首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, IoT interacts with many application areas such as smart city, smart building, security, traffic, remote monitoring, health, energy, disaster, agriculture, industry. The IoT network in these scenarios comprises tiny devices, gateways, and cloud platforms. An IoT network is able to keep these fundamental components in transmission under many conditions with lightweight communication protocols taking into account the limited hardware features (memory, processor, energy, etc.) of tiny devices. These lightweight communication protocols affect the network traffic, reliability, bandwidth, and energy consumption of the IoT application. Therefore, determining the most proper communication protocol for application developers emerges as an important engineering problem. This paper presents a straightforward overview of the lightweight communication protocols, technological advancements in application layer for the IoT ecosystem. The survey then analyzes various recent lightweight communication protocols and reviews their strengths and limitations. In addition, the paper explains the experimental comparison of Constrained Applications Protocol (CoAP), Message Queuing Telemetry (MQTT), and WebSocket protocols, more convenient for tiny IoT devices. Finally, we discuss future research directions of communication protocols for IoT.  相似文献   

2.
The vision to connect everyday physical objects to the Internet promises to create the Internet of Things (IoT), which is expected to integrate the diverse technologies such as sensors, actuators, radio frequency identification, communication technologies, and Internet protocols. Thus, IoT promises to transfer traditional industry to advance digital industry known as the Industry 4.0. At the core of the Industry 4.0 are the wireless sensor networks (WSNs) and wireless sensor and actuator networks (WSANs) that led to the development of industrial wireless sensor networks (IWSNs) and industrial wireless sensor and actuator networks (IWSANs). These networks play a central role of connecting machines, parts, products, and humans and create a diverse set of new applications to support intelligent and autonomous decision making. The IWSAN is a promising technology for numerous industrial applications because of their several potential benefits such as simple deployment, low cost, less complexity, and mobility support. However, despite such benefits, they impose several unique challenges at different layers of the protocol stack when deploying them for various monitoring and control applications in the Industry 4.0. In this article, we explore IWSAN, its applications, requirements, challenges, and solutions in the context of industrial control applications. Our main focus is on the medium access control (MAC) layer that can be exploited to satisfy such requirements. Our discussion presents extensive background study of the MAC schemes and it reviews the MAC protocols of the existing wireless standards and technologies. A number of application‐specific MAC protocols developed to support industrial applications, which are not part of these standards, are also elaborated. We rationalize to what extent the existing standards and protocols help in solving such requirements as laid down by the Industry 4.0. In the end, we emphasize on existing challenges and present important future directions.  相似文献   

3.
Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P,Grid,ad hoc network and so on.However,few researches about trust mechanism for Internet of Things(IoT) could be found in the literature,though we argue that considerable necessity is held for applying trust mechanism to IoT.In this paper,we establish a formal trust management control mechanism based on architecture modeling of IoT.We decompose the IoT into three layers,which are sensor layer,core layer and application layer,from aspects of network composition of IoT.Each layer is controlled by trust management for special purpose:self-organized,affective routing and multi-service respectively.And the final decision-making is performed by service requester according to the collected trust information as well as requester' policy.Finally,we use a formal semantics-based and fuzzy set theory to realize all above trust mechanism,the result of which provides a general framework for the development of trust models of IoT.  相似文献   

4.
Due to the widespread popularity and usage of Internet of things (IoT)‐enabled devices, there is an exponential increase in the data traffic generated from these IoT devices. Most of these devices communicate with each other using heterogeneous links having constraints such as latency, throughput, and interference from concurrent transmissions. This results in an extra burden on the underlying communication infrastructure to manage the traffic within these constraints between source and destination. However, most of the existing applications use different Transmission Control Protocol (TCP) variants for traffic management between these devices and are dependent on the stage of the sender, irrespective of the application types and link characteristics. Each operating system (OS) has different TCP variant for all applications, irrespective of path characteristics. Hence, a single TCP variant cannot select the best suitable link, which results in degradation in throughput compared to the existing default. Moreover, it cannot use the full capacity of the available link for different applications and network links, especially in heterogeneous network such as IoT. To cope up with these challenges, in this paper, we propose an Adaptive and Dynamic TCP Interface Architecture (ADYTIA). ADYTIA allows the usage of different TCP variants based on application and link characteristics, irrespective of the physical links of the entire path. It allows the usage of different TCP variants based on their design principle across heterogeneous technologies, platforms, and applications. ADYTIA is implemented on NS‐2 and Linux kernel for real testbed experiments. Its ability to select the best suitable TCP variant results in 20% to 80% improvement in throughput compared with the existing default and single TCP variant on Linux and Windows.  相似文献   

