0% found this document useful (0 votes)
45 views30 pages

Modern Approaches in Iot and Machine Learning For Cyber Security

iot1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views30 pages

Modern Approaches in Iot and Machine Learning For Cyber Security

iot1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Internet of Things

Vinit Kumar Gunjan


Mohd Dilshad Ansari
Mohammed Usman
ThiDieuLinh Nguyen   Editors

Modern Approaches
in IoT and Machine
Learning for Cyber
Security
Latest Trends in AI
Internet of Things

Technology, Communications and Computing

Series Editors
Giancarlo Fortino, Rende (CS), Italy
Antonio Liotta, Edinburgh Napier University, School of Computing
Edinburgh, UK
The series Internet of Things - Technologies, Communications and Computing
publishes new developments and advances in the various areas of the different facets
of the Internet of Things. The intent is to cover technology (smart devices, wireless
sensors, systems), communications (networks and protocols) and computing
(theory, middleware and applications) of the Internet of Things, as embedded in the
fields of engineering, computer science, life sciences, as well as the methodologies
behind them. The series contains monographs, lecture notes and edited volumes in
the Internet of Things research and development area, spanning the areas of wireless
sensor networks, autonomic networking, network protocol, agent-based computing,
artificial intelligence, self organizing systems, multi-sensor data fusion, smart
objects, and hybrid intelligent systems.
Indexing: Internet of Things is covered by Scopus and Ei-Compendex **
Vinit Kumar Gunjan • Mohd Dilshad Ansari
Mohammed Usman • ThiDieuLinh Nguyen
Editors

Modern Approaches in IoT


and Machine Learning
for Cyber Security
Latest Trends in AI
Editors
Vinit Kumar Gunjan Mohd Dilshad Ansari
Computer Science and Engineering Computer Science and Engineering
CMR Institute of Technology SRM University Delhi-NCR
Hyderabad, India Sonepat, Haryana, India

Mohammed Usman ThiDieuLinh Nguyen


Electrical Engineering Hanoi University of Industry
King Khalid University Hanoi, Vietnam
Abha, Saudi Arabia

ISSN 2199-1073     ISSN 2199-1081 (electronic)


Internet of Things
ISBN 978-3-031-09954-0    ISBN 978-3-031-09955-7 (eBook)
https://doi.org/10.1007/978-3-031-09955-7

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Switzerland AG 2024
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the
editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Paper in this product is recyclable.


Contents


IoT Design Methodology: Architectures and Protocols��������������������������������    1
Abhishek Pathak, Jitendra V. Tembhurne, C. Kalaiarasan, and Tapan Jain

Communication in IoT Devices����������������������������������������������������������������������   21
Dipak Wajgi, Jitendra V. Tembhurne, Rakhi Wajgi, and Tapan Jain

IoT Security and Privacy��������������������������������������������������������������������������������   45
Jitendra V. Tembhurne, Tausif Diwan, and Tapan Kumar Jain

Learning Approaches for Security and Privacy in Internet of Things��������   63
T. Daniya, M. Geetha, Velliangiri Sarveshwaran, and Ch. Madhu Babu

Blockchain Security for the Internet of Things��������������������������������������������   75
N. Nasurudeen Ahamed, P. Karthikeyan, S. Velliangiri, and Vinit
Kumar Gunjan

IoT and Blockchain-Enabled Charging Station for Electric Vehicles��������   93
J. Shanmugapriyan, N. Karuppiah, Velliangiri Sarveshwaran, and
S. Muthubalaji
Human Activity Recognition: Approaches, Datasets, Applications,
and Challenges ������������������������������������������������������������������������������������������������ 103
Alisha Banga, Ravinder Ahuja, and S. C. Sharma

Deep Learning for IoT������������������������������������������������������������������������������������ 113
Tausif Diwan, Jitendra V. Tembhurne, Tapan Kumar Jain, and Pooja Jain
Internet of Everything: Applications�������������������������������������������������������������� 131
Rakhi Wajgi, Jitendra V. Tembhurne, Dipak Wajgi, and Tapan Jain

Artificial Intelligence and Machine Learning with IoT ������������������������������ 159
Shailendra W. Shende, Jitendra V. Tembhurne, and Tapan Kumar Jain

Performance Analysis of Cellular Internet of Things Using Cognitive
Radio ���������������������������������������������������������������������������������������������������������������� 185
Priyanka Mishra, Prabhat Thakur, and G. Singh

v
vi Contents

IOT for Healthcare������������������������������������������������������������������������������������������ 201


G. Suryanarayana, L. N. C. Prakash K, Mohd Dilshad Ansari,
and Vinit Kumar Gunjan

Landslide Monitoring System Using an IoT Wireless Sensor Network������ 219
Gian Quoc Anh, Tran Binh Duong, Vijender Kumar Solanki,
and Duc-Tan Tran
Precision Livestock Farming Systems Based on Accelerometer
Technology and Machine Learning���������������������������������������������������������������� 237
Duc-Nghia Tran, Phung Cong Phi Khanh, Tran Binh Duong,
Vijender Kumar Solanki, and Duc-Tan Tran

Smart IoT-Based Greenhouse Monitoring System �������������������������������������� 261
Agilesh Saravanan. R, Gowri Priya, Sai Nishanth, Praveen Sai,
and Vasanth Kumar

Automatic Water Irrigation System Using IoT �������������������������������������������� 273
P. Sanjan Miller, B. Sai Bhaskar Reddy, M. Govardhan Reddy,
M. Sridhar, and Surendra Kumar Bitra

Development of Safety Monitoring for an IoT-Enabled Smart
Environment ���������������������������������������������������������������������������������������������������� 281
A. Harshitha, Ch. Manikanta Uma Srinivas, M. Eswar Sai,
Krishnaveni Kommuri, and P. Gopi Krishna
Design of a Corn Seed Sowing Machine for Uniform Distribution
of Corn Seeds Using Optimum Seed Distribution Algorithm���������������������� 293
A. Bhujangarao, K. Vidyasagar, B. Surya Prasad Rao,
and G. Suryaprakash
IoT-Based Wastebin-Monitoring and -Tracking System Using
GSM and GPS�������������������������������������������������������������������������������������������������� 311
Khode Mounika, E. N. V. Purna Chandar Rao, and Sudha

