3 research outputs found
NDN, CoAP, and MQTT: A Comparative Measurement Study in the IoT
This paper takes a comprehensive view on the protocol stacks that are under
debate for a future Internet of Things (IoT). It addresses the holistic
question of which solution is beneficial for common IoT use cases. We deploy
NDN and the two popular IP-based application protocols, CoAP and MQTT, in its
different variants on a large-scale IoT testbed in single- and multi-hop
scenarios. We analyze the use cases of scheduled periodic and unscheduled
traffic under varying loads. Our findings indicate that (a) NDN admits the most
resource-friendly deployment on nodes, and (b) shows superior robustness and
resilience in multi-hop scenarios, while (c) the IP protocols operate at less
overhead and higher speed in single-hop deployments. Most strikingly we find
that NDN-based protocols are in significantly better flow balance than the
UDP-based IP protocols and require less corrective actions
On Information-centric Resiliency and System-level Security in Constrained, Wireless Communication
The Internet of Things (IoT) interconnects many heterogeneous embedded devices either locally between each other, or globally with the Internet. These things are resource-constrained, e.g., powered by battery, and typically communicate via low-power and lossy wireless links. Communication needs to be secured and relies on crypto-operations that are often resource-intensive and in conflict with the device constraints. These challenging operational conditions on the cheapest hardware possible, the unreliable wireless transmission, and the need for protection against common threats of the inter-network, impose severe challenges to IoT networks. In this thesis, we advance the current state of the art in two dimensions.
Part I assesses Information-centric networking (ICN) for the IoT, a network paradigm that promises enhanced reliability for data retrieval in constrained edge networks. ICN lacks a lower layer definition, which, however, is the key to enable device sleep cycles and exclusive wireless media access. This part of the thesis designs and evaluates an effective media access strategy for ICN to reduce the energy consumption and wireless interference on constrained IoT nodes.
Part II examines the performance of hardware and software crypto-operations, executed on off-the-shelf IoT platforms. A novel system design enables the accessibility and auto-configuration of crypto-hardware through an operating system. One main focus is the generation of random numbers in the IoT. This part of the thesis further designs and evaluates Physical Unclonable Functions (PUFs) to provide novel randomness sources that generate highly unpredictable secrets, on low-cost devices that lack hardware-based security features.
This thesis takes a practical view on the constrained IoT and is accompanied by real-world implementations and measurements. We contribute open source software, automation tools, a simulator, and reproducible measurement results from real IoT deployments using off-the-shelf hardware. The large-scale experiments in an open access testbed provide a direct starting point for future research
Observing IoT resources over ICN
| openaire: EC/H2020/643990/EU//POINTThe Constrained Application Protocol (CoAP) is an HTTP-like protocol for RESTful applications intended to run on constrained devices, typically part of the Internet of Things. CoAP observe is an extension to the CoAP specification that allows CoAP clients to observe a resource through a simple publish/subscribe mechanism. In this paper we leverage Information- Centric Networking (ICN), transparently deployed within the domain of a network provider, to provide enhanced CoAP services. We present the design and the implementation of CoAP observe over ICN and we discuss how ICN can provide benefits to both network providers and CoAP applications, even though the latter are not aware of the existence of ICN. In particular, the use of ICN results in smaller state management and simpler implementation at CoAP endpoints, and less communication overhead in the network.Peer reviewe