scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities

01 Dec 2013-IEEE Wireless Communications (Institute of Electrical and Electronics Engineers)-Vol. 20, Iss: 6, pp 91-98
TL;DR: It becomes critically important to study how the current approaches to standardization in this area can be improved, and better understand the opportunities for the research community to contribute to the IoT field.
Abstract: Technologies to support the Internet of Things are becoming more important as the need to better understand our environments and make them smart increases. As a result it is predicted that intelligent devices and networks, such as WSNs, will not be isolated, but connected and integrated, composing computer networks. So far, the IP-based Internet is the largest network in the world; therefore, there are great strides to connect WSNs with the Internet. To this end, the IETF has developed a suite of protocols and open standards for accessing applications and services for wireless resource constrained networks. However, many open challenges remain, mostly due to the complex deployment characteristics of such systems and the stringent requirements imposed by various services wishing to make use of such complex systems. Thus, it becomes critically important to study how the current approaches to standardization in this area can be improved, and at the same time better understand the opportunities for the research community to contribute to the IoT field. To this end, this article presents an overview of current standards and research activities in both industry and academia.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Abstract: This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication technologies, and Internet protocols. The basic premise is to have smart sensors collaborate directly without human involvement to deliver a new class of applications. The current revolution in Internet, mobile, and machine-to-machine (M2M) technologies can be seen as the first phase of the IoT. In the coming years, the IoT is expected to bridge diverse technologies to enable new applications by connecting physical objects together in support of intelligent decision making. This paper starts by providing a horizontal overview of the IoT. Then, we give an overview of some technical details that pertain to the IoT enabling technologies, protocols, and applications. Compared to other survey papers in the field, our objective is to provide a more thorough summary of the most relevant protocols and application issues to enable researchers and application developers to get up to speed quickly on how the different protocols fit together to deliver desired functionalities without having to go through RFCs and the standards specifications. We also provide an overview of some of the key IoT challenges presented in the recent literature and provide a summary of related research work. Moreover, we explore the relation between the IoT and other emerging technologies including big data analytics and cloud and fog computing. We also present the need for better horizontal integration among IoT services. Finally, we present detailed service use-cases to illustrate how the different protocols presented in the paper fit together to deliver desired IoT services.

6,131 citations


Cites background from "A survey on the ietf protocol suite..."

  • ...Most of the identified challenges are reported in the surveys [3], [7], [8], [121], [122]....

    [...]

  • ...An overview of the current IETF standards and challenges for the IoT has been presented in [8]....

    [...]

Journal ArticleDOI
TL;DR: This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly.
Abstract: The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly. As compared to similar survey papers in the area, this paper is far more comprehensive in its coverage and exhaustively covers most major technologies spanning from sensors to applications.

1,025 citations


Cites background or methods from "A survey on the ietf protocol suite..."

  • ...Unlike HTTP, it incorporates optimizations for constrained application environments [50]....

    [...]

  • ...The Internet Engineering Task Force (IETF) has developed alternative protocols for communication between IoT devices using IP because IP is a flexible and reliable standard [50, 51]....

    [...]

Journal ArticleDOI
TL;DR: This paper investigates the properties of trust, proposes objectives of IoT trust management, and provides a survey on the current literature advances towards trustworthy IoT to propose a research model for holistic trust management in IoT.

1,001 citations

Journal ArticleDOI
TL;DR: This article assesses the different machine learning methods that deal with the challenges in IoT data by considering smart cities as the main use case and presents a taxonomy of machine learning algorithms explaining how different techniques are applied to the data in order to extract higher level information.

690 citations

Journal ArticleDOI
01 Feb 2018
TL;DR: This paper surveys the security of the main IoT frameworks, and shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties are shown.
Abstract: The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.

616 citations


Cites background from "A survey on the ietf protocol suite..."

  • ...A brief overview of the current IETF standards for the Internet of things is provided in [15]....

    [...]

References
More filters
Proceedings ArticleDOI
01 Dec 2009
TL;DR: Content-Centric Networking (CCN) is presented, which treats content as a primitive - decoupling location from identity, security and access, and retrieving content by name, using new approaches to routing named content.
Abstract: Network use has evolved to be dominated by content distribution and retrieval, while networking technology still speaks only of connections between hosts. Accessing content and services requires mapping from the what that users care about to the network's where. We present Content-Centric Networking (CCN) which treats content as a primitive - decoupling location from identity, security and access, and retrieving content by name. Using new approaches to routing named content, derived heavily from IP, we can simultaneously achieve scalability, security and performance. We implemented our architecture's basic features and demonstrate resilience and performance with secure file downloads and VoIP calls.

3,556 citations

Journal ArticleDOI
TL;DR: Content-Centric Networking (CCN) is presented which uses content chunks as a primitive---decoupling location from identity, security and access, and retrieving chunks of content by name, and simultaneously achieves scalability, security, and performance.
Abstract: Current network use is dominated by content distribution and retrieval yet current networking protocols are designed for conversations between hosts. Accessing content and services requires mapping from the what that users care about to the network's where. We present Content-Centric Networking (CCN) which uses content chunks as a primitive---decoupling location from identity, security and access, and retrieving chunks of content by name. Using new approaches to routing named content, derived from IP, CCN simultaneously achieves scalability, security, and performance. We describe our implementation of the architecture's basic features and demonstrate its performance and resilience with secure file downloads and VoIP calls.