Implementation of Secure Health Care Application Using IoT������������������ 325
Hema Sai Sree Gullapalli, Deepika Lakshmi Gunnam,
Gopi Krishna Popuri, Kiran Kumar Anumandla, and Shaik Razia
Air- and Sound-Quality Monitoring with Alert System Using
Node MCU�������������������������������������������������������������������������������������������������������� 333
Ch. Bhupati, J. Rajasekhar, T. Mohan Kumar, Ch. Nagendra,
and A. Bhanu Chand

IoT-Enabled Patient Assisting Device Using Ubidots Webserver���������������� 345
Chella Santhosh, P. Kanakaraja, M. Ravi Kumar, C. H. Sai Sravani,
V. Ramjee, and Y. Asish

Smart Home-Based Smoke Detection with Image Surveillance System���� 357
K. Kiran Kumar, P. S. G. Aruna Sri, G. Vijay Kumar, and G. Murali
Contents vii


IoT-Based Smart Irrigation System �������������������������������������������������������������� 365
P. S. G. Aruna Sri, K. Kiran Kumar, B. B. V. S. V. Prasad,
and G. Vijay Kumar

Agricultural Monitoring and Control of a System Using Smart IoT
Devices�������������������������������������������������������������������������������������������������������������� 375
Y. Padma, M. Sailaja, Shaik Razia, and Mohammed Ali Hussain
An IoT Framework to Support Rural Population with Diabetic
Related Issues via Optimization Algorithms ������������������������������������������������ 387
Vinit Kumar Gunjan, Fahimuddin Shaik, and Rashmi Pathak

IoT-Based Heart Disease Prediction System�������������������������������������������������� 395
Vemula Manvitha, Syed Musthak Ahmed, P. Ramchandar Rao,
and Vinit Kumar Gunjan

Smart Agriculture Monitoring System Using IoT���������������������������������������� 403
Erra Thirupathi, Chakradhar Adupa, P. Ramchandar Rao,
Vinith Kumar Gunjan, and Syed Musthak Ahmed

Index������������������������������������������������������������������������������������������������������������������ 415
About the Editors

Vinit Kumar Gunjan is Dean of Academic Affairs at CMR Institute of Technology


Hyderabad (associated with Jawaharlal Nehru Technological University, Hyderabad)
and Associate Professor in the Department of Computer Science and Engineering.
As an active researcher, he has produced and edited multiple Springer series vol-
umes, as well as published research papers in important IEEE, Elsevier, and Springer
journals and conferences. In 2016, the Science Engineering Research Board,
Department of Science and Technology, Government of India bestowed upon him
the prestigious Early Career Research Award. He is a Senior IEEE member, an
active volunteer of the IEEE Hyderabad section, and has served in various roles
with IEEE, including: 2023 Chair IEEE Computer Society Chapter; 2023 Additional
Treasurer, 2023-2022 SAMIEEE Coordinator; 2021 Additional Secretary;2021
Vice Chairman – IEEE Computational Intelligence Society; and volunteered as
Treasurer, Secretary, and Chairman of the IEEE Young Professionals Affinity Group
and the IEEE Computer Society. Many IEEE and Springer technical and non-tech-
nical workshops, seminars, and conferences have been organised by him. He has
had the honour of collaborating with top IEEE leaders and was awarded the excel-
lent IEEE Young Professional award by the IEEE Hyderabad Section in 2017.

Mohd Dilshad Ansari is currently working as Associate Professor in the Department


of Computer Science and Engineering at SRM University Delhi-NCR, Sonepat,
Haryana, India. He received B.Tech. in Information Technology from Uttar Pradesh
Technical University, Lucknow, UP, in 2009. He received his M.Tech. and Ph.D. in
Computer Science and Engineering from Jaypee University of Information
Technology, Waknaghat, Solan, HP, India, in 2011 and 2018, respectively. He has
more than 10 years of academic/research experience and has published more than
80 papers in international journals (SCIE/Scopus) and conferences (IEEE/Springer).
He is the Member of various technical/professional societies such as IEEE, UACEE
and IACSIT. He has been appointed as Editorial/Reviewer Board and Technical
Programme Committee member in various reputed journals/conferences. He is also
Guest Editor of Special Issues from reputed journals and has organized special

ix
x About the Editors

sessions in IEEE/Springer conferences. His research interest includes Digital and


Fuzzy Image Processing, Machine Learning, IoT and Cloud Computing.

Mohammed Usman received B.E. in Electronics and Communications from


Madras University, India, in 2002. He received his M.Sc. and Ph.D. from the
University of Strathclyde, UK, in 2003 and 2008, respectively. He is the recipient of
the University scholarship from Strathclyde for his Ph.D. He has more than a decade
of experience in academics and academic administration. He is a Senior Member of
IEEE and IEEE Communications Society. He has been TPC Chair and Organizing
Chair for IEEE conferences and actively involved in IEEE activities. He is currently
working as Assistant Professor in the Department of Electrical Engineering at King
Khalid University, Saudi Arabia. He received the & academic excellence' award
from the College of Engineering at King Khalid University and also received the
award for best project in 2016. His research is focused on technologies for next-
generation wireless networks, signal processing for biomedical application, proba-
bilistic modeling and channel coding.

