Which IoT protocol? Comparing standardized approaches over a common M2M application

Authors: Fysarakis, K., Askoxylakis, I., Soultatos, O., Papaefstathiou, I., Manifavas, C. and Katos, V.

Journal: Proceedings - IEEE Global Communications Conference, GLOBECOM

eISSN: 2576-6813

ISSN: 2334-0983

DOI: 10.1109/GLOCOM.2016.7842383

Abstract:

Computing devices already permeate working and living environments, while researchers and engineers aim to exploit the potential of pervasive systems in order to introduce new types of services and address inveterate and emerging problems. This process will lead us eventually to the era of urban computing and the Internet of Things (IoT). However, the long-promised improvements require overcoming some significant obstacles introduced by these technological advancements. One such obstacle is the lack of interoperable solutions, to facilitate the use, monitoring and management of the plethora of devices and their services. While seamless machine-to-machine (M2M) and human-to-machine (H2M) interactions are a necessity for secure and truly ubiquitous computing, the current status quo is that of a segregated and incompatible assortment of devices. The resource-constraints of the platforms integrated into smart environments, and their heterogeneity in hardware, network and overlaying technologies, only exacerbate these interoperability issues. Motivated by the above, this paper identifies three promising, standardized protocols, each following a different approach in addressing the above concerns. We evaluate the selected protocols in the context of designing and implementing an application requiring various M2M interactions, namely a policy-based access control framework for IoT devices. Thus, three variants of the application are developed, considering each protocol's intrinsic characteristics and features. Finally, the developed applications are evaluated on a common testbed of embedded devices, allowing us to extract useful conclusions concerning the protocols' performance, their intricacies and their applicability in similar applications.

https://eprints.bournemouth.ac.uk/24345/

Source: Scopus

Which IoT Protocol?

Authors: Fysarakis, K., Askoxylakis, I., Soultatos, O., Papaefstathiou, I., Manifavas, C. and Katos, V.

Journal: 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)

ISSN: 2334-0983

https://eprints.bournemouth.ac.uk/24345/

Source: Web of Science (Lite)

Which IoT Protocol? Comparing standardized approaches over a common M2M application

Authors: Fysarakis, K., Askoxylakis, I., Manifavas, C., Soultatos, O., Papaefstathiou, I. and Katos, V.

Conference: IEEE Globecom

Dates: 4 December-8 July 2016

https://eprints.bournemouth.ac.uk/24345/

Source: Manual

Which IoT Protocol? Comparing standardized approaches over a common M2M application

Authors: Fysarakis, K., Askoxylakis, I., Manifavas, C., Soultatos, O., Papaefstathiou, I. and Katos, V.

Conference: IEEE Globecom

Abstract:

Computing devices already permeate working and living environments, while researchers and engineers aim to exploit the potential of pervasive systems in order to introduce new types of services and address inveterate and emerging problems. This process will lead us eventually to the era of urban computing and the Internet of Things (IoT). However, the long- promised improvements require overcoming some significant obstacles introduced by these technological advancements. One such obstacle is the lack of interoperable solutions, to facilitate the use, monitoring and management of the plethora of devices and their services. While seamless machine-to-machine (M2M) and human-to-machine (H2M) interactions are a necessity for secure and truly ubiquitous computing, the current status quo is that of a segregated and incompatible assortment of devices. The resource-constraints of the platforms integrated into smart environments, and their heterogeneity in hardware, network and overlaying technologies, only exacerbate these interoperability issues. Motivated by the above, this paper identifies three promising, standardized protocols, each following a different approach in addressing the above concerns. We evaluate the selected protocols in the context of designing and implementing an application requiring various M2M interactions, namely a policy-based access control framework for IoT devices. Thus, three variants of the application are developed, considering each protocol’s intrinsic characteristics and features. Finally, the developed applications are evaluated on a common testbed of embedded devices, allowing us to extract useful conclusions concerning the protocols’ performance, their intricacies and their applicability in similar applications.

https://eprints.bournemouth.ac.uk/24345/

Source: BURO EPrints