{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:35:53Z","timestamp":1760243753483,"version":"build-2065373602"},"reference-count":32,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2012,11,7]],"date-time":"2012-11-07T00:00:00Z","timestamp":1352246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In the Internet of Things a code resolution service provides a discovery mechanism for a requester to obtain the information resources associated with a particular product code immediately. In large scale application scenarios a code resolution service faces some serious issues involving heterogeneity, big data and data ownership. A code resolution service network is required to address these issues. Firstly, a list of requirements for the network architecture and code resolution services is proposed. Secondly, in order to eliminate code resolution conflicts and code resolution overloads, a code structure is presented to create a uniform namespace for code resolution records. Thirdly, we propose a loosely coupled distributed network consisting of heterogeneous, independent; collaborating code resolution services and a SkipNet based code resolution service named SkipNet-OCRS, which not only inherits DHT\u2019s advantages, but also supports administrative control and autonomy. For the external behaviors of SkipNet-OCRS, a novel external behavior mode named QRRA mode is proposed to enhance security and reduce requester complexity. For the internal behaviors of SkipNet-OCRS, an improved query algorithm is proposed to increase query efficiency. It is analyzed that integrating SkipNet-OCRS into our resolution service network can meet our proposed requirements. Finally, simulation experiments verify the excellent performance of SkipNet-OCRS.<\/jats:p>","DOI":"10.3390\/s121115206","type":"journal-article","created":{"date-parts":[[2012,11,7]],"date-time":"2012-11-07T11:03:15Z","timestamp":1352286195000},"page":"15206-15243","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Large Scale Code Resolution Service Network in the Internet of Things"],"prefix":"10.3390","volume":"12","author":[{"given":"Haining","family":"Yu","sequence":"first","affiliation":[{"name":"Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China"}]},{"given":"Hongli","family":"Zhang","sequence":"additional","affiliation":[{"name":"Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China"}]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[{"name":"Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China"},{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China"}]},{"given":"Xiangzhan","family":"Yu","sequence":"additional","affiliation":[{"name":"Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China"}]}],"member":"1968","published-online":{"date-parts":[[2012,11,7]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","article-title":"Internet of things: Vision, applications and research challenges","volume":"10","author":"Miorandi","year":"2012","journal-title":"Ad Hoc Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"11888","DOI":"10.3390\/s120911888","article-title":"Improving service management in the Internet of Things","volume":"12","author":"Sammarco","year":"2012","journal-title":"Sensors"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Evdokimov, S., Fabian, B., Kunz, S., and Schoenemann, N. (2010, January 7\u20139). Comparison of Discovery Service Architectures for the Internet of Things. Newport Beach, CA, USA.","DOI":"10.1109\/SUTC.2010.22"},{"key":"ref_5","unstructured":"Object Naming Service. Available online: http:\/\/www.epcglobalinc.org\/standards\/ons (accessed on 31 August 2012)."},{"key":"ref_6","unstructured":"EPCglobal Architecture Framework. Available online: http:\/\/www.gs1.org\/gsmp\/kc\/epcglobal\/architecture (accessed on 31 August 2012)."},{"key":"ref_7","unstructured":"EPC Information Services (EPCIS) Version 1.0.1 Specification. Available online: http:\/\/www.gs1.org\/gsmp\/kc\/epcglobal\/epcis\/epcis_1_0_1-standard-20070921.pdf (accessed on 31 August 2012)."},{"key":"ref_8","unstructured":"BRIDGE. Available online: http:\/\/www.bridge-project.eu (accessed on 31 August 2012)."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Cox, R., Muthitacharoen, A., and Morris, R.T. (2002, January 7\u20138). Serving DNS Using a Peer-to-Peer lookup Service. Cambridge, MA, USA.","DOI":"10.1007\/3-540-45748-8_15"},{"key":"ref_10","unstructured":"Theimer, M., and Jones, M.B. (2002, January 2\u20135). Overlook: Scalable Name Service on an Overlay Network. Vienna, Austria."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Fabian, B., and Gunther, O. (2007, January 24\u201328). Distributed ONS and its Impact on Privacy. Glasgow, UK.","DOI":"10.1109\/ICC.2007.207"},{"key":"ref_12","unstructured":"Ramasubramanian, V., and Sirer, E.G. (September, January 30). The Design and Implementation of a Next Generation Name Service for the Internet. Portland, OR, USA."