To see the other types of publications on this topic, follow the link: IoT Protocol.

Journal articles on the topic 'IoT Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IoT Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kurniawan, Denny, Muhammad Ashar, and Harits Ar Rosyid. "Hybrid NarrowBand-internet of things protocol for real time data optimization." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 2827. http://dx.doi.org/10.11591/ijece.v13i3.pp2827-2836.

Full text
Abstract:
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and receiving data in real time. This research proposes a hybrid NarrowBand-IoT (NB-IoT) protocol designed using NarrowBand communication network technology with optimization of data communication using MQTT and HTTP protocols. In this research, the hybrid NB-IoT protocol has the best packet loss value of 0.010% against the HTTP NB-IoT protocol which has a value of 0.017%, and the MQTT NB-IoT protocol of 0.024%. The hybrid NB-IoT protocol has a latency value of 8.7 seconds compared to the HTTP NB-IoT protocol which has a latency of 10.9 seconds. Meanwhile, the throughput value of the hybrid NB-IoT protocol is 158906.1 byte/s and is better than the MQTT NB-IoT protocol which is only 158898.6 bytes/s.
APA, Harvard, Vancouver, ISO, and other styles
2

Denny, Kurniawan, Ashar Muhammad, and Ar Rosyid Harits. "10.11591/ijece.v13i3.pp2827-2836." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 2827–36. https://doi.org/10.11591/ijece.v13i3.pp2827-2836.

Full text
Abstract:
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and receiving data in real time. This research proposes a hybrid NarrowBand-IoT (NB-IoT) protocol designed using NarrowBand communication network technology with optimization of data communication using MQTT and HTTP protocols. In this research, the hybrid NB-IoT protocol has the best packet loss value of 0.010% against the HTTP NB-IoT protocol which has a value of 0.017%, and the MQTT NB-IoT protocol of 0.024%. The hybrid NB-IoT protocol has a latency value of 8.7 seconds compared to the HTTP NB-IoT protocol which has a latency of 10.9 seconds. Meanwhile, the throughput value of the hybrid NB-IoT protocol is 158906.1 byte/s and is better than the MQTT NB-IoT protocol which is only 158898.6 bytes/s.
APA, Harvard, Vancouver, ISO, and other styles
3

Kant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Full text
Abstract:
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment such as failure or impairment of production systems. We evaluate the prevalence of exposed IoT and IIoT devices related to the protocol MQTT by means of the search engine Shodan. The approach, design and results of our analysis are summarized in this paper.
APA, Harvard, Vancouver, ISO, and other styles
4

Rekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.

Full text
Abstract:
Abstract It is very difficult to develop a perfect security protocol for communication over the IoT network and developing a reliable authentication protocol requires a detailed understanding of cryptography. To ensure the reliability of security protocols of IoT, the validation method is not a good choice because of its several disadvantages and limitations. To prove the high reliability of Cryptographic Security Protocols(CSP) for IoT networks, the functional correctness of security protocols must be proved secure mathematically. Using the Formal Verification technique we can prove the functional correctness of IoT security protocols by providing the proofs mathematically. In this work, The CoAP Machine to Machine authentication protocol and centralied IoT network Authentication Protocol RADIUS is formally verified using the well-known verification technique known as model checking technique and we have used the Scyther model checker for the verification of security properties of the respective protocols. The abstract protocol models of the IoT authentication protocols were specified in the security protocol description language and the security requirements of the authentication protocols were specified as claim events.
APA, Harvard, Vancouver, ISO, and other styles
5

Khelf, Roumaissa, Nacira Ghoualmi-Zine, and Marwa Ahmim. "TAKE-IoT." International Journal of Embedded and Real-Time Communication Systems 11, no. 3 (2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.

Full text
Abstract:
The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements and withstands various types of known attacks. Moreover, TAKE-IoT aims to reduce computation costs using lightweight operations for the key generation. The proposed protocol is validated using the automated validation of internet security protocols and applications (AVISPA) tool. Hence, results show that TAKE-IoT can reach a proper level of security without sacrificing its efficiency in the context of IoT.
APA, Harvard, Vancouver, ISO, and other styles
6

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman, and Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging." Energies 13, no. 13 (2020): 3346. http://dx.doi.org/10.3390/en13133346.

Full text
Abstract:
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messaging. Most current IoT applications depend on real-time systems. Therefore, an RTOS (real-time operating system) as a famous OS (operating system) is used for the embedded systems to provide the constraints of real-time features, as required by these real-time systems. Using RTOS for IoT applications adds important features to the system, including reliability. Many of the undertaken research works into IoT platforms have only focused on specific applications; they did not deal with the real-time constraints under a real-time system umbrella. In this work, the design of the multi-topic IoT protocol and platform is implemented for real-time systems and also for general-purpose applications; this platform depends on the proposed multi-topic communication protocol, which is implemented here to show its functionality and effectiveness over similar protocols.
APA, Harvard, Vancouver, ISO, and other styles
7

Sarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.

Full text
Abstract:
Abstract: Now on a daily basis during a smarter embedded world, have Internet of Things. IoT have lot of things for the embedded systems, and it's the potential to remodel our world with the assistance of it. Internet of Things (IoT) or Web of Things (WoT) is emerging technology and it wireless network between two or more objects or smart things connect via Internet. IoT classified in two types first is within IoT and second side is outside of IoT. In inside IoT consider as protocols in IoT. In outside of IoT consider as sensor, actuators, etc., those are physically possible. In within IoT consider as protocol and IoT have own Protocol Stack. Protocol Stack has different layer like Application Layer, Transport Layer, Internet Layer and Physical/Link Layer. The judgmental role goal of IoT is to confirm effectual communication between two objects and build a sustained bond among them using different application. The application Layer liable for providing services and determining a group of protocol for message passing at the application Layer. This paper understands Application Layer Data Transfer Messaging Protocol like MQTT, AMQT, COAP, XMPP, DDS, HTTP, RESTFULL, and WEB-SOCKET. Also describe which sort of architecture (like Request/Response, Client/Server and Publish/Subscribe) and security (like DTLS, TCL/SSL and HTTPS) support in those protocols that decide upon appropriate protocol supported application needs.
APA, Harvard, Vancouver, ISO, and other styles
8

Oh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (2021): 1488. http://dx.doi.org/10.3390/s21041488.

Full text
Abstract:
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for device authentication in smart grid-enabled smart home environments. However, we demonstrate that their protocol can suffer from stolen smart device, impersonation, and session key disclosure attacks and fails to provide secure mutual authentication. Therefore, we propose a secure and lightweight authentication protocol for IoT-based smart homes to resolve the security flaws of Xiang and Zheng’s protocol. We proved the security of the proposed protocol by performing informal and formal security analyses, using the real or random (ROR) model, Burrows–Abadi–Needham (BAN) logic, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, we provide a comparison of performance and security properties between the proposed protocol and related existing protocols. We demonstrate that the proposed protocol ensures better security and lower computational costs than related protocols, and is suitable for practical IoT-based smart home environments.
APA, Harvard, Vancouver, ISO, and other styles
9

Wytrębowicz, Jacek, Krzysztof Cabaj, and Jerzy Krawiec. "Messaging Protocols for IoT Systems—A Pragmatic Comparison." Sensors 21, no. 20 (2021): 6904. http://dx.doi.org/10.3390/s21206904.

