Home > Internet of Things > A Survey of Protocols and Standards for Internet of Things

A Survey of Protocols and Standards for Internet of Things

References

[1] STAMFORD,“Gartner’s 2014 hype cycle for emerging technologies maps the journey to digital business,” August 2014, http://www.gartner.com/newsroom/id/2819918, (accessed February 24, 2017).

[2] Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. McCann, and K. Leung, “A survey on the IETF protocol suite for the internet of things: standards, challenges, and opportunities,” in IEEE Wireless Communications, vol. 20, no. 6, 2013, pp. 91-98.

[3] J. Granjal, E. Monteiro, and J. Sa Silva, “Security for the internet of things: A survey of existing protocols and open research issues,” in IEEE Communications Surveys Tutorials, vol. 17, no. 3, 2015, pp. 1294-1312.

[4] V. Karagiannis, P. Chatzimisios, F. Vazquez-Gallego, and J. Alonso- Zarate, “A survey on application layer protocols for the internet of things,” in Transaction on IoT and Cloud Computing, vol. 3, no. 1, 2015, pp. 11-17.

[5] A. Al-Fuqaha, M. Guizani, M. Mohaßmmadi, M. Aledhari, and M. Ayyash, “Internet of things: A survey on enabling technologies, protocols and applications,” in IEEE Communications Surveys Tutorials, vol. 17, no. 4, 2015, pp. 2347-2376.

[6] IEEE802.15.4-2011, “IEEE standard for local and metropolitan area network–part 15.4: Low-rate wireless personal area networks (LR-WPAN),” in IEEE Standards, April, 2012, pp.1-225.

[7] M. Park, “IEEE 802.11ah: sub-1-ghz license-exempt operation for the internet of things,” IEEE Communications Magazine, vol. 53, no. 9, 2015, pp. 145-151.

[8] A. Kim, F. Hekland, S. Petersen, and P. Doyle, “When hart goes wireless: Understanding and implementing the wirelesshart standard,” in IEEE International Conference on Emerging Technologies and Factory Automation, 2008, pp. 899–907.

[9] M. Nobre, I. Silva, and L. A. Guedes, “Routing and scheduling algorithms for WirelessHART Networks: a survey,” in Sensors 15, no. 5, 2015, pp. 9703-9740.

[10] Z-Wave, “Z-wave protocol overview,” April 2006, https://wiki.ase.tut.fi/courseWiki/images/9/94/SDS10243_2_Z_Wave_Protocol_Overview.pdf, (accessed February 24, 2017).

[11] J. Decuir, “Bluetooth 4.0: Low Energy,” 2010, https://californiaconsultants.org/wp-content/uploads/2014/05/CNSV-1205-Decuir.pdf , (accessed February 24, 2017).

[12] C. Gomez, J. Oller, and J. Paradells, “Overview and evaluation of 
Bluetooth low energy: An emerging low-power wireless technology,” 
in Sensors, vol. 12, no. 9, 2012, pp. 11734-11753.

[13] Zigbee, “Zigbee resource guide,” 2016, http://www.nxtbook.com/nxtbooks/webcom/zigbee_rg2016/#/0, (accessed February 24, 2017).

[14] O. Cetinkaya and O. Akan, “A dash7-based power metering system,” in 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), 2015, pp. 406–411.

[15] HomePlog Alliance, “HomePlug™ AV2 Technology,” 2007 http://www.homeplug.org/media/filer_public/2c/32/2c327fc8-25bb-409e-abf7-c398534c24dc/homeplug_av2_whitepaper_130909.pdf,(accessed February 24, 2017).

[16] A. Brandt and J. Buron, “Transmission of IPv6 Packets over ITU-T G.9959 Networks,” IETF RFC 7428, February 2015, https://www.ietf.org/rfc/rfc7428.txt, (accessed February 24, 2017).

[17] ITU-T, “Short range narrow-band digital radio communication transceivers PHY and MAC layer specifications,” 2012, https://www.itu.int/rec/T-REC-G.9959 , (accessed February 24, 2017).

[18] M. Hasan, E. Hossain, and D. Niyato, “Random access for machine- to-machine communication in lte-advanced networks: issues and approaches,” in IEEE Communications Magazine, vol. 51, no. 6, 2013, pp. 86-93.

