of services ensures prompt data analysis/processing at nearby nodes. This approach helps to lower the latency, enhance security, and reduce the overall cost of data processing and storage. In summary, fog computing is a way to bring data processing and analysis closer to the source, using edge devices and networking devices with limited resources. This allows for faster data analysis and a reduction in the amount of data stored in the cloud, and can help overcome the challenges of resource discovery and management in the healthcare industry. However, there are still challenges that need to be addressed, such as ensuring the availability of services and self-reorganization infrastructure. These can be solved using event-based publish/subscribe systems and P2P overlays based on Distributed Hash Tables (DHTs) [5].
In this context, we state now what is meant by a DHT-based system. A distributed hash table (DHT) is a class of decentralized distributed system that provides a lookup service similar to a hash table; (key, value) pairs are stored in a DHT and any node in the system can find the value associated with a given key efficiently. Responsibility for maintaining the mapping from keys to values is distributed among all nodes in the system in such a way that a change in the set of participants does not cause any major disruption. This is why DHT can scale to very large numbers of nodes and can efficiently handle node arrivals, departures, and failures. Any system designed based on the idea that DHT is known as a structured system. There exists another type of decentralized distributed structured system that does not use the idea of DHT; one such system is known as a Residue Class (RC)-based system. RC-based architecture is covered in detail in the next section.
To fulfill the demands for scalability and flexibility, event-based publish/subscribe systems contain a variety of features. Three main parts make up a publish/subscribe system: a publisher, a subscriber, and an event-notification service or broker. A registered event triggers the publisher to notify the broker, which is the workhorse for the entire architecture. Subscribers can sign up with the broker by indicating their interest in a certain category of events. To the interested subscribers, the broker asynchronously distributes the events produced by the publisher. Decoupling between other parts of these systems is introduced via the use of an intermediary broker. In terms of synchronization, time, and location, the publishers and subscribers are unrelated [6]. The publish/subscribe architecture allows for decoupling between publishers and subscribers, making the system more flexible. Publishers do not need to interact with each subscriber individually, and subscribers do not need to check for new events periodically. This type of architecture is well suited for large-scale, many-to-many interactions, and allows for the easy integration of new components. Additionally, the system is also flexible, as a publisher of one or more events can also act as a subscriber for other events, and vice versa.
The literature suggests a variety of publish/subscribe implementation designs. These are peer-to-peer, distributed, and centralized. A centralized broker is suggested by centralized solutions for event distribution. However, when the number of events rises, it experiences inherent scaling problems. The scalability issues of a centralized method are solved by distributed infrastructure. This is appropriate for the quick and effective distribution of temporary data. Peer-to-peer infrastructure, the third option, offers greater flexibility, scalability, and adaptability. Peers are utilized in this instance to store subscriptions and route events to the correct subscribers.
Due to its flexibility and scalability, peer-to-peer (P2P) overlay networks are preferable solutions for large-scale applications. Mobile networks can use P2P system principles. P2P systems treat each node equally and directly promote resource sharing between these nodes. As a result, the system is more resilient because the loss of one node will not affect the others. P2P networks also can accommodate users’ dynamic nature and are economical since resources are shared. They may be divided into two types of systems: structured and unstructured. Performance problems plague unstructured peer-to-peer systems such as Kaaza [7] and Gnutella [8]. Distributed hash tables (DHTs), which offer remarkable load balancing, search efficiency, minimal overhead, and fault tolerance under high network dynamics, are typically used in structured peer-to-peer networks. Therefore, it is thought that DHT is a preferable option for implementing a publish-subscribe system. Content Addressable Networks (CAN) [9], Chord [10], Pastry [11], and Tapestry [12] are a few examples of well-known DHT-based peer-to-peer systems.
Application-layer implementations are the only ones allowed for traditional publish/subscribe systems. These systems have several difficulties, including a lack of self-organization, the absence of effective matching algorithms, and scale problems. Implementing a publish/subscribe system over a P2P overlay network can address these innate problems. The literature has some implementations of publish-subscribe systems based on DHT, including PastryStrings [13], Scribe [14], Meghdoot [15], and Hermes [16]. For publish-subscribe applications, each of them uses a separate DHT.
DHTs incur operational costs due to the churn issue, which demands a workaround for delivering a reliable data query service. Several significant research [13,15,17,18,19] have addressed creating hybrid systems to combine the benefits of both structured and unstructured designs with significant trade-offs. An interest/resource-based non-DHT-based structural design technique has also received a lot of attention [20,21]. Alongside attempting to lessen the complexity of churn handling, it offers the benefits of DHT-based systems. In the current study, we propose a publish/subscribe and interest/resource-based non-DHT fog-computing architecture that enables effective resource sharing for sensor data analysis. For the design of the architecture, we took into account the interest/resource-based non-DHT-based architecture proposed in [20,21].

Our Contribution

Our main objective is to show the superiority of our publish/subscribe and interest/resource-based non-DHT fog-computing architecture over publish/subscribe DHT-based architectures from the viewpoints of search latency and data-lookup complexity. We have considered a number theoretic approach to building the architecture. The following facts support our decision to consider such an architecture: (1) In contrast to any structured DHT-based network, our overlay network’s search latency is independent of the total number of peers present, (2) the complexity of the intra-group data-lookup protocol is constant, while the complexity of the inter-group data lookup is O(n), where n is the total number of resources types present in the network.
The organization of the paper is as follows. In Section 2, we talk about the difference between DHT-based and RC-based architecture, and some related preliminaries of the proposed RC-based architecture. In Section 3, we present the Publish/Subscribe and RC-Based P2P Architecture for Fog Computing, the data-lookup protocols. In Section 4 we describe the comparison of our proposed architecture and its performance with some noted DHT-based systems. Finally, Section 5 concludes.