ThiDieuLinh Nguyen, PhD is working in the Division of Electronics and


Telecommunication Engineering in Electronics and Information, Faculty of
Electronics Engineering Technology, Hanoi University of Industry, Vietnam (HaUI).
Currently she is heading the department since 2015. She has more than 17 years of
academic experience in electronics, IoT, Smart Garden and telecommunication. She
has authored or co-authored more than 15 research articles that are published in
journals, books and conference proceedings. She teaches graduate and postgraduate
level courses at HaUI, Vietnam. She received Ph.D. in Information and
Communication Engineering from Harbin Institute of Technology, Harbin, China,
in 2013; Master of Electronic Engineering from Le Quy Don Technical University,
Hanoi, Vietnam in 2006 and Bachelor of Electronic Engineering from HCMC
University of Technology and Education, Vietnam, in 2004. She is an editor for
Artificial Intelligence Trends for Data Analytics Using Machine Learning and Deep
Learning Approaches and Distributed Artificial Intelligence: A Modern Approach
publisher by Taylor & Francis Group, LLC, USA. She is also Board Member of
International Journal of Hyperconnectivity and the Internet of Things (IJHIoT) IGI-
Global, USA, Information Technology Journal, Mobile Networks and Application
Journal and some other reputed journals and international conferences.
IoT Design Methodology: Architectures
and Protocols

Abhishek Pathak, Jitendra V. Tembhurne, C. Kalaiarasan, and Tapan Jain

1 Introduction

The increasing demands of intelligent and user-oriented Internet of Things (IoT)


applications are increasing the facilities of more improved and enhanced methods
for automatising and revolutionising the world scenario. Internet of Things is pro-
viding a paradigm shift to physical devices connected with network for communica-
tion. Different heterogeneous devices with different standards are used in various
applications. Because of this, several challenges are arising to improve the quality
of services (QoS) such as security, privacy, energy efficiency, scalability, interoper-
ability, standardisation of protocols, etc. In the coming years, huge amount of
devices will get involved in building an automatic and intelligent world [2]. In addi-
tion, enhancement in IoT will enhance the challenging issues and services to the
applications horizontally and vertically such as transportation, e-health, home and
industry automation, agriculture, etc. [3]. IOT is a combination of large number of

A. Pathak
Department of Computer Engineering, St. Vincent Pallotti College of Engineering &
Technology, Nagpur, Nagpur, India
J. V. Tembhurne
Department of Computer Science & Engineering, Indian Institute of Information Technology,
Nagpur, Nagpur, India
e-mail: [email protected]
C. Kalaiarasan
School of Engineering, Presidency University, Bengaluru, India
e-mail: [email protected]
T. Jain (*)
Department of Electronics & Communication Engineering, Indian Institute of Information
Technology, Nagpur, Nagpur, India

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024 1


V. K. Gunjan et al. (eds.), Modern Approaches in IoT and Machine Learning
for Cyber Security, Internet of Things, https://doi.org/10.1007/978-3-031-09955-7_1
2 A. Pathak et al.

heterogeneous devices, and these devices send the data for communication. The
data is generated from various types of devices in various forms; hence, data interop-
erability is a challenge in data extraction. To overcome this, adding semantics to it
is the most promising method as discussed in [4]. A method of semantic analysis
and extraction process is described [1, 10]. In a level-wise categorisation of IOT
network, the secure authentication is provided for different non-intelligent and
intelligent devices or nodes. Several research projects are developed and are in pro-
cess to provide solutions to key challenges at various organisations and industries
working in IOT. Many researchers are contributing to provide solutions to key chal-
lenges in terms of scalability and interoperability. In this chapter, we discussed the
design methodologies and explained the description of each methodology in brief.
Architecture with its key goals is explained. In Sect. 3, the building blocks and
explanation about each level are provided. Section 4 explains about the elements
considered for building the architecture. In Sect. 5, various protocols based on pub-
lish/subscribe and request/response category are highlighted with detailed explana-
tion of message format.

2 IoT Design Methodologies

IoT has touched almost all the application areas in the world. The major enhanced
sectors where big amount of contribution is going are healthcare, transport, agricul-
ture, smart homes and industrial applications.
These IoT design and methods are required to implement the applications, and
implementation varies as per the applications. In a broader scope, the key method-
ologies that should describe the specifications shown in Fig. 1 and as per the descrip-
tion presented in [22] are the following.
• Descriptions based on objectives and purpose
• Descriptions based on actions required
• Descriptions based on modelling
• Descriptions based on information
• Descriptions based on functions
• Descriptions based on networking and services

Description based on objectives This is the primary step to know the execution
behaviour of the system, that is, factors to be considered while gathering the data,
information retrieval, and system are collected.

Description based on actions This step specifies the manner of flow of actions,
which are derived from the nature of the system. The behavioural aspects of the
system, which is specific to the application, are identified.
IoT Design Methodology: Architectures and Protocols 3

Fig. 1 Methodologies adopted in IoT

Description based on modelling In this step, the attributes related to the system
devices and the relational effect of devices on each other are identified. The c­ oncepts
involved between the devices are considered, and this helps in predicting the behav-
ioural aspects involved in the system.

Description based on information We identified the structure of information, the


different entities involved in the system, and the different structures on different
levels, which require different parameters to be considered. This assists in receiving
the details of information in the system.

Description based on function This level defines the specifications required for
the functional overview of IoT structure. The functions depend on device, services,
management and security.

Description based on networking This step specifies the networking and inter-
connection parameters on device and component level. Based on an application, the
different devices and components utilised will communicate with their specific
tools and platforms.
4 A. Pathak et al.

3 Architecture

IoT is an emerging area that offers support and services to all areas of engineering
and science. All the components of the systems in machine to machine (M2M),
industries as well as in other organisation develop their functional architectures
based on the basic requirements used. To facilitate the management and support to
these systems, an architecture needs to be developed in order to understand the
interconnection of devices and components. The system should be capable of inter-
connecting the range of node and devices. In the future, IoT will become by default
the basic requisite to the growth and development of business, agriculture and
industry, which will facilitate the services to all the things used in day to day life. To
fulfil the upcoming requirements of the infrastructure to support flexible system
design, scalability and interoperability, we need robust and flexible infrastructure.

3.1 The Key Goals of Architecture

In this section, we discuss the key goals for designing the architecture of IoT.

