12 research outputs found

    Web Protocols and Challenges of Web Latency in the Web of Things

    Get PDF
    The Internet of Things (IoT) has been substantially dominated by proprietary and domain specific protocol stacks. There is no universal application protocol for the IoT that can work across many networking interfaces available today. The successful implementation of the IoT requires a single universal application layer protocol for devices and applications to talk to each other, regardless of how they are physically connected. One of the simplest and apparent solutions is to reuse mechanism, which is already extensively used for building scalable and interactive applications, such as the World Wide Web (Web) itself. Therefore, the adoption of the Web ecosystem and infrastructure to build applications for the IoT, leads to the concept of the Web of Things (WoT) and extends the IoT with the amalgamation of the Web as an open IoT ecosystem based upon open standards. While the IoT has been focusing on lower layers and hardware infrastructure, the WoT relies exclusively on application level protocols and tools. Web protocols are a critical factor in the successful implementation of the WoT. However, one of the main issues is web latency that may significantly affect the real-time performance of IoT systems. Therefore, this paper conducts a number of practical investigations on the performance and web latency of application layer protocols: HTTP/1.1, SPDY and HTTP/2. Using experimental results, it analyses the challenges of web protocols for the implementation of WoT

    Integration of heterogeneous devices and communication models via the cloud in the constrained internet of things

    Get PDF
    As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains will continue to increase in order to realize the efficiency gains promised by the IoT. Today, however, service developers looking to add value on top of existing IoT systems are faced with very heterogeneous devices and systems. These systems implement a wide variety of network connectivity options, protocols (proprietary or standards-based), and communication methods all of which are unknown to a service developer that is new to the IoT. Even within one IoT standard, a device typically has multiple options for communicating with others. In order to alleviate service developers from these concerns, this paper presents a cloud-based platform for integrating heterogeneous constrained IoT devices and communication models into services. Our evaluation shows that the impact of our approach on the operation of constrained devices is minimal while providing a tangible benefit in service integration of low-resource IoT devices. A proof of concept demonstrates the latter by means of a control and management dashboard for constrained devices that was implemented on top of the presented platform. The results of our work enable service developers to more easily implement and deploy services that span a wide variety of IoT application domains

    A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration

    Get PDF
    The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable. In this context, the novel concept of fog computing as well as the combined fog-to-cloud computing paradigm is becoming essential to decentralize the cloud, while bringing the services closer to the end-system. This article surveys e application layer communication protocols to fulfill the IoT communication requirements, and their potential for implementation in fog- and cloud-based IoT systems. To this end, the article first briefly presents potential protocol candidates, including request-reply and publish-subscribe protocols. After that, the article surveys these protocols based on their main characteristics, as well as the main performance issues, including latency, energy consumption, and network throughput. These findings are thereafter used to place the protocols in each segment of the system (IoT, fog, cloud), and thus opens up the discussion on their choice, interoperability, and wider system integration. The survey is expected to be useful to system architects and protocol designers when choosing the communication protocols in an integrated IoT-to-fog-to-cloud system architecture.Peer ReviewedPostprint (author's final draft

    Sensor function virtualization to support distributed intelligence in the internet of things

    Get PDF
    It is estimated that-by 2020-billion devices will be connected to the Internet. This number not only includes TVs, PCs, tablets and smartphones, but also billions of embedded sensors that will make up the "Internet of Things" and enable a whole new range of intelligent services in domains such as manufacturing, health, smart homes, logistics, etc. To some extent, intelligence such as data processing or access control can be placed on the devices themselves. Alternatively, functionalities can be outsourced to the cloud. In reality, there is no single solution that fits all needs. Cooperation between devices, intermediate infrastructures (local networks, access networks, global networks) and/or cloud systems is needed in order to optimally support IoT communication and IoT applications. Through distributed intelligence the right communication and processing functionality will be available at the right place. The first part of this paper motivates the need for such distributed intelligence based on shortcomings in typical IoT systems. The second part focuses on the concept of sensor function virtualization, a potential enabler for distributed intelligence, and presents solutions on how to realize it

    Improving efficiency, usability and scalability in a secure, resource-constrained web of things