2. Distributed Hash Table P2P vs. RC-Based P2P

In this section, we go over the functionality, benefits, and challenges of DHT-based and Residue Class (RC)-based P2P architecture. This section explains why the RC-based P2P model was selected for P2P fog computing as opposed to alternative DHT-based P2P models. We also present theoretical results in support of RC-based P2P architecture for the resource/interest paradigm.

2.1. DHT-Based P2P

The term “structured P2P systems” refers to all DHT-based P2P systems. In a structured peer-to-peer system, the data items are given keys, and a graph is created that connects each key to the node that holds the appropriate data. There are several P2P algorithms based on DHT, including Chord [10], Can [9], Pastry [11], Tapestry [12], and others. Distributed Hash Tables (DHTs) must first be understood before we can examine P2P that is DHT-based. A unique data structure known as a hash table may map keys to values. It utilizes a unique algorithm known as the hash function, which accepts the original key as input and produces a key that is the distinct numerical representation of the original key. The value that corresponds to the number key is mapped. As a result, the hash table stores data as (key, value) pairs among millions of peers using a distributed hash table (DHT). Every peer can use a key to query the database, which then returns the key’s value. A query is resolved in a DHT-based peer-to-peer system via a limited number of message exchanges among peers. Just a select few of the other peers—not all of them—are known to each peer.
DHT also employs a few churn-management techniques. All the peers have organized themselves into a ring in a circular DHT (like a Chord). A pair of (key, value) values and a distinct ID from the ID space are given to each peer. Moreover, only the peer’s immediate predecessor and successor are known to each peer (and have IP addresses). When a peer inside the circular DHT receives a query message asking for information about a value connected to a certain key, it first determines if it oversees the value of the key being requested. If it does, it unicasts the information to the peer that originated the inquiry message. If not, it would, depending on the key, pass the query message to either its successor or predecessor. In this manner, a query message is sent through peers in a circular DHT until a query hit is made. Since n is the total number of peers in the network, we can state that the time complexity for a search in DHT-based P2P is O(log n). Nevertheless, maintaining DHT and dealing with the churn issue is a difficult process that demands a lot of work.

2.2. RC-Based P2P Architecture [20]

 Definition 1.
A resource is defined as a tuple of the characters < R i , V > , where R i stands for a resource’s type and V for its value. Please note that a resource might have several values.
For illustration, let V symbolize a specific actor and R i denote the resource category “movies”. Therefore, < R i , V > represents movies (some or all) acted by a particular actor V.
 Definition 2.
In a peer-to-peer system with n different resource kinds, let S be the set of all peers (i.e., n distinct common resources). Then S = { C i } , 0 i n 1 , where C i represents the subset of peers that have the same resource type R i . This subset C i is referred to as group i in this study. Furthermore, we presume that C i h is the first peer among the peers in each group C i to join the system. The group-head of group C i is referred to as C i h . The following two − level overlay architecture as shown in Figure 1 has been proposed in [20].
1.
At level 1, there is a ring network consisting of the peers C i ( 0 i n 1 ). The ring has n peers, which corresponds to the number of different resource kinds. This ring network is known as a transit ring since it is utilized for quick data search.
2.
There are n totally linked networks (groups) of peers at level 2. Each of these groups, say G i , is made up of the peers of the subset C R i , 0 i n 1 , in such a way that all of the peers (∈ C R i ) are logically connected and the network has a diameter of 1. Each G i has a group-head C i h that connects it to the transit ring network.
3.
Each peer on the transit ring network maintains a global resource table (GRT) that consists of n number of tuples. GRT contains one tuple per group and each tuple is of the form <Group-Head Logical address, IP address>, where Group-Head Logical Address refers to the architecture. Additionally, Resource Code is the same as the group-head logical address.
4.
Each group-head C i h also maintains a local resource table (LRT) that consists of k number of tuples, where k is equal to the number of members present in that group G i . LRT contains a tuple of the form <Group member Logical address, IP address>. This LRT is also maintained by all the group-members of G i .
5.
Any communication between a peer C i ∈ group G x and C j ∈ group G y takes place only through the corresponding group-heads C x h and C y h .

2.2.1. Relevant Properties of Modular Arithmetic

Consider the set S n of non-negative integers less than n, where S n = {0, 1, 2, … (n − 1)}. This is known as the residue set or residue classes (mod n). In other words, each integer in S n represents a residue class (RC). These residue classes are denoted by the symbols [0], [1], [2], …, [n − 1], where [r] = {a: a is an integer, a ≡ r (mod n)}.
For example, for n = 3, the classes are:
[0] = {…, −6, −3, 0, 3, 6, …}
[1] = {…, −5, −2, 1, 4, 7, …}
[2] = {…, −4, −1, 2, 5, 8, …}
Thus, any class r (mod n) of S n can be written as follows:
[r] = {…, (r − 2n), (r − n), r, (r + n), (r + 2n), …, (r + (j − 1).n), (r + j.n), (r + (j + 1).n), …}
A few relevant properties of the residue class are stated below.
 Lemma 1.
Any two numbers of any class r of S n are mutually congruent.
 Proof.
Let us consider any two numbers N and N of class r. These numbers can be written as:
N r ( m o d n ) ; therefore , ( N r ) / n = an integer , say I
N r ( m o d n ) ; therefore , ( N r ) / n = an integer , say I
Using (1) and (2) we obtain the following,
( N N ) / n = ( ( N r ) ( N r ) ) / n = I I = an integer .
Therefore, N is congruent to N ; that is, N ≡ N (mod n);
Additionally, N ≡ N (mod n) because congruence relation (≡) is symmetric. Hence, the proof.  □

