559 results on '"Constrained Application Protocol"'
Search Results
2. A Survey on IoT Protocol in Real-Time Applications and Its Architectures
- Author
-
Umashankar, M. L., Mallikarjunaswamy, S., Sharmila, N., Kumar, D. Mahesh, Nataraj, K. R., Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Kumar, Amit, editor, Senatore, Sabrina, editor, and Gunjan, Vinit Kumar, editor
- Published
- 2023
- Full Text
- View/download PDF
3. An extended review of the application layer messaging protocol of the internet of things.
- Author
-
Bhowmik, Ronok and Riaz, Md. Hasnat
- Subjects
INTERNET of things ,INTERNET protocols ,REQUIREMENTS engineering ,DATA distribution ,TELEMETRY - Abstract
In the internet of things (IoT), there are resource-constrained and immense heterogeneous electronic gadgets worldwide. Till now, no single IoT application layer messaging protocol is the best, nor axiomatic for every requirement. This paper exhaustively summarizes information on the messaging protocols from the available previous research sources online. Our goal is to encapsulate a simple guideline so that users can choose an optimal messaging protocol quickly according to development requirements and specifications. For this purpose, we have reviewed the literature on six enabling and evolving application layer messaging protocols used for IoT systems namely, message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), the constrained application protocol (CoAP), extensible messaging and presence protocol (XMPP), data distribution service (DDS), and simple text-oriented messaging protocol (STOMP) in terms of some interrelated metrics. Additionally, we represented a critical analysis of the application layer messaging protocols. This study will be helpful to readers with valuable insights and guide research scholars and developers in choosing optimal application layer messaging protocols based on development specifications and requirements. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Performance analysis of IoT networks in terrestrial environment utilizing LZW data compression technique.
- Author
-
Sisodia, Ankur and Yadav, Ajay Kumar
- Subjects
DATA compression ,MULTICASTING (Computer networks) ,MACHINE-to-machine communications ,END-to-end delay ,INTERNET of things ,COMPUTER network protocols ,NETWORK performance - Abstract
The proliferation of Internet of Things (IoT) devices in terrestrial environments necessitates efficient data transmission and management protocols to optimize network performance. This research paper presents a comprehensive study on the implementation of IoT networks in a terrestrial setting, focusing on the integration of LZW (Lempel-Ziv-Welch) compression with three prominent IoT protocols: CoAP (Constrained Application Protocol), M2M (machine-to-machine), and MQTT (Message Queuing Telemetry Transport). We did a thorough test of these protocols using the NetSim simulator. We looked at how well they worked in terms of throughput, en-toend delay, and routing overhead, all of which are important for loT network efficiency. The point of our study is to find out what the pros and cons of these protocols are when they are combined with LZW compression in a terrestrial loT setting. The results of our analysis reveal significant variations in the performance of CoAP, M2M, and MQTT when subjected to data compression. Throughput efficiency, which directly impacts data transmission rates, is scrutinized alongside end-to-end delay, a critical factor in ensuring timely data delivery. Additionally, we explore the implications of protocol choice on routing overhead, a crucial metric for network resource utilization. This research contributes to the ongoing efforts to optimize IoT networks in terrestrial settings, offering valuable guidance to network architects and developers seeking to strike the right balance between protocol selection and data compression for improved IoT performance. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Performance Evaluation of Triangular Number Sequence Backoff Algorithm for Constrained Application Protocol
- Author
-
Chanon Jangkajit and Chanwit Suwannapong
- Subjects
backoff algorithm ,constrained application protocol ,performance evaluation ,triangular number sequence ,Technology ,Technology (General) ,T1-995 - Abstract
In the of the Internet of Things (IoT) realm, congestion is considered a serious issue affecting network throughput due to the requirement of multiple nodes for message exchange. With free-space optical communications, which can help send a message wirelessly, congestion control mechanisms nowadays depend upon the carrier sense of multiple access with collision avoidance (CSMA/CA), using the so-called Backoff Algorithm (BA). These algorithms, including Binary Exponential Backoff (BEB), Enhanced Fibonacci Backoff (EFB), Estimation-Based Backoff (EBA), and Backoff Interval Isolation (BII), have been introduced to facilitate congestion control mechanisms. Implementing such algorithms, however, might not deliver the greatest performance for Constrained Application Protocol (CoAP) which typically operates under limited resources. Therefore, the present study aims to introduce a new backoff algorithm, Triangular Number Sequence Backoff (TNSB), and to compare its performance with that of the aforementioned algorithms under the Transmission Control Protocol (TCP) and the Cooja network simulator. Statistical analysis involves ANOVA (F-test) and post hoc multiple comparison tests. The study shows that its performance is not significantly different from the others at the low congestion level. At the middle and the high congestion levels, it yields the highest throughput with the shortest settling time, while the packet loss rate and the response time are satisfactory.
- Published
- 2023
- Full Text
- View/download PDF
6. Performance Evaluation of Triangular Number Sequence Backoff Algorithm for Constrained Application Protocol.
- Author
-
Jangkajit, Chanon and Suwannapong, Chanwit
- Subjects
CARRIER sense multiple access ,TCP/IP ,ALGORITHMS ,FREE-space optical technology - Abstract
In the of the Internet of Things (IoT) realm, congestion is considered a serious issue affecting network throughput due to the requirement of multiple nodes for message exchange. With free-space optical communications, which can help send a message wirelessly, congestion control mechanisms nowadays depend upon the carrier sense of multiple access with collision avoidance (CSMA/CA), using the so-called Backoff Algorithm (BA). These algorithms, including Binary Exponential Backoff (BEB), Enhanced Fibonacci Backoff (EFB), Estimation-Based Backoff (EBA), and Backoff Interval Isolation (BII), have been introduced to facilitate congestion control mechanisms. Implementing such algorithms, however, might not deliver the greatest performance for Constrained Application Protocol (CoAP) which typically operates under limited resources. Therefore, the present study aims to introduce a new backoff algorithm, Triangular Number Sequence Backoff (TNSB), and to compare its performance with that of the aforementioned algorithms under the Transmission Control Protocol (TCP) and the Cooja network simulator. Statistical analysis involves ANOVA (F-test) and post hoc multiple comparison tests. The study shows that its performance is not significantly different from the others at the low congestion level. At the middle and the high congestion levels, it yields the highest throughput with the shortest settling time, while the packet loss rate and the response time are satisfactory. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. iCoCoA: intelligent congestion control algorithm for CoAP using deep reinforcement learning.
- Author
-
Donta, Praveen Kumar, Srirama, Satish Narayana, Amgoth, Tarachand, and Annavarapu, Chandra Sekhara Rao
- Abstract
The constrained application protocol (CoAP) is an application layer protocol in IoT, with underlying support for congestion control mechanism. It minimizes the frequent retransmissions, but does not optimize the throughput or adapt dynamic conditions. However, designing an efficient congestion control mechanism over the IoT poses new challenges because of its resource constraint nature. In this context, this article presents a new Intelligent congestion control algorithm (iCoCoA) for constraint devices, motivated by the success of the deep reinforcement learning in various applications. The iCoCoA learns from the various network features to decide the best Retransmission Timeout to mitigate the congestion in the dynamic environments. It also optimizes the throughput, energy, and unnecessary frequent retransmissions compared with the existing models. iCoCoA is developed and tested on the Cooja simulator and compared it with the standard protocols such as CoAP, CoCoA, and CoCoA+ in continuous and burst traffic conditions. The proposed iCoCoA mitigates congestion, outperforms 4–15% in throughput, 3–10% better packet delivery ratio, and 7–16% energy-efficiency with reduced number of retransmissions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
