{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T09:48:40Z","timestamp":1769852920065,"version":"3.49.0"},"reference-count":56,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2022,10,31]],"date-time":"2022-10-31T00:00:00Z","timestamp":1667174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Xunta de Galicia and ERDF Galicia 2014\u20132020","award":["ED431C 2020\/15"],"award-info":[{"award-number":["ED431C 2020\/15"]}]},{"name":"Xunta de Galicia and ERDF Galicia 2014\u20132020","award":["ED431G 2019\/01"],"award-info":[{"award-number":["ED431G 2019\/01"]}]},{"name":"Xunta de Galicia and ERDF Galicia 2014\u20132020","award":["PID2020-118857RA"],"award-info":[{"award-number":["PID2020-118857RA"]}]},{"name":"MCIN\/AEI\/10.13039\/501100011033","award":["ED431C 2020\/15"],"award-info":[{"award-number":["ED431C 2020\/15"]}]},{"name":"MCIN\/AEI\/10.13039\/501100011033","award":["ED431G 2019\/01"],"award-info":[{"award-number":["ED431G 2019\/01"]}]},{"name":"MCIN\/AEI\/10.13039\/501100011033","award":["PID2020-118857RA"],"award-info":[{"award-number":["PID2020-118857RA"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>IoT devices can be deployed almost anywhere, but they usually need to be connected to other IoT devices, either through the Internet or local area networks. For such communications, many IoT devices make use of wireless communications, whose coverage is key: if no coverage is available, an IoT device becomes isolated. This can happen both indoors (e.g., large buildings, industrial warehouses) or outdoors (e.g., rural areas, cities). To tackle such an issue, opportunistic networks can be useful, since they use gateways to provide services to IoT devices when they are in range (i.e., IoT devices take the opportunity of having a nearby gateway to exchange data or to use a computing service). Moreover, opportunistic networks can provide Edge Computing capabilities, thus creating Opportunistic Edge Computing (OEC) systems, which deploy smart gateways able to perform certain tasks faster than a remote Cloud. This article presents a novel decentralized OEC system based on Bluetooth 5 IoT nodes whose latency is evaluated to determine the feasibility of using it in practical applications. The obtained results indicate that, for the selected scenario, the average end-to-end latency is relatively low (736 ms), but it is impacted by factors such as the location of the bootstrap node, the smart gateway hardware or the use of high-security mechanisms.<\/jats:p>","DOI":"10.3390\/s22218360","type":"journal-article","created":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T06:49:02Z","timestamp":1667371742000},"page":"8360","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Practical Latency Analysis of a Bluetooth 5 Decentralized IoT Opportunistic Edge Computing System for Low-Cost SBCs"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1648-9440","authenticated-orcid":false,"given":"\u00c1ngel","family":"Niebla-Montero","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"},{"name":"Centro de Investigaci\u00f3n CITIC, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4068-8842","authenticated-orcid":false,"given":"Iv\u00e1n","family":"Froiz-M\u00edguez","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"},{"name":"Centro de Investigaci\u00f3n CITIC, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4991-6808","authenticated-orcid":false,"given":"Paula","family":"Fraga-Lamas","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"},{"name":"Centro de Investigaci\u00f3n CITIC, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2179-5917","authenticated-orcid":false,"given":"Tiago M.","family":"Fern\u00e1ndez-Caram\u00e9s","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"},{"name":"Centro de Investigaci\u00f3n CITIC, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2022,10,31]]},"reference":[{"key":"ref_1","unstructured":"HIS (2022, August 01). Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (In Billions). Available online: https:\/\/bit.ly\/3n6aQDO."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MITP.2017.3051335","article-title":"Can Blockchain Strengthen the Internet of Things?","volume":"19","author":"Kshetri","year":"2017","journal-title":"IT Prof."