2.2.2. Assignments of Overlay Addresses

Assume that in a resource/interest-based P2P system, there are n distinct resource types. Please note that n can be set to an extremely large value a priory to accommodate many distinct resource types. Consider the set of all peers in the system given as S = { C R i } ( ( 0 i n 1 ) ). Additionally, as mentioned earlier, for each subset C R i (i.e., group G i ) peer C i is the first peer with resource type R i to join the system.
In the suggested overlay architecture [20,21,22], the positive integers belonging to distinct classes are utilized to determine the following parameters:
1.
Logical addresses of peers in a subset C R i (i.e., group G i ): It will be shown how to use these addresses to support the claim that all peers (∈ G i ) are (logically) directly linked to one another, producing an overlay network of diameter 1. Each G i , as used in graph theory, is a whole graph.
2.
Identifying which peers on the transit ring network are neighbors with one another.
3.
Identifying each distinct resource type with a unique code.
The assignment of logical addresses to the peers at the two levels and the resources happen as follows:
1.
At level 1, the smallest non-negative number (r) of the residue class r (mod n) of the residue system, S n is assigned to each group-head C r h of group G r .
2.
At level 2, the group G r (i.e., the subset C R r ) will be formed by all peers with the same resource type R r , with the group-head C r h connected to the transit ring network. Given to each new peer that joins group G r is the group membership address (r + j.n), where j is 1, 2, 3 ….
3.
Resource class R r possessed by peers in G r is assigned the code r which is also the logical address of the group-head C r h of group G r .
4.
A corresponding tuple of <Group-Head Logical Address, IP Address> is added to the global resource table (GRT) each time a new group-head joins.
 Remark 1.
GRT remains sorted with respect to the logical addresses of the group-heads.
 Definition 3.
Two peers C i h and C j h on the ring network are logically linked together if (i + 1) mod n = j.
 Remark 2.
The last group-head C n 1 h and the first group-head C 0 h are neighbors based on Definition 3. It justifies that the transit network is a ring.
 Definition 4.
Two peers of a group G r are logically linked together if their assigned logical addresses are mutually congruent.
 Remark 3.
The diameter of the transit ring network is n / 2 .
 Lemma 2.
Each group G r forms a complete graph.
 Proof.
A pair of peers in a group G r are said to be logically connected by Definition 4, if their assigned logical addresses are compatible with one another. Additionally, from Lemma 1, we see that any two numbers of any class r of S n are mutually congruent. Hence, every peer has direct logical connectivity with every other peer in the same group G r . Thus, the evidence.  □

2.2.3. Salient Features of Overlay Architecture

We summarize the salient features of this architecture.
1.
It is a two − level hierarchical overlay network architecture with a structured network at each level.
2.
A group-head address would be identical to the resource type held by the group using modular arithmetic described in Section 2.2.1.
3.
Unlike distributed hash table-based works that are now in use, some of which put a ring network at the center of their proposed design [10,23], the number of peers on the ring is equal to the number of different resource kinds.
4.
Assume in general that there are already i group-heads ( C 0 , C 1 , … C i 1 ) in the ring. The address i will then be given to the following peer joining the system as the group leader with resource type i. As an illustration, the sixth group-head joining the system will have the logical address 5 and the resource type code 5, respectively.
5.
The diameter of the transit ring network is n/2. Please note that in any P2P network, the total number of peers N >> n.
6.
In level 2, every overlay network is fully connected, i.e., in terms of graph theory, it is a full graph made up of the group peers. Its diameter is therefore just 1. The design provides the lowest feasible search latency inside a group due to its smallest diameter (in terms of overlay hops).

2.2.4. Fault Tolerance of the Architecture

To achieve fault tolerance, we assume that an existing group-head always saves a copy of the list of all peers in this group to the peer with the next logical address. In the architecture, we assume the following fault model. Any peer in any group may be faulty. First, let us consider that in a group, its group-head becomes faulty. After detection, it will be replaced by the peer with the next logical address in the group; the logical address of the faulty group-head now becomes the new logical address of this peer and this peer will start acting as the new group-head. Therefore, in GRT, only the IP address of this new group-head will be entered replacing the IP address of the faulty group-head. The new group-head will unicast the modified GRT to every other group-head. It will also save a copy of the updated list of peers to the peer with the next logical address. Next, let us consider that a peer in a group other than the group-head is faulty. All that is required is to delete the entry of the faulty peer in the list of peers and this will be done by the group-head; the group-head will save a copy of this updated list to the peer with the next logical address. It may be noted that in the present research, peer movements in and out of the architecture (i.e., churn) are not considered because the application may require stable peers. Therefore, the process of the replacement of a faulty peer may be viewed as if a peer has left the system (somewhat similar to churn). Please note that the structure of the group remains a connected network.

2.2.5. Scalability of the Architecture

It should be observed that in every overlay network, there are very few different resource kinds n, in comparison to the number of peers. A very large value of n can be chosen during the design process to handle a very large number of potential resource types, preventing the risk of having to modify the architecture when new groups are formed (if needed in the future). If new groups are established in the future with new resource types in the system, additional residue classes in sequence will be accessible for their addressing. This implies that if at first there are few resource types present, just the first few residue classes will be used initially for addressing. As an illustration, suppose that n is originally set to 1000. There are 1000 potential residue classes, starting with [0], [1], [2], [4], [5], …, [999]. The residue classes [0], [1], and [2] will be used to address the peers in the three unique groups if there are originally only three groups of peers and three different resource types present. The leftover classes [3] and [4] will be used to address the peers in the two new groups in order of their entering the system if later two new groups with two new resource kinds are generated. As we can see, any group size is unlimited since any residue class may be used to conceptually address an infinite number of peers that have a shared interest. As a result, there are no drawbacks to the suggested architecture’s scalability.