8. Fog Computing, Cloud Computing and IoT Environment: Advanced Broker Management System.
- Author
-
Al Masarweh, Mohammed, Alwada'n, Tariq, and Afandi, Waleed
- Subjects
BROKERS ,INTERNET of things ,SERVICE level agreements ,QUALITY of service ,CLOUD computing ,COMPUTER network protocols - Abstract
Cloud computing is a massive amount of dynamic ad distributed resources that are delivered on request to clients over the Internet. Typical centralized cloud computing models may have difficulty dealing with challenges caused by IoT applications, such as network failure, latency, and capacity constraints. One of the introduced methods to solve these challenges is fog computing which makes the cloud closer to IoT devices. A system for dynamic congestion management brokerage is presented in this paper. With this proposed system, the IoT quality of service (QoS) requirements as defined by the service-level agreement (SLA) can be met as the massive amount of cloud requests come from the fog broker layer. In addition, a forwarding policy is introduced which helps the cloud service broker to select and forward the high-priority requests to the appropriate cloud resources from fog brokers and cloud users. This proposed idea is influenced by the weighted fair queuing (WFQ) Cisco queuing mechanism to simplify the management and control of the congestion that may possibly take place at the cloud service broker side. The system proposed in this paper is evaluated using iFogSim and CloudSim tools, and the results demonstrate that it improves IoT (QoS) compliance, while also avoiding cloud SLA violations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. Fuzzy Congestion Control and Avoidance for CoAP in IoT Networks
- Author
-
Thieu Nga Pham, Dang Hai Hoang, and Thi Thuy Duong Le
- Subjects
Congestion control ,rate control ,fuzzy control ,constrained application protocol ,Internet of Things ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In Internet of Things (IoT) networks, congestion is growing with the increasing number of devices, and a large amount of collected data must be transferred. Congestion control is one of the most significant challenges for such networks. The Constrained Application Protocol (CoAP) has been adopted for the IoT to satisfy the demand for smart applications. However, CoAP uses a basic congestion control algorithm that operates only when congestion occurs. Thus, the basic CoAP and most similar loss-based congestion control schemes have remaining issues for burst data transfer in dynamic network environments. This paper proposes a novel rate-based congestion control scheme using fuzzy control for CoAP, called FuzzyCoAP. We use the round-trip time gradient and bottleneck bandwidth gradient as inputs for FuzzyCoAP to infer the degree of congestion. FuzzyCoAP uses this indicator to predict early congestion and adjusts the sending rate to avoid congestion. FuzzyCoAP uses the congestion degree to update the variable RTO for retransmissions. On the other hand, FuzzyCoAP dynamically checks for the available bandwidth to gain high performance for burst data transfer. Various simulation experiments have demonstrated the feasibility of the FuzzyCoAP in different traffic scenarios. We compared the proposed scheme with representative loss-based CoAP schemes, that is, the basic CoAP. The simulation results proved that FuzzyCoAP provides high performance in terms of delay, throughput, loss rate, and retransmissions compared with the basic CoAP.
- Published
- 2022
- Full Text
- View/download PDF
10. A lightweight three factor authentication framework for IoT based critical applications.
- Author
-
Saqib, Manasha, Jasra, Bhat, and Moon, Ayaz Hassan
- Subjects
DIGITAL communications ,INTERNET of things ,SMART cities ,COMPUTER passwords ,TELECOMMUNICATION ,DIGITAL signatures ,CLOUD computing ,TELEMETRY - Abstract
IoT is emerging as a massive web of heterogeneous networks estimated to interconnect over 41 billion devices by 2025, generating around 79 zettabytes of data. The heterogeneous network shall bring in a plethora of digital services leveraging cloud and communication technologies to drive smart city applications. As users access these services remotely in a ubiquitous environment over public channels, it becomes imperative to secure their communication. Both entity and message authentication emerge as a critical security primitive to thwart unauthorized access and prevent the falsification of messages. While researchers have given due attention to achieving mutual authentication between the subscriber (remote user) and gateway node (broker), the mutual authentication between the gateway node and an IoT sensor node is left to be desired. It could be done at the peril of a rogue or a shadow IoT device unauthorizedly joining an IoT-based network. Some of the widely used IoT-specific application layer protocols like constrained application protocol (COAP) and message queue telemetry transport (MQTT) protocol are not inherently equipped with adequate security safeguards. They, therefore, rely on underlying transport layer security protocols, which are highly computationally intensive. To address this issue, this paper proposes a three-factor authentication framework suitable for IoT-driven critical applications based upon identity, password and a digital signature scheme. The framework employs publish-subscribe pattern leveraging elliptical curve cryptography (ECC) and computationally low hash chains. The formal and informal security analysis shows that the framework is resistant to different types of cryptographic attacks. Furthermore, the automated validation performed with the Scyther tool verifies that there are no cryptographic attacks found on any of the claims stated in the proposed framework. Finally, a comparison of the framework security features, computational, and communication overheads is carried out with other existing protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. An Enhanced CoAP Scheme Using Fuzzy Logic With Adaptive Timeout for IoT Congestion Control
- Author
-
Phet Aimtongkham, Paramate Horkaew, and Chakchai So-In
- Subjects
Adaptive timeout ,congestion control ,constrained application protocol ,fuzzy logic systems ,Internet of Things ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Congestion management in the Internet of Things (IoT) is one of the most challenging tasks in improving the quality of service (QoS) of a network. This is largely because modern wireless networks can consist of an immense number of connections. Consequently, limited network resources can be consumed simultaneously. This eventually causes congestion that has adverse impacts on both throughput and transmission delay. This is particularly true in a network whose transmissions are regulated by the Constrained Application Protocol (CoAP), which has been widely adopted in the IoT network. CoAP has a mechanism that allows connection-oriented communication by means of acknowledgment messages (ACKs) and retransmission timeouts (RTOs). However, during congestion, a client node is unable to efficiently specify the RTO, resulting in unnecessary retransmission. This overhead in turn causes even more extensive congestion in the network. Therefore, this research proposes a novel scheme for optimally setting the initial RTO and adjusting the RTO backoff that considers current network utilization. The scheme consists of three main components: 1) a multidimensional congestion estimator that determines congestion conditions in various aspects, 2) precise initial RTO estimation by means of a relative strength indicator and trend analysis, and 3) a flexible and congestion-aware backoff strategy based on an adaptive-boundary backoff factor evaluated by using a fuzzy logic system (FLS). The simulation results presented here reveal that the proposed scheme outperforms state-of-the-art methods in terms of the carried load, delay and percentage of retransmission.
- Published
- 2021
- Full Text
- View/download PDF
12. RCOAP: A Rate Control Scheme for Reliable Bursty Data Transfer in IoT Networks
- Author
-
Dang Hai Hoang and Thi Thuy Duong Le
- Subjects
Constrained application protocol ,congestion control ,Internet of Things ,rate control ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The Internet Engineering Task Force (IETF) standardized the Constrained Application Protocol (CoAP) for Internet of Things (IoT) devices to meet the demands of IoT applications. Due to the constrained IoT environment, CoAP was designed based on UDP as a lightweight protocol with simple congestion control, which leverages the basic binary exponential backoff. However, the basic congestion control of CoAP is unable to effectively perform reliable bursty data transfer in IoT networks. Recent studies have indicated that CoAP and its modifications still suffer from critical performance problems regarding congestion control, throughput, and delay. The current congestion control of the CoAP does not support bursty data transfer. In contrast to the current schemes that focus on a loss-based mechanism and a retransmission time-out (RTO) calculation, we propose a new rate control scheme, RCOAP, for reliable bursty data transfer in IoT networks. RCOAP uses the concept of regulating the transmission rate of CoAP sources. The key features of RCOAP are 1) estimating the initial sending rate by probing the bottleneck bandwidth, 2) adjusting the sending rate according to the dynamic network condition, and 3) distinguishing between losses due to congestion and losses due to wireless errors for the purpose of maintaining high throughput. Simulation results indicate that RCOAP is suitable for bursty data transfer. RCOAP shows a throughput increase of approximately 135% compared to the basic CoAP, CoCoA, and CoCoA+ under the same conditions while maintaining a low delay, loss rate, and a low number of retransmission attempts.
