Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
141
result(s) for
"application layer protocols"
Sort by:
An Hybrid device authentication algorithm for edge-based IoT networks
by
Prashant Kumar
,
Kota Solomon Raju
,
Andhe Dharani
in
application layer protocols
,
constrained application layer protocol
,
device authentication
2026
The Internet of Things (IoT) has emerged as the highly significant technology in today's world. IoT enables both users and devices to access services according to their needs from any location at any time. The data produced by these devices are vast and sensitive. Edge computing is crucial in IoT, offering services such as low latency, efficient data and network management, privacy and security and enhanced mobility. Solutions for privacy and security based on edge computing are essential for safeguarding the services and data generated by smart homes. Additionally, most IoT devices have limited storage and computing capabilities. Ensuring reliable device authentication is crucial in IoT, presenting challenges, such as resource constraints, heterogeneity, network dynamics and the deployment of IoT devices in remote areas. An edge-based IoT network is employed to meet the security needs of constrained devices. In this study, we introduce a novel edge-based architecture for smart homes and protect data and information by implementing a hybrid authentication algorithm. This hybrid device authentication algorithm is later integrated with the CoAP protocol, as the devices communicate using the CoAP protocol, and its detailed analysis is presented.
Journal Article
Internet of Things: A Comprehensive Overview on Protocols, Architectures, Technologies, Simulation Tools, and Future Directions
by
Herencsar, Norbert
,
Elbaz, Abdelmoniem
,
Soltan, Ahmed
in
application layer protocols
,
Central processing units
,
Communication
2023
The Internet of Things (IoT) is a global network of interconnected computing, sensing, and networking devices that can exchange data and information via various network protocols. It can connect numerous smart devices thanks to recent advances in wired, wireless, and hybrid technologies. Lightweight IoT protocols can compensate for IoT devices with restricted hardware characteristics in terms of storage, Central Processing Unit (CPU), energy, etc. Hence, it is critical to identify the optimal communication protocol for system architects. This necessitates an evaluation of next-generation networks with improved characteristics for connectivity. This paper highlights significant wireless and wired IoT technologies and their applications, offering a new categorization for conventional IoT network protocols. It provides an in-depth analysis of IoT communication protocols with detailed technical information about their stacks, limitations, and applications. The study further compares industrial IoT-compliant devices and software simulation tools. Finally, the study provides a summary of the current challenges, along with a broad overview of the future directions to tackle the challenges, in the next IoT generation. This study aims to provide a comprehensive primer on IoT concepts, protocols, and future insights that academics and professionals can use in various contexts.
Journal Article
Security of IoT Application Layer Protocols: Challenges and Findings
2020
IoT technologies are becoming pervasive in public and private sectors and represent presently an integral part of our daily life. The advantages offered by these technologies are frequently coupled with serious security issues that are often not properly overseen or even ignored. The IoT threat landscape is extremely wide and complex and involves a wide variety of hardware and software technologies. In this framework, the security of application layer protocols is of paramount importance since these protocols are at the basis of the communications among applications and services running on different IoT devices and on cloud/edge infrastructures. This paper offers a comprehensive survey of application layer protocol security by presenting the main challenges and findings. More specifically, the paper focuses on the most popular protocols devised in IoT environments for messaging/data sharing and for service discovery. The main threats of these protocols as well as the Common Vulnerabilities and Exposures (CVE) for their products and services are analyzed and discussed in detail. Good practices and measures that can be adopted to mitigate threats and attacks are also investigated. Our findings indicate that ensuring security at the application layer is very challenging. IoT devices are exposed to numerous security risks due to lack of appropriate security services in the protocols as well as to vulnerabilities or incorrect configuration of the products and services being deployed. Moreover, the constrained capabilities of these devices affect the types of security services that can be implemented.