5.
In the recent era, the security issues affecting the future Internet‐of‐Things (IoT) standards has fascinated noteworthy consideration from numerous research communities. In this view, numerous assessments in the form of surveys were proposed highlighting several future IoT‐centric subjects together with threat modeling, intrusion detection systems (IDS), and various emergent technologies. In contrast, in this article, we have focused exclusively on the emerging IoT‐related vulnerabilities. This article is a multi‐fold survey that emphasizes on understanding the crucial causes of novel vulnerabilities in IoT paradigms and issues in existing research. Initially, we have emphasized on different layers of IoT architecture and highlight various emerging security challenges associated with each layer along with the key issues of different IoT systems. Secondly, we discuss the exploitation, detection, and defense methodologies of IoT malware‐enabled distributed denial of service (DDoS), Sybil, and collusion attack capabilities. We have also discussed numerous state‐of‐the‐art strategies for intrusion detection and methods for IDS setup in future IoT systems. Third, we have presented a brief classification of existing IoT authentication protocols and a comparative analysis of such protocols based on different IoT‐enabled cyber attacks. For conducting a real‐time future IoT research, we have presented some emerging blockchain solutions. We have also discussed a comparative examination of some of the recently developed simulation tools and IoT test beds that are characterized based on different layers of IoT infrastructure. We have also outlined some of the open issues and future research directions and also facilitate the readers with broad classification of existing surveys in this domain that addresses several scopes related to the IoT paradigm. This survey article focuses in enabling IoT‐related research activities by comparing and merging scattered surveys in this domain.  相似文献   

6.
Existing transport layer protocols such as TCP and UDP are designed specifically for point-to-point communication. The increased popularity of peer-to-peer networking has brought changes in the Internet that provided users with potentially multiple replicated sources for content retrieval. However, applications that leverage such parallelism have thus far been limited to non-real-time file downloads. In this article we consider the problem of multipoint-to-point video streaming over peer-to-peer networks. We present a transport layer protocol called R/sup 2/CP that effectively enables real-time multipoint-to-point video streaming. R/sup 2/CP is a receiver-driven multistate transport protocol. It requires no coordination between multiple sources, accommodates flexible application layer reliability semantics, uses TCP-friendly congestion control, and delivers to the video stream the aggregate of the bandwidths available on the individual paths. Simulation results show great performance benefits using R/sup 2/CP in peer-to-peer networks.  相似文献   

7.

Most of the current research has been restricted to scalar sensor data based IoT applications. However, today’s research and development activities rely on multimedia-based services and applications while this kind of applications has several requirements in terms of storage, bandwidth, latency, etc. Furthermore, protocols dedicated to IoT applications have proved their weakness in multimedia environments. Hence, a new paradigm called internet of multimedia things (IoMT) has been proposed to fulfill the requirements of multimedia applications. In this paradigm different multimedia things can interact and cooperate with each other over the Internet. Moreover, IETF ROLL working group standardized an IPv6 routing protocol for low-power and lossy networks (RPL for LLNs) for resource constrained devices. In this paper, we propose an enhanced version of RPL for IoMT called free bandwidth (FreeBW)-RPL in which the sensed data is essentially provided by multimedia devices. FreeBW-RPL protocol proposes a new objective function called FreeBW that takes the FreeBW calculation in the network layer. We set the QoS routing challenge as the amount of the bandwidth while selecting the routing path in order to measure the maximum FreeBW so as to deliver better performance of the multimedia applications. Simulations have been conducted over COOJA simulator. The obtained results proved that our proposal outperforms the basic ones in terms of end-to-end delay, throughput, packet delivery ratio and energy consumption and provides better performance than other protocols.

  相似文献   

8.
物联网是计算机、互联网与移动通信网等相关技术的演进和延伸,其核心共性技术、网络与信息安全技术以及关键应用是物联网的主要研究内容。物联网感知节点大都部署在无人监控环境,并且由于物联网是在现有的网络基础上扩展了感知网络和应用平台,传统网络安全措施不足以提供可靠的安全保障。物联网安全研究将主要集中在物联网安全体系、物联网个体隐私保护模式、终端安全功能、物联网安全相关法律的制订等方面。  相似文献   

9.
Internet of Things (IoT) has very remarkable advantages over customary communication technologies. However, IoT suffers from different issues, such as limited battery life, low storage capacity, and little computing capacity. For this reason, in many IoT applications and devices, we require an alternative unit to execute the tasks from the user's device and return results. In general, the problem of limited resources by transferring the computation workload to other devices/systems with better resources is addressed by offloading computation. It can be focused on improving the application, extending battery life, or expanding storage capacity. The offloading operation can be performed based on various quality of service (QoS) parameters that contain computational demands for load balancing, response time, application, energy consumption, latency, and other things. Moreover, the systematic literature review (SLR) method is used to identify, assess, and integrate findings from all relevant studies that address one or more research questions on IoT offloading and conduct a comprehensive study of empirical research on offloading techniques. However, we present a new taxonomy for them based on offloading decision mechanisms and overall architectures. Furthermore, we offer a parametric comparison for the offloading methods. As well, we present the future direction and research opportunities in IoT offloading computation. This survey will assist academics and practitioners to directly understand the progress in IoT offloading.  相似文献   