2.3. Comparison of Distributed Hash Table P2P vs. RC-Based P2P

As the average number of hops needed for each search in Chord [10] is N/2, where N is the total number of peers in the system, following the chord is not done since it is exceedingly inefficient in big peer-to-peer systems. According to [20], the average number of hops needed for each search (on the ring network) is n/2, where n is the total number of different resources. Because there are often more peers than there are different resource categories or n, a search along the transit ring network in [20] can be extremely effective. The difficulty involved in data lookup is a function of the number of peers N in the system in Chord [10] and other structured P2P systems [9,11,12], but it is a function of the number of different resource categories n in the proposed design [20]. The important thing to note is that the search procedure has been made easy and effective using the same code to indicate a resource type R i and the related group-head C i . As a result, the time complexity for data search in the architecture shown in [20] is constrained by ( 1 + n 2 ) . Table 1 shows the data search difficulty of both [20] strategy and other significant already-existing DHT-based systems.

3. Publish/Subscribe and RC-Based P2P Architecture for Fog Computing

In this section, we suggest overlaying the actual fog nodes with two networking infrastructures to provide effective resource discovery. For our Healthcare 4.0 fog-computing architecture, we have made the following modifications described below to employ the RC-based p2p architecture mentioned in Section 2.2.
First, the network engineer organizes the heterogeneous network in the form of groups according to meaningful range of computing power, for example, lower group logical address can cater to nodes with 1–2 cores and <256 MB RAM, whereas higher group logical address can cater to nodes with higher range can be 16–32 cores with a few GB RAM. This essentially refers to the capacity to complete the necessary operations and store the results. Assigning the logical address and the number of groups is at the discretion of the designer based on the application needs. This implies that the logical address value is not representative of the abstract value for the computation capacity i.e., for example, group C 0 has no compute cores never happens. This current scheme is a deviation from the prior work on interest-based group assignments. The range allows the heterogeneous network to accommodate minor changes in the group’s needs. However, if it changes drastically, then the node will inform this information to its group-head, who will refer to the GRT and place the node in the group with the respective computing range.
Second, to incorporate this concept of peer computing power changing drastically and making data lookup efficient, we have included another column in the GRT which represent the computing range for each of the groups defined in our RC-based fog-computing architecture. The range i in our proposed architecture represents the resource R i in the existing RC-based architecture. An example, let us consider an RC-based p2p fog-computing network with 3 groups, and their respective computing ranges are defined by R 0 , R 1 , R 2 , the respective GRT table is shown in Table 2. Now if the requested range falls in the boundary condition, for example between R 1 and R 2 , the request will be forwarded to the group-head with a higher computing range R 2 .
Figure 2 depicts the fundamental architecture of a fog computing-based healthcare platform. This demonstrates the existence of a fog controller at the fog-computing layer. The fog controller can be utilized as the component in charge of gathering data from the underlying sensor layer. The fog controller will be informed about a group-head C x h logical address and IP address belonging to the RC-based architecture. Once given the task, it forwards the request to a group-head C x h . C x h searches for an appropriate fog node or group of fog nodes to do the required data analysis. Eventually, the output will be transmitted directly to the sensor layer actuators that are accessible for use or filtered data may be transferred to the cloud layer for additional processing or storage. Publish/subscribe and P2P overlays are the two communication paradigms used in our suggested network architecture.

3.1. PubSub-Based Fog-Computing Framework

For effective resource identification and work allocation, we first suggest using a publish/subscribe-based (PubSub-Based) communication model. In Figure 3, the proposed architecture is shown. The utilization of a fog controller serving as an event-notification agent for fog node p2p architecture is one of the main topics of this article. The fog controller may be duplicated in this framework to create a fault-tolerant system. The fog nodes in this architecture are arranged in groups as described earlier.
As mentioned in earlier, the group-heads in this architecture maintain the GRT (global resource table) containing information about the other group-heads present in the RC-based architecture, as well as LRT (local resource table) containing information about the other members in its group. The fog controller will be informed about a group-head C x h logical address and IP address belonging to the RC-based architecture. To make things simple, it can be the information about the first group-head who has joined the architecture C 0 h , but again it can be any group-head belonging to the RC-based architecture. Additionally, the sensors that are serving as publishers provide the controller. Based on the sensor releasing the data, the fog controller is configured to determine the computing power needed to process the data. When a publication is available with the controller, it sends the advertised job R e R i to the group-head C x h . The group-head C x h will now follow the data-lookup protocol defined in Section 3.2.1.

3.2. RC-Based P2P Fog-Computing Architecture

The three-layer architecture of RC-based P2P fog computing consists of client nodes/IoT devices in the first layer, fog nodes in the second layer, and a cloud node in the third layer. Between the client nodes/IoT devices and the fog nodes lies the fog controller. To link fog nodes and enable resource lookup and data transfers between them, RC-based P2P fog-computing architecture uses a residue class-based network model as discussed in Section 2.2. Fog nodes now employ RC-based lookup techniques to find resources and are connected over P2P. The architecture of RC-based peer-to-peer fog computing is shown in Figure 4. When a client node requests a resource or piece of data to the fog controller, based on the data, the fog controller is configured to determine the computing capacity needed R e R i , it forwards the requests to its known group-head C x h , the services are maintained by implementing RC-based lookup protocols. The group-head C x h will now perform the data-lookup protocol in the RC-based architecture. In that case, there are four different possibilities.
  • Scenario 1: The fog node C x h itself has R e R i .
  • Scenario 2: The fog node who has R e R i is the group member of the group C x .
  • Scenario 3: The fog node who has R e R i is the group-head of another group C y h .
  • Scenario 4: The fog node who has R e R i is the group member of another group C y .
Figure 4. Pub/Sub and RC-Based P2P Fog-Computing Architecture.
Figure 4. Pub/Sub and RC-Based P2P Fog-Computing Architecture.
Iot 04 00008 g004