[19] N. Sornin, M. Luis, T. Eirich, T. Kramp, and O.Hersent, “Lorawan specification,” LoRa Alliance, January 2015, https://www.lora-alliance.org/portals/0/specs/LoRaWAN%20Specification%201R0.pdf, (accessed February 24, 2017).

[20]I. Poole, “Weightless wireless — m2m white space communications-tutorial,” 2014, http://www.radio-electronics.com/info/wireless/weightless-m2m-white-space-wireless-communications/basics-overview.php, (accessed February 24, 2017).

[21] S. Bush, “Dect/ule connects homes for iot,” September 2015, http://www.electronicsweekly.com/news/design/communications/dect-ule-connects-homes-iot-2015-09/, (accessed February 24, 2017).

[22] EnOcean, “EnOcean – The World of Energy Harvesting Wireless Technology,” 2015, https://www.enocean.com/en/technology/white-papers/, (accessed February 24, 2017).

[23] R. Kshetrimayum, “An introduction to uwb communication systems,” in IEEE Potentials, vol. 28, no. 2, 2013, pp. 9-13.

[24] S. Evanczuk, “ANT/ANT+ Solutions Speed Low-Power Wireless Design,” February 2013, http://www.digikey.com/en/articles/techzone/2013/feb/antant-solutions-speed-lowpower-wireless-design, (accessed February 24, 2017).

[25] ISA, “Isa100.11a technology standard,” 2009, http://www.nivis.com/technology/ISA100.11a.php, (accessed February 24, 2017).

[26] T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, J. Vasseur, and R. Alexander, “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks,” IETF RFC 6550, March 2012, http://www.ietf.org/rfc/rfc6550.txt, (accessed February 24, 2017).

[27] Aijaz and A. Aghvami, “Cognitive machine-to-machine communications for internet-of-things: A protocol stack perspective,” in IEEE Internet of Things Journal, vol. 2, no. 2, 2015, pp. 103-112.

[28] S. Basagni, C. Petrioli, R. Petroccia, and D. Spaccini, “Carp: A channel-aware routing protocol for underwater acoustic wireless networks,” in Ad Hoc Networks, vol. 34, 2015, pp. 92-104.

[29] D. Dujovne, T. Watteyne, X. Vilajosana, and P. Thubert, “6tisch: deterministic ip-enabled industrial internet of things,” in IEEE Communications Magazine, vol. 52, no. 12, 2014, pp. 36–41.

[30] Internet Engineering Task Force, “IPv6 over Networks of Resource-constrained Nodes (6lo),” https://datatracker.ietf.org/wg/6lo/documents/, (accessed February 24, 2017).

[31] J. Nieminen, T. Savolainen, M. Isomaki, B. Patil, Z. Shelby ,and C. Gomez, “IPv6 over BLUETOOTH(R) Low Energy,” IETF RFC 7668, October 2015, http://www.ietf.org/rfc/rfc7668.txt, (accessed February 24, 2017).

[32] OASIS, “MQTT Version 3.1.1,” 2014, http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt-v3.1.1-os.pdf, (accessed February 24, 2017).

[33] M. Singh, M. Rajan, V. Shivraj, and P. Balamuralidhar, “Secure mqtt for internet of things (iot),” in Fifth International Conference on Communication Systems and Network Technologies (CSNT), 2015, pp. 746-751.

[34] OASIS, “Oasis advanced message queuing protocol (amqp) version 1.0,” 2012, from http://docs.oasis-open.org/amqp/core/v1.0/os/amqp-core-complete-v1.0-os.pdf, (accessed February 24, 2017).

[35] Z. Shelby, K. Hartke, and C. Bormann, “The Constrained Application Protocol (CoAP),” IETF RFC 7252, June 2014, http://www.ietf.org/rfc/rfc7252.txt, (accessed February 24, 2017).

[36] P. Saint-Andre, “Extensible Messaging and Presence Protocol (XMPP): Core,” IETF RFC 6120, March 2011 https://tools.ietf.org/html/rfc6120, (accessed February 24, 2017).

[37] O. M. Group, “Data Distribution Service (DDS)-v1.4,” April 2015, http://www.omg.org/spec/DDS/1.4, (accessed February 24, 2017).

