scispace - formally typeset
Open AccessProceedings ArticleDOI

A Survey on Application Layer Protocols for the Internet of Things

Reads0
Chats0
TLDR
This paper presents and compares existing IoT application layer protocols as well as protocols that are utilized to connect the “things” but also end-user applications to the Internet, and argues their suitability for the IoT by considering reliability, security, and energy consumption aspects.
Abstract
It has been more than fifteen years since the term Internet of Things (IoT) was introduced. However, despite the efforts of research groups and innovative corporations, still today it is not possible to say that the IoT is upon us. This is mainly due to the fact that a unified IoT architecture has not yet been clearly defined and there is no common agreement in defining communication protocols and standards for all the IoT parts. The framework that current IoT platforms use consists mostly in technologies that partially fulfill the IoT requirements. While developers employ existing technologies to build the IoT, research groups are working on adapting protocols to the IoT in order to optimize communications. In this paper, we present and compare existing IoT application layer protocols as well as protocols that are utilized to connect the “things” but also end-user applications to the Internet. We highlight IETF’s CoAP, IBM’s MQTT, HTML 5’s Websocket among others, and we argue their suitability for the IoT by considering reliability, security, and energy consumption aspects. Finally, we provide our conclusions for the IoT application layer communications based on the study that we have conducted.

read more

Citations
More filters
Proceedings ArticleDOI

Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP

TL;DR: An evaluation of the four established messaging protocols MQTT, CoAP, AMQP and HTTP for IoT systems is presented and the user can decide their appropriate usage in various IoT systems according to their requirements and suitability.
Journal ArticleDOI

Structural Health Monitoring Framework Based on Internet of Things: A Survey

TL;DR: A framework for structural health monitoring (SHM) using IoT technologies on intelligent and reliable monitoring is introduced and technologies involved in IoT and SHM system implementation as well as data routing strategy in IoT environment are presented.
Journal ArticleDOI

A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration

TL;DR: In this article, a survey of application layer communication protocols to fulfill the IoT communication requirements, and their potential for implementation in fog-and cloud-based IoT systems is presented, including request-reply and publish-subscribe protocols.
Journal ArticleDOI

Resource Management in Fog/Edge Computing: A Survey on Architectures, Infrastructure, and Algorithms

TL;DR: In this paper, the authors reviewed publications as early as 1991, with 85% of the publications between 2013 and 2018, to identify and classify the architectures, infrastructure, and underlying algorithms for managing resources in fog/edge computing.
Journal ArticleDOI

Fog/Edge Computing-Based IoT (FECIoT): Architecture, Applications, and Research Issues

TL;DR: A comprehensive survey on state-of-the-art IoT literature over the period 2008–2018 is presented and the FECIoT framework which covers the enabling technologies, services, and open research issues is proposed, progressing from basic to more advanced concepts within the IoT domain.
References
More filters
Journal ArticleDOI

Standardized Protocol Stack for the Internet of (Important) Things

TL;DR: The wireless communications stack the industry believes to meet the important criteria of power-efficiency, reliability and Internet connectivity, and the protocol stack proposed in the present work converges towards the standardized notations of the ISO/OSI and TCP/IP stacks is proposed.

The WebSocket Protocol

Ian Fette
TL;DR: The WebSocket Protocol enables two-way communication between a client running untrusted code in a controlled environment to a remote host that has opted-in to communications from that code.
Journal ArticleDOI

Securing the Internet of Things: A Standardization Perspective

TL;DR: An in-depth review of the communication security solutions for IoT, specifically the standard security protocols to be used in conjunction with the Constrained Application Protocol (CoAP), an application protocol specifically tailored to the needs of adapting to the constraints of IoT devices.
Related Papers (5)