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1107","DOI":"10.1109\/TNET.2005.857072","article-title":"Graph-theoretic analysis of structured P2P systems: Routing distances and fault resilience","volume":"13","author":"Loguinov","year":"2005","journal-title":"IEEE\/ACM Trans Netw."},{"key":"ref_14","unstructured":"Li, J., Stribling, J., Morris, R., Kaashoek, F., and Gil, T. (2005, January 13\u201317). A Performance vs. Cost Framework for Evaluating DHT Design Tradeoffs under Churn. Miami, ML, USA."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Pappas, V., Massey, D., Terzis, A., and Zhang, L. (2006, January 23\u201329). A Comparative Study of the DNS Design with DHT-Based Alternatives. Barcelona, Spain.","DOI":"10.1109\/INFOCOM.2006.207"},{"key":"ref_16","unstructured":"Yang, H., Luo, H., Yang, Y., Lu, S., and Zhang, L. (July, January 28). HOURS: Achieving DoS Resilience in an Open Service Hierarchy. Florence, Italy."},{"key":"ref_17","unstructured":"Parka, K., Pai, V., Peterson, L., and Wang, Z. (2004, January 6\u20138). CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups. San Francisco, CA, USA."},{"key":"ref_18","unstructured":"Yalagandula, P., and Dahlin, M. (2006, January 27\u201328). Administrative Autonomy in Structured Overlays. Santa Barbara, CA, USA."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Mislove, A., and Druschel, P. (2004, January 26\u201327). Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays. San Diego, CA, USA.","DOI":"10.1007\/978-3-540-30183-7_16"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Doi, Y., Wakayama, S., Ishiyama, M., Ozaki, S., and Inoue, A. (2006, January 28\u201330). On Scalability of DHT-DNS Hybrid Naming System. Pathumthani, Thailand.","DOI":"10.1007\/11930181_2"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Zhao, W., Liu, X., Li, X., Liu, D., and Zhang, S. (2009, January 17\u201319). Research on Hierarchical P2P Based RFID Code Resolution Network and its Security. Shanghai, China.","DOI":"10.1109\/FCST.2009.12"},{"key":"ref_22","unstructured":"K\u00fcrschner, C., Condea, C., Kasten, O., and Thiesse, F. (2008, January 26\u201328). Discovery Service Design in the EPC Global Network towards Full Supply Chain Visibility. Zurich, Switzerland."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1109\/TII.2011.2166783","article-title":"SHARDIS: A privacy-enhanced discovery service for RFID-based product information","volume":"8","author":"Fabian","year":"2012","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Kong, N., Li, X.D., and Yan, B.P. (2008, January 1\u20133). A Model Supporting Any Product Code Standard for the Resource Addressing in the Internet of Things. Wuhan, China.","DOI":"10.1109\/ICINIS.2008.106"},{"key":"ref_25","unstructured":"Harvey, N., Jones, M.B., Saroiu, S., Theimer, M., and Wolman, A. (2003, January 26\u201328). SkipNet: A Scalable Overlay Network with Practical Locality Properties. Seattle, WA, USA."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1007\/s12083-010-0093-z","article-title":"Survey on hierarchical routing schemes in \u201cflat\u201d distributed hash table","volume":"4","author":"Korzun","year":"2011","journal-title":"Peer Peer Netw. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1145\/78973.78977","article-title":"Skip Lists: A Probabilistic Alternative to Balanced Trees","volume":"33","author":"Pugh","year":"1990","journal-title":"Comm. ACM"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Broder, A., Charikar, M., Frieze, A., and Mitzen-Macher, M. (1998, January 24\u201326). Min-wise Independent Permutations. Dallas, TX, USA.","DOI":"10.1145\/276698.276781"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MIC.2004.1297269","article-title":"Enabling flexible queries with guarantees in P2P systems","volume":"8","author":"Schmidt","year":"2004","journal-title":"IEEE Internet Comput."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Chawathe, Y., Ramabhadran, S., Ratnasamy, S., LaMarcay, A., Shenker, S., and Hellersteinz, J. (2005, January 22\u201326). A Case Study in Building Layered DHT Applications. Philadelphia, PA, USA.","DOI":"10.1145\/1080091.1080104"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1735886.1735891","article-title":"Encryption policies for regulating access to outsourced data","volume":"35","author":"Vimercati","year":"2010","journal-title":"ACM Trans. Database Syst."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","article-title":"Attribute-Based Access control with efficient revocation in data outsourcing systems","volume":"22","author":"Hur","year":"2011","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/12\/11\/15206\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:53:23Z","timestamp":1760219603000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/12\/11\/15206"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,7]]},"references-count":32,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2012,11]]}},"alternative-id":["s121115206"],"URL":"https:\/\/doi.org\/10.3390\/s121115206","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2012,11,7]]}}}