3.1.1 Ready to Use

To achieve the objective and goals of IoT, we need to identify the usage, applica-
tions and technologies involved in it. The future application and usage will demand
for updates, and changes at all levels of IoT are increasing rapidly with more num-
ber of devices. This gives rise to such an infrastructure, which is readily available
for use, and software and hardware should be capable to update according to the
changes in the application demands.

3.1.2 Modelling and Functionality

Many devices participate in communication and data gathering, and it is important


to know which device is sending the data from which type of application. It may be
possible that in a network, the same type of devices are connected, so distinguishing
the device modelling is necessary in order to provide specific functionality and ser-
vices to that application; therefore, devices are assigned with specific device
identification.
IoT Design Methodology: Architectures and Protocols 5

3.1.3 Privacy and Security

As interoperability is a major issue in the field of IoT and as more heterogeneous


devices communicate with each other, which give rise to the threats to the privacy
of data, infrastructure should provide the functionality of identification, authentica-
tion, confidentiality, integrity and non-repudiation.

3.1.4 Localisation

Infrastructure should also support the mobility, reliability and availability features
in network. The node may be mobile in nature, so communication between mobile-­
to-­mobile types of devices or mobile to non-mobile types of device may happen.
With this, the configuration continuously changes according to the location, thus
availability of devices/nodes is the major factor in communication. Infrastructure
should be capable of providing the functionalities according to the changes
in location.

3.2 Building Blocks of IoT Architecture

Various architectures are proposed according to the technologies. As per the ser-
vices and management, the IoT architecture must consist the three basic layers:
Physical layer, Networking layer and Management layer, as shown in Fig. 2.

Fig. 2 IoT architecture


6 A. Pathak et al.

3.2.1 Physical Layer

As per the international standards for networking, the physical layer specifies the
standards and procedures at basic level of any interconnection wherein physical
means ‘devices’. In IoT, sensors and smart devices or hardware are involved in this
category where a signal is sensed from physical devices, that is, signal form, and
then transformed into the digital signals. Moreover, the developers embed their plat-
forms into the devices according to the applications.
Example In applications related to healthcare, the sensing devices such as pulse
sensors and heartbeat sensor sensed the pulse and heartbeats, respectively, and then
the signals are converted into digital values and values are accumulated according
to the application.

3.2.2 Networking

Networking is the most important part of infrastructure as a medium for process in


IoT. It involves the connection topologies and methods for wired and wireless types
of routing in IoT network. At this layer, basic structure is required to interconnect
end-to-end communication and it differs with the types. These interconnections
may be of same, different or hybrid types. The hybrid interconnection is more vul-
nerable to the updates and in the future attracts attention of network. In some appli-
cations, the technologies are embedded as per the application, which becomes rigid
to the change. The key points to consider in networking are its technology, scalabil-
ity and complexity. Technological revolution may give rise to the changes in the
standards related to the topologies, methods and horizontal growth in wired and
wireless topologies.

3.2.3 Management

Management of data is the most vital process in IoT ecosystem. In IoT, the various
types of data are generated from a variety of devices and managing such data is the
important task. Processing this enormous amount of data, which continuously gets
pulled or pushed, needs management of the data. The key challenges to the data
management are monitoring of data, deployment services, processing and connec-
tivity. There are many technological concepts involved in data management such as:
(i) Event processing
(ii) Data collection and analytics
(iii) Semantics related to networking
Event processing Event processing in nodes and especially in virtual sensors is
becoming one of the emerging research areas in the complex nature of event pro-
cessing. It is based on the knowledge gained by the situations and actions to predict
the behaviour in the future. It can be computational-based and detection-based.
IoT Design Methodology: Architectures and Protocols 7

Data collection and analysis Data collection and gathering is one of the revolu-
tionising areas of IoT wherein data is collected and analysed to acquire specific
information. It supports information exchange between various systems connected
in a network.

Semantics related to networking In today’s world, almost every data is collected


on clouds and accessed. This data is growing to identify the features in application.
So, a mechanism is needed to determine the type of data based on the complexity
level of applications growing because of the increasing demand of data-related
applications. To do so, data is annotated and interpreted to support the scalability
and interoperability in the network.

4 Elements of Internet of Things

As Internet of Things is a paradigm of heterogeneous element, so based on the func-


tionality, the elements of IoT differ. This section specifies the important elements to
be considered for functionality based on services.
(i) Sensing and Identification
(ii) Computation and Services
(iii) Communication
Sensing and Identification The most important process in IoT is to gather the data
coming from various physical objects connected in the network. These devices or
nodes send the data through various links. The devices are assigned with specific
device IDs, and the purpose of IDs are for identification in a network. Sensing and
identification is also represented in Fig. 3.

Example Electronic product codec (EPC) and Ubiquitous are methods available
for this purpose. Sensing and identification is the basic step in the world of IoT,
which is important for further steps of communication and computation.

Fig. 3 Sensing and identification


8 A. Pathak et al.

Computation and Services In IoT, analysis is extracting useful information from


the data for further processing. In analysis, the batches of data are sensed and gath-
ered through embedded sensors. These data are heterogeneous and vary in type. The
analysis helps in understanding the pattern and its structure reducing maintenance,
avoiding failures and improving operations. In computation, the protocols verify the
structures of these data and make them available for processing. The processing is
done on hardware and software level of IoT. On software level, the recent technolo-
gies such as Fog and Cloud computing are used. In IoT, devices embedded with
actuators and other devices are connected. These devices generate big data chunks
in large amount, resulting in the requirement of complex computations to extract
knowledge. In [8], illustration on various IoT platforms is given for utilising hard-
ware such as the series of Arduino platforms and Rasberry-Pi, more modern and
specific application platforms such as Intel Galileo, BeagleBone, Gadgeteer,
WiSense, Cubieboard, T-Mote sky. In addition, researchers contributing to this field
highlighted the applications related to smart devices such as smart phones and com-
puting devices. These intelligently operating devices operate on different operating
systems and software such as TinyOS, RiotOS, LiteOS, Contiki Android and C,
C++ and JAVA. The recent learnings in the field of cloud and Edge computing is
providing advanced computing ability to the field of IOT. A cloud platform provides
facilities to store data on cloud where real-time data can be managed and can be
processed for intelligent analysis.

