SlideShare a Scribd company logo
Internet of Things: A Survey on Enabling
Technologies, Protocols and Applications
ECE-653 Advance Computer Networking
Course Seminar
Mustafa Sadiq Aljumaily
Agenda
- What is IoT?
- Market Opportunities for IoT.
- IoT Architecture.
- IoT Elements.
- IoT Common Standards.
- QoS Criteria, IoT Challenges and Future Directions.
- Big Data Analytics, Cloud and Fog Computing in Support of the IoT.
- The Need for Better Horizontal Integration Between Application Layer
Protocols.
- Application User-Case
Internet of Things in Brief
- The IoT is enabled by the latest developments in RFID, smart sensors,
communication technologies and Internet protocols.
- The basic premise is to have smart sensors collaborate directly without human
involvement to deliver a new class of applications.
- IoT is expected to bridge diverse technologies to enable new applications by
connecting physical objects together in support of intelligent decision making.
- IoT applications are ranging from smart homes, transportation, healthcare,
industrial automation, and emergency response to natural and manmade disasters
where human decision making is difficult.
- IoT can make the devices connected to the Internet smart by using ubiquitous
and pervasive computing, embedded devices, communication technologies, sensor
networks, Internet protocols and applications.
- New devices, protocols, and architecture standardizations need to be developed
for the IoT to achieve such purpose.
Vertical and Horizontal Market of IoT
every domain specific application is
interacting with domain independent
services, whereas in each domain
sensors and actuators communicate
directly with each other
Market Opportunity
- IoT is a great opportunity for
equipment manufacturers, ISPs, and
Application developers.
- Several Billions and Trillions of Dollars
are the expectations of growth in
IoT-based services.
- Healthcare is expected to be the
largest portion of IoT business.
- Unique opportunity for traditional
equipment and appliances to
transform their products to smart
things.
- ISPs are required to provide QoS for
mixed M2M, P2M, and P2P traffic.
IoT Architecture
- interconnecting billions or trillions of heterogeneous objects through the
Internet, increases the need for a flexible layered architecture.
- Multiple architectures were proposed.
- 3 layers are good for WSNs,
but not IoT.
- 5 layers are more
representative of IoT special
requirements.
- Five-layer architecture
is the most applicable model
for IoT applications.
IoT 5-Layers Architecture
1- Objects Layer: includes sensors and actuators to create the big data of the IoT.
2- Object Abstraction Layer: transfer data from objects layer to service management layer
through various technologies. Cloud computing and data management processes are
handled in this layer.
3- Service Management Layer: the middleware layer to pair services with requestors
based on addresses and names. Process the received data, make decisions, and deliver the
services to the network wire protocols.
4- Application Layer: provides services to customers. Smart homes, smart buildings,
transportation, industrial automation and smart healthcare.
5- Business Layer: Manages the overall IoT system activities and services. Building business
model, graphs, flowcharts, ...etc. Design, analyze, implement, evaluate, monitor, and
develop IoT related elements. Support decision making processes.
IoT Elements
Operating Systems used in IoT
Building Blocks and
Technologies of the IoT
IoT Common Standards
- Different protocols and standards
are proposed to facilitate and
simplify application programmers
and services providers’ jobs.
- IEEE, W3C, IETF, ETSI and other
organizations are working on
developing and supporting these
standards.
- Most prominent protocols are
shown in the figure.
Application Protocol (CoAP)
- Web transfer protocol based on REST on top
of HTTP.
- Bound to UDP (not TCP) to be more suitable
for IoT applications.
- Two sublayers (messaging sublayer for
reliable communication, and request/response
sublayer to handle REST communications).
- utilizes four types of messages: confirmable,
non-confirmable, reset and acknowledgement.
- GET, PUT, POST and DELETE to achieve
Create, Retrieve, Update and Delete (CRUD)
operations.
- Features provided by CoAP includes resource
observation, block wise resource transport,
resource discovery, and security.
Application Protocol (MQTT)
applications utilize the MQTT such as health care,
monitoring, energy meter, and Facebook
notification
Application Protocol (XMPP)
- IETF Instant Messaging (IM) standard.