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Lopes, S.I., and Fern\u00e1ndez-Caram\u00e9s, T.M. (2021). Green IoT and Edge AI as Key Technological Enablers for a Sustainable Digital Transition towards a Smart Circular Economy: An Industry 5.0 Use Case. Sensors, 21.","DOI":"10.3390\/s21175745"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Froiz-M\u00edguez, I., Lopez-Iturri, P., Fraga-Lamas, P., Celaya-Echarri, M., Blanco-Novoa, \u00d3., Azpilicueta, L., Falcone, F., and Fern\u00e1ndez-Caram\u00e9s, T.M. (2020). Design, Implementation, and Empirical Validation of an IoT Smart Irrigation System for Fog Computing Applications Based on LoRa and LoRaWAN Sensor Nodes. Sensors, 20.","DOI":"10.3390\/s20236865"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"66649","DOI":"10.1109\/ACCESS.2018.2879578","article-title":"Parked Vehicle Edge Computing: Exploiting Opportunistic Resources for Distributed Mobile Applications","volume":"6","author":"Huang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MITP.2019.2898185","article-title":"The Rise of Proximal Mobile Edge Servers","volume":"21","author":"Batool","year":"2019","journal-title":"IT Prof."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Chamarajnagar, R., and Ashok, A. (2018, January 9\u201313). Opportunistic Mobile IoT with Blockchain Based Collaboration. Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/GLOCOM.2018.8647756"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Silva, R., Silva, J.S., and Boavida, F. (2017, January 8\u201312). Opportunistic fog computing: Feasibility assessment and architectural proposal. Proceedings of the 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal.","DOI":"10.23919\/INM.2017.7987320"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ayele, E.D., Meratnia, N., and Havinga, P.J.M. (2018, January 26\u201328). Towards a New Opportunistic IoT Network Architecture for Wildlife Monitoring System. Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France.","DOI":"10.1109\/NTMS.2018.8328721"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"9364","DOI":"10.1109\/TVT.2020.2970763","article-title":"Mobile Vehicles as Fog Nodes for Latency Optimization in Smart Cities","volume":"69","author":"Tang","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MS.2020.2986253","article-title":"Blockchain Technologies in Practice","volume":"37","author":"Ebert","year":"2020","journal-title":"IEEE Softw."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"75231","DOI":"10.1109\/ACCESS.2021.3082197","article-title":"HIDRA: A Distributed Blockchain-Based Architecture for Fog\/Edge Computing Environments","volume":"9","author":"Caminero","year":"2021","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-Caram\u00e9s, T.M., and Fraga-Lamas, P. (2019). Design of a Fog Computing, Blockchain and IoT-Based Continuous Glucose Monitoring System for Crowdsourcing mHealth. Proceedings, 4.","DOI":"10.3390\/ecsa-5-05757"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"110480","DOI":"10.1109\/ACCESS.2021.3101397","article-title":"Energy-Efficient Edge-Fog-Cloud Architecture for IoT-Based Smart Agriculture Environment","volume":"9","author":"Alharbi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1007\/BF00935665","article-title":"On the Stackelberg strategy in nonzero-sum games","volume":"11","author":"Simaan","year":"1973","journal-title":"J. Optim. Theory Appl."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Mohamed, N., Al-Jaroodi, J., Jawhar, I., Noura, H., and Mahmoud, S. (2017, January 4\u20138). UAVFog: A UAV-based fog computing for Internet of Things. Proceedings of the 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), San Francisco, CA, USA.","DOI":"10.1109\/UIC-ATC.2017.8397657"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/ACCESS.2017.2757955","article-title":"A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT","volume":"6","author":"Sharma","year":"2018","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Sung, Y., Sharma, P.K., Lopez, E.M., and Park, J.H. (2016). FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing. Sustainability, 9.","DOI":"10.3390\/su8090919"},{"key":"ref_19","unstructured":"AllJoyn (2022, August 01). AllJoyn Framework, Linux Found. Collaborative Projects., Available online: https:\/\/openconnectivity.org\/technology\/reference-implementation\/alljoyn\/."