- Published
- 2021
- Full Text
- View/download PDF
13. An Implementation of Harmonizing Internet of Things (IoT) in Cloud
- Author
-
Islam, Md. Motaharul, Khan, Zaheer, Alsaawy, Yazed, Akan, Ozgur, Series Editor, Bellavista, Paolo, Series Editor, Cao, Jiannong, Series Editor, Coulson, Geoffrey, Series Editor, Dressler, Falko, Series Editor, Ferrari, Domenico, Series Editor, Gerla, Mario, Series Editor, Kobayashi, Hisashi, Series Editor, Palazzo, Sergio, Series Editor, Sahni, Sartaj, Series Editor, Shen, Xuemin (Sherman), Series Editor, Stan, Mircea, Series Editor, Xiaohua, Jia, Series Editor, Zomaya, Albert Y., Series Editor, Pathan, Al-Sakib Khan, editor, Fadlullah, Zubair Md., editor, and Guerroumi, Mohamed, editor
- Published
- 2019
- Full Text
- View/download PDF
14. Fog Computing, Cloud Computing and IoT Environment: Advanced Broker Management System
- Author
-
Mohammed Al Masarweh, Tariq Alwada’n, and Waleed Afandi
- Subjects
cloud service broker ,quality of service ,round robin ,weighted fair queuing ,fog computing ,constrained application protocol ,Technology - Abstract
Cloud computing is a massive amount of dynamic ad distributed resources that are delivered on request to clients over the Internet. Typical centralized cloud computing models may have difficulty dealing with challenges caused by IoT applications, such as network failure, latency, and capacity constraints. One of the introduced methods to solve these challenges is fog computing which makes the cloud closer to IoT devices. A system for dynamic congestion management brokerage is presented in this paper. With this proposed system, the IoT quality of service (QoS) requirements as defined by the service-level agreement (SLA) can be met as the massive amount of cloud requests come from the fog broker layer. In addition, a forwarding policy is introduced which helps the cloud service broker to select and forward the high-priority requests to the appropriate cloud resources from fog brokers and cloud users. This proposed idea is influenced by the weighted fair queuing (WFQ) Cisco queuing mechanism to simplify the management and control of the congestion that may possibly take place at the cloud service broker side. The system proposed in this paper is evaluated using iFogSim and CloudSim tools, and the results demonstrate that it improves IoT (QoS) compliance, while also avoiding cloud SLA violations.
- Published
- 2022
- Full Text
- View/download PDF
15. A framework for harmonizing internet of things (IoT) in cloud: analyses and implementation.
- Author
-
Islam, Md. Motaharul, Khan, Zaheer, and Alsaawy, Yazed
- Subjects
- *
INTERNET of things , *FIRE detectors , *SENSE data , *INTERNET - Abstract
Internet of Things (IoT) refers to uniquely identifiable entities. Its vision is the world of connected objects. Due to its connected nature the data produced by IoT is being used for different purposes. Since IoT generates huge amount of data, we need some scalable storage to store and compute the data sensed from the sensors. To overcome this issue, we need the integration of cloud and IoT, so that the data might be stored and computed in a scalable environment. Harmonization of IoT in Cloud might be a novel solution in this regard. IoT devices will interact with each other using Constrained Application Protocol (CoAP). In this paper, we have implemented harmonizing IoT in Cloud. We have used CoAP to get things connected to each other through the Internet. For the implementation we have used two sensors, fire detector and the sensor attached with the door which is responsible for opening it. Thus our implementation will be storing and retrieving the sensed data from the cloud. We have also compared our implementation with different parameters. The comparison shows that our implementation significantly improves the performance compared to the existing system. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
16. CoAP-Based Request-Response Interaction Model for the Internet of Things
- Author
-
Khan, Fazlullah, ur Rahman, Izaz, Khan, Mukhtaj, Iqbal, Nadeem, Alam, Muhammad, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Xiaohua, Jia, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Ferreira, Joaquim, editor, and Alam, Muhammad, editor
- Published
- 2017
- Full Text
- View/download PDF
17. Wireless Protocols for Smart Cities
- Author
-
Sarin, Gaurav, Pardalos, Panos M., Managing editor, Du, Ding-Zhu, Editor, and Rassia, Stamatina Th., editor
- Published
- 2017
- Full Text
- View/download PDF
18. Performance evaluation of CoAP proxy virtualisation in cloud‐assisted sensor networks.
- Author
-
Banaie, Fatemeh, Hosseini, Amin, and Yaghmaee, Mohammad Hossein
- Abstract
In this study, the authors have modelled the performance of a scalable proxy virtualisation framework to support an appropriate level of quality of service (QoS) for delay sensitive applications in cloud‐based large‐scale sensor networks. The proposed model leverages the functionalities of a constrained application protocol (CoAP) to expose a standard interface for transparently decoupling of the applications from servers and ensuring the implementation of the custom QoS metrics through virtualisation techniques. The model, combined with the prediction‐based dynamic resource allocation approach, enables the computation of the number of requests that can be supported for a given service rate and required QoS. It also features the evaluation of different performance metrics, particularly, the probability distribution of the response time and the ability to identify the optimal balance between the resource cost and the service performance. The numerical results obtained from the proposed analytical model can be used to help design and optimise industrial cloud‐based sensing systems. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
19. Information Flow Tracking and Auditing for the Internet of Things Using Software-Defined Networking.
- Author
-
Alzahrani, Bander
- Subjects
- *
SOFTWARE-defined networking , *INTERNET of things , *INTERNET usage monitoring - Abstract
Internet of Things (IoT) applications are expected to have access to sensitive data. On the other hand, IoT devices are not powerful enough to implement complex security solutions. But even if this was not a problem, there are so many other security challenges related to the IoT that a security breach should not be considered an exceptional case. In this paper, we propose an information tracking mechanism that can be used as an audit tool in case of a security incidence. To achieve this goal, we leverage software-defined networking (SDN). SDN is a promising technology that receives increasing attention, since it enables network "programmability" and intelligent packet forwarding. In this paper, we consider the case of an SDN deployment in the network of a single provider that interconnects various IoT devices. Furthermore, specialized network attachments points are used for parsing IoT specific protocols and perform the necessary actions. Moreover, in order to make our solution even more realistic and to facilitate deployment, we base our constructions and design solely on existing SDN standards. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
20. Automatic Key Update Mechanism for Lightweight M2M Communication and Enhancement of IoT Security: A Case Study of CoAP Using Libcoap Library
- Author
-
Wen-Chung Tsai, Tzu-Hsuan Tsai, Te-Jen Wang, and Mao-Lun Chiang
- Subjects
Internet of Things ,information security ,machine to machine ,constrained application protocol ,Chemical technology ,TP1-1185 - Abstract
The ecosystem for an Internet of Things (IoT) generally comprises endpoint clients, network devices, and cloud servers. Thus, data transfers within the network present multiple security concerns. The recent boom in IoT applications has accelerated the need for a network infrastructure that provides timely and safe information exchange services. A shortcoming of many existing networks is the use of static key authentication. To enable the use of automatic key update mechanisms in IoT devices and enhance security in lightweight machine-to-machine (M2M) communications, we propose a key update mechanism, namely, double OTP (D-OTP), which combines both one-time password (OTP) and one-time pad to achieve an IoT ecosystem with theoretically unbreakable security. The proposed D-OTP was implemented into the Constrained Application Protocol (CoAP) through the commonly used libcoap library. The experimental results revealed that an additional 8.93% latency overhead was required to obtain an unbreakable guarantee of data transfers in 100 CoAP communication sessions.
- Published
- 2022
- Full Text
- View/download PDF
21. An extended review of the application layer messaging protocol of the internet of things
- Author
-
Ronok Bhowmik and Md. Hasnat Riaz
- Subjects
Internet of things ,Advanced message queuing protocol ,Constrained application protocol ,Message queuing telemetry transport ,Data distribution service ,Extensible messaging and presence protocol ,Simple text-oriented messaging protocol - Abstract
In the internet of things (IoT), there are resource-constrained and immense heterogeneous electronic gadgets worldwide. Till now, no single IoT application layer messaging protocol is the best, nor axiomatic for every requirement. This paper exhaustively summarizes information on the messaging protocols from the available previous research sources online. Our goal is to encapsulate a simple guideline so that users can choose an optimal messaging protocol quickly according to development requirements and specifications. For this purpose, we have reviewed the literature on six enabling and evolving application layer messaging protocols used for IoT systems namely, message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), the constrained application protocol (CoAP), extensible messaging and presence protocol (XMPP), data distribution service (DDS), and simple text-oriented messaging protocol (STOMP) in terms of some interrelated metrics. Additionally, we represented a critical analysis of the application layer messaging protocols. This study will be helpful to readers with valuable insights and guide research scholars and developers in choosing optimal application layer messaging protocols based on development specifications and requirements.
