An Assessment of Internet of Things Protocols for Resource-Constrained Applications

Dae Hyeok Mun, Minh Le Dinh, Young Woo Kwon

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

49 Scopus citations

Abstract

With the resource constraints of Internet of Things (IoT) devices, performance and energy efficiency have become an important IoT software design consideration while minimizing resource usages. To provide efficient communication for resource-constrained applications, several IoT protocols have been introduced, and yet there are few existing guidelines to help the programmer choose an appropriate communication protocol. To address this limitation, we evaluate five different communication protocols including CoAP, MQTT, MQTT-SN, WebSocket, and TCP. Our result can help IoT application programmers make informed decision when choosing communication protocols for their applications.

Original languageEnglish
Title of host publicationProceedings - 2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016
EditorsWilliam Claycomb, Dejan Milojicic, Ling Liu, Mihhail Matskin, Zhiyong Zhang, Sorel Reisman, Hiroyuki Sato, Zhiyong Zhang, Sheikh Iqbal Ahamed
PublisherIEEE Computer Society
Pages555-560
Number of pages6
ISBN (Electronic)9781467388450
DOIs
StatePublished - 24 Aug 2016
Event2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016 - Atlanta, United States
Duration: 10 Jun 201614 Jun 2016

Publication series

NameProceedings - International Computer Software and Applications Conference
Volume1
ISSN (Print)0730-3157

Conference

Conference2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016
Country/TerritoryUnited States
CityAtlanta
Period10/06/1614/06/16

Keywords

  • assessment
  • energy efficiency
  • internet of things
  • performance
  • protocols
  • resources

Fingerprint

Dive into the research topics of 'An Assessment of Internet of Things Protocols for Resource-Constrained Applications'. Together they form a unique fingerprint.

Cite this