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"45496","DOI":"10.1109\/ACCESS.2020.2978291","article-title":"Design and Empirical Validation of a Bluetooth 5 Fog Computing Based Industrial CPS Architecture for Intelligent Industry 4.0 Shipyard Workshops","volume":"8","author":"Azpilicueta","year":"2020","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Buli\u0107, P., Kojek, G., and Biasizzo, A. (2019). Data Transmission Efficiency in Bluetooth Low Energy Versions. Sensors, 19.","DOI":"10.3390\/s19173746"},{"key":"ref_22","unstructured":"(2022, September 01). Bluetooth\u00ae Core Specification Version 5.0 Feature Enhancements. Available online: https:\/\/www.bluetooth.com\/bluetooth-resources\/bluetooth-5-go-faster-go-further\/."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"93267","DOI":"10.1109\/ACCESS.2021.3093102","article-title":"Speeding Up Bluetooth Mesh","volume":"9","author":"Valenzuela","year":"2021","journal-title":"IEEE Access"},{"key":"ref_24","unstructured":"(2022, June 27). Nordic nRF52840-DK, Datasheet. Available online: https:\/\/infocenter.nordicsemi.com\/pdf\/nRF52840_OPS_v0.5.pdf."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"140700","DOI":"10.1109\/ACCESS.2021.3119775","article-title":"Next Generation Auto-Identification and Traceability Technologies for Industry 5.0: A Methodology and Practical Use Case for the Shipbuilding Industry","volume":"9","year":"2021","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Max-Onakpoya, E., Madamori, S., and Baker, C.E. (2019, January 13\u201314). Utilizing Opportunistic Social Networks for Remote Patient Monitoring in Rural Areas. Proceedings of the 1st ACM International Workshop on Technology Enablers and Innovative Applications for Smart Cities and Communities (TESCA\u201919). Association for Computing Machinery, New York, NY, USA.","DOI":"10.1145\/3364544.3364831"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Karvonen, H., Mikhaylov, K., H\u00e4m\u00e4l\u00e4inen, M., Iinatti, J., and Pomalaza- R\u00e1ez, C. (2017). Experimental performance evaluation of BLE 4 versus BLE 5 in indoors and outdoors scenarios. Advances in Body Area Networks, Springer.","DOI":"10.1007\/978-3-030-02819-0_18"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"8833767","DOI":"10.1155\/2020\/8833767","article-title":"Bodacious-Instance Coverage Mechanism for Wireless Sensor Network","volume":"2020","author":"Ashraf","year":"2020","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_29","unstructured":"de Jong, L. (2015). Decentralized Link Sharing, towards a Framework for Decentralized Applications. [Master\u2019s Thesis, University of Groningen]. Available online: https:\/\/www.cs.rug.nl\/~aiellom\/tesi\/dejong.pdf."},{"key":"ref_30","unstructured":"Antunes, J. (2022, September 01). PulsarCast. Scaling PubSub over the Distributed Web. Available online: http:\/\/web.tecnico.ulisboa.pt\/~ist14191\/papers\/TR-75993-joao-antunes.pdf."},{"key":"ref_31","unstructured":"(2022, September 01). QUIC Official Webpage. Available online: https:\/\/quicwg.org."},{"key":"ref_32","unstructured":"(2022, September 01). CJDNS Official Webpage. Available online: https:\/\/github.com\/cjdelisle\/cjdns."},{"key":"ref_33","unstructured":"(2022, September 01). UDT Official Webpage. Available online: https:\/\/udt.sourceforge.io."},{"key":"ref_34","unstructured":"(2022, September 01). WEBRTC Official Webpage. Available online: https:\/\/webrtc.org."},{"key":"ref_35","unstructured":"Adamsky, F. (2016). Analysis of Bandwidth Attacks in a Bittorrent Swarm. [Doctoral Thesis, University of London]. Available online: https:\/\/openaccess.city.ac.uk\/id\/eprint\/16158\/."},{"key":"ref_36","first-page":"53","article-title":"Kademlia: A Peer-to-Peer Information System Based on the XOR Metric","volume":"Volume 2429","author":"Druschel","year":"2002","journal-title":"Peer-to-Peer Systems. IPTPS 2002"},{"key":"ref_37","unstructured":"Cheshire, S., and Krochmal, M. (2022, August 01). Multicast DNS. Internet Engineering Task Force (IETF). Available online: https:\/\/www.rfc-editor.org\/rfc\/rfc6762."},{"key":"ref_38","unstructured":"Mastorakis, S. (2019). Peer-to-Peer Data Sharing in Named Data Networking. Internet Research Laboratory. [Ph.D. Thesis, University of California]. Available online: https:\/\/escholarship.org\/content\/qt372316q8\/qt372316q8_noSplash_6ecda766439f4e7bbd0d20bfd442792c.pdf."