3.2.1. RC-Based Lookup Protocol

Assume an RC-based peer-to-peer system with n different computing ranges, let S be the set of all peers. Then S = { C i } , ( 0 i n 1 ), where C i represents the subset of peers that have the computing power within the range R i . This subset C i is referred to as group i in this study. Furthermore, we presume that C i h is the first peer among the peers in each group C i to join the system. The group-head of group C i is referred to as C i h .
Assume the IoT/client device ( I x ) sends some data to the fog controller (FC), based on the data, the FC is configured to determine the computing capacity needed R e R i . For simplicity, we have considered that the fog controller FC is informed about the fog node C 0 h , which is the group-head of the computing range R 0 and also the first one to have joined the RC-based architecture. FC, after determining the computing capacity required, has forwarded the advertised job R e R i to C 0 h . C 0 h will now perform the lookup service in the RC-based architecture. Here we present the algorithms for all the scenarios described in Section 3.2.
  • Scenario 1 (Section 3.2): The fog node C 0 h itself has R e R i .
    FC forwards the advertised job R e R i to C 0 h .
    If R e R i falls in the computing range R 0 and the fog node C 0 h have the resource R e R i it will provide service to FC.
    This scenario is presented in Algorithm 1.
    Algorithm 1 Scenario 1 (Section 3.2): The fog node C 0 h itself has the resource
    1:
    FC forwards the advertised job R e R i to C 0 h ;
    2:
    if ( R e R i R 0 ) ∧ C 0 h possess R e R i then
    3:
    C 0 h unicasts service to FC;
    4:
    else if Scenario 2 or Scenario 3 or Scenario 4 then
    5:
     Respective Scenario solution
    6:
    else
    7:
    C 0 h informs FC no one has R e R i ;
    8:
     cloud node is contacted by FC for service R e R i ;
    9:
     cloud responds with R e R i to FC;
    10:
    end if
    Observation 1: The number of hops required for an FC to find a resource in the proposed overlay P2P architecture for Scenario 1 (Section 3.2) is only 2 which is constant.
  • Scenario 2 (Section 3.2): The fog node who has R e R i is the group member of the group of C 0 .
    FC forwards the advertised job R e R i to C 0 h .
    Fog node C 0 h does not have R e R i ,
    If R e R i falls in the computing range R 0 ,it will broadcast the advertised message R e R i in its group C 0 using LRT.
    Fog node F i in C 0 who has R e R i will reply with the service to the C 0 h .
    C 0 h will reply to FC with the service.
    This scenario is presented in Algorithm 2.
    Algorithm 2 Scenario 2 (Section 3.2): The fog node that has the resource is the group member of the group of C x
    1:
    FC forwards the advertised job R e R i to C 0 h ;
    2:
    if ( R e R i R 0 ) ∧ C 0 h does not possess R e R i then
    3:
    C 0 h broadcast the advertised message R e R i in its group C 0 using LRT;
    4:
    if  F i C 0 possess R e R i  then
    5:
       F i unicasts service to C 0 h ;
    6:
       C 0 h respond to FC with the service R e R i ;
    7:
    else if Scenario 3 or Scenario 4 then
    8:
      Respective Scenario solution
    9:
    else
    10:
       C 0 h informs FC no one has R e R i ;
    11:
      cloud node is contacted by FC for service R e R i ;
    12:
      cloud responds with R e R i to FC;
    13:
    end if
    14:
    end if
    Observation 2: The number of hops required for an FC to find a resource in the proposed overlay P2P architecture for Scenario 2 (Section 3.2) is only 4 which is constant.
  • Scenario 3 (Section 3.2): The fog node that has the resource is the group-head of another resource type C y h .
    FC forwards the advertised job R e R i to C 0 h .
    Fog node C 0 h and any F i C 0 does not have the resource R e R i .
    C 0 h determines the group-head C y h ’s address code from GRT such that R e R i ∈ the computing range R y for C y h (i = y).
    C 0 h computes | i j | = h .
    Based upon the value of h, it will forward R e R i to its predecessor or its successor.
    Every group-head traversed C i h forwards R e R i until i = y.
    If C i h has the resource, it will reply with the service to the C 0 h .
    C 0 h will reply to the FC with the service.
    This scenario is presented in Algorithm 3.
    Algorithm 3 Scenario 3 (Section 3.2): The fog node that has the resource is the group-head of another resource type C y h
    1:
    FC forwards the advertised job R e R i to C 0 h ;
    2:
    if R e R i R 0 then
    3:
    C 0 h determines the group-head C y h ’s address code from GRT;  ▹ R e R i ∈ the computing range R y for C y h (i = y)
    4:
    C 0 h computes | i j | = h ;
    5:
    if h > n/2 then   ▹ n = total no. of computing ranges
    6:
       C 0 h forwards the advertised message R e R i along with C y h ’s IP address to its predecessor C n 1 h ;
    7:
    else
    8:
       C 0 h forwards the advertised message R e R i along with C y h ’s IP address to its successor C 1 h ;  ▹ Looking for minimum no. of hops along the transit ring network
    9:
    end if
    10:
     All intermediate group-heads C i h forwards until i = y ▹ no. of hops along the ring in the worst case is n/2
    11:
    if  C y h possess R e R i  then
    12:
       C y h unicasts service to C 0 h ;
    13:
       C 0 h respond to FC with the service R e R i ;
    14:
    else if Scenario 4 then
    15:
      Respective Scenario solution
    16:
    else
    17:
       C 0 h informs FC no one has R e R i ;
    18:
      cloud node is contacted by FC for service R e R i ;
    19:
      cloud responds with R e R i to FC;
    20:
    end if
    21:
    end if
    Observation 3: The number of hops required for an FC to find a resource in the proposed overlay P2P architecture for Scenario 3 (Section 3.2) is n + 2 , where n is the total number of computing ranges in the network, the data-lookup complexity is O(n).
  • Scenario 4 (Section 3.2): The fog node who has R e R i is the group member another group C y .
    FC forwards the advertised job R e R i to C 0 h .
    Fog node C 0 h and any F i C 0 does not have R e R i .
    C 0 h determines the group-head C y h ’s address code from GRT such that R e R i ∈ the computing range R y for C y h (i = y).
    C 0 h computes | i j | = h .
    Based upon the value of h, it will forward R e R i to its predecessor or its successor.
    Every group-head traversed C i h forwards R e R i until i = y.
    If C y h does not have R e R i it will broadcast the message R e R i in group C y .
    Fog node F y in C y who has R e R i will reply with the service to the C y h .
    C y h will reply to C 0 h with the service.
    C 0 h will reply to FC with the service.
    This scenario is presented in Algorithm 4.
Algorithm 4 Scenario 4 (Section 3.2): The fog node that has R e R i is the group member of the group of another resource type C y
1:
FC forwards the advertised job R e R i to C 0 h ;
2:
if R e R i R 0 then
3:
C 0 h determines the group-head C y h ’s address code from GRT;  ▹ R e R i ∈ the computing range R y for C y h (i = y)
4:
C 0 h computes | i j | = h ;
5:
if h > n/2 then    ▹ n = total no. of computing ranges
6:
   C 0 h forwards the advertised message R e R i along with C y h ’s IP address to its predecessor C n 1 h ;
7:
else
8:
   C 0 h forwards the advertised message R e R i along with C y h ’s IP address to its successor C 1 h ;  ▹ Looking for minimum no. of hops along the transit ring network
9:
end if
10:
 All intermediate group-heads C i h forwards until i = y ▹ no. of hops along the ring in the worst case is n/2
11:
if  C y h does not possess R e R i  then
12:
   C y h broadcast the advertised message R e R i in its group C y using LRT;
13:
  if  F y C y possess R e R i  then
14:
    F y unicasts service to C y h ;
15:
    C y h unicasts service to C 0 h
16:
    C 0 h respond to FC with the service R e R i ;
17:
  else
18:
    C 0 h informs FC no one has R e R i ;
19:
   cloud node is contacted by FC for service R e R i ;
20:
   cloud responds with R e R i to FC;
21:
  end if
22:
end if
23:
end if
Observation 4: The number of hops required for an FC to find R e R i in the proposed overlay P2P architecture for Scenario 4 (Section 3.2) is n + 4 , where n is the total number of resources in the network, the data-lookup complexity is O(n).