Communication Communication in IoT is done between devices such as machine


to machine (M2M), Device to Server (D2S) or Server to Server (S2S). These tech-
niques are heterogeneous in behaviour and operation platform, as the objective of
IOT is to connect everything, which is not smart and cannot perform operations. In
such environment, communication protocols and standards make it possible to
interpret and to understand the foreign object data. They facilitate and simplify the
complexity involved in interacting with the other end device. Table 1 shows the
information of variety of communication standards.

Table 1 Communication standards at different levels


Level Communication standard
Infrastructural level Wireless Fidelity (WiFi)
Bluetooth
IEEE 802.15.4
Z-Wave
Long Term Evolution(LTE)-Advanced
Near Field Communication (NFC)
Radio Frequency Identification(RFID)
Management level Advanced Message Queuing Protocol (AMQP)
Constrained Application Protocol (COAP)
Message Queuing Telemetry Transport (MQTT)
Data Distribution Service (DDS)
Extensible Messaging and Presence Protocol (XMPP)
IoT Design Methodology: Architectures and Protocols 9

Infrastructural Level The physical links are established by keeping range and
power into consideration, as power consumption and depletion of devices is the key
element that decides the operating life of devices in a network. Examples of such
protocols, which are used in communication, are IEEE 802.15.4, Z-Wave and LTE-­
Advanced. Some technologies pioneered the requirement for M2M communication
such as RFID, NFC and UWB. RFID facilitates the communication through radio
links, and these radio links identify the object within the range of 10 cm to 200 m
and communicate at 13.56 MHZ of frequency band. In addition, NFC protocols also
communicate at the same high frequency of 13.56 MHZ and support range up to
10 cm. The most promising technology is the WiFi, which arises as a basic support
for IoT infrastructure for communication and services within 100 m range [6].

Management Level As detailed in Sect. 3.2.3, data management involves moni-


toring data for exceptions and errors. To send pulled data from publisher to sub-
scriber, it needs routing logic. The various management protocols are adopted to
manage the communication method between the publishers and subscribers; this
management is done at application layer. The various management protocols are
available for IOT ecosystem such as AMQP, DDS, COAP and MQTT.

5 Standardisation and Protocols

Standardisation is the common set of rules defined to test the protocols on certain
platforms; it is a common forum of industry, researcher centres, public authorities
and consumers. The objective of defining the standard is to achieve common goals
in terms of QoS in the performance of the devices and platforms. As IoT is a collec-
tion of heterogeneous devices, the devices need a common platform for understand-
ing the communication [5, 7, 9].
Standardisation is essential to set the following:
• Interoperability across applications and services
• Maintain operation across system, syntax, semantics and domain knowledge
• Maintain regulations in economy between regulators and developers
• Provide security and privacy of contents
Nowadays, the key challenge to standardisation is maintaining the performance
interoperability, availability and reliability. Many groups are in progress and are
working in this direction. The major leading organisations are the European
Telecommunications Standards Institute (ETSI), Institute of Electrical and
Electronics Engineers (IEEE), Wide Web Consortium (W3C), Internet Engineering
Task Force (IETF) and EPCglobal [23].
Protocols are the basic building blocks of the communication process in
IoT. Various protocols are to facilitate the services offered in IoT. On each layer of
interconnection, the specific protocols function for the task as explained in Table 2.
10 A. Pathak et al.

Table 2 Protocols and Layers Protocols and standards


standards
Application layer ONEM2M/ETSI, HTTP, COAP, SEP 2.0
Transport layer TCP, UDP, ZigBee
Network layer RPL, IPV6, 6LowPan
Data link layer IEEE 802.15.4, Bluetooth, WiFi, NFC,
Physical layer 3GPP

Fig. 4 IoT protocols

The protocols in IoT can be categorised based on the functionality assigned and
level of management. Protocols in IoT can be categorised according to application
level, infrastructural level and influential level. As shown in Fig. 4, the protocols at
influential level are the protocols used with wide scope of usability at system level.

5.1 IEEE 1905.1

Protocol defines the standard for both wired and wireless media, especially the WiFi
media used in the market. It supports connectivity to the heterogeneous types of
devices with mobility benefits and is used as an intermediate between network and
data link layer. IEEE 1905.1 message frame consists of 8 octets and variable length
list. The frame slots are as follows and the frame format is shown in Fig. 5:
• Message version – 1 octet
• Reserved – 1 octet
• Message type – 2 octet
IoT Design Methodology: Architectures and Protocols 11

Fig. 5 IEEE 1905.1 frame format

• Message-Id – 2 octet
• Fragment-Id – 1 octet
• Last fragment indicator – 1 octet
• Relay indicator – 1 octet
• Reserved – 6 bits
• List of type length value (TLV)

5.2 IEEE 1888.3

Another protocol discussed in this category is IEEE 1888.3, a standard defined by


ISO/IEC/IEEE. It is a protocol for security service enhancement and a standard
proposed for Ubiquitous green community control network. It also helps to avoid
unintended data disclosure. The processing of infrastructural layer and application
layer related to protocols is listed as below:
• At infrastructural level, the protocols are applied for synchronisation of standard.
The popular protocols in this category are RPL, 6LowPan, IPV4/IPV6, IEEE
802.15.4, LTE-A, Z-Wave and EPCglobal.
• Application layer protocols are responsible for data presentation and formatting.
In constrained environments where heterogeneous nature of devices are con-
nected, the IEEE 1888.3 protocol supports the communication of such heteroge-
neous environment. Many protocols are developed by keeping the objective of
constrained environment, that is, COAP, AMQP and MQTT – these are standard
communication protocols. The basic functionality of these protocols is to pro-
vide services based on message transmission and support the environment of
request/response or publish/subscribe type. Maximum protocols in this category
use routing schemes such as round robin and message queuing mechanism.

