Multi-Dimensional Data Communication Protocols for the Physical Level of the Internet of Things Based on 5G Communication

Author(s):  
Yingling Mao
Author(s):  
Felipe Viel ◽  
Luis Augusto Silva ◽  
Valderi Leithardt ◽  
Gabriel Villarubia González ◽  
Raimundo Celeste Ghizoni Teive ◽  
...  

The evolution and miniaturization of the technologies for processing, storage, and communication have enabled computer systems to process a high volume of information and make decisions without human intervention. Within this context, several systems architectures and models have gained prominences, such as the Internet of Things (IoT) and Smart Grids (SGs). SGs use communication protocols to exchange information, among which the Open Smart Grid Protocol (OSGP) stands out. In contrast, this protocol does not have integration support with IoT systems that use some already consolidated communication protocols, such as the Constrained Application Protocol (CoAP). Thus, this work develops the integration of the protocols OSGP and CoAP to allow the communication between conventional IoT systems and systems dedicated to SGs. Results demonstrate the effectiveness of this integration, with the minimum impact on the flow of commands and data, making possible the use of the developed CoAP-OSGP Interface for Internet of Things (COIIoT).


Author(s):  
Muneer Bani Yassein ◽  
Wail Mardini ◽  
Amnah Al-Abdi

Internet of Things (IoT) is one of the most active and hot topics these days in which most of our everyday objects are connected with each other over internal and external networks. As in any data communication paradigm there are security aspects that should be taken care of. The traditional security mechanisms are usually not applicable in IoT because there are different standards involved, this make the security preservation is one of the main challenges in IoT. According to previous surveys, there are many of security issues in regards to IoT. In this chapter, five issues from the security issues in IoT are discussed; Access Control, Authentication, Privacy, Policy Enforcement, and Trust. After that, major proposed solutions from the literature is listed and compared according to the strength and weakness points for each of them.


Constrained devices are commonly used in the Internet of Things systems. Since these devices have limited communication and computation resources, communication protocols which are lightweight are needed. A lightweight protocol called Message Queue Telemetry Transport, which is a publish/subscribe messaging protocol, is utilized with the constrained devices. Hence, this paper is aimed at monitoring data by using machine-to-machine communication protocol with the help of an IoT device, Raspberry Pi.


2012 ◽  
Vol 532-533 ◽  
pp. 1100-1104
Author(s):  
Lan Li

The internet of things is a network designed for connecting things together, which is established on the basis of computer network, as well as by making use of the RFID, wireless data communication technology, etc. Among all these technologies, RFID plays a crucial role in the construction of the internet of things. So far, the RFID technology has been widely used in industry, commerce, intelligent transportation system, and many other fields.


Author(s):  
Róbert Rákay ◽  
Alena Galajdová ◽  
Jaroslav Šeminský ◽  
Ivan Cvitić

Abstract The article is focused on testing selected communication protocols for the Internet of Things. The aim of the experiments was to find a suitable communication protocol to build a smart device of home automation. The recent developments in the field of communication protocols and data processing are providing a new form of constrained communication, while describing how the Things talk to each other in the Internet of Things. With growing number of connected devices in industry and commercial field, there is a need for the devices which can handle the new forms of communication, handle sensors and operate the battery power. The gathered data is either processed on the “edge” of the network or on the cloud platforms. Authors present a comparison of selected newest communication protocols, while reflecting on the results of their experimental testing.


Sign in / Sign up

Export Citation Format

Share Document