4. Performance Evaluation

In this section, we discuss the performance of the proposed RC-based Lookup Protocol Algorithm proposed in Section 3.2.1.
In [5] a DHT-based fog-computing architecture has been proposed for Healthcare 4.0. Specifically, the authors have taken the example of Chord [10] architecture to solve the problem. As the average number of hops needed for each search in Chord is N/2, where N is the total number of peers in the system, following the chord is not suitable since it is exceedingly inefficient in big peer-to-peer systems.
The complexity of the data-lookup protocol in the current study is constant in the best-case scenario, i.e., Scenario 1 and 2, and is O(n) as discussed in Section 3.2.1 for the other scenarios. In contrast to the studies in [5], search latency is independent of the total number of peers in the network. Because of its much lower search latency, we deduce that the suggested structured interest-based overlay architecture might be preferred over non-interest-based structured ones. Here, by interest, we refer to the resources of different computing ranges as described earlier.
The important thing to note is that the search procedure has been made easy and effective using the computing ranges to indicate a resource type R i and the related group-head C i h . In addition, the size of the GRT database is only constrained by the variety of computing ranges, which is very small. In actuality, there are many more peers than there are different computing ranges, and the size of the GRT is independent of the total number of peers N in the P2P system. The freshly joining group-head will always have the greatest logical address since GRT expands dynamically as additional group-heads join. Because GRT is always ordered in relation to the logical addresses of the group-heads, searching inside it is particularly effective.

Experiments

As we already indicated, the major goal of the current study is to demonstrate how our interest-based, non-DHT design outperforms DHT-based systems in terms of search latency and data-lookup complexity. We thus conducted three tests to evaluate the data-lookup latency on all the scenarios mentioned in Section 3.2.1 in terms of overlay hops of the RC-based Fog computing p2p architecture with a well-known p2p architecture Chord [10], in addition to the analytical comparison. Results of the experiments with three different numbers of distinct resource types are shown in Figure 5, Figure 6 and Figure 7.
  • Scenario 1:
    Figure 5. Scenario 1: Chord vs. RC-based.
    Figure 5. Scenario 1: Chord vs. RC-based.
    Iot 04 00008 g005
  • Scenario 2:
    Figure 6. Scenario 2: Chord vs. RC-based.
    Figure 6. Scenario 2: Chord vs. RC-based.
    Iot 04 00008 g006
  • Scenario 3 and 4:
    Figure 7. Scenario 3 and 4: Chord vs. RC-based.
    Figure 7. Scenario 3 and 4: Chord vs. RC-based.
    Iot 04 00008 g007
We have taken into account RC-based overlay networks with 10, 15, and 20 different resource kinds; the number of fog nodes in each of the groups corresponding to the different computing ranges has steadily risen, culminating in a final system fog node count of 3 × 10 11 for all the scenarios. Consider N as the total number of fog nodes in the overlay network. For Chord [10] the data-lookup latency is O( l o g 2 N ). The data search latency for Chord grows with the number of fog nodes in the system, as seen in each picture since this delay is dependent on the total number of fog nodes N in the system. The data search latency in the RC-based design, however, is unaffected by the size of any individual group or the system’s total number of fog nodes N. As a result, the RC-based design will have a constant data-lookup latency for Scenarios 1 and 2 and n for Scenarios 3 and 4, where n is the total number of resources n < < N, as seen in each of the two images as a straight line with zero gradients as the number of fog nodes in the system grows. In each of the two pictures, we can see a considerable reduction in data-lookup latency compared to Chord [10] due to our suggested design.