5.3 Constrained Application Protocol (COAP)

This is a protocol designed especially for constrained application devices to meet


the requirement of the Internet and M2M communication and to support multicast-
ing. It is a request/response type protocol, and message length is four byte with
fixed header, version type, token length, request/response code and message ID. In
COAP, GET, PUT, POST and DELETE are the operations to achieve Create,
Retrieve, Update and Delete (CRUD) operations. It works on four types of mes-
sages, that is, confirmable, non-confirmable, reset and acknowledge [11–13].
12 A. Pathak et al.

Figure 6 explains the implementation view of COAP. The request from client is
accessed by COAP server and is forwarded over the HTTP-REST to process the
query on Internet storage. In addition, Representational State Transfer Protocol
(REST) is cacheable connection. The CRUD operations are indicated, and type of
value each operation hold is presented below [11–14]:
• Request
–– 0: Confirmable: Acknowledgement message
–– 1: Non-confirmable: Does not expect a confirmation message
• Response
–– 2: Acknowledgement: Acknowledge a confirmable message
–– 3: Reset: Received a message and not processed
COAP is a specialised application protocol designed by RFC7252. It is designed
in such a way that it easily gets integrated with HTTP and UDP for seamless inte-
gration and useful in environment where M2M is implemented. The frame format
of COAP is presented in Fig. 7; COAP is low overhead protocol thus providing easy
integration and less outflows. The message format consists of version, message
type, token length, request/response code and message id [17].
Queuing Mechanism The queuing mechanism protocols are more popular in use
and attracted the researchers to investigate and resolve the issues related to interop-
erability and reliability. We enlist the protocol here, and the detailed working is
highlighted in Sects. 5.4 and 5.5, respectively:
• Message Queuing Telemetry Transport (MQTT)
• Advanced Message Queuing Protocol (AMQP)

Fig. 6 Constrained application protocol

Fig. 7 COAP frame format


IoT Design Methodology: Architectures and Protocols 13

5.4 Message Queuing Telemetry Transport Protocol

MQTT is a binary-based lightweight protocol, bandwidth efficient and uses low


battery consumption. It is an open source protocol designed on publish/subscribe
scheme and introduced [24] and then modified to be standardised by OASIS in 2013
[15]. It is built on TCP protocol. The packet length of MQTT protocol is computed
using control header, length, protocol level, connect flags and payload; the same is
represented by Eq. (1).

MQTT packet length


 control header  length  protocol level  connect flags  payload (1)

The protocol level defines the QoS level of delivery assurance. Herein, control
header is fixed and is of 1 byte and packet length is of maximum 4 bytes. There are
two versions of MQTT protocol: MQTT designed for TCP/IP protocol and
MQTT-SN designed to work over UDP and ZigBee protocols. The architecture of
MQTT [26] is presented in Fig. 8.
MQTT operations is categorised in two sub-operations, that is, from Publisher to
broker and then from broker to consumer/client. As shown in Fig. 9, MQTT server
as broker receives the messages from publishers and makes them available to get
subscribed by appropriate client. The publisher publishes the message and gets the
response/acknowledgement to publish. The broker consists of queue, and the

Fig. 8 MQTT protocol

Fig. 9 MQTT operation


14 A. Pathak et al.

Fig. 10 MQTT message format

maximum queue length in MQTT is of 260 MB. The specific client accesses the
specific message required. The client requests to connect with the broker, and the
broker provides the acknowledgment to connect [19].
Figure 10 demonstrates the MQTT message format, which is a binary-based
protocol. It consists of Message type of four bytes, UDP field of one byte, QoS level
of two bytes and lastly one byte of retain field. The message format of MQTT con-
sists of control header, packet length, variable length header and payload. The con-
trol elements are in the form of binary bytes not the text strings. It operates on
request and response mechanism, that is, to each request, the acknowledgment is
accepted [16].

5.5 Advanced Message Queuing Protocol (AMQP)

AMQP is an advanced message queuing protocol. Queuing mechanism targets the


issues related to interoperability and reliability in IoT. In this concept, multiple
queues can be implemented. AMQP is layered architecture that defines [18] the
following:
Layer 1: Defines system and encoding process.
Layer 2: Defines transport layer and efficient, binary peer to peer protocol
functioning.
Layer 3: Defines grouping for atomic transactions.
Layer 4: Defines security aspects.
The popular AMQP versions are RabbitMQ, OpenMQ, StormMQ, ApacheQpid
and RedHat Enterprise MRG.
IoT Design Methodology: Architectures and Protocols 15

As shown in Fig. 11, the implementation of AMQP protocol consists of broker.


The broker is an implementation of exchange and queues. The exchange is a soft-
ware program that decides the assignment of messages to particular queue; the mes-
sages can be assigned based on Topic, Direct, Fan-out and Header and the exchange
implement routing algorithm. Exchange is used to bind the queues [20, 25, 27].
Direct Exchange Direct exchange is used to deliver the messages to queues based
on routing keys. It is well suited to unicast mode. Direct exchange is default
exchange of AMQP protocol, and the same has been shown in Fig. 12.

Fan-Out Exchange This exchange supports broadcasting type of communication.


If ‘N’ queues are connected with the exchange, then messages will be published to
all the queues. The function of Fan-out exchange is presented in Fig. 13:
• Online multiplayer gaming
• Best suited to distributed environment concepts in which the server sends con-
figuration messages and updates to all the clients

Fig. 11 AMQP protocol

Fig. 12 Direct exchange


16 A. Pathak et al.

Fig. 13 Fan-out exchange

Topic Exchange This exchange type supports multicast. The routine is done to
more queues simultaneously. The message gets delivered to queues based on match-
ing key and pattern, for example, in Geographical cases, sending specific data to
specific location user.