10.
The Internet of Things (IoT) continues to expand the current Internet, opening the door to a wide range of novel applications. The increasing volume of the IoT requires effective strategies to overcome its challenges. Machine Learning (ML) has led to a growing technology that enables computers to solve problems without the need for knowledge of their intricate details. Over the past years, various ML techniques have been used to efficiently manage IoT networks. Clustering is a technique that has proven its performance in the networking domain. Many works in the literature have studied ML-based clustering methods for IoT networks, including their main properties, characteristics, underlying technologies, and open issues. In this paper, we focus on topology-centered ML-based clustering protocols for IoT networks. Specifically, we investigate the potential benefits of adopting the clustering approach to address several IoT challenges. Moreover, we provide a comprehensive taxonomy of ML-based clustering algorithms for IoT networks. Finally, we statistically analyze the incorporation of ML techniques for clustering in various IoT systems and highlight the related open issues.  相似文献   

11.
The Internet of Things (IoT) is the communications paradigm that can provide the potential of ultimate communication. The IoT paradigm describes communication not only human to human (H2H) but also machine to machine (M2M) without the need of human interference. In this paper, we examine, review and present the current IoT technologies starting from the physical layer to the application and data layer. Additionally, we focus on future IoT key enabling technologies like the new fifth generation (5G) networks and Semantic Web. Finally, we present main IoT application domains like smart cities, transportation, logistics, and healthcare.  相似文献   

12.
Real-time communication in packet-switched networks   总被引:4,自引:0,他引:4  
The dramatically increased bandwidths and processing capabilities of future high-speed networks make possible many distributed real-time applications, such as sensor-based applications and multimedia services. Since these applications will have traffic characteristics and performance requirements that differ dramatically from those of current data-oriented applications, new communication network architectures, and protocols will be required. In this paper we discuss the performance requirements and traffic characteristics of various real-time applications, survey recent developments in the areas of network architecture and protocols for supporting real-time services, and develop frameworks in which these, and future, research efforts can be considered  相似文献   

13.
The challenge raised by the introduction of Internet of Things (IoT) concept will permanently shape the networking and communications landscape and will therefore have a significant social impact. The ongoing IoT research activities are directed towards the definition and design of open architectures and standards, but there are still many issues requiring a global consensus before the final deployment. The paper presents and discusses the IoT architectural frameworks proposed under the ongoing standardization efforts, design issues in terms of IoT hardware and software components, as well as the IoT application domain representatives, such as smart cities, healthcare, agriculture, and nano-scale applications (addressed within the concept of Internet of Nano-Things). In order to obtain the performances related to recently proposed protocols for emerging Industrial Internet of Things applications, the preliminary results for Message Queuing Telemetry Transport and Time-Slotted Channel Hopping protocols are provided. The testing was performed on OpenMote hardware platform and two IoT operating systems: Contiki and OpenWSN.  相似文献   

14.
Mobility management protocols operating from different layers of the classical protocol stack (e.g., link, network, transport, and application layers) have been proposed in the last several years. These protocols achieve different handoff performance for different types of applications. In this paper, mobile applications are grouped into five different classes, class A through class E, based on their mobility management requirements. Analytical models are developed to investigate the handoff performance of the existing mobility management protocols for these application classes. The analysis shows that applications of a particular class experience different handoff performance when different mobility management protocols are used. Handoff performance comparisons of different mobility management protocols are carried out to decide on the suitable mobility management protocol for a particular application class. The results of mathematical analysis advocate the use of transport layer mobility management for class B and class C applications, mobile IP for non-real-time class D and class E applications, and session initiation protocol-based mobility management for real-time class D and class E applications. Moreover, through analytical modeling, the parameters that influence the handoff performance of mobility management protocols are identified. These parameters can be used to design new application-adaptive techniques to enhance the handoff performance of the existing mobility management protocols.  相似文献   

15.

Higher layer applications, such as routing protocols and robot navigation systems, commonly depend upon link quality (LQ) estimates for improving the efficiency and reliability of wireless communications. LQ estimation is especially critical for maintaining connectivity in mobile ad hoc networks, which tend to be less reliable than infrastructure networks due to their decentralized and dynamic nature. However, estimating LQ for applications higher than the physical layer is challenging due to the underlying dynamics of wireless propagation and the mismatched temporal perspectives between the layers. Due to its relevance and difficulty, a significant research effort has been devoted to developing empirical methods for accurately estimating LQ. The goal of this survey is to provide a comprehensive review of the existing approaches to LQ estimation in IEEE 802.11-based ad hoc and mesh networks, with some exceptions that include sensor networks. The survey organizes the literature according to the different fundamental techniques, and also compares them in terms in terms of strengths and weaknesses. Finally, we conclude with the latest developments in LQ estimation, which involve machine learning, and provide recommendations for future work in the field.