- achieve authentication, access control,
privacy measurement, hop-by-hop and
end-to- end encryption, and compatibility
with other protocols.
- An XML stanza represents a piece of code
that is divided into three components:
message, presence, and iq (info/query).
- The text based communication in XMPP
using XML imposes high network
overhead. One solution to this problem is
compressing XML streams using EXI
Application Protocol (AMQP)
AMQP defines two types of messages: bare
messages that are supplied by the sender
and annotated messages that are seen at
the receiver
Application Protocol (DDS)
- Publish- subscribe protocol for real
time M2M communications.
- Two layers DCPS and DLRL.
- DCPS is responsible for delivering the
information to the subscribers.
- DLRL is an optional layer serves as the
interface to the DCPS functionalities.
- Five entities involved: publisher,
datawriter, subscriber, datareader, and
topic.
Comparison among IoT Application Protocols
Service Discovery Protocol (mDNS)
mDNS is an appropriate choice for
embedded Internet-based devices due
to the facts that:
a) There is no need for manual
reconfiguration or extra administration
to manage devices.
b) It is able to run without infrastructure
c) It is able to continue working if failure
of infrastructure happens.
Service Discovery Protocol (DNS-SD)
- The pairing function of required
services by clients using mDNS is
called DNS-based service
discovery (DNS-SD).
- The main drawback of these two
protocols is the need for caching
DNS entries especially when it
comes to resource- constrained
devices.
Infrastructure Protocol (RPL)
- IETF link independent routing
protocol.
- Based on IPv6.
- Destination Oriented Directed Acyclic
Graph (DODAG) is the core of RPL.
- Single root.
- Each node is aware of parent, but no
children information.
- Non-storing mode: routing towards
lower levels based on IP source
routing.
- Storing mode: downward routing
based on destination IPv6 address.
Infrastructure Protocol (6LowPAN)
- Communications protocol with special characteristics like limited packet size,
various address lengths, low bandwidth.
- The specification of mapping services required by the IPv6 over Low power
WPANs to maintain an IPv6 network.
- Four types of headers: (00) NO 6LoWPAN Header, (01) Dispatch Header, (10)
Mesh Addressing, and (11) Fragmentation
- NO 6LoWPAN Header: packets that do not accord to the 6LoWPAN
specification will be discarded.
- Compression of IPv6 headers or multicasting is performed by specifying
Dispatch header.
- 6LoWPAN removes a lot of IPv6 overheads in such a way that a small IPv6
datagram can be sent over a single IEEE 802.15.4 hop in the best case.
Infrastructure Protocol (IEEE 802.15.4)
- MAC and PHY for low-rate wireless private
area networks (LR-WPAN).
- Low data rate, low cost, high message
throughput, reliable communications.
- Handles a large number of nodes up to
65k.
- Supports 3 frequency channel bands (2.4
GHz, 915 MHz, and 868 MHz).
- Two types of network nodes (FFD and
RFD).
- FFD can be coordinator or normal node.
- RFD: very simple can only communicate
with coordinator in star topology.
Infrastructure Protocol (BLE)
- Also called Bluetooth smart.
- Cover up to 100m with 15 times
shorter latency than bluetooth.
- Proved efficiency in smartphones,
vehicle to vehicle
communications, and WSN.
- Allow devices to operate as
masters or slaves in a star
topology.
- Devices are communicating or
going to sleep mode.
Infrastructure Protocol (EPCglobal)
- EPC is Unique ID stored in RFID tag.
- Used in supply chain management.
- The underlying architecture uses
Internet-based RFID technologies along
with cheap RFID tags and readers to
share product information.
- EPCglobal Network: EPC, ID system, EPC
Middleware, Discovery Services, and EPC
Information Services.
- The ID system links the EPC identities to
a database using an EPC reader through
the middleware.
- The discovery service is a mechanism of
EPCglobal to find the required data by
the tags using the ONS.
Infrastructure Protocol (LTE-A)
- A set of cellular communication protocols fits well for IoT smart cities.
- Physical layer uses OFDMA where bandwidth is partitioned into smaller bands.