[38] IEEE, “IEEE Standard for a Convergent Digital Home Network for Heterogeneous Technologies,” in IEEE Standards 1905.1-2013, 2013, pp.1-93.

[39] K. Malar and N. Kamaraj, “Development of smart transducers with ieee 1451.4 standard for industrial automation,” in International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2014, pp. 111-114.

[40] A. John Blackford, and P. Mike Digdon, “Tr-069 CPE wan management protocol,” 2013, https://www.broadband-forum.org/technical/download/TR-069.pdf, (accessed February 24, 2017).

[41] Open Mobile Alliance, “Device Management Architecture,” 2016, http://www.openmobilealliance.org/release/DM/V2_0-20160209-A/OMA-AD-DM-V2_0-20160209-A.pdf, (accessed February 24, 2017).

[42] Open Mobile Alliance, “Lightweight machine to machine architecture,” December 2013, http://www.openmobilealliance.org/release/LightweightM2M/V1_0-20151214-C/OMA-AD-LightweightM2M-V1_0-20131210-C.pdf, (accessed February 24, 2017).

[43] G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, “Transmission of IPv6 Packets over IEEE 802.15.4 Networks,” IETF RFC 4944, September 2007, https://tools.ietf.org/html/rfc4944, (accessed February 24, 2017).

[44] J. Hui and P. Thubert, Compression Format for IPv6 Datagrams over IEEE 802.15.4‐Based Networks, IETF RFC 6262, September 2011, https://tools.ietf.org/html/rfc6282 (accessed February 24, 2017).

[45] E. Kim, D. Kaspar, and J. Vasseur, “Design and Application Spaces for IPv6 over Low‐Power Wireless Personal Area Networks (6LoWPANs),” IETF RFC 6568, April 2012, http://www.ietf.org/rfc/rfc6568.txt, (accessed February 24, 2017).

[46] P. Pongle and G. Chavan, “A Survey: Attacks RPL and 6LowPAN in IoT,” in International Conference on Pervasive Computing (ICPC 2015), Pune, India, 2015, pp. 1-6.

[47] L. Wallgren, S. Raza, and T. Voigt, “Routing attacks and countermeasures in the RPL based internet of things,” International Journal of Distributed Sensor Networks, vol. 9, no. 8, 2013 pp.1-11.

[48] A. Roger, T. Tsao, V. Daza, A. Lozano, M. Richardson, and M. Dohler, “A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs),” IETF RFC 7416, January 2015, https://tools.ietf.org/html/rfc7416 (accessed February 24, 2017).

[49] H. Tschofenig, and T. Fossati,“Transport Layer Security (TLS)/Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things,” IETF RFC 7925, July 2016, https://tools.ietf.org/html/rfc7925, (accessed February 24, 2017).

[50] IEEE1888, “IEEE standard for ubiquitous green community control network: Security,” in IEEE Standards 1888.3-2013, 2013, pp. 1-30.

[51] TCG, “Guidance for securing iot using tcg technology,” September 2015, http://www.trustedcomputinggroup.org/guidance-securing-iot-using-tcg-technology-reference-document/ , (accessed February 24, 2017).

[52]D. Hardt, “The OAuth 2.0 Authorization Framework,” IETF RFC 6749, October 2012, http://www.ietf.org/rfc/rfc6749.txt (accessed February 24, 2017).

[53] L. Torsten, M. McGloin, and P. Hunt. “OAuth 2.0 threat model and security considerations,” IETF RFC 6819, January 2013, http://www.ietf.org/rfc/rfc6819.txt, (accessed February 24, 2017).

[54] T. Lodderstedt, J. Bradley, and A. Labunets, “OAuth Security Topics,” IETF Draft Nov, 2016. https://tools.ietf.org/html/draft-lodderstedt-oauth-security-topics-00 (accessed February 24, 2017).

[55] A. Melnikov and K. Zeilenga, “Simple Authentication and Security Layer (SASL),” IETF RFC 4422, June 2006, http://www.ietf.org/rfc/ rfc4422.txt (accessed February 24, 2017).

