A Comparative Analysis on Resource Discovery Protocols for The Internet of Things

被引:0
|
作者
Khalil, Kasem [1 ]
Elgazzar, Khalid [1 ]
Bayoumi, Magdy [1 ]
机构
[1] Univ Louisiana Lafayette, Ctr Adv Comp Studies, Lafayette, LA 70504 USA
关键词
Internet of things; resource discovery; CoAP; UPnP; MQTT protocol;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Resources discovery is a fundamental requirement to the full realization of the vision of Internet of Things. Discovery includes resource properties, capabilities, and metadata. It enables consumers to build IoT applications and services that utilize "smart things" with no prior knowledge about these things. This paper studies three of the most commonly used discovery protocols, CoAP, MQTT, and UPnP. We compare between their performance and behavior in IoT deployments. Each protocol is implemented and deployed on a mobile phone as a client and a Raspberry Pi as a broker/server. The implementation includes a WeMo switch and a TI SensorTag as resources. The paper provides insights on the different features, behavioural attributes, and a comparative analysis between these protocols. We also present performance indexes of each protocol in terms of memory and CPU usage, latency, and traffic exchange between a publisher and a subscriber. Our analysis shows that despite the three protocols are fundamentally different and each one has pros and cons, they are all highly useful in IoT environments. However, CoAP is generally more flexible and scalable, but requires a higher memory footprint.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Internet of Things Authentication Protocols: Comparative Study
    Dargaoui, Souhayla
    Azrour, Mourade
    El Allaoui, Ahmad
    Guezzaz, Azidine
    Alabdulatif, Abdulatif
    Alnajim, Abdullah
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (01): : 65 - 91
  • [2] Resource discovery techniques in the internet of things: A review
    Khalil, Kasem
    Elgazzar, Khalid
    Seliem, Mohamed
    Bayoumi, Magdy
    INTERNET OF THINGS, 2020, 12
  • [3] Routing Protocols Analysis for Internet of Things
    Xin, Hua-Mei
    Yang, Kun
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 447 - 450
  • [4] A knowledge-based resource discovery for Internet of Things
    Perera, Charith
    Vasilakos, Athanasios V.
    KNOWLEDGE-BASED SYSTEMS, 2016, 109 : 122 - 136
  • [5] A Scalable Semantic Resource Discovery Architecture for the Internet of Things
    Mecibah, Rafik
    Djamaa, Badis
    Yachir, Ali
    Aissani, Mohamed
    ADVANCES IN COMPUTING SYSTEMS AND APPLICATIONS, 2019, 50 : 37 - 47
  • [6] An Assessment of Internet of Things Protocols for Resource-Constrained Applications
    Mun, Dae-Hyeok
    Minh Le Dinh
    Kwon, Young-Woo
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 555 - 560
  • [7] Analysis of Application Layer Protocols in Internet of Things
    Sasirekha, S.
    Swamynathan, S.
    Chandini, S.
    Keerthana, K.
    ADVANCES IN COMPUTING AND DATA SCIENCES, ICACDS 2016, 2017, 721 : 550 - 561
  • [8] Taxonomy and analysis of security protocols for Internet of Things
    Das, Ashok Kumar
    Zeadally, Sherali
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 110 - 125
  • [9] AN ANALYSIS OF ROUTING PROTOCOLS IN MANETS AND INTERNET OF THINGS
    Thebiga, M.
    Pramila, R. Suji
    2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [10] Automated Analysis of Secure Internet of Things Protocols
    Kim, Jun Young
    Holz, Ralph
    Hu, Wen
    Jha, Sanjay
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 238 - 249