- Published
- 2023
22. Secure and Efficient Automatic Ruling in Three-Level Network Architecture
- Author
-
Porambage, Pawani, Braeken, An, Carlier, Matthias, Kumar, Pardeep, Gurtov, Andrei, Ylianttila, Mika, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Loshkovska, Suzana, editor, and Koceski, Saso, editor
- Published
- 2016
- Full Text
- View/download PDF
23. SECoG: semantically enhanced mashup of CoAP-based IoT services.
- Author
-
Jin, Xiongnan, Jung, Jooik, Chun, Sejin, Yoon, Seungjun, and Lee, Kyong-Ho
- Abstract
One of the noticeable characteristics of the Internet-of-Things (IoT) devices is that they are resource-constrained, which makes them incompatible with the standard Internet protocols, e.g., HTTP. Nevertheless, IoT offers the Constrained Application Protocol (CoAP) as an alternative protocol for IoT devices where it is considered to be lightweight in regard to power consumption, network traffic, and so on. The main challenges associated with CoAP, however, still remain unsolved where most of the state-of-the-art approaches group servers manually and return the exact matches only. To address these issues, we propose a novel Semantically Enhanced CoAP Gateway (SECoG) for complex service mashups. SECoG enables users to create a simple or complex CoAP service mashup via a single HTTP request. Furthermore, a prototype implementation of SECoG was deployed on a real-world testbed to evaluate the proposed approach in terms of the reliability, execution time, network traffic, and accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
24. Forward error correction in real‐time Internet of things CoAP‐based wireless sensor networks.
- Author
-
Herrero, Rolando and Hernandez, Daniel
- Abstract
The Internet Engineering Task Force (IETF) has developed and promoted several standards intended to facilitate Internet of things communication among constrained devices in low‐power low‐rate networks (LLNs). Specifically, IETF introduces a series of protocols that deal with different layers of the stack ranging from IPv6 adaptation to routing in LLN. Among them, the constrained application protocol (CoAP) is a session protocol that is used to carry sensor and actuator traffic. Since CoAP transport relies on the user datagram protocol, and in order to provide reliability, it introduces a mode operation known as confirmable where messages are considered delivered once they have been acknowledged. One drawback of this approach, however, is the latency that results from the retransmission of packets in lossy networks. In this study, the authors present, model, compare and evaluate a forward error correction mechanism that enables CoAP to improve its reliability while reducing latency. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
25. Design and Implementation of Virtual Private Storage Framework Using Internet of Things Local Networks
- Author
-
Hwi-Ho Lee, Jung-Hyok Kwon, and Eui-Jik Kim
- Subjects
constrained application protocol ,internet of things local network ,sensor device ,speedy block-wise transfer ,virtual private storage ,Mathematics ,QA1-939 - Abstract
This paper presents a virtual private storage framework (VPSF) using Internet of Things (IoT) local networks. The VPSF uses the extra storage space of sensor devices in an IoT local network to store users’ private data, while guaranteeing expected network lifetime, by partitioning the storage space of a sensor device into data and system volumes and, if necessary, logically integrating the extra data volumes of the multiple sensor devices to virtually build a single storage space. When user data need to be stored, the VPSF gateway divides the original data into several blocks and selects the sensor devices in which the blocks will be stored based on their residual energy. The blocks are transmitted to the selected devices using the modified speedy block-wise transfer (BlockS) option of the constrained application protocol (CoAP), which reduces communication overhead by retransmitting lost blocks without a retransmission request message. To verify the feasibility of the VPSF, an experimental implementation was conducted using the open-source software libcoap. The results demonstrate that the VPSF is an energy-efficient solution for virtual private storage because it averages the residual energy amounts for sensor devices within an IoT local network and reduces their communication overhead.
- Published
- 2020
- Full Text
- View/download PDF
26. A UCB-based dynamic CoAP mode selection algorithm in distribution IoT
- Author
-
Huang Min, Xinhong You, Li Shuai, Zhang Pengping, and Shidong Zhang
- Subjects
Service (systems architecture) ,Upper confidence bound (UCB) ,Transmission delay ,Computer science ,Constrained application protocol (CoAP) ,020209 energy ,Quality of service ,General Engineering ,Mode (statistics) ,02 engineering and technology ,Engineering (General). Civil engineering (General) ,01 natural sciences ,010305 fluids & plasmas ,Constrained Application Protocol ,Complete information ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Differentiated QoS requirements ,TA1-2040 ,Communications protocol ,Algorithm ,Dynamic mode selection ,Data transmission ,Distribution internet of things (IoT) - Abstract
Lightweight constrained application protocol (CoAP) has emerged as a common communication protocol for resource-constrained equipment in distribution internet of things (IoT). CoAP introduces two modes for data transmission, i.e., non-confirmed mode for reducing transmission delay and confirmed mode for reducing packet-loss ratio, which can be dynamically selected to satisfy the service requirements. However, there are still some challenges in dynamic CoAP mode selection, including incomplete information and differentiated quality of service (QoS) requirements of distributed IoT services. In this paper, we propose a upper confidence bound (UCB)-based dynamic CoAP mode selection algorithm for data transmission to address these challenges. The simulation results validate that, compared with the fixed mode selection algorithm, the proposed algorithm can flexibly balance the tradeoff between packet-loss ratio and transmission delay as well as satisfy the differentiated QoS in distribution IoT.
- Published
- 2022
27. The Impact of Networking Protocols on Massive M2M Communication in the Industrial IoT
- Author
-
Martine Lenders, Cenk Gündoğan, Hauke Petersen, Matthias Wählisch, Michael Frey, Felix Shzu-Juraschek, Thomas C. Schmidt, and Peter Kietzmann
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Reliability (computer networking) ,Latency (audio) ,Cloud computing ,Constrained Application Protocol ,Software deployment ,Use case ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Message queue ,Computer network - Abstract
Common use cases in the Industrial Internet of Things (IIoT) deploy massive amounts of sensors and actuators that communicate with each other or to a remote cloud. While they form too large and too volatile networks to run on ultrareliable, time-synchronized low-latency channels, participants still require reliability and latency guaranties. We elaborate this for safety-critical use cases. This paper focuses on the effects of networking protocols for industrial communication services. It analyzes and compares the traditional Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) with the Constrained Application Protocol (CoAP) as a current IETF recommendation, and also with emerging Information-centric Networking (ICN) approaches, which are ready for deployment. Our findings indicate a rather diverse picture with a large dependence on deployment: Publish-subscribe protocols are more versatile, whereas ICN protocols are more robust in multihop environments. MQTT-SN competitively claims resources on congested links, while CoAP politely coexists on the price of its performance.
- Published
- 2021
- Full Text
- View/download PDF
28. Social Internet of Things for domotics: A knowledge-based approach over LDP-CoAP.
- Author
-
Sicilia, Álvaro, Pauwels, Pieter, Madrazo, Leandro, Poveda Villalón, María, Euzenat, Jérôme, Ruta, Michele, Scioscia, Floriano, Loseto, Giuseppe, Gramegna, Filippo, Ieva, Saverio, Pinto, Agnese, Di Sciascio, Eugenio, and Poveda-Villalón, María
- Subjects
INTERNET of things ,ARTIFICIAL intelligence - Abstract
Ambient Intelligence aims at simplifying the interaction of a user with her surrounding context, minimizing the effort needed to increase comfort and assistance. Nevertheless, especially in built and structured environments, current technologies and market solutions are often far from providing the required levels of automation, coordination and adaptivity. Devices should interact autonomously, should reach opportunistic decisions and take actions accordingly. In particular, user activities and profiles should be among the manifold implicit factors to be taken into account in that process. Home and Building Automation (HBA) is one of the most relevant scenarios suffering from the poorness of the allowed system intelligence, automation and adaptivity. Devices are logically associated through static profiles defined at system deployment stage. The large majority of solutions are proprietary and centralized, and require manual configuration. This paper proposes a novel semantic-based framework complying with the emerging Social Internet of Things paradigm. Infrastructured spaces can be intended as populated by device agents organized in social networks, interacting autonomously and sharing information, cooperating and orchestrating resources. A service-oriented architecture allows collaborative dissemination, discovery and composition of service/resource descriptions. Semantic Web languages are adopted as knowledge representation layer and mobile-oriented implementations of non-monotonic inferences for semantic matchmaking are used to give decision capabilities to software agents. Finally, the Linked Data Platform (LDP) over the Constrained Application Protocol (CoAP) provides the knowledge organization and sharing infrastructure underpinning social object interactions. The framework has been implemented and tested in a home automation prototype integrating several communication protocols and off-the-shelf devices. Experiments advocate the effectiveness of the approach. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
29. Proxying internet services for internet of things devices
- Author
-
Sefer Kurnaz and Mohammed Yousif Taha Alrawe
- Subjects
Consumption (economics) ,MQTT ,business.industry ,Computer science ,Materials Science (miscellaneous) ,Cell Biology ,Atomic and Molecular Physics, and Optics ,Constrained Application Protocol ,Bandwidth (computing) ,The Internet ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,business ,Internet of Things ,Limited resources ,Biotechnology ,Computer network - Abstract
With the rapidly growing number of internet of things (IoT) devices connected to the internet, accessing the available internet services has become more significant to support the operation of these devices. However, according to the limited resources available on IoT devices, accessing these services can be exhaustive, which has encouraged the proposal of new light-weight protocols, e.g. the MQ Telemetry Transport (MQTT) and the Constrained Application Protocol (CoAP). Accordingly, a new system is proposed in this paper to proxy all internet services using their requirements and protocols to the IoT devices using these light-weight protocols. The proposed system has been able to significantly reduce the resources consumption on IoT devices, such as the energy, memory, time and network bandwidth. Accordingly, this system can significantly improve the efficiency of these devices, so that IoT devices can achieve more tasks using the same resources, or the same tasks using less resources.
