Page 88 - ITU Journal Future and evolving technologies Volume 2 (2021), Issue 5 – Internet of Everything
P. 88

ITU Journal on Future and Evolving Technologies, Volume 2 (2021), Issue 5




          Concerning  aspects  such  as  secure  channel  establish-  structures of both the CLO that wants to establish a friend‑
          ment, COG‑LO identi ied a series of shortcomings to the   ship and the data structures of all involved friends (since
          cornerstone  technologies  that  facilitate  secure  informa‑   the social relations are bidirectional).
          tion  exchange  over  the  Internet,  namely  the  Public  Key   As  usual  in  traditional  distributed  deployments  of  sys‑
          Infrastructure (PKI) and associated X.509 certi icate stan‑   tems like the SIoT platform used in this project, different
          dard  [30].    ically,  as  it  has  been  recently  shown,   servers are used to share the load of traf ic and compu‑
          PKIs  are  exposed  to  risks  due  to  errors  or  breaches  in‑   tation.  Each server can be con igured to work following
          volving Certi ication Authorities (CAs), resulting in unau‑   a full replication or a partial replication scheme, or even
          thorised certi icates being issued and compromising thus
                                                               as a totally independent system with non‑replicated data.
          the security of  the corresponding end  users.  In  light of
                                                               Using the  irst approach all the data is replicated or copied
          the above, COG‑LO adopts a novel blockchain‑based solu‑
                                                               to all the participating nodes in the cluster. Otherwise, us‑
          tion enabled by the Hyperledger [27] family of technolo‑
                                                               ing the second approach,  the entire data is split equally
          gies,  namely the Hyperledger Indy and the Hyperledger   into  partitions  and  is  stored  in  the  participating  nodes,
          Aries  frameworks  in  order  to  establish  secure  cross‑   thereby  creating  a  distributed  storage  of  data.  The  to‑
          organisational communication.  The aforementioned so‑   tal storage space depends on the total memory available
          lution, being based on the blockchain technology, inher‑   across the peer.  As shown in Fig.  5, the replicated mode
          its inevitably its advantages.  The solid basis of the pub‑   allows the speed‑up of the discovery process, since the in‑
          lic append‑only log (past logs cannot be changed unless   formation is immediately available in the peer from which
          the blockchain is subverted by a dishonest network ma‑   the search is being performed.  While this approach has
          jority), eliminate the single‑point‑of‑failure issue and en‑   bene its in terms of time, it also requires an increased use
          ables rapid reaction to identity revocations since DIDs can   of resources.
          be validated on the distributed ledger.
                                                               The  optimization  performed  by  the  CA  is  based  on  the
                                                               graph representation of the CLOs network.  Upon the oc‑
          4.  PERFORMANCE ANALYSIS                             currence  of  a  disruption  event  (e.g.,  an  ad  hoc  order,  a
                                                               tr  ic  event  etc.),  the  graph  gets  pruned  by  SIoT  to  in‑
          The fundamental aspect that is used to evaluate the per‑
                                                               clude only CLOs in the vicinity of the event.  The size of
          formance of the COG‑LO framework is the time consump‑
                                                               the graph, i.e., the number of vehicles included in the op‑
          tion of the algorithms implemented within the Social In‑
          ternet of Things (SIoT) and the optimizer.           timization impacts greatly the response time.
          More    ically,  the  scalability  of  these  components  is   The  performance  of  the  optimization  algorithms  is  pre‑
          addressed by observing how the computational time for   sented in Table 1. It clearly shows the importance of graph
          object  digitalization  varies  as  the  number  of  objects  in‑   pruning to achieve real‑time responsiveness to disruption
          creases,  how  the  social  graph    ing  time  varies  when   events. Table 1 shows the performance time for optimiza‑
          a  friend  must  be  discovered  as  the  size  of  social  graph   tion processing on pruned graphs.  An optimization algo‑
          varies, and  inally by the complexity of the optimization   rithm uses exact methods,  with linear solver,  where us‑
          algorithms in large environments, where the problem of   ing a large number of CLOs exponentially increases pro‑
          a large amount of data and variables to be analyzed must   cessing  time.  For  optimization  processing,  the  total  in‑
          be faced.                                            frastructure graph is clustered into regional representa‑
          The Social Internet of Things (SIoT) architecture consists   tion with graph sizes of 300‑500 CLOs (postal of ices, ve‑
          of  various  SIoT  clusters.  Each  cluster  is  implemented   hicles,  parcels).  The  processing  time  in  Table  1  clearly
          using  Apache  Ignite  to  support  a  memory‑centric  dis‑   shows that without pruning the graph and omitting the
          tributed database, caching and processing platform [17].   number of CLOs included in event handling,  the system
                                                               would not be able to create real‑time responses.
          Each SIoT peer can automatically discover each other in
          order to create a cluster or to browse another peer’s so‑
          cial graph.  In the  irst performance study of the SIoT, the
                                                               Table 1 – VRP optimization response time, based on the number of CLOs
          response time for the creation of a SIoT social graph was   included
          observed, in relation to the size of the graph (number of
                                                                vehicles/post of ices  20 CLOs  25 CLOs  30 CLOs  40 CLOs
          CLOs). The initialization process entails the instantiation
          of  the  digital  twins  of  logistics  objects,  along  with  their   2 CLOs  4.9s  12.4 s  28.7s  95.1s
          relevant data structures [28].  Fig.  3 demonstrates how   3 CLOs        9.9s    26.3s   43.4s   168.3s
          this process scales in time increasing the number of CLOs   4 CLOs       18.1s   38.2s   78.5s   258.2s
          forming the social graph.
                                                                     5 CLOs        27.5s   52.6s   127.2s  378.4s
          The SIoT graph receives update requests every time the
                                                                     6 CLOs        40.7s   117.4s  228.4s  592.2s
          state  of  CLOs  changes.  These  updates  require  recalcu‑
          lating  the  relationships  between  the  CLOs.  In  this  ex‑   7 CLOs  52.8s   172.1s  415.6s  865.4s
          periment,  the time required for a CLO state update and    8 CLOs        74.3s   230.6s  720.1s  1923.3s
          the  creation  of  social  relationships  between  a  CLO  and
          N  friends  CLOs  is  observed.  Fig.  4  depicts  the  results
          and demonstrates the time necessary to modify the data



        76                                   © International Telecommunication Union, 2021
   83   84   85   86   87   88   89   90   91   92   93