3,122 citations


"A survey on the ietf protocol suite..." refers background in this paper

  • ...Power saving can easily be achieved in the CCN architecture....

    [...]

  • ...Content-centric networking (CCN) [16] provides a promising way to overcome the above concerns for resource constrained networks....

    [...]

  • ...In addition, the CCN-based IoT is superior to the CoAP in dealing with massive access, because CCN is primarily designed for content dissemination....

    [...]

  • ...Figure 6 illustrates the comparison of the IP protocol stack and CCN stack....

    [...]

  • ...It is worth noting that the content layer of CCN is the crucial component for the application request/response processing, which is equivalent to the request/ response exchange in CoAP except that the intermediate device may also interpret RESTful messages besides the server and client....

    [...]

Proceedings ArticleDOI
22 Apr 2008
TL;DR: An introduction to the architecture of WirelessHART is given and several challenges the implementation team had to tackle during the implementation are described, such as the design of the timer, network wide synchronization, communication security, reliable mesh networking, and the central network manager.
Abstract: Wireless technology has been regarded as a paradigm shifter in the process industry. The first open wireless communication standard specifically designed for process measurement and control applications, WirelessHART was officially released in September 2007 (as a part of the HART 7 Specification). WirelessHART is a secure and TDMA- based wireless mesh networking technology operating in the 2.4 GHz ISM radio band. In this paper, we give an introduction to the architecture of WirelessHART and share our first-hand experience in building a prototype for this specification. We describe several challenges we had to tackle during the implementation, such as the design of the timer, network wide synchronization, communication security, reliable mesh networking, and the central network manager. For each challenge, we provide a detailed analysis and propose our solution. Based on the prototype implementation, a simple WirelessHART network has been built for the purpose of demonstration. The demonstration network in turn validates our design. To the best of our knowledge, this is the first reported effort to build a WirelessHART protocol stack.

634 citations


Additional excerpts

  • ...Also, WirelessHART adopts part of the MAC header and integrates its own logic on top of the MAC format....

    [...]

  • ...Moreover, many well-known standardization organizations are also active in developing low-power protocol stacks based on IEEE 802.15.4, such as WirelessHART [4] and ZigBee....

    [...]

  • ...4, such as WirelessHART [4] and ZigBee....

    [...]

Journal ArticleDOI
TL;DR: This paper surveys and discusses various remarkable techniques toward green mobile networks to date, mainly targeting mobile cellular networks, and summarizes the current research projects related to greenMobile networks, along with the taxonomy of energy-efficiency metrics.
Abstract: The explosive development of Information and Communication Technology (ICT) has significantly enlarged both the energy demands and the CO 2 emissions, and consequently contributes to make the energy crisis and global warming problems worse. However, as the main force of the ICT field, the mobile networks, are currently focusing on the capacity, variety and stability of the communication services, without paying too much severe concerns on the energy efficiency. The escalating energy costs and environmental concerns have already created an urgent need for more energy-efficient "green" wireless communications. In this paper, we survey and discuss various remarkable techniques toward green mobile networks to date, mainly targeting mobile cellular networks. We also summarize the current research projects related to green mobile networks, along with the taxonomy of energy-efficiency metrics. We finally discuss and elaborate future research opportunities and design challenges for green mobile networks.

349 citations


"A survey on the ietf protocol suite..." refers background in this paper

  • ...Energy Scarcity — The energy scarcity of the lowcost and low-powered sensor node has been a key issue for WSNs and for future IoT [6]....

    [...]

Proceedings ArticleDOI
12 Apr 2010
TL;DR: This work demonstrates for the first time that replacing the traditional FIFO queue service in backpressure routing with LIFO queues reduces the average end-to-end packet delays for delivered packets drastically and improves backpressure scalability by introducing a new concept of floating queues into the backpressure framework.
Abstract: Current data collection protocols for wireless sensor networks are mostly based on quasi-static minimum-cost routing trees. We consider an alternative, highly-agile approach called backpressure routing, in which routing and forwarding decisions are made on a per-packet basis. Although there is a considerable theoretical literature on backpressure routing, it has not been implemented on practical systems to date due to concerns about packet looping, the effect of link losses, large packet delays, and scalability. Addressing these concerns, we present the Backpressure Collection Protocol (BCP) for sensor networks, the first ever implementation of dynamic backpressure routing in wireless networks. In particular, we demonstrate for the first time that replacing the traditional FIFO queue service in backpressure routing with LIFO queues reduces the average end-to-end packet delays for delivered packets drastically (75% under high load, 98% under low load). Further, we improve backpressure scalability by introducing a new concept of floating queues into the backpressure framework. Under static network settings, BCP shows a more than 60% improvement in max-min rate over the state of the art Collection Tree Protocol (CTP). We also empirically demonstrate the superior delivery performance of BCP in highly dynamic network settings, including conditions of extreme external interference and highly mobile sinks.

281 citations


"A survey on the ietf protocol suite..." refers methods in this paper

  • ...Different from the DAG routing topology used by RPL, the queue-aware backpressure routing algorithm sends packets to the gateway(s) by exploiting all possible end-to-end paths, which has been proved to be throughput optimal in theory and successfully implemented in real-world sensor networks [10]....

    [...]