- Published
- 2021
- Full Text
- View/download PDF
30. Secure and energy-efficient smart building architecture with emerging technology IoT
- Author
-
Sharad Sharma, Xiaochun Cheng, Arun Kumar, Nitin Goyal, Aman Singh, and Parminder Singh
- Subjects
MQTT ,Computer Networks and Communications ,Computer science ,business.industry ,computer.internet_protocol ,Energy management ,020206 networking & telecommunications ,02 engineering and technology ,Application layer ,Constrained Application Protocol ,Datagram Transport Layer Security ,Smart grid ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,computer ,Building automation ,Computer network ,Efficient energy use - Abstract
With the advent of the Internet-of-Things (IoT), it is considered to be one of the latest innovations that offer interesting opportunities for different vertical industries. One of the most relevant IoT technology areas is smart construction. IoT operates in several sectors on a daily basis; implementation includes smart building, smart grids, smart cities, smart houses, physical defense, e-health, asset, and transportation management, but it is not restricted to this. Support from smart IoT buildings is an IoT-level, connected, and cost-effective system. Commercial space has major requirements in terms of comfort, accessibility, security, and energy management. Such requirements can be served organically by IoT-based systems. As the supply of energy has been exhausted and energy demand has risen, there has been a growing focus on energy usage and the maintenance of buildings. With the use of evolving IoT technology, we present a secure and energy-efficient smart building architecture. Every device is known by its unique address, and one of the key web transfer protocols is the Constrained Application Protocol (CoAP). It is an application layer protocol that does not use protected channels for data transfer. Automatic key management, confidentiality, authentication, and data integrity are all features of the Datagram Transport Layer Protection (DTLS). To achieve energy efficiency, we propose a smart construction architecture that, through IoT, manages the performance of all technological systems. The results of the simulation show that the energy consumption is lowered by about 30.86% with the use of the CoAP in the smart building, which is less than the Message Queuing Telemetry Transport case (MQTT). This paper also aims to observe how to integrate the DTLS protocol with the Secure Hash Algorithm (SHA-256) using optimizations from the Certificate Authority (CA) to improve security.
- Published
- 2021
- Full Text
- View/download PDF
31. Congestion Control in CoAP Observe Group Communication
- Author
-
Chanwit Suwannapong and Chatchai Khunboa
- Subjects
Internet of Things ,constrained application protocol ,wireless sensor networks ,congestion control ,observing resource ,group communication ,Chemical technology ,TP1-1185 - Abstract
The Constrained Application Protocol (CoAP) is a simple and lightweight machine-to-machine (M2M) protocol for constrained devices for use in lossy networks which offers a small memory capacity and limited processing. Designed and developed by the Internet Engineering Task Force (IETF), it functions as an application layer protocol and benefits from reliable delivery and simple congestion control. It is implemented for request/response message exchanges over the User Datagram Protocol (UDP) to support the Internet of Things (IoT). CoAP also provides a basic congestion control mechanism. In dealing with its own congestion, it relies on a fixed interval retransmission timeout (RTO) and binary exponential backoff (BEB). However, the default CoAP congestion control is considered to be unable to effectively perform group communication and observe resources, and it cannot handle rapid, frequent requests. This results in buffer overflow and packet loss. To overcome these problems, we proposed a new congestion control mechanism for CoAP Observe Group Communication, namely Congestion Control Random Early Detection (CoCo-RED), consisting of (1) determining and calculating an RTO timer, (2) a Revised Random Early Detection (RevRED) algorithm which has recently been developed and primarily based on the buffer management of TCP congestion control, and (3) a Fibonacci Pre-Increment Backoff (FPB) algorithm which waits for backoff time prior to retransmission. All the aforementioned algorithms were therefore implemented instead of the default CoAP mechanism. In this study, evaluations were carried out regarding the efficiency of the developed CoCo-RED using a Cooja simulator. The congestion control mechanism can quickly handle the changing behaviors of network communication, and thus it prevents the buffer overflow that leads to congestions. The results of our experiments indicate that CoCo-RED can control congestion more effectively than the default CoAP in every condition.
- Published
- 2019
- Full Text
- View/download PDF
32. Providing a CoAP-based technique to get wireless sensor data via IoT gateway
- Author
-
Mohammad Reza Nikseresht and Mahdi Mollamotalebi
- Subjects
Computer Networks and Communications ,Computer science ,Network packet ,business.industry ,020206 networking & telecommunications ,02 engineering and technology ,law.invention ,Constrained Application Protocol ,law ,Internet Protocol ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,020201 artificial intelligence & image processing ,The Internet ,business ,6LoWPAN ,Personal area network ,Wireless sensor network ,Computer network - Abstract
The advancement of wireless sensor networks and the possibility of using Internet protocols in devices with limited resources (such as sensors) have changed the future of the Internet. How to interact and exchange information is one of the challenges in the Internet of Things (IoT). The 6LoWPAN (IP6 Low Power Wireless Personal Area Network) and CoAP (Constrained Application Protocol) standards have been developed for using web protocols in sensor-based LLN (Low-power and Lossy Network). The 6LoWPAN/CoAP protocol stack enables access to the sensor network via web protocols. This facilitates the development of applications on the sensor network and their access to the Internet. Each of the layers of the 6LoWPAN/CoAP protocol stack imposes an overhead on the transmitted messages, and the resulting data overhead intensifies the energy consumption in multi-hop networks. In this paper, a technique is provided to reduce the burden imposed on small and medium-size packets on 6LoWPAN/CoAP multi-hop networks by scheduling and aggregating CoAP packets on sensor nodes. It classifies the CoAP requests/responses over the network (by specifying the maximum allowed delay) and manages the timing and aggregation of received messages on the sensor nodes (based on the maximum allowed delay on each one). The results of the evaluation of the provided technique indicated reducing the power consumption and network traffic for applications such as monitoring in multi-hop networks based on the 6LoWPAN/CoAP protocol stack.
- Published
- 2021
- Full Text
- View/download PDF
33. Stepwise Adjustment of Constrained Application Protocol Observing Period for Internet of Things Applications Using Wireless Sensor Networks.