5. Conclusions

Healthcare 4.0 heralds a transition in the healthcare sector from manual processes to decisions based on technology. This change intends to make greater use of patient experience technology. A variety of IoT-based devices are employed to continually collect patient health data. Initially, these data were processed in cloud-based data centers. Issues with latency, privacy, and cost were present in this method. Fog computing has provided a solution to the problems associated with cloud-based data processing. Fog computing also has its own difficulties in terms of finding and making use of available resources.
In this study, we introduce resource/computing range-based, RC-based fog computing, a novel method for constructing a scalable Healthcare 4.0 fog-computing system that performs data-lookup operations with a high degree of efficiency, therefore lowering latency and delivering more rapid localized services. Because RC-based fog can handle greater processing needs locally, there are much fewer requests that must be routed to the cloud, which effectively saves Internet bandwidth. In the RC-based fog-computing concept, several cloud service types, including SaaS, PaaS, and IaaS, may be grouped at various level 2 networks. In our upcoming research, we will take into account the geographic location parameter to include numerous fog controllers supporting many IoT devices connecting to various group-heads in the RC-based fog-computing architecture to offer service. The suggested RC-based fog architecture will be further expanded to support multi-layer hierarchical Healthcare 4.0 P2P fog structures, and its performance will be compared to that of current fog architecture. Additionally, in our immediate future research we plan to simulate our proposed architecture using the fog simulators such as IFogSim2 [24] and have real-time data generated to provide the architecture’s effectiveness in realistic Healthcare 4.0 scenarios.

Author Contributions

Conceptualization, I.R. and R.M.; methodology, I.R. and B.G.; software, R.M.; validation, R.M. and N.R.; formal analysis, R.M.; investigation, I.R.; writing—review and editing, I.R.; visualization, R.M. and I.R.; supervision, B.G.; project administration, B.G. and N.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Acknowledgments