[56] L. Seitz, S. Gerdes, G. Selander, M. Mani, and S. Kumar, “Use Cases for Authentication and Authorization in Constrained Environments,” IETF RFC 7744 Jan. 2016, http://www.ietf.org/rfc/rfc7744.txt, (accessed February 24, 2017).

[57] S. Gerdes, L. Seitz, S. Gerdes, and G. Selander, “An architecture for authorization in constrained environments,” IETF Draft, August 2016, https://www.ietf.org/id/draft-ietf-ace-actors-04.txt (accessed February 24, 2017).

[58] O. Garcia-Morchon, S. Kumar and M. Sethi, “Security Considerations in the IP-based Internet of Things,” IETF Draft, Feb. 2017, Available: https://www.ietf.org/id/draft-irtf-t2trg-iot-seccons-01.txt, (accessed February 24, 2017).

[59] H. Baba, Y. Ishida, T. Amatsu, K. Maeda, “Problems in and among industries for the prompt realization of IoT and safety considerations,” IETF Draft, Oct. 2016, https://datatracker.ietf.org/doc/draft-baba-iot-problems/, (accessed February 24, 2017).

[60] K. Moore, R. Barnes, H. Tschofenig, “Best Current Practices for Securing Internet of Things (IoT) Devices,” IETF Draft, Oct. 2016, https://tools.ietf.org/html/draft-moore-iot-security-bcp-00, (accessed February 24, 2017).

[61] M. A. Iqbal and M. Bayoumi, “Secure End-to-End key establishment protocol for resource-constrained healthcare sensors in the context of IoT,” 2016 International Conference on High Performance Computing & Simulation (HPCS), 2016, pp. 523-530.

[62] J. L. Hernandez-Ramos, J. B. Bernabe and A. Skarmeta, “ARMY: architecture for a secure and privacy-aware lifecycle of smart objects in the internet of my things,” in IEEE Communications Magazine, vol. 54, no. 9, 2016, pp. 28-35.

[63] V. H. La, R. Fuentes and A. R. Cavalli, “A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks,” in 22nd Asia-Pacific Conference on Communications (APCC), 2016, pp. 230-237.

[64] S. Zamfir, T. Balan, I. Iliescu and F. Sandu, “A security analysis on standard IoT protocols,” in International Conference on Applied and Theoretical Electricity (ICATE), 2016, pp. 1-6.

[65] S. A. Kumar, T. Vealey and H. Srivastava, “Security in Internet of Things: Challenges, Solutions and Future Directions,” in 49th Hawaii International Conference on System Sciences (HICSS), 2016, pp. 5772-5781.
[66] Wikipedia, “Blockchain (database),” https://en.wikipedia.org/wiki/Blockchain_(database), (accessed February 24, 2017).

[67] Postscapes, “Blockchain IoT Projects and Applications | 2016 Guide,” http://www.postscapes.com/blockchains-and-the-internet-of-things/ (accessed February 24, 2017).

[68] P. Kianmajd, J. Rowe and K. Levitt, “Privacy-preserving coordination for smart communities,” in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2016, pp. 1045-1046.

[69] S. H. Hashemi, F. Faghri, P. Rausch and R. H. Campbell, “World of Empowered IoT Users,” in IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), 2016, pp. 13-24.

[70] K. Christidis and M. Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things,” in IEEE Access, vol. 4, 2016, pp. 2292-2303.

[71] A. Marcella, “Blockchain-Based Architectures for the Internet of Things: A Survey,” May 15, 2016, https://ssrn.com/abstract=2846810, (accessed February 24, 2017).

[72] J. Lee, Y. Kim, Y. Kwak, J. Zhang, A. Papasakellariou, T. Novlan, C. Sun and Y. Li, “LTE-advanced in 3GPP Rel -13/14: an evolution toward 5G,” in IEEE Communications Magazine, vol. 54, no. 3, 2016, pp. 36-42.

[73] C. Hoymann, D. Astely, M. Stattin, G. Wikstrom, J. F. Cheng, A. Hoglund, M. Frenne, R. Blasco, J. Huschke and F. Gunnarsson, “LTE release 14 outlook,” in IEEE Communications Magazine, vol. 54, no. 6, 2016, pp. 44-49.

1 2 3 4 5 6 7 8 9 10

Leave a Comment:

Your email address will not be published. Required fields are marked *