- Employs a multiple component carrier (MCC) spread spectrum to allow up to
five 20 MHz bands.
- The architecture of LTE-A network relies on two essential parts.
- The first one is the Core Network (CN) which controls mobile devices and deals
with IP packet flows.
- The other part is the Radio Access Network (RAN) which handles wireless
communication and radio access and establishes user plane and control plane
protocols.
- Challenges include network congestion and QoS compromising.
Infrastructure Protocol (Z-wave)
- Low power wireless communication protocol for Home Automation Networks
(HAN).
- Used in remote control applications in smart homes.
- Covers about 30 meters point-to-point communication.
- Operates in ISM bands around 900 MHz.
- Transmission rate up to 200Kbps.
- Optional ACK messages.
- Controller and slaves nodes.
- Routing is performed using source routing method.
Generally: there is a need for more investigation on improvements and
optimizations of routing protocols to meet the IoT requirements.
Physical Layer protocols in IoT
Security in IoT
- IoT cannot be secured by conventional security protocols which are used on the
Internet.
- security problems should be considered in all layers of the IoT from the application to
the infrastructure layers.
- Codo is a security solution for data storage that caches data for bulk encryption and
decryption.
- IEEE 802.15.4 security protocol protect the communication between two neighboring
devices.
- IPSec is mandatory security protocol for IPv6 network layer.
- Transport Layer Security (TLS) for TCP and Datagram TLS (DTLS) for UDP are used in the
transport layer.
- Application layer can either depends on lower layers for security or use some solutions
like EventGaurd, QUIP, Lithe, OASIS, and SASL to provide encryption and authentication
- Intrusion Detection Systems (IDS) for IoT are also investigated.
Interoperability (IEEE 1905.1)
- The IEEE 1905.1 standard was
designed for convergent digital
home networks and
heterogeneous technologies
- an abstraction layer that hides the
diversity of media access control
topologies.
- Environmental impact of IoT
devices, large scale and green
deployment are remain open.
QoS Criteria, IoT Challenges and Future Directions
1- Availability: must be realized in the hardware and software levels to provide anywhere
and anytime services for customers.
2- Reliability: refers to the proper working of the system based on its specification.
3- Mobility: most of the services are expected to be delivered to mobile users.
4- Performance: depends on the performance of many components as well as the
performance of the underlying technologies.
5- Management: manage the Fault, Configuration, Accounting, Performance and Security
(FCAPS) aspects of all devices.
6- Scalability: the ability to add new devices, services and functions for customers without
negatively affecting the quality of existing services.
7- Interoperability: handle a large number of heterogeneous things that belong to different
platforms.
8- Security and Privacy: the lack of common standard and architecture for the IoT security.
Big Data Analytics in Support of IoT
- Extract analytics and consequently knowledge, by which a business can
achieve competitive advantage.
- Apache Hadoop and SciDB are hardly strong enough for big data needs
of IoT
- Facebook has used an improved version of Hadoop to analyze billions
of messages per day and offer real-time statistics of user actions.
- IoT big data analytics service known as TSaaaS using time series data
analytics to perform pattern mining on a large amount of collected
sensor data.
Cloud Computing for IoT
Employing CC for the IoT is not an easy
task due to the following challenges:
- Synchronization: between different
cloud vendors.
- Standardization: (due to different
vendors).
- Balancing: between general and IoT
CC services.
- Reliability.
- Management.
- Enhancement.
Many solutions are available but none of
them is a “fit for all” solution.
Fog Computing in support of IoT
- Fog Computing (a.k.a. cloudlets
or edge computing) can act as a
bridge between smart devices
and large-scale cloud computing
and storage services.
- Mobile network operators are
the potential providers of fog
computing since they can offer
fog services as one of IaaS, PaaS,
or SaaS models to the enterprise
businesses by providing services
at their service network or even
cell tower.
BETTER HORIZONTAL INTEGRATION BETWEEN APPLICATION LAYER
PROTOCOLS- Two types of devices: resource
constrained and resource rich
devices.
- Interoperability is difficult.
- fragmentation between the
protocols utilized for
communication within and across
resource-constrained and
resource-rich devices is not
foreseen to change in the near
future.