- Author
-
Jung-Hyok Kwon, Sungmo Kim, and Eui-Jik Kim
- Subjects
INTERNET of things ,WIRELESS sensor networks ,COMPUTER networks ,QUEUEING networks ,BUFFER storage (Computer science) - Abstract
In this paper, we present a stepwise adjustment of the constrained application protocol observing period (SACOP) for Internet of Things (IoT) applications using wireless sensor networks (WSNs), which dynamically adjust observing periods depending on the Rx queue status of the constrained application protocol (CoAP) client. The operation of SACOP consists of the following two consecutive phases: overflow alert and observing period adjustment. In the former phase, a client sends a buffer overflow alert when the queue of the client reaches the predefined queue threshold. In the latter phase, the servers change their own observing period level depending on whether or not they receive a buffer overflow alert message. Therefore, SACOP can significantly reduce the number of dropped messages caused by buffer overflow. A simulation showed that SACOP achieved a higher network performance than the legacy approach with regard to the number of dropped messages. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
34. Efficient Scheduling, Caching, and Merging of Notifications to Save Message Costs in IoT Networks Using CoAP
- Author
-
You-Chiun Wang, Sih-Yu Lin, and Wei Kuang Lai
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Computer Science Applications ,Constrained Application Protocol ,Scheduling (computing) ,Hardware and Architecture ,020204 information systems ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Cache ,business ,Internet of Things ,Information Systems ,Computer network - Abstract
Internet-of-Things (IoT) devices are widely deployed and many of them have limited capabilities. Constrained application protocol (CoAP) is developed to integrate such devices into the Web environment. Specifically, client devices register their interested data with IoT devices, which will keep notifying them of the status of sensing data. However, client devices have different demands in terms of minimum and maximum periods to receive notifications, whereas IoT devices usually offer notifications at regular intervals. Some IoT devices would send many more notifications than necessary, which wastes bandwidth and energy. To conquer this problem, this article proposes a group-based message management (GMM) framework for CoAP proxies to efficiently coordinate the sending of notifications from IoT devices and forward them to client devices. GMM curtails superfluous notifications by three modules. The scheduling module groups client devices based on their demands and finds an optimal observation period for each group. The caching module adjusts the max-age value to allow a proxy reusing its cached notifications to answer requests. The merging module combines the notifications originated from different IoT devices queried by the same client device so as to save bandwidth. The simulation results show that GMM not only reduces unnecessary notifications but also conserves the energy of devices.
- Published
- 2021
- Full Text
- View/download PDF
35. Toward Adaptive Range for Parallel Connections in CoAP
- Author
-
Mahesh Chandra Govil, Arka Prokash Mazumdar, and Vinesh Jain
- Subjects
Multidisciplinary ,business.industry ,Computer science ,010102 general mathematics ,Testbed ,01 natural sciences ,Application layer ,Constrained Application Protocol ,Proof of concept ,Overhead (computing) ,0101 mathematics ,business ,Communications protocol ,Throughput (business) ,Computer network ,Data transmission - Abstract
Constrained Application Protocol (CoAP) is a communication protocol at application layer in the Internet of things (IoT). It employs NSTART parameter to maintain outstanding parallel connections toward individual destinations for data transfer. In the existing implementation of CoAP, the value for NSTART is defined statically. Where the higher values of this parameter up to a threshold give better throughput in moderate traffic, the lower values for the same control the congestion in overload situations. In overload situations, higher values of NSTART result in increased overhead and thereby perform poorly in terms of throughput. The static nature of the parameter and its relevant performance issues demand to manage NSTART dynamically in CoAP. In this work, we propose an algorithm to adjust the value of NSTART dynamically based on the congestion in the network. The proposed approach is an attempt to make the client free from managing NSTART dynamically. For the proof of concept, we implement and run simulations on Cooja mote at IoT/FIT-Lab testbed and Californium CoAP client. The results show 15% improvement in throughput, 15% reduction in average exchange duration, and 48% reduction in average number of retries (average taken of three scenarios) by proposed approach in comparison with the best case of CoCoA (NSTART = 4).
- Published
- 2021
- Full Text
- View/download PDF
36. An IOT based system for monitoring environmental and physiological conditions
- Author
-
C. Santhanakrishnan, K. Annapurani, C Krishnaveni, and Raghvendra Singh
- Subjects
010302 applied physics ,Fire detection ,Computer science ,business.industry ,Real-time computing ,Control (management) ,Cloud computing ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Object (computer science) ,01 natural sciences ,Term (time) ,Constrained Application Protocol ,0103 physical sciences ,Global Positioning System ,The Internet ,0210 nano-technology ,business - Abstract
Nowadays, the significant progress in technological sector’s growth is at its peak high and so the widening of internet to everything that include sensors and specifically the term IOT (Internet of Things). The main objective of this work focuses on tracking a person, baggage, vehicle (or any object etc) on real time basis, fetching all the environmental information surrounding the subject and partially controlling the subject. A database is created along when the human interacts with the subjects that are usually saved with various parameters along with the images. If it’s an electric object then along with its position details and image on a map, a human can remotely interact and control the object. If the case is of any non– electric object only the objects’ image and positional details with image description will be added to the map. It can descry and send fall-detection and environmental variation alerts. The information display, counsel and controlling can be done with the help of a web portal. The dignity of the human or an object with the current environmental circumstances are known with the help of Thing speak and hiox cloud type based – COAP (Constrained Application Protocol) Mode Control Algorithm. The paper covers all existing GPS (Global Positioning System) security sections of CoAP including tracking and safeguard of any person or an object. Transportation of sensitive materials (chemicals, industrial products etc) can be review properly with the device. Fall/smoke/fire detection along with other environmental (climatic) information like temperature, atmospheric pressure, gyroscopic inclination and humidity are monitored and the forewarn are given for the same. The device is customarily portable with a remotely controlling option of connecting it with the relay circuitry-for controlling appliances and objects.
- Published
- 2021
- Full Text
- View/download PDF
37. An Enhanced CoAP Scheme Using Fuzzy Logic With Adaptive Timeout for IoT Congestion Control
- Author
-
Paramate Horkaew, Chakchai So-In, and Phet Aimtongkham
- Subjects
General Computer Science ,Transmission delay ,Computer science ,Retransmission ,Internet of Things ,Throughput ,02 engineering and technology ,Adaptive timeout ,Constrained Application Protocol ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Wireless network ,business.industry ,Quality of service ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,General Engineering ,020206 networking & telecommunications ,congestion control ,constrained application protocol ,TK1-9971 ,Network congestion ,fuzzy logic systems ,020201 artificial intelligence & image processing ,Electrical engineering. Electronics. Nuclear engineering ,business ,Computer network - Abstract
Congestion management in the Internet of Things (IoT) is one of the most challenging tasks in improving the quality of service (QoS) of a network. This is largely because modern wireless networks can consist of an immense number of connections. Consequently, limited network resources can be consumed simultaneously. This eventually causes congestion that has adverse impacts on both throughput and transmission delay. This is particularly true in a network whose transmissions are regulated by the Constrained Application Protocol (CoAP), which has been widely adopted in the IoT network. CoAP has a mechanism that allows connection-oriented communication by means of acknowledgment messages (ACKs) and retransmission timeouts (RTOs). However, during congestion, a client node is unable to efficiently specify the RTO, resulting in unnecessary retransmission. This overhead in turn causes even more extensive congestion in the network. Therefore, this research proposes a novel scheme for optimally setting the initial RTO and adjusting the RTO backoff that considers current network utilization. The scheme consists of three main components: 1) a multidimensional congestion estimator that determines congestion conditions in various aspects, 2) precise initial RTO estimation by means of a relative strength indicator and trend analysis, and 3) a flexible and congestion-aware backoff strategy based on an adaptive-boundary backoff factor evaluated by using a fuzzy logic system (FLS). The simulation results presented here reveal that the proposed scheme outperforms state-of-the-art methods in terms of the carried load, delay and percentage of retransmission.
- Published
- 2021
38. Big Data analysis of demand side management for Industrial IOT applications
- Author
-
Venkata Shiva Sai Jaswanth Kodidala, Venkata Satya Sai Teja Dasara, Mounish Juvvadi, N. Thangadurai, Sowmya Akkala, and Sanjay Kumar Madupoju
- Subjects
010302 applied physics ,Authentication ,Database ,Data stream mining ,Computer science ,business.industry ,Payload ,Big data ,02 engineering and technology ,021001 nanoscience & nanotechnology ,computer.software_genre ,01 natural sciences ,Constrained Application Protocol ,0103 physical sciences ,Spark (mathematics) ,Ransomware ,The Internet ,0210 nano-technology ,business ,computer - Abstract
Companies today demand even more high quality services and infrastructure in the field of Industrial Internet IOT. There are several problems facing smart urbanization. Of special concern are secured energy demand side management. The IIoT makes ransomware, cyber attacks and other security threats open to industrial systems. IIoT will provide meaningful solutions to these problems through the amalgamation of big data analytics. That first author recommends a safe, reliable Demand Side Management engine for a smart cooperative client using IIoT based Big Data Analysis. A highly distributed framework to the theoretical engine for optimizing DSM across a Home Area Network. A payload authentication framework based on a lightweight handshake mechanism is used to improve the protection of this engine. In order to make users to control different server native resources energy efficiently, our theoretical method uses the portable utilizes of the Constrained Application Protocol. Moreover, data streams with parallel MapReduce processing are managed using big data analysis. In addition, we use Apache Spark with Apache Hadoop to check the theoretical engine to test our input transform match on stable datafile. The test results indicate that the architecture outlined provides useful insights into the intelligent social communities of the IIoT.