We feel grateful to the reviewers for their insightful comments and recomendation which have allowed us to increase the manuscripts quality.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hathaliya, J.J.; Tanwar, S.; Tyagi, S.; Kumar, N. Securing electronics healthcare records in healthcare 4.0: A biometric-based approach. Comput. Electr. Eng. 2019, 76, 398–410. [Google Scholar] [CrossRef]
  2. Vora, J.; DevMurari, P.; Tanwar, S.; Tyagi, S.; Kumar, N.; Obaidat, M.S. Blind signatures based secured e-healthcare system. In Proceedings of the 2018 International Conference on Computer, Information and Telecommunication Systems (CITS), Colmar, France, 11–13 July 2018. [Google Scholar]
  3. Vora, J.; Nayyar, A.; Tanwar, S.; Tyagi, S.; Kumar, N.; Obaidat, M.S.; Rodrigues, J.J. BHEEM: A blockchain-based framework for securing electronic health records. In Proceedings of the 2018 IEEE GLOBECOM workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
  4. Vora, J.; Italiya, P.; Tanwar, S.; Tyagi, S.; Kumar, N.; Obaidat, M.S.; Hsiao, K.F. Ensuring privacy and security in e-health records. In Proceedings of the 2018 International Conference on Computer, Information and Telecommunication Systems (CITS), Colmar, France, 11–13 July 2018. [Google Scholar]
  5. Shukla, N.; Gandhi, C. Efficient Resource Discovery and Sharing Framework for Fog Computing in Healthcare 4.0. In Fog Computing for Healthcare 4.0 Environments; Signals and Communication Technology; Tanwar, S., Ed.; Springer: Cham, Switzerland, 2020. [Google Scholar] [CrossRef]
  6. Eugster, P.T.; Felber, P.A.; Guerraoui, R.; Kermarrec, A.M. The many faces of publish/subscribe. ACM Comput. Surv. (CSUR) 2003, 35, 114–131. [Google Scholar] [CrossRef]
  7. Liang, J.; Kumar, R.; Ross, K. The kazaa overlay: A measurement study. In Proceedings of the 19th IEEE Annual Computer Communications Workshop, Hong Kong, China, 7–11 March 2004; pp. 17–20. [Google Scholar]
  8. Ripeanu, M. Peer-to-peer architecture case study: Gnutella network. In Proceedings of the First International Conference on Peer-to-Peer Computing, Linköping, Sweden, 27–29 August 2001; pp. 99–100. [Google Scholar]
  9. Ratnasamy, S.; Francis, P.; Handley, M.; Karp, R.; Shenker, S. A Scalable Contentaddressable Network; ACM: New York, NY, USA, 2001. [Google Scholar]
  10. Stoica, I.; Morris, R.; Karger, D.; Kaashoek, M.F.; Balakrishnan, H. Chord: A scalable peer-to-peer lookup service for internet applications. ACM Sigcomm. Comput. Commun. Rev. 2001, 31, 149–160. [Google Scholar] [CrossRef]
  11. Rowstron, A.; Druschel, P. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing, Heidelberg, Germany, 12–16 November 2001; pp. 329–350. [Google Scholar]
  12. Zhao, B.Y.; Kubiatowicz, J.; Joseph, A.D. Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing; University of California at Berkeley: Berkeley, CA, USA, 2001. [Google Scholar]
  13. Aekaterinidis, I.; Triantafillou, P. Pastrystrings: A comprehensive content-based publish/subscribe DHT network. In Proceedings of the International Conference on Distributed Computing Systems, Lisboa, Portugal, 4–7 July 2006; Volume 6, p. 23. [Google Scholar]
  14. Rowstron, A.; Kermarrec, A.M.; Castro, M.; Druschel, P. Scribe: The design of a large-scale event notification infrastructure. In Proceedings of the International Workshop on Networked Group Communication, London, UK, 7–9 November 2001; pp. 30–43. [Google Scholar]
  15. Gupta, A.; Sahin, O.D.; Agrawal, D.; Abbadi, A.E. Meghdoot: Content-based publish/subscribe over p2p networks. In Proceedings of the 5th ACM/IFIP/USENIX International Conference on Middleware, Toronto, ON, Canada, 6 October 2004; pp. 254–273. [Google Scholar]
  16. Pietzuch, P.R.; Bacon, J.M. Hermes: A distributed event-based middleware architecture. In Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops, Sendai, Japan, 7–9 December 2002; pp. 611–618. [Google Scholar]
  17. Carlsson, B.; Gustavsson, R. The rise and fall of napster—An evolutionary approach. In Proceedings of the International Computer Science Conference on Active Media Technology, Hong Kong, China, 18–20 December 2001; pp. 347–354. [Google Scholar]
  18. Gupta, H.; Vahid Dastjerdi, A.; Ghosh, S.K.; Buyya, R. iFogSim: A toolkit for modeling and simulation of resource management techniques in the internet of things, edge 1 and fog computing environments. Softw. Pract. Exp. 2017, 47, 1275–1296. [Google Scholar] [CrossRef]
  19. Hao, Z.; Novak, E.; Yi, S.; Li, Q. Challenges and software architecture for fog computing. IEEE Internet Comput. 2017, 21, 44–53. [Google Scholar] [CrossRef]
  20. Kaluvakuri, S.; Maddali, K.; Roy, I.; Rekabdar, B.; Liu, Z.; Gupta, B. Design of RC Based Low Diameter Hierarchical Structured P2P Network Architecture. In Learning and Analytics in Intelligent Systems; EMENA-ISTL; Springer: Berlin/Heidelberg, Germany, 2020; Volume 7, pp. 312–320. [Google Scholar]
  21. Kaluvakuri, S.; Maddali, K.; Rahimi, N.; Gupta, B.; Debnath, N. Generalization of RC-Based Low Diameter Hierarchical Structured P2P Network Architecture. Int. J. Comput. Appl. (IJCA) 2020, 27, 77–83. [Google Scholar]
  22. Maddali, K.; Rekabdar, B.; Kaluvakuri, S.; Gupta, B. Efficient Capacity-Constrained Multicast in RC based P2P Networks. In Proceedings of the CAINE2019: 32nd International Conference on Computer Applications in Industry and Engineering, San Diego, CA, USA, 30 September–2 October 2019; Volume 63, pp. 121–129. [Google Scholar]
  23. Yang, M.; Yang, Y. An Efficient Hybrid Peer-to-Peer System for Distributed Data Sharing. Comput. IEEE Trans. 2010, 59, 1158–1171. [Google Scholar] [CrossRef]
  24. Mahmud, R.; Pallewatta, S.; Goudarzi, M.; Buyya, R. IFogSim2: An Extended iFogSim Simulator for Mobility, Clustering, and Microservice Management in Edge and Fog Computing Environments. J. Syst. Softw. 2022, 190, 111351. [Google Scholar] [CrossRef]
Figure 1. A two − level RC-based structured P2P architecture with n distinct resource types.
Figure 1. A two − level RC-based structured P2P architecture with n distinct resource types.
Iot 04 00008 g001
Figure 2. Healthcare 4.0: Fog-Computing Architecture.
Figure 2. Healthcare 4.0: Fog-Computing Architecture.
Iot 04 00008 g002
Figure 3. Publish/Subscribe Resource Discovery.
Figure 3. Publish/Subscribe Resource Discovery.
Iot 04 00008 g003
Table 1. Data Lookup: Complexity Comparison.
Table 1. Data Lookup: Complexity Comparison.
CanChordPastryRC-Based
ArchitectureDHT-basedDHT-basedDHT-basedRC-Based
Lookup Protocol{Key, value} pairs to map a point P in the coordinate space using uniform hash functionsMatching Key and NodeIDMatching Key and prefix in NodeIDInter-Group: Routing through group heads Intra-Group: Complete Graph
ParametersN number of peers in the network, d-number of dimensionsN number of peers in the networkN number of peers in the network, b-number of bits (B = 2b) use for the base of the chosen identifiern = Number of distinct resource types, N-number of peers in the network, n < < N
Lookup Performance O ( d N 1 / d ) O ( l o g N ) O B ( l o g N ) Inter-Group: O ( n ) , Intra-Group: O ( 1 )
Table 2. Global Resource Table (GRT).
Table 2. Global Resource Table (GRT).
Global Resource Table (GRT)
Group-Head Logical AddressIP-AddressComputing Range
0172.16.254.1 R 0
1160.15.244.4 R 1
2171.10.230.7 R 2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Roy, I.; Mitra, R.; Rahimi, N.; Gupta, B. Efficient Non-DHT-Based RC-Based Architecture for Fog Computing in Healthcare 4.0. IoT 2023, 4, 131-149. https://doi.org/10.3390/iot4020008

AMA Style

Roy I, Mitra R, Rahimi N, Gupta B. Efficient Non-DHT-Based RC-Based Architecture for Fog Computing in Healthcare 4.0. IoT. 2023; 4(2):131-149. https://doi.org/10.3390/iot4020008

Chicago/Turabian Style

Roy, Indranil, Reshmi Mitra, Nick Rahimi, and Bidyut Gupta. 2023. "Efficient Non-DHT-Based RC-Based Architecture for Fog Computing in Healthcare 4.0" IoT 4, no. 2: 131-149. https://doi.org/10.3390/iot4020008

Article Metrics

Back to TopTop