Header Exchange In this type of exchange, the messages are published as per the
type of headers assigned as key. The key can be multiple in number. Based on
matching key with only one type or all types, messages are published.
This exchange model accepts messages from the publisher and route them to
queues according to the predefined criteria as shown in Fig. 11. It uses a routine and
instances to examine the message and route it to proper queue by using key, which
is actually a virtual address. In communication, the parameters used for message are
as follows:
• Queue current status
• Time to live (TTL) for message expires
• Queue length
• Message type
• Message identifier
• Message order
Queue Status The queues used in messaging hold the data according to the capac-
ity of queue. The messages/data are pulled from messages as per the parameter, that
is, links defined for the consumer.

Time to Live (TTL) It is a live for which the message will remain in the queue.
The time to live decides the life of message in the queue.

Queue Length The queue will decide the capacity of message to hold in commu-
nication by the queue.
IoT Design Methodology: Architectures and Protocols 17

Moreover, the features’ targets in communication are as follows:


• Targeted quality of service
• Persistence
• Delivery of messages to multiple consumers
• Possibility of ensuring multiple consumptions
RabbitMQ It is basically a publish/subscribe model, a broker architecture. It uses
queue exchange mechanism for publishing the message and subscribing the mes-
sage from consumer. It is an advanced message queuing technology. The exchange
implements routing logic to forward the message to the respective queue. The rout-
ing logic can be anything the user needs, but more preferably, round robin type of
routing is common for forwarding the messages. As explained by RabbitMQ Pivotal,
the message can be routed by using four different types of exchange mechanism,
that is, Fan-out, Direct, Topic and Header. The exchange mechanism using the Fan-­
out message is forwarded to all queues, that is, messages get consumed by all the
consumers. The Direct exchange mechanism binds the queues with consumer by
using routing/binding keys. The Topic exchange mechanism provides the same
mechanism as the Direct, but only adding some wild characters to the messages.
The Header type keys and values as header in the message as a parameter to publish
and consume.
The basic mechanism on which RabbitMQ works is Queuing mechanism. The
queue gets bind with exchange, exchange routes the messages produced by the pro-
ducer, and consumed by the consumer from queue. These producers and consumers
may be of different and varying configurations and applications, which gives rise to
the issues related with accuracy and interoperability, that is, mismatch between the
number of message packets generated per second by the producer (publisher) and
message packets consumed by the consumer because of different configuration
platforms.
For example, in a company with various departments, where all departments are
connected centrally, considering only three departments, Human Resource,
Marketing and Administration maintain active directories. The same is presented in
Fig. 14 and details are shown as follows:
Actors: Human Resource Department – producer
Marketing Department – consumer1
Administrative Department – consumer2
RabbitMQ system – Broker (exchange & queue)
RabbitMQ is a more sophisticated implementation of message queuing tech-
niques. It is more scalable as it provides the mechanism to increase the use of
queues. The number of queues may vary as per the number of exchanges used. It
also provides the mechanism named as dead letter exchange (DLX) where the rejec-
tion of messages is avoided. Still, some issues related with availability of queues
may arise, which results in the decrease in performance related to queues. Another
more specific implementation of message queuing known as Kafka is attracting the
18 A. Pathak et al.

Fig. 14 Implementation example of RabbitMQ

Table 3 Protocol connectivity and security aspects


Protocols/connectivity QoS Transport Security Usage
AMQP Yes TCP Yes D2S/S2S
MQTT 3 levels TCP Yes D2S
HTTP No TCP Yes Web
DDS 20 levels TCP/UDP Yes D2D
Web-socket No TCP Yes Web

attention of researchers. In Kafka, the zookeeper concept is implemented to avoid


the issues related with performance. Various research papers that describe the work-
ing of Kafka with zookeeper implementation as well as examples are explained.
Nowadays, researchers are focusing on issues related to communication in
IoT. As heterogeneous devices are connected in IoT systems, we are facing continu-
ous issues related to scalability and interoperability, so security and privacy become
the most challenging tasks. MQTT protocol is light-weighted, consumes less power,
requires less bandwidth and is utilised in heterogeneous devices connected in differ-
ent environment. Hence, MQTT protocol is less secured because of the limited ser-
vice of authentication process and there are no encryption capabilities as presented
in [21]. Mechanism applied to overcome security issues can be implemented, which
focuses on authentication and authorisation of devices at broker level. These mecha-
nisms are best suited for constrained devices but for resource-constrained devices
still need further development. AMQP protocol offers more secure architecture as it
provides more reliable connection-oriented procedure. In addition, AMQP protocol
facilitates diversity in application and becomes vulnerable to know threats to net-
work. Table 3 presents protocols highlighted according to the security aspects.
IoT Design Methodology: Architectures and Protocols 19

Another important challenge is related to interoperability, and it is becoming a


key challenge in communication between D2S and S2S. To address this, researchers
are providing the solution related to analysis of data based on syntax and semantics.
Semantic extraction of data helps in classifying and categorising the data, thus help-
ing future issues related to scalability and interoperability. In IoT, the challenge
related to interoperability can be addressed in basic connectivity between devices.
Semantics provides potential strength to data extraction: the tags or labels are uti-
lised to extract and classify the data through which domain knowledge and context
information can be matched for accurate data extraction.

6 Summary and Future Direction

As predicted by various standard bodies and organisations, with the growth in num-
ber of devices and nodes in network, the challenges and threats related to commu-
nication and synchronisation will increase. In the coming years, the quality of
services and performance of the system will depend on the networks’ support for
scalability with efficient interoperability. The coming era will be independent of the
platform, and the modelling of the system will not depend on the specifications and
requirements of functional modelling in the system. Various IoT platforms will get
updated with the arising needs and requirements. It is clear that a single protocol
and standard will not be sufficient to cope with publisher and subscriber synchroni-
sation. The challenges will arise with quality of services (QoS) in the performance
of protocols. In such a varying environment, the standards and protocols in IoT will
play a vital role in seamless integration of devices with platforms to achieve objec-
tives of IoT.