- Many suggested solutions.
Application User Case (Nursing House)
Interested in collecting patient’s vital sign measurements, light sensor, and door sensor.
Implementation steps:
- Application developer can use SmartThings or BITalino sensors for collecting data.
- Utilize their APIs to build an application that sends collected data to nursing stations.
Or use:
- USB sensors with microcontrollers in SBC.
- Utilize WiFi or IEEE 802.15.4 to communicate their measurements.
- Download and install open source MQTT broker like Mosquitto.
- Open source implementation of MQTT like Eclipse Paho.
- Phidgets USB sensors to collect vital signs, light and door sensor data.
- MQTT clients ⇒ MQTT broker ⇒ MQTT server ⇒ Nursing Stations.
Application User Case (Nursing House)
Internet of things  a survey on enabling technologies, protocols and applications

More Related Content

PPTX
Introduction to IoT - Unit I
PPTX
wireless network IEEE 802.11
DOCX
Unit v
PDF
Artificial Intelligence in Telecom – Industry Adoption Analysis
PPTX
FP7 iCore project presentation
PPTX
Fog computing technology
PDF
Machine Learning Applications to IoT
PPTX
Cyber Physical System: Architecture, Applications and Research Challenges
Introduction to IoT - Unit I
wireless network IEEE 802.11
Unit v
Artificial Intelligence in Telecom – Industry Adoption Analysis
FP7 iCore project presentation
Fog computing technology
Machine Learning Applications to IoT
Cyber Physical System: Architecture, Applications and Research Challenges

What's hot (20)

PPT
Cyber-Physical Systems
PPTX
Zigbee technology ppt
PDF
IoT and m2m
PPTX
Cloud Management Mechanisms
PPTX
Remote network monitoring
PPTX
Physical design of io t
PPTX
PDF
IoT architecture
PPSX
Features of mobile ip
PDF
Fog computing
DOCX
ISP AND ITS ARCHITECTURE.
PDF
15CS81- IoT- VTU- module 3
PPTX
Virtual machine security
PPTX
Challenges of Conventional Systems.pptx
PPT
SE CHAPTER 2 PROCESS MODELS
DOCX
Lifi technology documentation
PPTX
M2M systems layers and designs standardizations
PPTX
M2M - Machine to Machine Technology
PDF
Cloud Security, Standards and Applications
PPT
Daknet Technology
Cyber-Physical Systems
Zigbee technology ppt
IoT and m2m
Cloud Management Mechanisms
Remote network monitoring
Physical design of io t
IoT architecture
Features of mobile ip
Fog computing
ISP AND ITS ARCHITECTURE.
15CS81- IoT- VTU- module 3
Virtual machine security
Challenges of Conventional Systems.pptx
SE CHAPTER 2 PROCESS MODELS
Lifi technology documentation
M2M systems layers and designs standardizations
M2M - Machine to Machine Technology
Cloud Security, Standards and Applications
Daknet Technology
Ad

Similar to Internet of things a survey on enabling technologies, protocols and applications (20)

PDF
IOT NOTES BASED ON THE ENGINEERING ACADEMICS
PPTX
Module 1.pptx
PDF
IOT_MODULE_3.pdf simple example notes for use
PPTX
INTERNET OF THINGS.pptx
PPTX
PPTX
Lecture 5,6 [Autosavedaot IOT ]slides.pptx
DOCX
Internet of things unit-1
PPTX
IOT -UNIT-3.pptx PROTOCOLS AND TECHNOLOGIES BEHIND IOT
PDF
IOT COMPLETE NOTES.pdf Internet of Things
PDF
IOT COMPLETE NOTES.pdf jhdflhagflkajshfagslgfahflasgshlah
PDF
DS-University-IOT COMPLETE NOTES.pdf FOR CIVIL
PDF
Chapter 1 pdf
PPTX
PDF
the connection of iot with lora pan which enable
PPTX
IoT Introduction & Communication Protocol