Journal Article
A Multi-Protocol IoT Platform Based on Open-Source Frameworks
by
Pitsilis, Vassilis
,
Akasiadis, Charilaos
,
Spyropoulos, Constantine D.
in
Access control
,
Communication
,
Infrastructure
2019
Internet of Things (IoT) technologies have evolved rapidly during the last decade, and many architecture types have been proposed for distributed and interconnected systems. However, most systems are implemented following fragmented approaches for specific application domains, introducing difficulties in providing unified solutions. However, the unification of solutions is an important feature from an IoT perspective. In this paper, we present an IoT platform that supports multiple application layer communication protocols (Representational State Transfer (REST)/HyperText Transfer Protocol (HTTP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), Constrained Application Protocol (CoAP), and Websockets) and that is composed of open-source frameworks (RabbitMQ, Ponte, OM2M, and RDF4J). We have explored a back-end system that interoperates with the various frameworks and offers a single approach for user-access control on IoT data streams and micro-services. The proposed platform is evaluated using its containerized version, being easily deployable on the vast majority of modern computing infrastructures. Its design promotes service reusability and follows a marketplace architecture, so that the creation of interoperable IoT ecosystems with active contributors is enabled. All the platform’s features are analyzed, and we discuss the results of experiments, with the multiple communication protocols being tested when used interchangeably for transferring data. Developing unified solutions using such a platform is of interest to users and developers as they can test and evaluate local instances or even complex applications composed of their own IoT resources before releasing a production version to the marketplace.
Journal Article
Comparing application layer protocols for video transmission in IoT low power lossy networks: an analytic comparison
by
Khansari, Mohammad
,
Ghotbou, Arvin
in
Communications Engineering
,
Computer Communication Networks
,
Electrical Engineering
2021
Wide-spread use of low power lossy networks (LLNs) in internet of things (IoT) raises numerous challenges to video transmission over those networks. Deployment of proper application layer protocols can overcome some of those challenges and be influential on video transmission over LLNs. Although there are many good researches on application layer protocols in IoT, none of them provide a review for these protocols in video transmission scenarios. In this paper a comparison among some of these protocols including AMQP, CoAP, DDS, MQTT, MQTT-SN, Websocket, XMPP, HTTP 1.1/2.0, RTP and its control protocols such as RTCP is performed. The comparison shows that the nature of LLNs make video transmission an impossible task for some of these protocols and a proper protocol such as CoAP should be adapted to be used in these low power and lossy environments.
Journal Article
A Semantic Gateway for Internet of Things Interoperability at the Application Layer
by
Benkhaled, Sihem
,
Hemam, Mounir
in
application-layer protocols
,
Communication
,
Internet of Things
2022
Due to the rapid growth of the Internet of Things (IoT), researchers have demonstrated various IoT solutions, which are used to interconnect a wide range of IoT devices through the Internet. However, IoT stumbled into vertical silos; the available solutions provide specific IoT infrastructure, devices, protocols, data formats and models. This diversity and heterogeneity lead to interoperability issues. Heterogeneity happens at all IoT layers, especially at the application layer; devices often adopt mutually incompatible application-layer communication protocols to connect devices to IoT services. Furthermore, in order to integrate semantics to raw data, each system uses its one domain-specific ontology to make data more understandable and interpretable by adding semantic annotations. Working in isolation reduces the interoperability among IoT devices and systems, things across domains need to internetwork and collaborate to provide high level IoT services. Therefore, to alleviate the problem of both communication protocol interoperability and semantic interoperability across vertical silos of systems at the application layer, this paper proposes a semantic gateway (SGIoT) that acts as a bridge between heterogeneous sink nodes at the physical level and IoT services. SGIoT enables interconnectivity between communication protocols such as CoAP and MQTT regardless of their communication model, meanwhile it enables semantics integration throu gh cross-domain ontology (CDOnto) for semantic annotation, in order to provide interpretation of messages among IoT applications across domains. Our approach focuses on modularity and extensibility.