- Published
- 2021
- Full Text
- View/download PDF
39. Distance‐based congestion control mechanism for CoAP in IoT
- Author
-
Sharu Bansal and Dilip Kumar
- Subjects
Network packet ,Computer science ,business.industry ,Retransmission ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Round-trip delay time ,Application layer ,Computer Science Applications ,Constrained Application Protocol ,Network congestion ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
Designing a scalable and efficient application layer protocols for the Internet of Things (IoT) environment is an ongoing problem. The constrained application protocol (CoAP) offering RESTful services for IoT devices implements a simple congestion control mechanism. This study proposes and analyses the distance-based congestion control CoAP (DCC-CoAP) for the current state of the network and accordingly calculate the future flow rate to handle congestion. The authors’ main idea is to use the combination of distance between nodes and round trip time (RTT) measurements which limits the losses of CoAP messages, which is an efficient way to predict the network congestion. The user-defined options, i.e. retransmission counter and timestamp of sent and received CON and ACK messages are introduced for mapping CON to ACK and measure RTT. The comparative analysis of the DCC-CoAP with other congestion control mechanism like default CoAP, CoCoA+ is also highlighted in this study. With low additional computations, future RTT can be measured for avoiding congestion, and retransmission timeout varies with distance to avoid transaction losses. An algorithm with varying data rate has been used in homogeneous and mixed traffic to calculate the parameters in terms of packet delivery ratios, delay and retransmission count.
- Published
- 2020
- Full Text
- View/download PDF
40. MQTT-SN, CoAP, and RTP in wireless IoT real-time communications
- Author
-
Rolando Herrero
- Subjects
MQTT ,Computer Networks and Communications ,business.industry ,Computer science ,020207 software engineering ,Context (language use) ,02 engineering and technology ,Constrained Application Protocol ,Transmission (telecommunications) ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Wireless ,020201 artificial intelligence & image processing ,business ,Protocol (object-oriented programming) ,Wireless sensor network ,Message queue ,Software ,Information Systems ,Computer network - Abstract
A great number of Internet of things (IoT) applications rely on real-time communication (RTC) mechanisms for transmission of media. Essentially, applications analyze and process media to make decisions that typically affect actuation and control of embedded devices. IoT networks, however, are subjected to constrains that limit the computational and resource complexity of all entities involved. This is particularly critical when considering the traditional RTC protocols like real-time protocol (RTP) that was not designed to perform well in the context of low-power lossy networks (LLNs). This paper focuses on alternatives to media transport in IoT networks. Specially, constrained application protocol (CoAP) and the message queuing telemetry transport sensor network protocol (MQTT-SN) are presented as valid technologies for media propagation in LLNs. The paper models and compares CoAP, RTP, and MQTT-SN to determine the most efficient scenario for audio, speech, and video transmission.
- Published
- 2020
- Full Text
- View/download PDF
41. A Generic IoT Architecture for Ubiquitous Context-Aware Learning
- Author
-
Salsabeel Shapsough and Imran A. Zualkernan
- Subjects
Non-functional requirement ,business.industry ,Computer science ,05 social sciences ,General Engineering ,Educational technology ,050301 education ,Context (language use) ,02 engineering and technology ,Experiential learning ,Computer Science Applications ,Education ,Constrained Application Protocol ,Human–computer interaction ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,business ,0503 education ,Protocol (object-oriented programming) ,Message queue - Abstract
Ubiquitous learning environments move learners out of a classroom and into the real world where learners engage in experiential and tangible learning involving instrumented physical things. Learners use peer-to-peer networks connecting learners, teachers, and a host of learning “things,” such as instrumented pieces of art, flower pots, and even buildings. A key component of such systems is wireless-enabled edge devices augmented with various types of sensors to represent the state of physical things and their context. This article presents a novel generic architecture for context-aware ubiquitous learning systems based on the Internet of Things (IoT) computing paradigm. A commonly used IoT edge device was used to implement four variants of the proposed architecture. The variants were based on advanced message queuing protocol, constrained application protocol (CoAP), message queue telemetry transport, and extensible messaging and presence protocol. All variants provided more than adequate performance for implementing ubiquitous learning scenarios. As expected, CoAP was generally more resource-efficient. However, practical differences in performance were so small that the choice of which architectural variant to use may depend on nonfunctional requirements such as reliability, security, maximum payload size, and ease of implementation.
- Published
- 2020
- Full Text
- View/download PDF
42. Edge-centric delegation of authorization for constrained devices in the Internet of Things
- Author
-
Elías Grande and Marta Beltrán
- Subjects
Delegation ,Edge device ,Computer Networks and Communications ,business.industry ,Computer science ,media_common.quotation_subject ,Authorization ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Constrained Application Protocol ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Enhanced Data Rates for GSM Evolution ,Roaming ,business ,Edge computing ,Computer network ,media_common - Abstract
Access management poses a significant challenge within the Internet of Things (IoT) given the constrained capabilities in terms of computing, memory, storage, bandwidth and energy available for most of the low-cost devices and things embedded in the physical world. In this scenario, Edge Computing can be considered a powerful opportunity to solve authorization issues, deploying edge devices near IoT constrained things capable of performing as logical intermediaries or brokers between them and cloud resources, services or applications. This work proposes an edge-centric delegation of authorization for constrained devices (without cryptographic capabilities) based on well-known and extensively used specifications and protocols such as OAuth 2.0 and CoAP (Constrained Application Protocol). The proposed solution is based on three different roles allowing constrained devices automated enrolment, authorized access to resources deployed in the cloud and roaming. Furthermore, the proposed solution is validated and assessed using a real smart farming case study.
- Published
- 2020
- Full Text
- View/download PDF
43. Enhanced constrained application protocol for secured medical data transmission model for internet of things
- Author
-
Anandamurugan Selvaraj and Kamalam Gobichettipalayam Krishnasamy
- Subjects
Computational Mathematics ,Datagram Transport Layer Security ,Transmission (telecommunications) ,Artificial Intelligence ,computer.internet_protocol ,business.industry ,Computer science ,business ,Internet of Things ,computer ,Computer network ,Data transmission ,Constrained Application Protocol - Published
- 2020
- Full Text
- View/download PDF
44. Performance evaluation of CoAP proxy virtualisation in cloud‐assisted sensor networks
- Author
-
Fatemeh Banaie, Amin Hosseini, and Mohammad Hossein Yaghmaee
- Subjects
Service (systems architecture) ,business.industry ,Computer science ,Quality of service ,Distributed computing ,010401 analytical chemistry ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,01 natural sciences ,Industrial and Manufacturing Engineering ,0104 chemical sciences ,Constrained Application Protocol ,Server ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Resource allocation ,business ,Wireless sensor network - Abstract
In this study, the authors have modelled the performance of a scalable proxy virtualisation framework to support an appropriate level of quality of service (QoS) for delay sensitive applications in cloud-based large-scale sensor networks. The proposed model leverages the functionalities of a constrained application protocol (CoAP) to expose a standard interface for transparently decoupling of the applications from servers and ensuring the implementation of the custom QoS metrics through virtualisation techniques. The model, combined with the prediction-based dynamic resource allocation approach, enables the computation of the number of requests that can be supported for a given service rate and required QoS. It also features the evaluation of different performance metrics, particularly, the probability distribution of the response time and the ability to identify the optimal balance between the resource cost and the service performance. The numerical results obtained from the proposed analytical model can be used to help design and optimise industrial cloud-based sensing systems.