Full text
Abstract:
There are a dozen messaging protocols proposed for IoT systems. Choosing one for a new design is complicated, and a non-optimal selection can result in slower development and higher design costs. This paper aims to help select appropriate protocols, considering IoT applications’ specificity and communication requirements. We have identified the protocol features that are significant for the design and operation of IoT systems. This paper gives a substantial comparison of the protocols using the features and is based on a thorough analysis of the protocol specifications. The results contain an assessment of the suitability of the protocols for the defined types of IoT devices and the identified communication purposes. We conclude the comparison with some recommendations of the protocol selection and usage.
APA, Harvard, Vancouver, ISO, and other styles
10

Son, Heesuk, and Dongman Lee. "An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments." ACM Transactions on Internet Technology 22, no. 2 (2022): 1–25. http://dx.doi.org/10.1145/3430501.

Full text
Abstract:
Incompatible updates of IoT systems and protocols give rise to interoperability problems. Even though various protocol adaptation and unknown protocol inference schemes have been proposed, they either do not work where the updated protocol specifications are not given or suffer from inefficiency issues. In this work, we present an efficient protocol inference scheme for incompatible updates in IoT environments. The scheme refines an active automata learning algorithm, L*, by incorporating a knowledge base of the legacy protocol behavior into its membership query selection procedure for updated protocol behavior inference. It also infers protocol syntax based on our previous work that computes the most probable message field updates and adapts the legacy protocol message accordingly. We evaluate the proposed scheme with two case studies with the most popular IoT protocols and prove that it infers updated protocols efficiently while improving the L* algorithm’s performance for resolving the incompatibility.
APA, Harvard, Vancouver, ISO, and other styles
11

R. Suganthi. "Efficient Routing Protocol (ERP) for MANETS-IoT Systems." Journal of Information Systems Engineering and Management 10, no. 2 (2025): 670–79. https://doi.org/10.52783/jisem.v10i2.2776.

Full text
Abstract:
An Internet of Things (IoT)-integrated mobile ad hoc network (MANET), referred to as MANET-IoT systems, consists of interconnected mobile and IoT devices, often operating with limited battery capacity. In such systems, existing routing protocols consume significant energy and time for path identification, which impacts the overall system performance. The purpose of this paper is to suggest a new Efficient Routing protocol (ERP) Protocol for MANET-IoT systems to enhance network performance by efficiently selecting intermediate forwarding nodes according to the Position details about the destination node. This approach reduces the path searching process, thereby lowering overall energy consumption. Simulations are conducted using the ns-2 simulator. The proposed protocol is simulated using wireless nodes and IoT devices and compared with existing Position-based protocols, LAR and EELAR. The experimental results demonstrate that the ERP protocol significantly reduces total energy consumption, routing overhead, and transmission delay, while also extending the lifetime of devices. The outcomes of the simulation confirm The improved functionality of the suggested protocol in MANET-IoT systems.
APA, Harvard, Vancouver, ISO, and other styles
12

Ragnar, Mikael Halldórsson, Dushku Edlira, and Dragoni Nicola. "ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services." IEEE ACCESS Volume 9 (October 25, 2021): 144880–94. https://doi.org/10.1109/ACCESS.2021.3122391.

Full text
Abstract:
Remote attestation (RA) is a security mechanism that verifies the trustworthiness of remote IoT devices. Traditional RA protocols aim to detect the presence of malicious code in the static memory of a device. In the IoT domain, RA research is currently following two main directions: Dynamic RA and Swarm RA. Dynamic RA schemes intend to detect runtime attacks that hijack the control-flow execution of a running program without injecting new malicious code into the memory. On the other hand, swarm RA protocols focus on attesting efficiently and effectively a large number of IoT devices. However, existing RA protocols do not perform dynamic attestation in asynchronous IoT networks. This paper proposes a RA protocol for Asynchronous Remote Control-Flow Attestation of Distributed IoT Services (ARCADIS). This protocol extends the state-of-the-art by detecting IoT devices that have (directly or indirectly) been maliciously influenced by runtime attacks on asynchronous distributed IoT services. The protocol has been simulated for Wismote sensors in the Contiki emulator. The conducted experiments confirm the feasibility of ARCADIS and demonstrate its practicality for small IoT networks.
APA, Harvard, Vancouver, ISO, and other styles
13

Lee, JoonYoung, SungJin Yu, KiSung Park, YoHan Park, and YoungHo Park. "Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments." Sensors 19, no. 10 (2019): 2358. http://dx.doi.org/10.3390/s19102358.

Full text
Abstract:
Internet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT environments are provided through wireless networks to legal users. However, the wireless network is an open channel, which is insecure to attacks from adversaries such as replay attacks, impersonation attacks, and invasions of privacy. To provide secure IoT services to users, mutual authentication protocols have attracted much attention as consequential security issues, and numerous protocols have been studied. In 2017, Bae et al. presented a smartcard-based two-factor authentication protocol for multi-gateway IoT environments. However, we point out that Bae et al.’s protocol is vulnerable to user impersonation attacks, gateway spoofing attacks, and session key disclosure, and cannot provide a mutual authentication. In addition, we propose a three-factor mutual authentication protocol for multi-gateway IoT environments to resolve these security weaknesses. Then, we use Burrows–Abadi–Needham (BAN) logic to prove that the proposed protocol achieves secure mutual authentication, and we use the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to analyze a formal security verification. In conclusion, our proposed protocol is secure and applicable in multi-gateway IoT environments.
APA, Harvard, Vancouver, ISO, and other styles
14

Oniga, Bogdan, Leon Denis, Vasile Dadarlat, and Adrian Munteanu. "Message-Based Communication for Heterogeneous Internet of Things Systems." Sensors 20, no. 3 (2020): 861. http://dx.doi.org/10.3390/s20030861.

Full text
Abstract:
The Internet of Things (IoT) domain presents a wide spectrum of technologies for building IoT applications. The requirements are varying from one application to another granting uniqueness to each IoT system. Each application demands custom implementations to achieve efficient, secure and cost-effective environments. They pose a set of properties that cannot be addressed by a single-based protocol IoT network. Such properties are achievable by designing a heterogeneous IoT system, which integrates diverse IoT protocols and provides a network management solution to efficiently manage the system components. This paper proposes an IoT message-based communication model applied atop the IoT protocols in order to achieve functional scalability and network management transparency agnostic to the employed communication protocol. The paper evaluates the proposed communication model and proves its functional scalability in a heterogeneous IoT system. The experimental assessment compares the payload size of the proposed system with respect to the LwM2M standard, a protocol designed specifically for IoT applications. In addition, the paper discusses the energy consumption introduced by the proposed model as well as the options available to reduce such impact.
APA, Harvard, Vancouver, ISO, and other styles
15

Kim, Taehun, Deokkyu Kwon, Yohan Park, and Youngho Park. "Blockchain-Based Secure Authentication Protocol for Fog-Enabled IoT Environments." Mathematics 13, no. 13 (2025): 2142. https://doi.org/10.3390/math13132142.