Journal Article
Clustering unknown network traffic with dual-path autoencoder
2023
Currently, the proportion of unknown traffic in networks continues to increase. This poses great challenges to the management and security of cyberspace. The unknown traffic refers to network traffic generated by previously unknown protocols in a preconstructed traffic identification system. Measures to address this challenge can be developed by grouping the mixed unknown traffic into multiple clusters, where, ideally, each cluster contains just one traffic class. In this paper, we propose a novel scheme for clustering unknown traffic, named dual-path autoencoder-based clustering, to discover protocol-based traffic classes. The dual-path autoencoder model refers to the combination of convolutional autoencoder and deep autoencoder, which realizes the extraction and aggregation of payload features and statistical features. Then, the fusion feature is clustered by the correlation-adjusted clustering module, and the unknown traffic flows are divided into multiple high-purity clusters. To evaluate our scheme, experiments are conducted on two public network traffic datasets and one campus network dataset. Using seven common application layer protocols to simulate unknown traffic, the evaluation results show that our scheme can achieve above 98% on each dataset when the preset number of clusters is 60. This establishes the effectiveness of the proposed scheme for clustering unknown network protocols.
Journal Article
Energy Saving Chaotic Sequence Based Encryption, Authentication and Hashing for M2M Communication of IoT Devices
2023
In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energyefficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices.
Journal Article
Application Layer Protocol for a Heterogeneous Group of Mobile Robots in Search and Rescue Scenarios
2025
Search and rescue (SaR) robotics is a fast-growing domain of academic research and field applications. Robots are widely used in various tasks before, during and after a disaster outbreak. SaR missions require fast hardware deployment, should rely on robust systems and tend employing groups of collaborating robots, which increase overall system performance and reliability. Heterogeneous robotic group connectivity demands a unified way of communication, which could be used by robots with different hardware and software. Such communication protocol should be open source and flexible enough to be applicable in international SaR missions. In this paper, we present a new protocol for heterogeneous robots’ interaction within a SaR mission. The proposed application layer protocol is based on well-tested modern technologies and implements the above-listed features that make it applicable in practice. The protocol is extendable, flexible and outperforms previously developed SaR robotics interaction protocols since it considers advantages, disadvantages and implementation difficulties that had been faced by the previously suggested protocols. The protocol was experimentally validated in a joint mapping task within a laboratory environment.
Journal Article
A Bibliometric Analysis on Optimization of Application Layer Protocols in the Internet of Things
2021
Internet of Things (loT), getting popular day by day, thanks to the every object that has been made intelligent and started communicated among themselves with ease. These objects are equipped with sensors and capable of connecting and exchanging the application data over the Internet. While the application data is getting exchanged among these intelligent objects smoothly, there are various concerns with these intelligent objects like they are constrained when it comes to resources like memory, processing capability, power consumption etc. In this regard many attempts are made to enhance or to optimize existing messaging protocols so that we can get best out of these objects. Along with this there are some serious issues need to be addressed to achieve the growth of IoT systems globally, to name a few are security, standardization, privacy, government regulations and politics and civic engagement. In this article, we present the previous research contributions in the area of optimization related work in application layer protocols in IoT, especially Message Queuing Telemetry Transport (MQTT) Protocol and Constrained Application Protocol (CoAP) by the help of detail bibliometric analysis. For this analysis, we have referred to the Scopus database and for pictorial depiction of the data we have used the tools like VOSviewer, iMapBuilder. We have selected last 10 years duration for this analysis considering the significant evolvement in the IoT and its allied areas. In this period, a total of 1106 research articles are published by various researchers. We have observed the significant rise in the research in IoT related areas in last 4 years, where the total of 862 articles are published & in the year of 2019, it was having the maximum count of 287 articles published. The detailed analysis study revealed that a maximum of published articles are conference papers followed by journal articles and book chapters. According to the analysis, India is the torch bearer in the IoT related research areas & is followed by countries like South Korea and Italy.
Journal Article