What is it about?

Abstract. This scientific work shows the consequences of analytical experiments on the operation of Internet of Things technology protocols, an analysis of their features based on the consideration of messages and procedures. A comparison of procedures and options for using protocols, classification and operating principles is provided. The relevance of this topic is owing to the variability of present procedures, Internet of things canons and the deficiency of widespread standards describing this technology. The results of this scientific research are presented in detail in the form of graphs and tables. Keywords: applications, COAP, DDoS attacks, .Internet of things, IoT, NFC, RFiD, IoT applications protocols, MQTT, M2M, SOAP, STOMP, XMPP,

Featured Image

Why is it important?

The extensive development of the Internet of things has led to the emergence of many application protocols necessary for its implementation. Intercontinental administrations - ITU-T, IEEE, ETSI, OASIS, non-administrative relations (oneM2M), associations of creators and operatives - IERC, ISO/ IEC, partner projects -IoT-A. The exertions assumed are mostly resident, disjointed and intended at resolution slightly thin difficulties. The Internet of things Association is part of the information skill cluster of the fund and officially participates in the work of international standardization organizations Internet of Things (ITU-T) and represents the interests of the global expert community, since the realization of the Internet of Things in the international and domestic markets is an obvious challenge for leading telecommunications companies [1-9]. An analysis of existing publications has shown that not much literature is devoted to this topic [10], and publicly available sources do not fully disclose the question of using application protocols of the Internet of Things that interests us. In most cases, attention is paid to such technologies as ZigBee, Bluetooth Low Energy, NFC, RFID [11]. At the same time, this issue is raised more and more often in foreign sources, but the information is also quite fragmented and is of an exploratory nature [12]. Thus, there is an obvious need to generalize the available materials and systematize them. The destination of the scientific article is to analyse the operation of Internet of Things technology protocols, develop recommendations for their use and be able to categorize them according to main criteria. To do this, it is necessary to perform the following steps: dependably categorize the structures of procedures and study the principles of their operation, identify the stages of their interaction with each other, and clarify the key features of each classification.

Perspectives

In these subnet segments, you can perform tasks related to the interaction between the user and the system: finding material after the attendant; custom setting of strictures (regularity of data acquisition, beginning/inactivation of instruments and swellings). The MQTT (Note Column Telemetre Transportation) procedure is considered for telemetre and distant inspection. This procedure works to conversation posts among strategies at the publisher-subscribe foundation, agreeing strategies to direct and accept statistics when an incident take place. MQTT is a dual publish/subscribe message procedure that operates by means of the ТСР transference [31]. For a circulated computation situation, for network facilities, the SoAP protocol is consumed. This procedure has a dedicated RPC (Distant Action Demand) admission apparatus, which is answerable for distant meaning demands. SOAP (Easy device Admission Procedure) is a practice for switching planned and random communications in XML format in a circulated computation situation. SOAP practices a elementary construction typical that ensures the reliable transmission of a message from correspondent to recipient, this allows the use of mediators that can procedure fragment of the communication or complement supplementary basics to it. Used in systems where more complex relationships are needed than: “create”, “read”, “change”, “delete”.

Professor Alevtina Aleksandrovna Muradova
Tashkent University of Information Technologies

Read the Original

This page is a summary of: Results of analytical experiments on the operation of internet of things technology protocols, January 2024, American Institute of Physics,
DOI: 10.1063/5.0242060.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page