PPT
IoT _protocols.ppt
PDF
K010426371
PDF
Introducció a les xarxes 5G
DOCX
IOT-Monograph .docx
IOT NOTES BASED ON THE ENGINEERING ACADEMICS
Module 1.pptx
IOT_MODULE_3.pdf simple example notes for use
INTERNET OF THINGS.pptx
Lecture 5,6 [Autosavedaot IOT ]slides.pptx
Internet of things unit-1
IOT -UNIT-3.pptx PROTOCOLS AND TECHNOLOGIES BEHIND IOT
IOT COMPLETE NOTES.pdf Internet of Things
IOT COMPLETE NOTES.pdf jhdflhagflkajshfagslgfahflasgshlah
DS-University-IOT COMPLETE NOTES.pdf FOR CIVIL
Chapter 1 pdf
the connection of iot with lora pan which enable
IoT Introduction & Communication Protocol
IoT _protocols.ppt
K010426371
Introducció a les xarxes 5G
IOT-Monograph .docx
Ad

More from Mustafa Sadiq (18)

ODP
Cognitive Radio definition and benefits
PDF
وظائف Iana بالعربي
PPSX
What is Graduate Record Exam GRE
PPTX
كيف اتعلم اللغة الانكليزية بسهولة
PDF
Ccent اساسيات الشبكات من شركة سيسكو
PDF
Cisco abstract instructions ملخص اوامر اجهزة سيسكو
PDF
كورس تطوير تطبيقات الاندرويد بدون برمجة Android Apps Development
PDF
أسهل طريقة للبحث عن قبول مشروط في الجامعات الامريكية ضمن تخصص محدد
ODP
Millimeter Waves Wireless Communications
ODP
5G overview
PDF
تجاوز صعوبات الدراسة
PPTX
Enjoy learning التعليم المستمر ومهاراته
PPTX
Scientific research process خطوات البحث العلمي
PDF
مجلة افاق حاسوبية العدد الاول
PDF
مجلة افاق حاسوبية العدد صفر
PDF
مؤسسة العلوم الوطنية الامريكية
PPTX
Tennessee knoxville utk
Cognitive Radio definition and benefits
وظائف Iana بالعربي
What is Graduate Record Exam GRE
كيف اتعلم اللغة الانكليزية بسهولة
Ccent اساسيات الشبكات من شركة سيسكو
Cisco abstract instructions ملخص اوامر اجهزة سيسكو
كورس تطوير تطبيقات الاندرويد بدون برمجة Android Apps Development
أسهل طريقة للبحث عن قبول مشروط في الجامعات الامريكية ضمن تخصص محدد
Millimeter Waves Wireless Communications
5G overview
تجاوز صعوبات الدراسة
Enjoy learning التعليم المستمر ومهاراته
Scientific research process خطوات البحث العلمي
مجلة افاق حاسوبية العدد الاول
مجلة افاق حاسوبية العدد صفر
مؤسسة العلوم الوطنية الامريكية
Tennessee knoxville utk

Recently uploaded (20)

PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
DOCX
573137875-Attendance-Management-System-original
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Lecture Notes Electrical Wiring System Components
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Geodesy 1.pptx...............................................
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Well-logging-methods_new................
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
web development for engineering and engineering
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
composite construction of structures.pdf
PPTX
additive manufacturing of ss316l using mig welding
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Structs to JSON How Go Powers REST APIs.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
573137875-Attendance-Management-System-original
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Foundation to blockchain - A guide to Blockchain Tech
Lecture Notes Electrical Wiring System Components
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Geodesy 1.pptx...............................................
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Well-logging-methods_new................