  相似文献   

16.
Mobile computing is the way of the future, as evident by such initiatives as Bluetooth, Iceberg and HomeRF. However, for mobile computing to be successful, an obvious layer, the MAC layer, must be efficient in channel access and reservation. Therefore, in-depth understanding is needed of the wireless MAC layer if wireless computing is to takeoff. Many random access wireless MAC protocols have been proposed and even standardized. However, there has yet been an attempt to understand why certain designs are used and what makes certain protocols better than others. In this paper, we survey several popular, contemporary, wireless, random access MAC protocols and determine the effects behind the design choices of these protocols.  相似文献   

17.
In a wide variety of broadband applications, there is a need to distribute information to a potentially large number of receiver sites that are widely dispersed from each other. Communication satellites are a natural technology option and are extremely well suited for carrying such services because of the inherent broadcast capability of the satellite channel. Despite the potential of satellite multicast, there exists little support for multicast services over satellite networks. Although several multicast protocols have been proposed for use over the Internet, they are not optimized for satellite networks. One of the key multicast components that is affected when satellite networks are involved in the communication is the transport layer. In this paper, we attempt to provide an overview of the design space and the ways in which the network deployment and application requirements affect the solution space for transport layer schemes in a satellite environment. We also highlight some of the issues that are critical in the development of next generation satellite multicast services. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

18.
Zhu  Shicheng  Yang  Shunkun  Gou  Xiaodong  Xu  Yang  Zhang  Tao  Wan  Yueliang 《Wireless Personal Communications》2022,123(1):165-194

The concept of Internet of Things (IoT) was designed to change everyday lives of people via multiple forms of computing and easy deployment of applications. In recent years, the increasing complexity of IoT-ready devices and processes has led to potential risks related to system reliability. Therefore, the comprehensive testing of IoT technology has attracted the attention of many researchers, which promotes the extensive development of IoT testing methods and infrastructure. However, the current research on IoT testing methods and testbeds mainly focuses on specific application scenarios, lacking systematic review and analysis of many applications from different points of view. This paper systematically summarizes the latest testing methods covering different IoT fields and discusses the development status of the existing Internet of things testbed. Findings of this review demonstrate that IoT testing is moving toward larger scale and intelligent testing, and that in near future, IoT test architecture is set to become more standardized and universally applicable with multi-technology convergence—i.e., a combination of big data, cloud computing, and artificial intelligence—being the prime focus of IoT testing.

  相似文献   

19.

The Internet of Things (IoT) embodies the confluence of the virtual & physical world. IoT will play an important role in managing the managing depleting resource such as water, fuel, food, etc. However, to realize these applications enormous IoT devices will communicate with each other. This massive connectivity will directly or indirectly aid in Green House Gas emissions. Hence, to admissibly reduce this environmental impact of IoT, it must be greened in terms of energy consumption. Green IoT will reduce environmental exploitation by slashing carbon emission effectively and thus will help in achieving sustainability of the planet. This paper describes the journey of IoT to Green IoT. Along with this, the survey on recent Green-IoT techniques that will effectively help in reducing required energy consumption is presented. Along with this ability of unmanned aerial vehicle (UAV) technology to provide Green IoT and survey on recent energy-efficient UAV assisted communication is presented. In addition to this, a dual battery enabled Unmanned Aerial vehicle base station, an energy-efficient clustering algorithm, has also been proposed to prolong the battery life.

  相似文献   

20.
Internet of Things (IoT) technologies allow everyday objects including small devices in sensor networks to be capable of connecting to the Internet. Such an innovative technology can lead to positive changes in human life. However, if there is no proper security mechanism, private and sensitive data around humans can be revealed to the public Internet. In this aspect, this paper considers security issues of the IoT. In particular, we focus on various challenges in deploying Datagram Transport Layer Security (DTLS) protocol into a resource constrained environment. DTLS provides secure communication with UDP-based applications the same as TLS does for TCP-based applications. Several standard organizations such as IETF, oneM2M and OMA recommend using the DTLS as a default secure scheme for CoAP which is a new standard specified for resource-constrained environments. To find a practical way to deploy the DTLS in such a constrained IoT environments, we propose an IoT–Cloud collaboration system, where DTLS handshake delegation is the main component. We also implement and evaluate the proposed system in our real IoT testbed, where constrained devices are interconnected with each other in a multi-hop fashion. Evaluation results show that the proposed scheme dramatically reduces DTLS handshake latency, implementation code size and energy consumption.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号