Full text
Abstract:
Fog computing technology grants computing and storage resources to nearby IoT devices, enabling a fast response and ensuring data locality. Thus, fog-enabled IoT environments provide real-time and convenient services to users in healthcare, agriculture, and road traffic monitoring. However, messages are exchanged on public channels, which can be targeted to various security attacks. Hence, secure authentication protocols are critical for reliable fog-enabled IoT services. In 2024, Harbi et al. proposed a remote user authentication protocol for fog-enabled IoT environments. They claimed that their protocol can resist various security attacks and ensure session key secrecy. Unfortunately, we have identified several vulnerabilities in their protocol, including to insider, denial of service (DoS), and stolen verifier attacks. We also prove that their protocol does not ensure user untraceability and that it has an authentication problem. To address the security problems of their protocol, we propose a security-enhanced blockchain-based secure authentication protocol for fog-enabled IoT environments. We demonstrate the security robustness of the proposed protocol via informal and formal analyses, including Burrows–Abadi–Needham (BAN) logic, the Real-or-Random (RoR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. Moreover, we compare the proposed protocol with related protocols to demonstrate the excellence of the proposed protocol in terms of efficiency and security. Finally, we conduct simulations using NS-3 to verify its real-world applicability.
APA, Harvard, Vancouver, ISO, and other styles
16

Ren, Jie, and Lijuan Liu. "A Study on Information Classification and Storage in Cloud Computing Data Centers Based on Group Collaborative Intelligent Clustering." Journal of Electrical and Computer Engineering 2022 (March 25, 2022): 1–11. http://dx.doi.org/10.1155/2022/1476661.

Full text
Abstract:
Internet of things (IoT) and cloud computing are combined to form a cloud computing data center, and cloud computing provides virtualization, storage, computing, and other support services for IoT applications. Data is the foundation and core of cloud IoT platform applications, and massive multisource heterogeneous IoT data aggregation and storage have basic requirements such as real-time, security, and scalability. This paper focuses on the aggregation and storage methods of massive heterogeneous cloud IoT data, solving the multisource data aggregation problem caused by inconsistent protocols and the heterogeneous data storage problem caused by inconsistent data types. A heterogeneous network protocol adaptation and data aggregation method is proposed for the multisource data aggregation problem caused by protocol inconsistency. A protocol adaptation layer is set up in the IoT virtual gateway to achieve compatibility with multiple types of data aggregation protocols, ensuring adaptive access to different types of IoT nodes, and on this basis, data is transmitted to the cloud IoT platform through a unified interface, shielding the variability of IoT sensing devices. Given the problems of device forgery and malicious tampering in the data aggregation process, we propose a fast authentication and data storage method for IoT devices based on “API key” and implant the device authentication API key into the protocol adaptation layer of the virtual gateway to realize the source authentication of IoT nodes and ensure the authenticity of data.
APA, Harvard, Vancouver, ISO, and other styles
17

Sun, Da-Zhi, Yi-Na Gao, and Yangguang Tian. "On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices." Sensors 23, no. 14 (2023): 6559. http://dx.doi.org/10.3390/s23146559.

Full text
Abstract:
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into a standalone protocol. In this paper, we therefore examine the security of the PUF protocol under the assumption of an insider attack. Our cryptanalysis findings are the following. (1) A legitimate but malicious IoT node can monitor the secure communication among the server and any other IoT nodes in both N2N authentication and N2S authentication. (2) A legitimate but malicious IoT node is able to impersonate a target IoT node to cheat the server and any other IoT nodes in N2N authentication and the server in N2S authentication, respectively. (3) A legitimate but malicious IoT node can masquerade as the server to cheat any other target IoT nodes in both N2N authentication and N2S authentication. To the best of our knowledge, our work gives the first non-trivial concrete security analysis for the PUF protocol. In addition, we employ the automatic verification tool of security protocols, i.e., Scyther, to confirm the weaknesses found in the PUF protocol. We finally consider how to prevent weaknesses in the PUF protocol.
APA, Harvard, Vancouver, ISO, and other styles
18

Kadhim, Abdulkareem A., and Sarah A. Rafea. "IMPROVED ROUTING PROTOCOLS BASED ON RPL FOR FULL IOT-WSN STACK." Iraqi Journal of Information and Communications Technology 1, no. 1 (2021): 58–69. http://dx.doi.org/10.31987/ijict.1.1.172.

Full text
Abstract:
The Internet Engineering Task Force (IETF) standardized several protocols such as Constraint Application Protocol (CoAP) to run over WSN-IoT constrained devices. IPv6 is used to transmit packets over IEEE802.15.4 radio link called 6LoWPAN. The routing protocol for low power and lossy (RPL) network enable connectivity of WSN over IoT. Nodes in RPL optimized its path using objective function (OF), which depends on different node/link metrics. In this paper, the performance of IoT-WSN stack consisting of CoAP, 6LoWPAN and two proposed protocols based on RPL are evaluated. The two proposed protocols depend on a new OF based on link reliability and energy metric. The first is a modification of recently introduced protocol called Energy Threshold RPL (ETRPL) protocol. ETRPL uses the remaining energy of the preferred parent node as a metric. The other protocol used a new metric that combines energy consumption with ETX for all paths to the root called EERPL. The protocols are tested with full IoT-WSN stack and implemented using Cooja simulator. The results showed that ETRPL and EERPL performed better than standard RPL in terms of the energy consumption, average time delay, packet reception ratio, throughput and the number of dead nodes.
APA, Harvard, Vancouver, ISO, and other styles
19

Kadhim, Dheyaa Jasim, and Omar Abdulsattar Hamad. "Improving IoT Applications Using a Proposed Routing Protocol." Journal of Engineering 20, no. 11 (2023): 50–62. http://dx.doi.org/10.31026/j.eng.2014.11.04.

Full text
Abstract:
The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and improving the routing protocol to support them makes it more suitable for IoT systems.The proposed routing protocol is simulated using Castalia-3.2 and all the cases are examined to show the enhancement that achieved by each case. The proposed routing protocol shows better performance than other protocols do regarding Packet Delivery Ratio (PDR) and latency. It preserves network reliability since it does not generate routing or data packets needlessly. Routing protocol with added features (actuating and mobility) shows good performance. But that performance is affected by increasing the speed of mobile nodes.
APA, Harvard, Vancouver, ISO, and other styles
20

Oh, Soo-Yeon, Yong-Joon Lee, and Sung-Ho Hwang. "Design and Implementation of IoT Gateway with MQTT and IEC 61850 MMS Protocol." International Journal of Membrane Science and Technology 10, no. 1 (2023): 64–71. http://dx.doi.org/10.15379/ijmst.v10i1.1430.

Full text
Abstract:
With microgrids deployed in multiple areas, communication technologies that control devices and collect data play an important role. Microgrid environments are similar to the internet of things (IoT) environment, where multiple devices exchange information. Recent studies have attempted to utilize IoT protocols as communication protocols for microgrids. Studies have also begun on interworking IoT protocols with IEC 61850, an existing protocol for power utility. In this study, we designed an IoT gateway that maps message queuing telemetry transport (MQTT), an IoT protocol, to the IEC 61850 data model. We built a testbed and performed a verification using TShark to verify that MQTT and IEC 61850 MMS traffic are properly generated and mapped by the IoT gateway. We also used IEEE 1588 to perform time synchronization between Raspberry Pi units, which are IoT devices. Performance analysis was conducted by measuring the mean transfer time of the MQTT and IEC 61850 MMS traffic for various Ethernet speeds and Wi-Fi protocols.
APA, Harvard, Vancouver, ISO, and other styles
21

Bhowmik, Ronok, and Md Hasnat Riaz. "An extended review of the application layer messaging protocol of the internet of things." Bulletin of Electrical Engineering and Informatics 12, no. 5 (2023): 3124–33. http://dx.doi.org/10.11591/eei.v12i5.5236.