Operating System & Kernel Study Guide-1 - converted.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Arduino robotics embedded978-1-4302-3184-4.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
web development for engineering and engineering
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
composite construction of structures.pdf
additive manufacturing of ss316l using mig welding
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx

Internet of things a survey on enabling technologies, protocols and applications

  • 1. Internet of Things: A Survey on Enabling Technologies, Protocols and Applications ECE-653 Advance Computer Networking Course Seminar Mustafa Sadiq Aljumaily
  • 2. Agenda - What is IoT? - Market Opportunities for IoT. - IoT Architecture. - IoT Elements. - IoT Common Standards. - QoS Criteria, IoT Challenges and Future Directions. - Big Data Analytics, Cloud and Fog Computing in Support of the IoT. - The Need for Better Horizontal Integration Between Application Layer Protocols. - Application User-Case
  • 3. Internet of Things in Brief - The IoT is enabled by the latest developments in RFID, smart sensors, communication technologies and Internet protocols. - The basic premise is to have smart sensors collaborate directly without human involvement to deliver a new class of applications. - IoT is expected to bridge diverse technologies to enable new applications by connecting physical objects together in support of intelligent decision making. - IoT applications are ranging from smart homes, transportation, healthcare, industrial automation, and emergency response to natural and manmade disasters where human decision making is difficult. - IoT can make the devices connected to the Internet smart by using ubiquitous and pervasive computing, embedded devices, communication technologies, sensor networks, Internet protocols and applications. - New devices, protocols, and architecture standardizations need to be developed for the IoT to achieve such purpose.
  • 4. Vertical and Horizontal Market of IoT every domain specific application is interacting with domain independent services, whereas in each domain sensors and actuators communicate directly with each other
  • 5. Market Opportunity - IoT is a great opportunity for equipment manufacturers, ISPs, and Application developers. - Several Billions and Trillions of Dollars are the expectations of growth in IoT-based services. - Healthcare is expected to be the largest portion of IoT business. - Unique opportunity for traditional equipment and appliances to transform their products to smart things. - ISPs are required to provide QoS for mixed M2M, P2M, and P2P traffic.
  • 6. IoT Architecture - interconnecting billions or trillions of heterogeneous objects through the Internet, increases the need for a flexible layered architecture. - Multiple architectures were proposed. - 3 layers are good for WSNs, but not IoT. - 5 layers are more representative of IoT special requirements. - Five-layer architecture is the most applicable model for IoT applications.
  • 7. IoT 5-Layers Architecture 1- Objects Layer: includes sensors and actuators to create the big data of the IoT. 2- Object Abstraction Layer: transfer data from objects layer to service management layer through various technologies. Cloud computing and data management processes are handled in this layer. 3- Service Management Layer: the middleware layer to pair services with requestors based on addresses and names. Process the received data, make decisions, and deliver the services to the network wire protocols. 4- Application Layer: provides services to customers. Smart homes, smart buildings, transportation, industrial automation and smart healthcare. 5- Business Layer: Manages the overall IoT system activities and services. Building business model, graphs, flowcharts, ...etc. Design, analyze, implement, evaluate, monitor, and develop IoT related elements. Support decision making processes.
  • 11. IoT Common Standards - Different protocols and standards are proposed to facilitate and simplify application programmers and services providers’ jobs. - IEEE, W3C, IETF, ETSI and other organizations are working on developing and supporting these standards. - Most prominent protocols are shown in the figure.
  • 12. Application Protocol (CoAP) - Web transfer protocol based on REST on top of HTTP. - Bound to UDP (not TCP) to be more suitable for IoT applications. - Two sublayers (messaging sublayer for reliable communication, and request/response sublayer to handle REST communications). - utilizes four types of messages: confirmable, non-confirmable, reset and acknowledgement. - GET, PUT, POST and DELETE to achieve Create, Retrieve, Update and Delete (CRUD) operations. - Features provided by CoAP includes resource observation, block wise resource transport, resource discovery, and security.
  • 13. Application Protocol (MQTT) applications utilize the MQTT such as health care, monitoring, energy meter, and Facebook notification
  • 14. Application Protocol (XMPP) - IETF Instant Messaging (IM) standard. - achieve authentication, access control, privacy measurement, hop-by-hop and end-to- end encryption, and compatibility with other protocols. - An XML stanza represents a piece of code that is divided into three components: message, presence, and iq (info/query). - The text based communication in XMPP using XML imposes high network overhead. One solution to this problem is compressing XML streams using EXI
  • 15. Application Protocol (AMQP) AMQP defines two types of messages: bare messages that are supplied by the sender and annotated messages that are seen at the receiver
  • 16. Application Protocol (DDS) - Publish- subscribe protocol for real time M2M communications. - Two layers DCPS and DLRL. - DCPS is responsible for delivering the information to the subscribers. - DLRL is an optional layer serves as the interface to the DCPS functionalities. - Five entities involved: publisher, datawriter, subscriber, datareader, and topic.
