Advertisement

Comparative Analysis of Application Layer Internet of Things (IoT) Protocols

Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 9)

Abstract

IoT devices will be everywhere, will be context-aware and will enable ambient intelligence. This provides a possibility of a framework that would allow direct machine-to-machine communication. This vision has produced an exemplar which is often referred to as the Internet of things (IoT). We have studied the application level IoT protocols namely, The Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT) and the Hypertext Transfer Protocol (HTTP)/REpresentational State Transfer (REST). We have used the cooja simulator for carrying out the simulation. We have simulated the above protocols in the cooja simulator demonstrating a simple scenario of three motes. We have read the sensor information from the server with the help of browser. We can also make use of different topologies and simulate the scenario according the requirement.

Keywords

Internet of things (IoT) Constrained Application Protocol (CoAP) Machine-to-machine (M2M) Message Queuing Telemetry Transport (MQTT) Hypertext Transfer Protocol (HTTP) REpresentational State Transfer (REST) 

References

  1. 1.
    Ugrenovic D, Gardasevic G (2015) CoAP protocol for web-based monitoring in IoT healthcare applications. In: 2015 23rd Telecommunications Forum Telfor (TELFOR). IEEEGoogle Scholar
  2. 2.
    Potsch T, et al (2012) Performance evaluation of CoAP using RPL and LPL in TinyOS. In: 2012 5th international conference on new technologies, mobility and security (NTMS). IEEEGoogle Scholar
  3. 3.
    Teklemariam GK, et al (2014) Simple RESTful sensor application development model using CoAP. In: 2014 IEEE 39th conference on local computer networks workshops (LCN Workshops). IEEEGoogle Scholar
  4. 4.
    Govindan K, Azad AP (2015) End-to-end service assurance in IoT MQTT-SN. In: 2015 12th annual IEEE consumer communications and networking conference (CCNC). IEEEGoogle Scholar
  5. 5.
    Singh M, et al (2015) Secure MQTT for internet of things (IoT). In: 2015 5th international conference on communication systems and network technologies (CSNT). IEEEGoogle Scholar
  6. 6.
    Thangavel D, et al (2014) Performance evaluation of MQTT and CoAP via a common middleware. In: 2014 IEEE ninth international conference on intelligent sensors, sensor networks and information processing (ISSNIP). IEEEGoogle Scholar
  7. 7.
    Pereira C, Aguiar A (2014) Towards efficient mobile M2M communications: survey and open challenges. Sensors 14(10)Google Scholar
  8. 8.
    Luzuriaga JE, et al (2015) Handling mobility in IoT applications using the MQTT protocol. In: Internet Technologies and Applications (ITA). IEEEGoogle Scholar
  9. 9.
    Whitmore A, Agarwal A, Xu LDa (2015) The internet of things—a survey of topics and trends. Inf Syst Front 17(2)Google Scholar
  10. 10.
    Gazis V, et al (2015) A survey of technologies for the internet of things. In: 2015 international wireless communications and mobile computing conference (IWCMC). IEEEGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.GTU PG SchoolAhmedabadIndia

Personalised recommendations