    Get PDF

    Performance Evaluation of Class A LoRa Communications

    Get PDF
    Recently, Low Power Wide Area Networks (LPWANs) have attracted a great interest due to the need of connecting more and more devices to the so-called Internet of Things (IoT). This thesis explores LoRa’s suitability and performance within this paradigm, through a theoretical approach as well as through practical data acquired in multiple field campaigns. First, a performance evaluation model of LoRa class A devices is proposed. The model is meant to characterize the performance of LoRa’s Uplink communications where both physical layer (PHY) and medium access control (MAC) are taken into account. By admitting a uniform spatial distribution of the devices, the performance characterization of the PHY-layer is studied through the derivation of the probability of successfully decoding multiple frames that were transmitted with the same spreading factor and at the same time. The MAC performance is evaluated by admitting that the inter-arrival time of the frames generated by each LoRa device is exponentially distributed. A typical LoRaWAN operating scenario is considered, where the transmissions of LoRa Class A devices suffer path-loss, shadowing and Rayleigh fading. Numerical results obtained with the modeling methodology are compared with simulation results, and the validation of the proposed model is discussed for different levels of traffic load and PHY-layer conditions. Due to the possibility of capturing multiple frames simultaneously, the maximum achievable performance of the PHY/MAC LoRa scheme according to the signal-to-interference-plus-noise ratio (SINR) is considered. The contribution of this model is primarily focused on studying the average number of successfully received LoRa frames, which establishes a performance upper bound due to the optimal capture condition considered in the PHY-layer. In the second stage of this work a practical LoRa point-to-point network was deployed to characterize LoRa’s performance in a practical way. Performance was assessed through data collected in the course of several experiments, positioning the transmitter in diverse locations and environments. This work reports statistics of the received packets and different metrics gathered from the physical-layer

    TLS/PKI Challenges and certificate pinning techniques for IoT and M2M secure communications

    Get PDF
    Transport Layer Security is becoming the de facto standard to provide end-to-end security in the current Internet. IoT and M2M scenarios are not an exception since TLS is also being adopted there. The ability of TLS for negotiating any security parameter, its flexibility and extensibility are responsible for its wide adoption but also for several attacks. Moreover, as it relies on Public Key Infrastructure (PKI) for authentication, it is also affected by PKI problems. Considering the advent of IoT/M2M scenarios and their particularities, it is necessary to have a closer look at TLS history to evaluate the potential challenges of using TLS and PKI in these scenarios. According to this, the article provides a deep revision of several security aspects of TLS and PKI, with a particular focus on current Certificate Pinning solutions in order to illustrate the potential problems that should be addressed

    Resilient IoT Network for short-range data transmission

    Get PDF
    The current trends predict an increase of Internet of Things (IoT) devices to the billionths, changing the everyday life of the human race everywhere around the world. However, in order to work reliably these devices will require a means of communication that leverages current technologies allowing them to transmit data at short distances. The ubiquity of Bluetooth Low Energy (BLE) alongside the solid foundations of IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) will enable the creation of vast networks of interconnected devices in a reliable and transparent way. Nevertheless the validation of such technologies combination is key before the large deployment of such networks can be started. This work validated such a setup, proving that the reliable communication between devices using 6LoWPAN over BLE can be achieved. The project obtained promising results in terms of transparency between this stack and more traditional Internet Protocol (IP) stacks for multiple distances. The conclusions obtained open the possibility for real world scenario testing and small scale deployment for further validation of 6LoWPAN over BLE.As tendências actuais prevêm um aumento de dispositivos de IoT para a ordem dos milhares de milhão, provocando mudanças no dia a dia de pessoas por todo o mundo. Contudo, para garantir que estes dispositivos funcionam de forma ável, irão necessitar de um meio de comunicação que alavanque as technologias actuais de forma a permitir a comunicação a curtas distâncias. A ubiquidade do BLE combinado com as bases sólidas do 6LoWPAN irão possibilitar a criação de vastas redes de dispositivos ligados entre si de forma con ável e transparente. Contudo a validação desta combinação de tecnologias é essencial antes da implantação em larga escala destes sistemas. Este trabalho validou esta combinação de tecnologias, provando que comunicação entre dispositivos utilizando 6LoWPAN sobre BLE é possível. Este projecto obteve resultados promissores em termos de transparências entre esta e stacks mais tradicionais de protocolos de internet. As conclusões obtidas abrem a possibilidade de testes em cenários reais e de instalação de pequenas redes para maior validação de 6LoWPAN sobre BLE
    corecore