  • 17. Comparison among IoT Application Protocols
  • 18. Service Discovery Protocol (mDNS) mDNS is an appropriate choice for embedded Internet-based devices due to the facts that: a) There is no need for manual reconfiguration or extra administration to manage devices. b) It is able to run without infrastructure c) It is able to continue working if failure of infrastructure happens.
  • 19. Service Discovery Protocol (DNS-SD) - The pairing function of required services by clients using mDNS is called DNS-based service discovery (DNS-SD). - The main drawback of these two protocols is the need for caching DNS entries especially when it comes to resource- constrained devices.
  • 20. Infrastructure Protocol (RPL) - IETF link independent routing protocol. - Based on IPv6. - Destination Oriented Directed Acyclic Graph (DODAG) is the core of RPL. - Single root. - Each node is aware of parent, but no children information. - Non-storing mode: routing towards lower levels based on IP source routing. - Storing mode: downward routing based on destination IPv6 address.
  • 21. Infrastructure Protocol (6LowPAN) - Communications protocol with special characteristics like limited packet size, various address lengths, low bandwidth. - The specification of mapping services required by the IPv6 over Low power WPANs to maintain an IPv6 network. - Four types of headers: (00) NO 6LoWPAN Header, (01) Dispatch Header, (10) Mesh Addressing, and (11) Fragmentation - NO 6LoWPAN Header: packets that do not accord to the 6LoWPAN specification will be discarded. - Compression of IPv6 headers or multicasting is performed by specifying Dispatch header. - 6LoWPAN removes a lot of IPv6 overheads in such a way that a small IPv6 datagram can be sent over a single IEEE 802.15.4 hop in the best case.
  • 22. Infrastructure Protocol (IEEE 802.15.4) - MAC and PHY for low-rate wireless private area networks (LR-WPAN). - Low data rate, low cost, high message throughput, reliable communications. - Handles a large number of nodes up to 65k. - Supports 3 frequency channel bands (2.4 GHz, 915 MHz, and 868 MHz). - Two types of network nodes (FFD and RFD). - FFD can be coordinator or normal node. - RFD: very simple can only communicate with coordinator in star topology.
  • 23. Infrastructure Protocol (BLE) - Also called Bluetooth smart. - Cover up to 100m with 15 times shorter latency than bluetooth. - Proved efficiency in smartphones, vehicle to vehicle communications, and WSN. - Allow devices to operate as masters or slaves in a star topology. - Devices are communicating or going to sleep mode.
  • 24. Infrastructure Protocol (EPCglobal) - EPC is Unique ID stored in RFID tag. - Used in supply chain management. - The underlying architecture uses Internet-based RFID technologies along with cheap RFID tags and readers to share product information. - EPCglobal Network: EPC, ID system, EPC Middleware, Discovery Services, and EPC Information Services. - The ID system links the EPC identities to a database using an EPC reader through the middleware. - The discovery service is a mechanism of EPCglobal to find the required data by the tags using the ONS.
  • 25. Infrastructure Protocol (LTE-A) - A set of cellular communication protocols fits well for IoT smart cities. - Physical layer uses OFDMA where bandwidth is partitioned into smaller bands. - Employs a multiple component carrier (MCC) spread spectrum to allow up to five 20 MHz bands. - The architecture of LTE-A network relies on two essential parts. - The first one is the Core Network (CN) which controls mobile devices and deals with IP packet flows. - The other part is the Radio Access Network (RAN) which handles wireless communication and radio access and establishes user plane and control plane protocols. - Challenges include network congestion and QoS compromising.
  • 26. Infrastructure Protocol (Z-wave) - Low power wireless communication protocol for Home Automation Networks (HAN). - Used in remote control applications in smart homes. - Covers about 30 meters point-to-point communication. - Operates in ISM bands around 900 MHz. - Transmission rate up to 200Kbps. - Optional ACK messages. - Controller and slaves nodes. - Routing is performed using source routing method. Generally: there is a need for more investigation on improvements and optimizations of routing protocols to meet the IoT requirements.