Full text
Abstract:
In the internet of things (IoT), there are resource-constrained and immense heterogeneous electronic gadgets worldwide. Till now, no single IoT application layer messaging protocol is the best, nor is anyone axiomatic for every requirement. This paper exhaustively summarizes information on the messaging protocols from the available previous research sources online. Our goal is to encapsulate a simple guideline so that users can choose an optimal messaging protocol quickly according to development requirements and specifications. For this purpose, we have reviewed the literature on six enabling and evolving application layer messaging protocols used for IoT systems namely, message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), the constrained application protocol (CoAP), extensible messaging and presence protocol (XMPP), data distribution service (DDS), and simple text-oriented messaging protocol (STOMP) in terms of some interrelated metrics. Additionally, we represented a critical analysis of the application layer messaging protocols. This study will be helpful to readers with valuable insights and guide research scholars and developers in choosing optimal application layer messaging protocols based on development specifications and requirements.
APA, Harvard, Vancouver, ISO, and other styles
22

Sana, Touhami, and Belghachi Mohamed. "A novel secure and energy aware LOADng routing protocol for IoT: an application to smart agriculture." Indonesian Journal of Electrical Engineering and Computer Science 37, no. 2 (2025): 1005. http://dx.doi.org/10.11591/ijeecs.v37.i2.pp1005-1013.

Full text
Abstract:
<span>In the burgeoning domain of the internet of things (IoT), efficient and secure communication protocols are crucial for the seamless operation of diverse applications. This paper proposes a novel routing protocol, termed secure and energy aware LOADng (SEA-LOADng), tailored for IoT deployments in the context of smart agriculture. The protocol is designed to address the unique challenges posed by agricultural environments, including limited energy resources and the need for robust security measures. The proposed protocol leverages LOADng, a lightweight and efficient routing protocol suitable for low-power and lossy networks characteristic of IoT deployments. Through innovative energy-aware mechanisms, it optimizes the power usage of IoT devices, thus prolonging their operational lifespan and reducing maintenance overhead. Moreover, stringent security measures are integrated into the protocol to safeguard sensitive data transmitted within the IoT network. To assess the efficacy of the proposed protocol, comprehensive simulations are carried out using realistic smart agriculture scenarios. The results demonstrate significant improvements in energy efficiency compared to LOADng protocol, while maintaining robust security against hello flood attack.</span>
APA, Harvard, Vancouver, ISO, and other styles
23

Touhami, Sana Belghachi Mohamed. "A novel secure and energy aware LOADng routing protocol for IoT: an application to smart agriculture." Indonesian Journal of Electrical Engineering and Computer Science 37, no. 2 (2025): 1005–13. https://doi.org/10.11591/ijeecs.v37.i2.pp1005-1013.

Full text
Abstract:
In the burgeoning domain of the internet of things (IoT), efficient and secure communication protocols are crucial for the seamless operation of diverse applications. This paper proposes a novel routing protocol, termed secure and energy aware LOADng (SEA-LOADng), tailored for IoT deployments in the context of smart agriculture. The protocol is designed to address the unique challenges posed by agricultural environments, including limited energy resources and the need for robust security measures. The proposed protocol leverages LOADng, a lightweight and efficient routing protocol suitable for low-power and lossy networks characteristic of IoT deployments. Through innovative energy-aware mechanisms, it optimizes the power usage of IoT devices, thus prolonging their operational lifespan and reducing maintenance overhead. Moreover, stringent security measures are integrated into the protocol to safeguard sensitive data transmitted within the IoT network. To assess the efficacy of the proposed protocol, comprehensive simulations are carried out using realistic smart agriculture scenarios. The results demonstrate significant improvements in energy efficiency compared to LOADng protocol, while maintaining robust security against hello flood attack.
APA, Harvard, Vancouver, ISO, and other styles
24

HERIANSYAH, HERIANSYAH, AHMAD REYNALDI NOPRIANSYAH, and SWADEXI ISTIQPHARA. "Evaluasi Kinerja Testbed Routing Protocol berbasis NodeMCU ESP8266 pada Perangkat IoT." MIND Journal 5, no. 2 (2021): 135–48. http://dx.doi.org/10.26760/mindjournal.v5i2.135-148.

Full text
Abstract:
AbstrakJaringan Ad hoc pada perangkat Internet of Things (IoT) mempunyai sifat yang yang dinamis dengan node pada jaringan yang berperan sebagai router dan bergerak bebas secara random tanpa bantuan infrasturktur komunikasi sehingga topologi berubah sangat cepat seiring dengan perubahan posisi. Perubahan ini sangat mempengaruhi kualitas layanan pada perangkat IoT itu sendiri. Penelitian ini bertujuan untuk mengevaluasi protocol routing yang sudah ada dengan cara mengimplementasikan routing protocol tersebut di perangkat testbed berbasis NodeMCU ESP8266. Hal ini bertujuan untuk memilih protocol routing yang paling optimal sebelum proses implementasi dilaksanakan. Pengujian ini berlaku untuk routing protocol yang sudah ada maupun yang baru. Kinerja protocol jaringan diukur melalui nilai Quality of Service (QoS) ditempatkan pada scenario berbeda yang terdiri dari throughput, delay, jitter, dan packet delivery ratio sesuai dengan perbedaan beban jaringan, mobilitas, dan ukuran jaringan. Hasil penelitian ini menunjukkan bahwa testbed yang dibangun berhasil mensimulasikan routing protocol yang ada untuk menghasilkan QoS yang baik pada perangkat IoT.Kata kunci: IoT, routing protocol, testbed, QoS.AbstractAd hoc networks on Internet of Things (IoT) devices have dynamic characteristics where the nodes on this network can operate as routers and move freely randomly without using any communication infrastructure so that the topology changes very quickly along with changes in position. This adjustment has a significant impact on the IoT device's service quality. This study aims to evaluate the existing routing protocols by implementing the routing protocol in a testbed based on NodeMCU ESP8266. It aims to choose the most optimal routing protocol before the implementation process is carried out. This test applies to both existing and new routing protocols. Network protocol performance is measured by the Quality of Service (QoS) value which includes throughput, delay, jitter, and packet delivery ratio in different scenarios based on network load, mobility, and different network sizes. The results show that this study was successful in simulating routing protocol in order to provide good QoS on IoT devices.Keywords: IoT, routing protocol, testbed, QoS.
APA, Harvard, Vancouver, ISO, and other styles
25

Tian, Yuan, Nanyijia Zhang, and Jian Li. "Two Novel Semi-Quantum Secure Direct Communication Protocols in IoT." Sensors 24, no. 24 (2024): 7990. https://doi.org/10.3390/s24247990.

Full text
Abstract:
As Internet of Things (IoT) technology continues to advance, there is a growing awareness of IoT security within the industry. Quantum communication technology can potentially significantly improve the communication security of IoT devices. Based on semi-quantum cryptography and utilizing single photons, this paper introduces two semi-quantum secure direct communication (SQSDC) protocols for use in smart door locks. Protocol 1 is more efficient, and the efficiency analysis shows that the communication efficiency is as high as 28.57%. Security analysis demonstrates the asymptotic security of the protocols, effectively resisting intercept–measure–resend attacks and entangle–measure attacks from potential eavesdroppers. The extended SQSDC protocol (protocol 2) builds upon protocol 1 by enabling a single qubit to transmit two bits of information, resulting in a double efficiency outcome.
APA, Harvard, Vancouver, ISO, and other styles
26

Jiang, Lili, and Hui Cui. "Private and Mutual Authentication Protocols for Internet of Things." Mathematics 11, no. 8 (2023): 1929. http://dx.doi.org/10.3390/math11081929.