},{"key":"ref_39","first-page":"98","article-title":"Koorde: A Simple Degree-Optimal Distributed Hash Table","volume":"Volume 2735","author":"Kaashoek","year":"2003","journal-title":"Peer-to-Peer Systems II. IPTPS 2003"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1007\/s12083-019-00839-8","article-title":"Next level peer-to-peer overlay networks under high churns: A survey","volume":"13","author":"Naik","year":"2020","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/TNET.2002.808407","article-title":"Chord: A scalable peer-to-peer lookup protocol for internet applications","volume":"11","author":"Stoica","year":"2003","journal-title":"Ieee\/Acm Trans. Netw."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1109\/JSYST.2014.2306147","article-title":"MR-Chord: Improved Chord Lookup Performance in Structured Mobile P2P Networks","volume":"9","author":"Woungang","year":"2015","journal-title":"IEEE Syst. J."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Muchtar, F., Singh, P.K., Ahmmad, S.N.Z., Ambar, R., Hanafi, H.F., and Fadilah, S.I. (2018, January 20\u201322). P2P Over MANET: A Review and Its Conceptual Framework. Proceedings of the 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, India.","DOI":"10.1109\/PDGC.2018.8745856"},{"key":"ref_44","unstructured":"Interactive Connectivity Establishment (ICE) (2022, September 01). RFC 8845. Available online: https:\/\/www.rfc-editor.org\/rfc\/rfc8445.html."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Druschel, P., Kaashoek, M.F., and Rowstron, A.I.T. (2002, January 7\u20138). Peer-to-Peer Systems. Proceedings of the First International Workshop, IPTPS 2002, Cambridge, MA, USA. Lecture Notes in Computer Science.","DOI":"10.1007\/3-540-45748-8"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"32979","DOI":"10.1109\/ACCESS.2018.2842685","article-title":"A Review on the Use of Blockchain for the Internet of Things","volume":"6","year":"2018","journal-title":"IEEE Access"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Guidi, B., Michienzi, A., and Ricci, L. (2021, January 6\u201310). A libP2P Implementation of the Bitcoin Block Exchange Protocol. Proceedings of the 2nd International Workshop on Distributed Infrastructure for Common Good (DICG\u201921), Virtual Event.","DOI":"10.1145\/3493426.3493822"},{"key":"ref_48","unstructured":"IPFS (2022, August 01). The Interplanetary File System (IPFS). Available online: https:\/\/ipfs.io\/."},{"key":"ref_49","unstructured":"IETF (2022, August 01). The Transport Layer Security (TLS) Protocol Version 1.3. Available online: https:\/\/bit.ly\/3NGbuVO."},{"key":"ref_50","unstructured":"IETF (2022, August 01). The Transport Layer Security (TLS) Protocol Version 1.3\u2014Cipher Suites. Available online: https:\/\/bit.ly\/3z4m4lg."},{"key":"ref_51","unstructured":"Perrin, T. (2022, August 01). The Noise Protocol Framework. Available online: https:\/\/bit.ly\/3POdBIY."},{"key":"ref_52","unstructured":"Perrin, T. (2022, August 01). The Noise Protocol Framework DH Functions, Cipher Functions, and Hash Functions. Available online: https:\/\/bit.ly\/38TvRjp."},{"key":"ref_53","unstructured":"(2022, August 01). Go-libp2p Official Repository. Available online: https:\/\/github.com\/libp2p\/go-libp2p."},{"key":"ref_54","unstructured":"(2022, September 01). Official Gitlab Repository of the ORBALLO Project. Available online: https:\/\/gitlab.com\/orballo_project\/opportunistic-ble-mesh."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-Caram\u00e9s, T.M., and Fraga-Lamas, P. (2020). Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases. Sensors, 20.","DOI":"10.3390\/s20113048"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Albela, M., Fraga-Lamas, P., Castedo, L., and Fern\u00e1ndez-Caram\u00e9s, T.M. (2019). Clock Frequency Impact on the Performance of High-Security Cryptographic Cipher Suites for Energy-Efficient Resource-Constrained IoT Devices. Sensors, 19.","DOI":"10.3390\/s19010015"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/21\/8360\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:06:56Z","timestamp":1760144816000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/21\/8360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,31]]},"references-count":56,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2022,11]]}},"alternative-id":["s22218360"],"URL":"https:\/\/doi.org\/10.3390\/s22218360","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,31]]}}}