- Published
- 2020
- Full Text
- View/download PDF
45. CoAP and Its Performance Evaluation
- Author
-
Ünal Çavuşoğlu, Kerem Kucuk, Cüneyt Bayilmiş, and Mehmet Ali Ebleme
- Subjects
Computer Science, Information System ,business.industry ,Computer science ,General Engineering ,Throughput ,Energy consumption ,Constrained Application Protocol ,Bilgisayar Bilimleri, Bilgi Sistemleri ,User Datagram Protocol ,COAP protocol ,CoAP,performance evaluation,energy consumption,throughput,time delay ,The Internet ,Internet of Things ,business ,Protocol (object-oriented programming) ,Computer network - Abstract
Constrained Application Protocol (CoAP) is one of the lightest IoT connectivity protocol. It has been developed for IoT devices that has constrained resources such as memory, processing power, battery etc. CoAP protocol is built on REST architecture. It provides connecting internet of IoT devices with UDP protocol. CoAP is a Client-Server request/response messaging protocol. CoAP provides two modes of operations: (i) non-confirmable, (ii) confirmable. In addition, it provides four methods to communicate for different application requirements. And it has two ways to response a request. This paper deals with CoAP IoT messaging protocol and presents its performance evaluation. In addition, performance evaluation of CoAP has been realized according to delay, throughput and energy consumption parameters.
- Published
- 2020
- Full Text
- View/download PDF
46. Reset- and Reconnection-based Covert Channels in CoAP
- Author
-
Laura Hartmann, Steffen Wendzel, and Sebastian Zillien
- Subjects
Network security ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Covert communication ,Industrial Internet ,Covert channel ,Lightweight protocol ,business ,Internet of Things ,Reset (computing) ,Constrained Application Protocol ,Computer network - Abstract
The Internet of Things (IoT) and the Industrial Internet of Things (IIoT) are fast growing areas. Therefore, several protocols are specifically designed for these domains. CoAP (Constrained Application Protocol) is one of the more common ones. This lightweight protocol typically communicates over UDP, but can also use TCP and other carrier protocols, and is particularly suitable for embedded systems. In this work, we investigate CoAP with respect to covert communication and explore a new network hiding technique that is based on Artificial Resets. In addition, we investigate another covert channel by using the pattern PT15 Artificial Reconnections. We also propose and discuss detection methods for both covert channels.
- Published
- 2021
- Full Text
- View/download PDF
47. LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things †
- Author
-
Ridha Bouallegue and Balkis Bettoumi
- Subjects
Routing protocol ,RPL ,Computer science ,computer.internet_protocol ,Internet of Things ,TP1-1185 ,Man-in-the-middle attack ,Biochemistry ,Article ,Analytical Chemistry ,Constrained Application Protocol ,Computer Communication Networks ,energy consumption ,Humans ,Host Identity Protocol ,Electrical and Electronic Engineering ,Instrumentation ,mesh-under ,6LoWPAN ,business.industry ,Communication ,Chemical technology ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Lightweight Authentication ,Data Compression ,Application layer ,Atomic and Molecular Physics, and Optics ,IPv6 ,opportunistic mode ,CoAP ,business ,Wireless sensor network ,computer ,Wireless Sensor Network ,Computer network - Abstract
The high level of security requirements and low capabilities of constrained devices that are connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an authentication solution that deals with the problem of energy constraints. The Host Identity Protocol Diet EXchange (HIP DEX) is primarily designed to be suitable for constrained devices and designed to be resistant to Denial of Service (DoS) and man-in-the-middle (MITM) attacks. In this paper, we propose an efficient saving energy solution to secure end-to-end (E2E) communications based on the compression of the IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) header for HIP DEX packets. We implement our solution in an IoT based-WSN over Constrained Application Protocol (CoAP) in the application layer and Routing Protocol for Low power and lossy networks (RPL) in the routing layer. We also propose a novel distribution model that minimizes the number of signaling messages. Both proposed compression and distribution models for HIP DEX combined with an original implementation of an opportunistic association establishment of the handshake, constitute an efficient security solution for IoT. We called our solution Lightweight Compressed HIP DEX in the IoT (LC-DEX).
- Published
- 2021
48. Message queue telemetry transport and lightweight machine-to-machine comparison based on performance efficiency under various scenarios
- Author
-
Drishti Singh, Ria Singh, Aryan Gupta, and Ambika Vishal Pawar
- Subjects
Lightweight machine-to-machine ,Internet of things ,General Computer Science ,Constrained application protocol ,Message queue telemetry transport ,Electrical and Electronic Engineering - Abstract
Internet of things (IoT) is been advancing over a long period of time in many aspects. For data transfer between IoT devices in a wireless sensor network, various IoT protocols are proposed. Among them, the most widely used are constrained application protocol (CoAP) and message queue telemetry transport (MQTT). Overcoming the limitations of CoAP, lightweight machine-to-machine (LwM2M) framework was designed above CoAP. Recent statistics show that LwM2M and MQTT are the widely used, but LwM2M is still less used than MQTT. Our paper is aimed at comparing both MQTT and LwM2M on the basis of performance efficiency, which will be achieved by sending same file through both protocols to the server. Performance efficiency will be calculated in two scenarios, i) when the client makes a connection with the server i.e., while initial connection and ii) while sending data file to server i.e., while data transfer. Both the protocols will be tested on the number of packets sent and the variability of packet size throughout the session. Experimental results indicated that LwM2M outperformed MQTT in both above scenarios by almost 69%. Therefore, we concluded by stating that LwM2M is best choice over MQTT, but MQTT can still be used in some situations if necessary.
- Published
- 2022
- Full Text
- View/download PDF
49. Design and Implementation of a CoAP-Compliant Solution for RFID Inclusion in the Internet of Things.
- Author
-
Farris, Ivan, Pizzi, Sara, Molinaro, Antonella, and Iera, Antonio
- Subjects
RADIO frequency identification systems ,INTERNET of things ,COMPUTER networks ,ENERGY harvesting ,TECHNOLOGICAL innovations ,COMPUTER graphics - Abstract
Recent technological advancements allowed widening the applicability scope of the RFID (Radio Frequency Identification) technology from item identification to sensor-enabled computation platforms. This feature, added to the native radio energy-harvesting capability and the extremely low power consumption, has attracted the interest of research and industrial communities and pushed them to include the RFID technology into a global network of interconnected objects, as envisaged by the Internet of Things paradigm. In the last few years, standardization bodies have made significant efforts to design lightweight approaches, such as CoAP (Constrained Application Protocol), to efficiently manage resource-constrained nodes by using traditional web interfaces; nevertheless, RFID integration is not addressed yet. In this paper, we propose a CoAP-compliant solution where RFID tags, behaving as virtual CoAP servers, are directly accessible by remote CoAP clients via a reader, which acts as a CoAP proxy. A real testbed, addressing key aspects, such as tag addressing, discovery and management of CoAP requests via RFID operations, is deployed to validate the feasibility of the proposal. Experimental results show rapid response times: less than 60 ms are requested for resource retrieval, while from 80 to 360 ms for sending data to the RFID device, depending on the tag memory dimension. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
50. SHAPEIoT: Secure Handshake Protocol for Autonomous IoT Device Discovery and Blacklisting using Physical Unclonable Functions and Machine Learning
- Author
-
Cem Ata Baykara, Kübra Kalkan, and Ilgın Şafak
- Subjects
Handshake ,Computer science ,Network security ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Physical unclonable function ,Machine learning ,computer.software_genre ,Constrained Application Protocol ,Network simulation ,Session key ,Anomaly detection ,Artificial intelligence ,business ,Protocol (object-oriented programming) ,computer - Abstract
This paper proposes a new lightweight handshake protocol implemented on top of the Constrained Application Protocol (CoAP) that can be used in device discovery and ensuring the IoT network security by autonomously managing devices of any computational complexity using whitelisting and blacklisting. A Physical Unclonable Function (PUF) is utilized for the session key generation in the proposed handshake protocol. The CoAP server performs real-time device discovery using the proposed handshake protocol, and anomaly detection using machinelearning algorithms to ensure the security of the IoT network. To the best of our knowledge, the presented PUF-based handshake protocol is the first to performs blacklisting and whitelisting. Whitelisted IoT devices not displaying anomalous behavior can join and remain in the IoT network. IoT devices that display anomalous behavior are autonomously blacklisted by the CoAP server and are either disallowed from joining the IoT network or are removed from the IoT network. Simulation results show that amongst the five machine learning algorithms studied, the stacking classifier displays the highest overall anomaly detection accuracy of 99.98%. Based on the results of the network simulation performed, the CoAP server is capable of blacklisting malicious IoT devices within the network with perfect accuracy.
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.