Full text
Abstract:
The Internet of Things (IoT) consists of a range of devices that communicate with other devices that are surrounding them. Secure communications between IoT devices have been an essential requirement. However, most existing authentication protocols fail to provide privacy protection for devices such that sensitive information including device owner’s identity and device type can be leaked. In this paper, based on attribute-based encryption (ABE), we propose two private and mutual authentication protocols to protect the privacy of IoT devices. The first protocol is a three-message key exchange protocol, following the public-key encryption mode of the Internet Key Exchange (IKE). The second protocol is a one-round key exchange protocol, thereby providing simplicity and efficiency of messages communicated between the participants. Both of our protocols can be proved secure in the defined model. Finally, we implement the two protocols in an open source framework.
APA, Harvard, Vancouver, ISO, and other styles
27

Kang, Baoyuan, Yanbao Han, Kun Qian, and Jianqi Du. "Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment." Mathematical Problems in Engineering 2020 (June 23, 2020): 1–6. http://dx.doi.org/10.1155/2020/1970798.

Full text
Abstract:
Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.’s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.’s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterfeit. To overcome the shortcomings of Amin et al.’s protocol, we propose an improved protocol. In the registration phase of the improved protocol, the pseudoidentity and real identity of a user or a cloud server are bundled up with the control server’s secret numbers. This measure can effectively prevent impersonation attack. We also compare the improved protocol with several existing authentication protocols in security and computational efficiency.
APA, Harvard, Vancouver, ISO, and other styles
28

Shykhmat, A., and V. Veres. "SELECTION OF PROTOCOLS FOR DATA TRANSMISSION FROM INTERNET OF THINGS DEVICES TO CLOUD PROVIDERS." Computer systems and network 5, no. 1 (2023): 149–59. http://dx.doi.org/10.23939/csn2023.01.149.

Full text
Abstract:
The Internet of Things (IoT) enables the creation of networks between devices, people, applications, and the Internet, creating new ecosystems with higher productivity, better energy efficiency, and higher profitability. Nodes in these networks must have the ability to communicate and exchange data, which requires the use of data transfer protocols. However, choosing the right protocol for a specific use case is not always straightforward. This paper provides an overview of two existing data transfer protocols, MQTT and HTTP, compares the amount of tariffed traffic generated by each protocol, and evaluates the efficiency of protocol costs. The research showed that in comparison to AWS IoT Core, GCP IoT Core is more expensive for all evaluated scenarios and is not recommended for use. For scenarios with frequent data transfer, the best solution is to use the MQTT bridge provided by AWS IoT Core. If the number of connected devices exceeds 10 million with a high frequency of data transmission every 1 minute, it is advisable to consider using a standalone MQTT broker or another TCP-based protocol such as CoAP. In the case of less frequent data transmission (every 10 minutes or less), an HTTP bridge may be a solution for up to 100 million devices. As a result of the research, a decision tree was created to select the best protocol for specific use cases. Keywords - IoT, data transfer protocols, HTTP, MQTT, AWS, GCP, IoT Core
APA, Harvard, Vancouver, ISO, and other styles
29

Al Ahmed, Mahmoud Tayseer, Fazirulhisyam Hashim, Shaiful Jahari Hashim, and Azizol Abdullah. "Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks." Electronics 12, no. 4 (2023): 867. http://dx.doi.org/10.3390/electronics12040867.

Full text
Abstract:
Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the authentication of the devices in the network. The current security model in IoT networks uses centralized key exchange servers that present a security weak point. IoT networks need decentralized management for network security. Blockchain, with its decentralized model of authentication, can provide a solution for decentralized authentication in IoT networks. However, blockchain authentication models are known to be computationally demanding because they require complex mathematical calculations. In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger. The proposed protocol arranges the nodes in clusters and creates an authentication blockchain for each cluster. These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. The proposed protocol security performance is analyzed using cryptographic protocols verifier software and tested. Additionally, a test bed consisting of a Raspberry Pi network is presented to analyze the performance of the proposed protocol.
APA, Harvard, Vancouver, ISO, and other styles
30

Mohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.

Full text
Abstract:
The Internet of Things (IoT) has expanded access to information technology by combining both digital and physical fields as an emerging technology. IoT will increasingly overshadow human life as it becomes more pervasive. IoT will be applied to important areas of the national economy, such as health care and medical care, and smart transportation. Hence, data security in IoT must be met with highlights such as distinguishing proof, unwavering quality, integration, and verifiable, and so on. Security within the field of IoT is more vital in terms of openness and reliance. Security is an critical issue for IoT applications and proceeds to confront major challenges. This think about pointed to supply a convention to extend IoT-based security. The method proposed in this paper is to show modern conveyance engineering to extend IoT security. This unused design is based on a blockchain and can be actualized as a dispersed design in all layers of IoT. The findings of recreations and usage in genuine IoT scenarios appear that the execution of the proposed security conventions can be proficient and viable within the productivity and adequacy of distinctive levels of security and IoT accessibility.
APA, Harvard, Vancouver, ISO, and other styles
31

Tightiz, Lilia, and Hyosik Yang. "A Comprehensive Review on IoT Protocols’ Features in Smart Grid Communication." Energies 13, no. 11 (2020): 2762. http://dx.doi.org/10.3390/en13112762.

Full text
Abstract:
Since the smart grid deals with a large mass of data and critical missions, it requires ubiquitous, reliable, and real-time communication. The Internet of Things (IoT) technology, which has the potential of connecting all objects over the globe through the Internet, excels in providing robust information transmission infrastructure in the smart grid. There are a multitude of possible protocols, standards, and configurations for communication in the smart grid. A commonly applied communication standard IEC 61850 recommends the use of Manufacturing Message Specification (MMS) protocol for communication in Local Area Network (LAN) and eXtensible Messaging and Presence Protocol (XMPP) in Wide Area Network (WAN). However, a plethora of research on this topic compares the behavior of other IoT protocols and standard recommendations in the smart grid. On the other hand, the sky-rocketing penetration of Renewable Energy Sources (RES), especially in the form of micro grid, transformed the central control structure of the smart grid into a distributed style called Multi-Agent Systems (MAS). This new approach defined new communication requirements and more particular IoT protocol characteristic requirements. However, a limited number of the existing studies have considered IoT protocol characteristic requirements of the smart grid and its new control structures. In this paper, we initially investigate the communication requirements of the smart grid and introduce all IoT protocols and their specifications. We analyze IoT protocol characteristics and performances in the smart grid through literature review based on the smart grid communication requirements. In this approach, we highlight weak points of these practices making them fail to acquire the holistic guidelines in utilizing proper IoT protocol that can meet the smart grid environment interaction requirements. Using the existing facilities, the public Internet, we follow the arrangement of cost-effective high penetration communication requirements for new structures of the smart grid, i.e., the MAS and multi-micro grid. In this case, we consider IoT protocol Quality of Services (QoS) requirements, especially in the case of security and reliability, to satisfy stakeholders, namely utilities and prosumers. Addressing effective elements in applying IoT in the smart grid’s future trends is another contribution to this paper.
APA, Harvard, Vancouver, ISO, and other styles
32

Singh, Kamred Udham. "Design Of Energy Efficient and Secure Routing Protocol for Wsn in Iot." Mathematical Statistician and Engineering Applications 70, no. 2 (2021): 1434–41. http://dx.doi.org/10.17762/msea.v70i2.2336.

