Performance Evaluation of Application Layer Protocols for the Internet-of-Things

Author(s):  
Matthias Pohl ◽  
Janick Kubela ◽  
Sascha Bosse ◽  
Klaus Turowski
Proceedings ◽  
2019 ◽  
Vol 31 (1) ◽  
pp. 49 ◽  
Author(s):  
Mónica Martí ◽  
Carlos Garcia-Rubio ◽  
Celeste Campo

The fast growth of the Internet of Things (IoT) has made this technology one of the most promising paradigms of recent years. Wireless Sensor Networks (WSNs) are one of the most important challenges of the Internet of things. These networks are made up of devices with limited processing power, memory, and energy. The constrained nature of WSNs makes it necessary to have specific restricted protocols to work in these environments. In this paper, we present an energy consumption and network traffic study of the main IoT application layer protocols, the Constrained Application Protocol (CoAP), and the version of Message Queue Telemetry Transport (MQTT) for sensor networks (MQTT_SN). The simulations presented evaluate the performance of these protocols with different network configurations.


Sensors ◽  
2020 ◽  
Vol 20 (1) ◽  
pp. 283
Author(s):  
Fawad Ali Khan ◽  
Rafidah Md Noor ◽  
Miss Laiha Mat Kiah ◽  
Ismail Ahmedy ◽  
Mohd Yamani ◽  
...  

Internet of Things (IoT) facilitates a wide range of applications through sensor-based connected devices that require bandwidth and other network resources. Enhancement of efficient utilization of a heterogeneous IoT network is an open optimization problem that is mostly suffered by network flooding. Redundant, unwanted, and flooded queries are major causes of inefficient utilization of resources. Several query control mechanisms in the literature claimed to cater to the issues related to bandwidth, cost, and Quality of Service (QoS). This research article presented a statistical performance evaluation of different query control mechanisms that addressed minimization of energy consumption, energy cost and network flooding. Specifically, it evaluated the performance measure of Query Control Mechanism (QCM) for QoS-enabled layered-based clustering for reactive flooding in the Internet of Things. By statistical means, this study inferred the significant achievement of the QCM algorithm that outperformed the prevailing algorithms, i.e., Divide-and-Conquer (DnC), Service Level Agreements (SLA), and Hybrid Energy-aware Clustering Protocol for IoT (Hy-IoT) for identification and elimination of redundant flooding queries. The inferential analysis for performance evaluation of algorithms was measured in terms of three scenarios, i.e., energy consumption, delays and throughput with different intervals of traffic, malicious mote and malicious mote with realistic condition. It is evident from the results that the QCM algorithm outperforms the existing algorithms and the statistical probability value “P” < 0.05 indicates the performance of QCM is significant at the 95% confidence interval. Hence, it could be inferred from findings that the performance of the QCM algorithm was substantial as compared to that of other algorithms.


Author(s):  
Liangming Cai ◽  
Jingrong Le ◽  
Xuxin Ruan ◽  
Min Du

This paper presents an OSA patient interactive monitoring system based on the Internet of Things (IoT) framework. This system allows OSA patients to get timely rescue when they are sleepy outside. Because the Beidou position marker has an interactive function, it can reduce the anxiety of the patient while waiting for the rescue. At the same time, if a friend helps the OSA patients to call the doctor, the friend can also report the patient's condition in time. This system uses the popular IoT framework. At the bottom is the data acquisition layer, which uses wearable sensors to collect vital signs from patients, with a focus on ECG and SpO2 signals. The middle layer is the network layer that transmits the collected physiological signals to the Beidou indicator using the Bluetooth Low Energy (BLE) protocol. The top layer is the application layer, and the application layer uses the mature rescue interactive platform of Beidou. Since the GPS indicator has not included the communication satellite, So it has no SMS function. OSA patients can only passively wait for a rescue. Moreover, due to the lack of satellites in Asia and the insufficient density of the ground-enhanced system, the positioning error of OSA patients is large. The Beidou system developed by China itself, the main coverage of the satellite is in Asia, and is equipped with a high-density ground-based augmentation system. Therefore, the Beidou model improves the positioning accuracy and is equipped with a special communication satellite, which increases the short message interaction function. Therefore, patients can report disease progression in time while waiting for a rescue. After our simulation test, the effectiveness of the OSA patient rescue monitoring system based on the Internet of Things framework and the positioning accuracy of OSA patients have been greatly improved. Especially when OSA patients work outdoors, the cell phone base station signal coverage is relatively weak. The satellite signal is well covered, plus the SMS function of the Beidou indicator. Therefore, the system can be used to provide timely patient progress and provide data support for the medical rescue team to provide a more accurate rescue plan. After a comparative trial, the rescue rate of OSA patients using the detection device of this system was increased by 15 percentage points compared with the rescue rate using only GPS satellite phones.


The internet of things is turning into an appealing framework worldview to acknowledge inter-connections throughout corporeal, digital as well as communal gaps. Through the connections amid the IoT, safety concerns befall important, along with it is huge to set up improved resolutions for safety protections. The IoT apparition of unlock data sharing is expert through using cloud registering concepts. Since IoT is depends on the web, safety concerns of internet will similarly emerge in IoT as well as IoT enclose three layers for example perception, transportation and application layers. The safety concerns, modernism along with solution recognized by the application layer are conversed about in this Paper. The principle focal point of this examination work is on Data Security Protection procedure for application layer


Sign in / Sign up

Export Citation Format

Share Document