IEEE1888 over WebSocket for Communicating across a Network Boundary

Yuya Tarutani, Shuuichirou Murata, Kazuhiro Matsuda, Morito Matsuoka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Some communications between devices are limited by network boundaries for ensuring security. In these cases, IEEE1888 does not provide inter-device communication. We thus propose IEEE1888 over WebSocket for communication between devices across network boundaries. In IEEE1888 over WebSocket, two devices are added to an IEEE1888 network for communication across network boundaries, so devices using traditional IEEE1888 need not to be changed. We implemented an experimental system of IEEE1888 overWebSocket. The results shows that IEEE1888 over WebSocket enables communication across network boundaries.

Original languageEnglish
Title of host publicationProceedings - 2016 IEEE 40th Annual Computer Software and Applications Conference Workshops, COMPSAC 2016
EditorsLing Liu, Dejan Milojicic, Zhiyong Zhang, Zhiyong Zhang, Sheikh Iqbal Ahamed, Hiroyuki Sato, Stevlio Cimato, William Claycomb, Sorel Reisman, Motonori Nakamura, Chung Horng Lung, Mihhail Matskin
PublisherIEEE Computer Society
Pages332-337
Number of pages6
ISBN (Electronic)9781467388450
DOIs
Publication statusPublished - Aug 24 2016
Externally publishedYes
Event2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016 - Atlanta, United States
Duration: Jun 10 2016Jun 14 2016

Publication series

NameProceedings - International Computer Software and Applications Conference
Volume2
ISSN (Print)0730-3157

Other

Other2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016
Country/TerritoryUnited States
CityAtlanta
Period6/10/166/14/16

Keywords

  • IEEE1888
  • IoT
  • WebSocket
  • network boundary traversal

ASJC Scopus subject areas

  • Software
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'IEEE1888 over WebSocket for Communicating across a Network Boundary'. Together they form a unique fingerprint.

Cite this