Full text
Abstract:

 
 
 
 Abstract
 This paper proposes an energy-efficient and secure routing system for wireless sensor networks (WSNs) in the Internet of Things (IoT). The proposed routing protocol improves packet delivery ratio, end-to-end latency, and network lifetime over existing protocols. The protocol under consideration reduces node energy consumption, increasing the network's lifetime, while ensuring data security. Simulation studies using several metrics evaluate the proposed procedure. The recommended protocol outperforms existing protocols in energy efficiency and security. The protocol under discussion has several IoT applications, including smart agriculture, healthcare monitoring, and environmental monitoring. It ensures reliable and secure data transfer. This paper introduces a novel routing system that addresses energy saving and security in wireless sensor networks and the Internet of Things (IoT).
 
 
 
APA, Harvard, Vancouver, ISO, and other styles
33

Shende, Dipali K., Sonavane S.S, and Yogesh Angal. "A Comprehensive Survey of the Routing Schemes for IoT applications." Scalable Computing: Practice and Experience 21, no. 2 (2020): 203–16. http://dx.doi.org/10.12694/scpe.v21i2.1667.

Full text
Abstract:
Internet of Things (IoT) is with a perception of ‘anything’, ‘anywhere’ and provides the interconnection among devices with a remarkable scale and speed. The prevalent intention of IoT is the datatransmission through the internet without the mediation of humans. An efficient routing protocol must be included in the IoT network for the accomplishment of its objectives and securing data transmission. Accordingly, the survey presents various routing protocols for secure data communication in IoT for providing a clear vision as the major issue in the IoT networks is energy consumption. Therefore, there is a need for devising an effective routing scheme to provide superior performance over the other existing schemes in terms of energy consumption. Thus, this review article provides a detailed review of 52 research papers presenting the suggested routing protocols based on the contentbased, clustering-based, fuzzy-based, Routing Protocol for Low power and Lossy Networks, tree-based and so on. Also, a detailed analysis and discussion are made by concerning the parameters, simulation tool, and year of publication, network size, evaluation metrics, and utilized protocols. Finally, the research gaps and issues of various conventional routing protocols are presented for extending the researchers towards a better contribution of routing protocol for the secure IoT routing.
APA, Harvard, Vancouver, ISO, and other styles
34

Ahmad, Farooq, Muhammad Tayyab Chaudhry, Muhammad Hasan Jamal, et al. "Formal modeling and analysis of security schemes of RPL protocol using colored Petri nets." PLOS ONE 18, no. 8 (2023): e0285700. http://dx.doi.org/10.1371/journal.pone.0285700.

Full text
Abstract:
In the Internet of things (IoT), data packets are accumulated and disseminated across IoT devices without human intervention, therefore the privacy and security of sensitive data during transmission are crucial. For this purpose, multiple routing techniques exist to ensure security and privacy in IoT Systems. One such technique is the routing protocol for low power and lossy networks (RPL) which is an IPv6 protocol commonly used for routing in IoT systems. Formal modeling of an IoT system can validate the reliability, accuracy, and consistency of the system. This paper presents the formal modeling of RPL protocol and the analysis of its security schemes using colored Petri nets that applies formal validation and verification for both the secure and non-secure modes of RPL protocol. The proposed approach can also be useful for formal modeling-based verification of the security of the other communication protocols.
APA, Harvard, Vancouver, ISO, and other styles
35

Islam, Mahbubul, Hossain Jamil, Samiul Pranto, Rupak Das, Al Amin, and Arshia Khan. "Future Industrial Applications: Exploring LPWAN-Driven IoT Protocols." Sensors 24, no. 8 (2024): 2509. http://dx.doi.org/10.3390/s24082509.

Full text
Abstract:
The Internet of Things (IoT) will bring about the next industrial revolution in Industry 4.0. The communication aspect of IoT devices is one of the most critical factors in choosing the device that is suitable for use. Thus far, the IoT physical layer communication challenges have been met with various communications protocols that provide varying strengths and weaknesses. This paper summarizes the network architectures of some of the most popular IoT wireless communications protocols. It also presents a comparative analysis of some of the critical features, including power consumption, coverage, data rate, security, cost, and quality of service (QoS). This comparative study shows that low-power wide area network (LPWAN)-based IoT protocols (LoRa, Sigfox, NB-IoT, LTE-M) are more suitable for future industrial applications because of their energy efficiency, high coverage, and cost efficiency. In addition, the study also presents an Industrial Internet of Things (IIoT) application perspective on the suitability of LPWAN protocols in a particular scenario and addresses some open issues that need to be researched. Thus, this study can assist in deciding the most suitable IoT communication protocol for an industrial and production field.
APA, Harvard, Vancouver, ISO, and other styles
36

Mamlook, Rustom, Omer F. Khan, and Thabit Sultan Mohammed. "Bridging for cross protocol talk in IOT devices using windows communication foundation." International Journal of Engineering & Technology 7, no. 3.29 (2018): 196. http://dx.doi.org/10.14419/ijet.v7i3.29.18794.

Full text
Abstract:
In the Internet of Things (IoT), multiple communication protocols are used to connect the smart device. Wi-Fi, Xbee, ZigBee, Bluetooth, and LoRaWAN are some of the communication channels utilized for connectivity by devices using some IoT platform.In order to enable the development of smart services for IoT platforms, there are solutions by different vendors to connect between IoT devices. For example, multiple IoT platforms are available in the market namely IoTivity platform developed by Open Connectivity Foundation (OCF), AllJoyn platform from All Seen Alliance, Weave made by Google, and Home Kit by Apple. In view of such segmentation of IoT platforms, IoT Application’s development has been made complex, where IoT device and accompanying application compatibility with available platforms requires support for multiple protocols.To simplify the complexity introduced by multiple platforms, M2M [4] International standard was already proposed as the bridge for integrating IoT protocols. In our paper, we implement a proxy web service using Windows Communication Foundation (WCF) as a way to translate communication in one IoT protocol to another. In our implementation of middleware, we allowed the MQTT broker to accept messages, which were passed, to the Web Service from various devices over Hyper Text Protocol’s POST or GET Commands. Bridging between WCF Web Service and MQTT broker was enabled with duplex communication. Hence, devices supporting either HTTP protocol or MQTT protocol were able to communicate transparently.
APA, Harvard, Vancouver, ISO, and other styles
37

Mao, Yuxin, Chenqian Zhou, Yun Ling, and Jaime Lloret. "An Optimized Probabilistic Delay Tolerant Network (DTN) Routing Protocol Based on Scheduling Mechanism for Internet of Things (IoT)." Sensors 19, no. 2 (2019): 243. http://dx.doi.org/10.3390/s19020243.

Full text
Abstract:
Many applications of Internet of Things (IoT) have been implemented based on unreliable wireless or mobile networks like the delay tolerant network (DTN). Therefore, it is an important issue for IoT applications to achieve efficient data transmission in DTN. In order to improve delivery rate and optimize delivery delay with low overhead in DTN for IoT applications, we propose a new routing protocol, called Scheduling-Probabilistic Routing Protocol using History of Encounters and Transitivity (PROPHET). In this protocol, we calculate the delivery predictability according to the encountering frequency among nodes. Two scheduling mechanisms are proposed to extend the traditional PROPHET protocol and improve performance in both storage and transmission in DTN. In order to evaluate the proposed routing protocol, we perform simulations and compare it with other routing protocols in an Opportunistic Network Environment (ONE) simulator. The results demonstrate that the proposed Scheduling-PROPHET can achieve better performances in several key aspects compared with the existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
38

Radwan, S. Abujassar. "Developing QoS by Priority Routing for Real Time Data in Internet of Things (IoT) Urban Scenarios." International Journal of Computer Networks & Communications (IJCNC) 11, no. 6 (2019): 45–61. https://doi.org/10.5281/zenodo.3587385.