References

1. A. Mazayev, J.A. Martins, N. Correia, Interoperability in IoT Through the Semantic Profiling
of Objects Center for Electronic, Optoelectronic and Telecommunications (University of
Algarve, Faro, 2018)
2. D. Evans, The Internet of Things: How the Next Evolution of the Internet Is Changing
Everything (Cisco Internet Business Solutions Group, San Jose, 2011)
3. A.N. Knaian, J. Paradiso, A.C. Smith, A Wireless Sensor Network for Smart Roadbeds and
Intelligent Transportation Systems (Massachusetts Institute of Technology, 2000). https://
dspace.mit.edu/handle/1721.1/9072. Accessed on 17 Jan 2018
4. F. Shi, Q. Li, T. Zhu, H. Ning, et al., A survey of data semantization in Internet of Things.
Sensors 18, 313 (2018)
5. M. Wazid, A.K. Das, V. Odelu, N. Kumar, M. Conti, M. Jo, et al., Design of secure user authen-
ticated key management protocol for generic IoT networks. IEEE Internet Things J. 5(1),
269–282 (2018)
6. J. Lin, W. Yuy, N. Zhangz, Z. Yang, H. Zhangx, W. Zhao, et al., A survey on Internet of Things:
architecture, enabling technologies, security and privacy, and applications. IEEE Internet
Things J. 4(5), 1125–1142 (2017)
20 A. Pathak et al.

7. Y. Yang, L. Wu, G. Yin, L. Li, H. Zhao, et al., A survey on security and privacy issues in
Internet-of-Things. IEEE Internet Things J. 4(5), 1250–1258 (2017)
8. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, et al., Internet of
Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv.
Tutor. 17(4), 2347–2376 (2015)
9. P. Sethi, S.R. Sarangi, Internet of Things: architectures, protocols, and applications. J. Electr.
Comput. Eng. 2017, 25 pages (2017)
10. S. Wagle, Semantic Data Extraction over MQTT for IoTcentric Wireless Sensor Networks, in
2016 International Conference on Internet of Things and Applications (IoTA), (Maharashtra
Institute of Technology, Pune, India, 22 January–24 January 2016)
11. A. Ludovici, P. Moreno, A. Calveras, TinyCoAP: A novel constrained application protocol
(CoAP) implementation for embedding RESTful web services in wireless sensor networks
based on TinyOS. J. Sens. Actuator Netw. 2, 288–315 (2013)
12. Z. Shelby, K. Hartke, C. Bormann, B. Frank, et al., Constrained Application Protocol (CoAP)
(Internet Engineering Task Force (IETF), Fremont, 2013)
13. C. Bormann, A.P. Castellani, Z. Shelby, CoAP: an application protocol for billions of tiny
Internet nodes. IEEE Internet Comput. 16(2), 62–67 (2012)
14. Amaran, M. H., Noh, N. A. M., Rohmad, M. S., & Hashim, H. et al., A comparison of
lightweight communication protocols in robotic applications. Procedia Comput. Sci. 76,
400–405 (2015)
15. Oasis, MQTT Version 3.1.1 Plus Errata 01 (2014). http://docs.oasisopen.org/mqtt/mqtt/v3.1.1/
mqtt-­v3.1.1.pdf. R. Cohn, Comparison of AMQP and MQTT. White Paper (2012). https://
lists.oasisopen.org/archives/amqp/201202/msg00086/StormMQ_WhitePaper_Comparison_
of_AMQP_and_MQTT.Pdf
16. A.S. Clark, H. Troung, MQTT for sensor networks (MQTT-SN) protocol specification (2013).
http://mqtt.org//new/wpcontent/uploads/2009/06/MQTT-­SN/_spec_v1.2.pdf
17. P. Madhumitha, B. Johnsema, D. Manivannan, Domination of constrained application proto-
col: a requirement approach for optimization of Internet of Things in wireless sensor networks.
Indian J. Sci. Technol. 7(3), 296–300 (2014)
18. J.E. Luzuriaga, M. Perez, P. Boronat, J.C. Cano, C. Calafate, P. Manzoni, et al., A comparative
evaluation of AMQP and MQTT protocols over unstable and mobile networks, in IEEE 12th
Consumer Communications and Networking Conference, (Las Vegas, NV, USA, 2015)
19. K. Grgić, I. Špeh, I. Heđi, A web-based IoT solution for monitoring data using MQTT protocol,
in International Conference on Smart Systems and Technologies (SST), (Osijek, Croatia, 2016)
20. J.E. Luzuriaga, M. Perez, P. Boronat, J.C. Cano, C. Calafate, P. Manzoni, et al., Testing AMQP
protocol on unstable and mobile networks, in Internet and Distributed Computing Systems.
IDCS 2014. Lecture Notes in Computer Science, vol. 8729, (Springer, Cham, 2014)
21. S. Andy, B. Rahardjo, B. Hanindhito, Attack scenarios and security analysis of MQTT com-
munication protocol in IoT system, in Proceeding of the EECSI 2017, (Yogyakarta, Indonesia,
2017, 19–21 Sept)
22. A. Bahga, V. Madisetti, Internet of Things, a Hands on Approach (ISBN: 978-0996025515,
2015)
23. A. Pal, H.K. Rath, S. Shailendra, A. Bhattacharyya, et al., IoT Standardization: The Road
Ahead (IntechOpen, 2018)
24. Dr Andy Stanford-Clark of IBM, and Arlen Nipper of Arcom (now Eurotech) (1999). https://
www.ibm.com/support/pages/mqtt
25. G. Marsh, A.P. Sampat, S. Potluri, D.K. Panda, et al., Scaling Advanced Message Queuing
Protocol (AMQP) Architecture with Broker Federation and InfiniBand (Ohio State
University, 2008)
26. http://www.steves-­internet-­guide.com/mqtt-­protocol-­messages-­overview. Accessed on 1st
Oct 2020
27. A. Vijayakrishna, G. Gopichand, M.D. Ansari, G. Suryanarayana, IOT based smart agricul-
ture using LIFI, in 2022 5th International Conference on Multimedia, Signal Processing and
Communication Technologies (IMPACT), (IEEE, November 2022), pp. 1–7

You might also like