  • 28. Security in IoT - IoT cannot be secured by conventional security protocols which are used on the Internet. - security problems should be considered in all layers of the IoT from the application to the infrastructure layers. - Codo is a security solution for data storage that caches data for bulk encryption and decryption. - IEEE 802.15.4 security protocol protect the communication between two neighboring devices. - IPSec is mandatory security protocol for IPv6 network layer. - Transport Layer Security (TLS) for TCP and Datagram TLS (DTLS) for UDP are used in the transport layer. - Application layer can either depends on lower layers for security or use some solutions like EventGaurd, QUIP, Lithe, OASIS, and SASL to provide encryption and authentication - Intrusion Detection Systems (IDS) for IoT are also investigated.
  • 29. Interoperability (IEEE 1905.1) - The IEEE 1905.1 standard was designed for convergent digital home networks and heterogeneous technologies - an abstraction layer that hides the diversity of media access control topologies. - Environmental impact of IoT devices, large scale and green deployment are remain open.
  • 30. QoS Criteria, IoT Challenges and Future Directions 1- Availability: must be realized in the hardware and software levels to provide anywhere and anytime services for customers. 2- Reliability: refers to the proper working of the system based on its specification. 3- Mobility: most of the services are expected to be delivered to mobile users. 4- Performance: depends on the performance of many components as well as the performance of the underlying technologies. 5- Management: manage the Fault, Configuration, Accounting, Performance and Security (FCAPS) aspects of all devices. 6- Scalability: the ability to add new devices, services and functions for customers without negatively affecting the quality of existing services. 7- Interoperability: handle a large number of heterogeneous things that belong to different platforms. 8- Security and Privacy: the lack of common standard and architecture for the IoT security.
  • 31. Big Data Analytics in Support of IoT - Extract analytics and consequently knowledge, by which a business can achieve competitive advantage. - Apache Hadoop and SciDB are hardly strong enough for big data needs of IoT - Facebook has used an improved version of Hadoop to analyze billions of messages per day and offer real-time statistics of user actions. - IoT big data analytics service known as TSaaaS using time series data analytics to perform pattern mining on a large amount of collected sensor data.
  • 32. Cloud Computing for IoT Employing CC for the IoT is not an easy task due to the following challenges: - Synchronization: between different cloud vendors. - Standardization: (due to different vendors). - Balancing: between general and IoT CC services. - Reliability. - Management. - Enhancement. Many solutions are available but none of them is a “fit for all” solution.
  • 33. Fog Computing in support of IoT - Fog Computing (a.k.a. cloudlets or edge computing) can act as a bridge between smart devices and large-scale cloud computing and storage services. - Mobile network operators are the potential providers of fog computing since they can offer fog services as one of IaaS, PaaS, or SaaS models to the enterprise businesses by providing services at their service network or even cell tower.
  • 34. BETTER HORIZONTAL INTEGRATION BETWEEN APPLICATION LAYER PROTOCOLS- Two types of devices: resource constrained and resource rich devices. - Interoperability is difficult. - fragmentation between the protocols utilized for communication within and across resource-constrained and resource-rich devices is not foreseen to change in the near future. - Many suggested solutions.
  • 35. Application User Case (Nursing House) Interested in collecting patient’s vital sign measurements, light sensor, and door sensor. Implementation steps: - Application developer can use SmartThings or BITalino sensors for collecting data. - Utilize their APIs to build an application that sends collected data to nursing stations. Or use: - USB sensors with microcontrollers in SBC. - Utilize WiFi or IEEE 802.15.4 to communicate their measurements. - Download and install open source MQTT broker like Mosquitto. - Open source implementation of MQTT like Eclipse Paho. - Phidgets USB sensors to collect vital signs, light and door sensor data. - MQTT clients ⇒ MQTT broker ⇒ MQTT server ⇒ Nursing Stations.
  • 36. Application User Case (Nursing House)