Full text
Abstract:
In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees the wide range offered by the quality of services. In this paper, we will introduce a smart pathway that can be bridge the gap between IoT services with its real data traffic. Therefore, we enhanced the MANET routing protocol for computing two or more paths to pass the more that one high priority real traffic data via these paths to improve the gloomy picture of this protocol in the context of IoT. In particular, the good services with high timely delivery of urgent data such as real time data environmental monitoring. After surveying the published and available protocol interoperability given for urban sensing. In this research, we have proposed a novel solution to integrate MANET overlays, and collaboratively formed over MANET, to boost urban data in IoT. Overlays are used to dynamic differentiate and fasten the delivery of high priority real application time data over low-latency MANET paths by integrating with the original specifications. Our experimental results showed the effectiveness on the network such as the overhead and network congestion. In addition, the initial results of the light-weight improved the routing protocol over the baseline protocols in terms of the delay of reciveing the packets between nodes which lead to increase the throughput by reducing loss packets.
APA, Harvard, Vancouver, ISO, and other styles
39

Liu, Bai, Xiangyi Zhang, Runhua Shi, Mingwu Zhang, and Guoxing Zhang. "SEPSI: A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT." Mathematics 10, no. 12 (2022): 2120. http://dx.doi.org/10.3390/math10122120.

Full text
Abstract:
The rapid development of the Internet of Things (IoT), big data and artificial intelligence (AI) technology has brought extensive IoT services to entities. However, most IoT services carry the risk of leaking privacy. Privacy-preserving set intersection in IoT is used for a wide range of basic services, and its privacy protection issues have received widespread attention. The traditional candidate protocols to solve the privacy-preserving set intersection are classical encryption protocols based on computational difficulty. With the emergence of quantum computing, some advanced quantum algorithms may undermine the security and reliability of traditional protocols. Therefore, it is important to design more secure privacy-preserving set intersection protocols. In addition, identity information is also very important compared to data security. To this end, we propose a quantum privacy-preserving set intersection protocol for IoT scenarios, which has higher security and linear communication efficiency. This protocol can protect identity anonymity while protecting private data.
APA, Harvard, Vancouver, ISO, and other styles
40

Husnain, Muhammad, Khizar Hayat, Enrico Cambiaso, et al. "Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System." Sensors 22, no. 2 (2022): 567. http://dx.doi.org/10.3390/s22020567.

Full text
Abstract:
The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although MQTT servers/brokers are considered the main component of all MQTT-based IoT applications, their openness makes them vulnerable to potential cyber-attacks such as DoS, DDoS, or buffer overflow. As a result of this, an efficient intrusion detection system for MQTT-based applications is still a missing piece of the IoT security context. Unfortunately, existing IDSs do not provide IoT communication protocol support such as MQTT or CoAP to validate crafted or malformed packets for protecting the protocol implementation vulnerabilities of IoT devices. In this paper, we have designed and developed an MQTT parsing engine that can be integrated with network-based IDS as an initial layer for extensive checking against IoT protocol vulnerabilities and improper usage through a rigorous validation of packet fields during the packet-parsing stage. In addition, we evaluate the performance of the proposed solution across different reported vulnerabilities. The experimental results demonstrate the effectiveness of the proposed solution for detecting and preventing the exploitation of vulnerabilities on IoT protocols.
APA, Harvard, Vancouver, ISO, and other styles
41

Surya, P., Asuman Suenbuel, and Arockia Selvakumar Arockia Doss. "Industrial Internet of Things - Control of Industry Simulation Through Different Protocols." Journal of Physics: Conference Series 2115, no. 1 (2021): 012011. http://dx.doi.org/10.1088/1742-6596/2115/1/012011.

Full text
Abstract:
Abstract In past few years there is a great demand for internet of things (IoT), It has become an important part of smart technologies. There have been many researches going-on in internet of things in both academics and industries. IoT using in industries is also known as Industrial Internet of Things (IIoT). Where smart sensors are used along with IoT are used. This research work is done to identify the best protocol for high-speed data transmission with no loss of data to prevent command lag between mobile controller and industry. In this research a soda filling Industry simulation with 3 different plants was controlled through a mobile application through different protocols with 4 different features of data transfer. The time of data sending and receiving from application and ESP32 controller are stored in a log. The speed of data transfer of all different protocols is compared. From the final result, ThingSpeak is an optimum protocol for this application which is 36% faster than HTTP in single data transfer and 39% faster than MQTT in continuous data transfer.
APA, Harvard, Vancouver, ISO, and other styles
42

Wadullah Tareq, Roaa, and Turkan Ahmed Khaleel. "Implementation of MQTT Protocol in Health Care Based on IoT Systems: A Study." International journal of electrical and computer engineering systems 12, no. 4 (2021): 215–23. http://dx.doi.org/10.32985/ijeces.12.4.5.

Full text
Abstract:
Internet of things IoT systems have become one of the most promising technologies in all fields. Data transmission is one of the important aspects, and the tendency to messaging protocols is an important aspect of IoT systems. One of these most important protocols is MQTT. This protocol depends on the Publish/Subscribe model, and it is a lightweight protocol. Reliability, simplicity, quality of service levels, and being Resource-constrained make MQTT common in the IoT industry. This paper designed an IoT device that consists of the sensor MLX 90614 non-contact IR Temperature connected to a development board (Node MCU ESP8266). A person's temperature is one of the important vital signs. This system measures human temperature values and transmits the measured values to the Mosquitto broker by using the MQTT protocol in real-time. The technology used is Wi-Fi. The person or the doctor can read the patient’s temperature remotely through a program (Flutter Android Client) representing the subscriber. Also, MQTT protocol control packets of the system were analyzed using Wireshark. The three levels of QoS were used in subscriber clients to compare the throughput. The results indicate that QoS2 is more reliable and offers more throughput but more delay. The results also show that the average round trip time (RTT) of the MQTT protocol is five milliseconds which means optimal performance for IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
43

Viel, Felipe, Luis Augusto Silva, Valderi Reis Quietinho Leithardt, Juan Francisco De Paz Santana, Raimundo Celeste Ghizoni Teive, and Cesar Albenes Zeferino. "An Efficient Interface for the Integration of IoT Devices with Smart Grids." Sensors 20, no. 10 (2020): 2849. http://dx.doi.org/10.3390/s20102849.

Full text
Abstract:
The evolution of computing devices and ubiquitous computing has led to the development of the Internet of Things (IoT). Smart Grids (SGs) stand out among the many applications of IoT and comprise several embedded intelligent technologies to improve the reliability and the safety of power grids. SGs use communication protocols for information exchange, such as the Open Smart Grid Protocol (OSGP). However, OSGP does not support the integration with devices compliant with the Constrained Application Protocol (CoAP), a communication protocol used in conventional IoT systems. In this sense, this article presents an efficient software interface that provides integration between OSGP and CoAP. The results obtained demonstrate the effectiveness of the proposed solution, which presents low communication overhead and enables the integration between IoT and SG systems.
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Chien-Ming, and Shuangshuang Liu. "Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure." Security and Communication Networks 2021 (September 30, 2021): 1–13. http://dx.doi.org/10.1155/2021/6537678.

