A Comparative Analysis on Resource Discovery Protocols for The Internet of Things

被引:0
|
作者
Khalil, Kasem [1 ]
Elgazzar, Khalid [1 ]
Bayoumi, Magdy [1 ]
机构
[1] Univ Louisiana Lafayette, Ctr Adv Comp Studies, Lafayette, LA 70504 USA
关键词
Internet of things; resource discovery; CoAP; UPnP; MQTT protocol;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Resources discovery is a fundamental requirement to the full realization of the vision of Internet of Things. Discovery includes resource properties, capabilities, and metadata. It enables consumers to build IoT applications and services that utilize "smart things" with no prior knowledge about these things. This paper studies three of the most commonly used discovery protocols, CoAP, MQTT, and UPnP. We compare between their performance and behavior in IoT deployments. Each protocol is implemented and deployed on a mobile phone as a client and a Raspberry Pi as a broker/server. The implementation includes a WeMo switch and a TI SensorTag as resources. The paper provides insights on the different features, behavioural attributes, and a comparative analysis between these protocols. We also present performance indexes of each protocol in terms of memory and CPU usage, latency, and traffic exchange between a publisher and a subscriber. Our analysis shows that despite the three protocols are fundamentally different and each one has pros and cons, they are all highly useful in IoT environments. However, CoAP is generally more flexible and scalable, but requires a higher memory footprint.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] A Security Approach for CoAP-based Internet of Things Resource Discovery
    Khalil, Kasem
    Elgazzar, Khalid
    Abdelgawad, Ahmed
    Bayoumi, Magdy
    2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [22] A Decentralized Resource Discovery Using Attribute Based Encryption for Internet of Things
    Kamel, Mohammed B. M.
    Yan, Yuping
    Ligeti, Peter
    Reich, Christoph
    2020 FOURTH CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2020,
  • [23] Comparative Analysis of Internet Key Exchange Protocols
    Shaheen, Safdar Hussain
    Yousaf, Muhammad
    Majeed, Muhammad Younas
    2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2015,
  • [24] Analysis on functionalities and security features of Internet of Things related protocols
    Alessandra Rizzardi
    Sabrina Sicari
    Alberto Coen-Porisini
    Wireless Networks, 2022, 28 : 2857 - 2887
  • [25] Scalability Analysis of Medium Access Control Protocols for Internet of Things
    Ahmed, Nurzaman
    Rahman, Hafizur
    Hussain, Md. Iftekhar
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 601 - 611
  • [26] Analysis on functionalities and security features of Internet of Things related protocols
    Rizzardi, Alessandra
    Sicari, Sabrina
    Coen-Porisini, Alberto
    WIRELESS NETWORKS, 2022, 28 (07) : 2857 - 2887
  • [27] Power Consumption Analysis of Application Layer Protocols for the Internet of Things
    Velinov, Aleksandar
    Mileva, Aleksandra
    ICT INNOVATIONS 2016: COGNITIVE FUNCTIONS AND NEXT GENERATION ICT SYSTEMS, 2018, 665 : 193 - 202
  • [28] Simulation and Analysis of Authentication Protocols for Mobile Internet of Things (MIoT)
    Kumar, Adarsh
    Gopal, Krishna
    Aggarwal, Alok
    2014 INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2014, : 423 - 428
  • [29] CARD: Context-Aware Resource Discovery for mobile Internet of Things scenarios
    Pozza, Riccardo
    Nati, Michele
    Georgoulas, Stylianos
    Gluhak, Alexander
    Moessner, Klaus
    Krco, Srdjan
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2014,
  • [30] Survey of Standardized Protocols for the Internet of Things
    Florea, Iulia
    Rughinis, Razvan
    Ruse, Laura
    Dragomir, Dan
    2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 190 - 196