Full text
Abstract:
The Internet of Things (IoT) is a huge network formed by connecting various information sensing devices through the Internet. Although IoT has been popularized in many fields, connected devices can be used only when network security is guaranteed. Recently, Rana et al. proposed a secure and lightweight authentication protocol for the next-generation IoT infrastructure. They claim that their protocol can resist major security attacks. However, in this study, we prove that their protocol is still vulnerable to offline password guessing attacks and privilege internal attacks. In order to solve these shortcomings, we propose an improved protocol, which is proved to be secure by formal and informal analysis. In addition, after comparing the time and memory consumption with other protocols, we find that our protocol has more advantages.
APA, Harvard, Vancouver, ISO, and other styles
45

A, Mahesh Reddy, and Kameswara Rao M. "A Lightweight Symmetric Cryptography based User Authentication Protocol for IoT based Applications." Scalable Computing: Practice and Experience 25, no. 3 (2024): 1647–57. http://dx.doi.org/10.12694/scpe.v25i3.2692.

Full text
Abstract:
The utilization of IoT is expanding across various domains, including telecare, intelligent home systems, and transportation networks. In these environments, IoT devices generate data gathered on remote servers, requiring external users to authenticate themselves to access the data. However, existing authentication protocols for IoT must meet the crucial requirements of speed, security against multiple attacks, and ensuring user anonymity and un-traceability. The main objective of this work is to find lightweight symmetric cryptography-based user authentication protocol tailored for IoT-based applications, focusing on MIM (Man-in-the-Middle) attack prevention, enhanced anonymity, and secure communication between IoT nodes and remote servers via IoT gateways. Existing protocols often lack sufficient defenses against MIM attacks and do not adequately address the need for enhanced user anonymity and secure communication channels within the IoT framework. Our research has identified that authentication techniques based on pairing are susceptible to attacks targeting temporary session-specific data, impersonation, privileged insiders, and offline password guessing. Furthermore, using bilinear pairing in these techniques requires significant computational and communication resources to address the security as mentioned above concerns. A new authentication mechanism must be proposed and designed explicitly for IoT scenarios. The proposed approach exclusively utilizes hash and exclusive-or operations to ensure suitability within the IoT context; thoroughly evaluated the recommended protocol against existing authentication protocols, employing both informal and formal analytical routines like BAN logic, ROR model, and AVISPA simulation. Our findings suggest protocol not only enhances performance but also enhances security. The proposed approach is a tried-and-true strategy for improving security rules in practical Internet of Things (IoT) settings addressing the inherent challenges posed by authentication requirements in IoT environments. The accuracy 98.93%, and Node detection rate 46.57% were improved which is a better outcome.
APA, Harvard, Vancouver, ISO, and other styles
46

Ramezan, Gholamreza, and Cyril Leung. "A Blockchain-Based Contractual Routing Protocol for the Internet of Things Using Smart Contracts." Wireless Communications and Mobile Computing 2018 (November 1, 2018): 1–14. http://dx.doi.org/10.1155/2018/4029591.

Full text
Abstract:
In this paper, we propose a novel blockchain-based contractual routing (BCR) protocol for a network of untrusted IoT devices. In contrast to conventional secure routing protocols in which a central authority (CA) is required to facilitate the identification and authentication of each device, the BCR protocol operates in a distributed manner with no CA. The BCR protocol utilizes smart contracts to discover a route to a destination or data gateway within heterogeneous IoT networks. Any intermediary device can guarantee a route from a source IoT device to a destination device or gateway. We compare the performance of BCR with that of the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in a network of 14 devices. The results show that the routing overhead of the BCR protocol is 5 times lower compared to AODV at the cost of a slightly lower packet delivery ratio. BCR is fairly resistant to both Blackhole and Greyhole attacks. The results show that the BCR protocol enables distributed routing in heterogeneous IoT networks.
APA, Harvard, Vancouver, ISO, and other styles
47

Dawood, Ali. "A Robust Privacy Preserving Authentication Scheme for IOT Environment by 5G Technology." AlKadhim Journal for Computer Science 2, no. 1 (2024): 12–27. http://dx.doi.org/10.61710/kjcs.v2i1.56.

Full text
Abstract:
In recent years, secure communication between the interconnected components of the internet of things has become an important and worrying issue due to some attacks on the IoT. The Internet of Things (IOT) is the integration of things with the world of the Internet, where this integration takes place by adding devices or programs to be smart and, as a result, they will be able to communicate with one another and participate in all elements of life quite efficiently. Accordingly, we've developed an authentication protocol for the IoT ecosystem; it's primary function is to ensure the safety of data exchange between the many devices that make up the IoT. Our proposed protocol is based on the elliptic curve cipher (ECC) algorithm, which greatly aids in protecting IoT components from physical assault. Our informal protocol analysis demonstrates that our solution not only protects users' privacy by concealing their devices' identities but also thwarts impersonation, counterattacks, and tracking and suggestion attacks directed at IoT devices. Security characteristics of the proposed protocol are also explicitly examined with the help of the ( SCYTHER) program. In addition, the effectiveness of the suggested protocol is evaluated by determining both its excess costs and its communication costs. Therefore, it appears that the protocol is vastly superior than the many other equivalent protocols by assessing its performance and security.
APA, Harvard, Vancouver, ISO, and other styles
48

G. Hamid, Harth, and Zainab T. Alisa. "A survey on IoT application layer protocols." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1663. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.

Full text
Abstract:
<span>The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.</span>
APA, Harvard, Vancouver, ISO, and other styles
49

Hamid, Harth Ghassan, and Zainab T. Alisa. "Survey on IoT application layer protocols." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1663–72. https://doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.

Full text
Abstract:
The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.
APA, Harvard, Vancouver, ISO, and other styles
50

Jun, Hyun-Ji, and Hyo-Sik Yang. "Performance of the XMPP and the MQTT Protocols on IEC 61850-Based Micro Grid Communication Architecture." Energies 14, no. 16 (2021): 5024. http://dx.doi.org/10.3390/en14165024.

Full text
Abstract:
As micro grids are gradually being deployed in many areas, communication technology is becoming important for collecting data and controlling devices in micro grids. In a micro grid, various devices are distributed and perform their respective functions. These devices exchange information with each other and transmit information to the micro grid management system. This micro grid environment is similar to the IoT environment in which information is exchanged in the presence of a large number of devices. Recent studies have tried to apply various IoT protocols as a communication protocol in the micro grid. However, the data model used in current research is limited in proprietary data mapping. Recently, IEC TC 57 published another IEC 61850 series which maps the IEC 61850 services to XMPP (eXtensible Messaging Presence Protocol), which was the first IoT protocol mapping of IEC 61850. Few research has shown that the mapping of the IEC 61850 data model to the IoT protocol and communication boundary is limited in a lab environment. We developed a micro grid test-bed with an IEC 61850 data and service model, and mapped to two IoT protocols, that is, XMPP and the MQTT (Message Queuing Telemetry Transport). By combining IoT protocol with the IEC 61850 data and service model, the proposed micro grid architecture can provide interoperability with any DMS or other power utility system. Performance analysis was conducted on the test-bed by measuring various metrics, such as the response time, packet size, and packet loss, over a public network.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!