SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
IoT Specific Application Protocols
Jigar Makhija
About me
My name is Jigar Makhija and I was a Associate Software Engineer for LNT Infotech. I am an accomplished coder and programmer,
and I enjoy using my skills to contribute to the exciting technological advances that happen every day. I graduated from the Kachchh
University in 2013 with a Bachelor's Degree in Computer Applications and I post-graduated from the Indus University in 2016 with a
Master’s Degree in Information Technology (MSC.IT).
After that I got an opportunity as an entry-level position at LNT Infotech directly after my post-graduation and i resigned in January of
2019. After spending more and more time in programming I found that i am a quick learner with all tech-related things.
I joined Amrita Vishwa Vidyapeetham as a Research Student in the Computer Science Department from January with complete
different domain in the field of Internet of Things, gradually working with embedded devices i made my hands dirty with cyber security
domain combining my IoT skills and still studying and finding vulnerabilities in different aspects to provide better solutions.
The Internet of Things is a convergence of embedded systems, wireless sensor networks,
control systems and automation that makes connected factories, intelligent retail, smart
homes and cities and wearable devices possible.
IoT technologies empower you to transform your business with data-driven insights,
improved operational processes, new lines of business and more efficient use of materials.
By - Microsoft
Agenda
Intro
Basic Idea
about
Protocols
Security
Aspects
Mitigat
ion
An overview about IoT Protocols
When talking about the Internet of Things, we always think about communication.
Interaction between sensors, devices, gateways, servers, and user applications is the essential characteristic
that makes the Internet of Things what it is.
But what enables all this smart stuff to talk and interact are the IoT protocols which can be seen as languages
that the IoT gear uses in order to communicate.
Why should you care about IoT protocols?
Answer to your Question: Why should you care about IoT protocols?
What differentiates a smart device from ordinary devices is that it stays mute in case of a breakdown, the
smart device is able to talk to other devices.
if it encounters any problems and, if need be, to communicate the failure to the user or automatically call for
help.
But every such instance of interaction is possible when there is a medium of communication, a common
‘language’ that all the devices in a given IoT ecosystem would share and be able to use.
Within the Internet of Things, the medium is provided by the IoT protocols: communication can be either
through Internet protocols already in use, or the IoT protocols developed for these connected device.
Different Aspects of IoT communication
Each with its own type of protocols to suit its purposes
IoT protocols can be divided in terms of the role they
play within the network.
There are protocols used in connectivity infrastructure
(e.g. 6LowPAN),
communications (Wi-Fi, Bluetooth),
data transmission (MQTT, CoAP, XMPP),
security (DTLS),
device management as well as telemetry (LwM2M).
This is one of the reasons why the Internet of
Things needs standardized IoT protocols.
Application Layer Protocols for the Internet of
Things
Introduction
The critical goal of Internet of things (IoT) is to
ensure effective communication between objects and
build a sustained bond among them using different
types of applications.
The application layer is responsible for providing
services and determines a set of protocols for
message passing at the application level.
with this interconnection, these devices need
different protocols (Bluetooth, Wifi) to avoid the
problem of interoperability.
Some Protocols
CONSTRAINED
APPLICATION PROTOCOL
(COAP)
Constrained Application
Protocol (CoAP) is
request/response protocol.
This protocol is only
sufficient in constrained
environment such as:
constrained node with low
capability in RAM or CPU,
and constrained network,
such as lower power using
wireless personal area
network (WPAN).
CoAP supports publisher/subscriber architecture, this architecture provides multicast communications, and the
publisher sends the message so on the other hand multi-subscribers can catch the message and takes the
actions.
This multicast is done in an Asynchronous way. Publish/subscribe architecture is used to support a large
number of users and provide better performance than the traditional way.
The most important features in CoAP are simplicity and reliability; since it supports unicast and multicast
request by
taking advantage of UDP, and provide the ability to Asynchronous message exchanges.
CoAP is a single protocol with two layers, the first layer is the messaging layer and the second one is the
request/response layer; messaging layer aims to achieve reliability based on UDP, while request/response layer
aims to act the interactions and communication.
CoAP uses different types of massages: Conformable Message, Non-conformable Message, Acknowledgement
Message, Reset Message, Piggybacked Response, Separate Response, and Empty Message.
Message queue telemetry transport (MQTT) is a publisher/subscriber protocol.
It’s similar to the client-server Model.
its simplicity, and open source code make
this protocol suited only for constrained
environments, such as low power, limited
computation capability and memory, and
limited bandwidth.
It’s suitable for IoT applications and
machine to machine communications. MQTT
protocol can run over TCP/IP
MESSAGE QUEUE TELEMETRY TRANSPORT (MQTT)
MQTT
MQTT provides a set of features that includes:
the support of multi-cast communication (one to many message), and the capability to
establish communications between remote devices.
But the most important feature of this protocol is the minimization of network traffic by
reducing transport overhead and protocol exchanges.
In addition, it provides a notification mechanism when an abnormal situation occurs.
MQTT protocol provides three options to achieve messaging Quality of Service (QoS)
MQTT Vs CoAP
MQTT protocol outperforms CoAP protocol in the
case of high traffic network;
MQTT provides higher throughput and lower
latency than CoAP.
The importance of MQTT protocol is due to its
simplicity and the no need of high CPU and
memory usage (lightweight protocol).
MQTT supports a wide range of different devices
and mobile platforms.
On the other hand, MQTT is high sampling rate
and high latency, and dedicated to simple data
type only, can’t be used in real time applications.
EXTENSIBLE MESSAGING AND PRESENCE PROTOCOL (XMPP)
XMPP nowadays is one of the most common
communication and messaging protocol in IoT.
XMPP protocol supports both request/response and
publish/subscribe models.
request/response which allows bi-directional
communications and publisher/subscriber model which
allows multi-directional communication (push and pull
the data).
High scalability in XMPP is provided by decentralized
architecture.
REPRESENTATIONAL STATE TRANSFER (RESTFUL SERVICES )
It provides web services which
allow communication and data
exchange between different devices
using HTTP in IoT environment.
Different representations are used
in this RESET such as JASON, XML,
and text.
Reset architecture uses the same
methods used in HTTP, such as GET,
PUT, DELETE, POST, and OPTION, to
the request or response of resource
usage.
RESTFUL web services support
request/response messaging
model, by using HTTP
commands.
When using HTTPs it provides
security since it uses
TLS/SSL.
REST with CoAP
Major attacks affecting the application layer protocols.
Vulnerabilities classified in Application Protocols
MQTT CoAP XMPP
Authentication Message
parsing
Unauthorized
entry to a server
Authorization Proxying and
caching
Authentication
Message
delivery
Bootstrapping Message
validation
Message
validation
Key generation Certificate
verification
Message
encryption
IP address
spoofing
Mitigating these
Issues
There are still lot of
research ongoing proposing
mitigation measures for the
AMQP, DDS and XMPP
protocols yet to arrive on
solid proofs .
Thank you
Post/Ask your queries?

Mais conteúdo relacionado

Mais procurados

Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
TELKOMNIKA JOURNAL
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
IJORCS
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Karthic C M
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
Conference Papers
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
IJECEIAES
 

Mais procurados (20)

Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Z041106163167
Z041106163167Z041106163167
Z041106163167
 
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc NetworksSecurity Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approach
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
Intelligent Internet of Things (IIoT): System Architectures and Communica...
   Intelligent Internet of Things (IIoT): System  Architectures and Communica...   Intelligent Internet of Things (IIoT): System  Architectures and Communica...
Intelligent Internet of Things (IIoT): System Architectures and Communica...
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
 
Deep learning
Deep learning Deep learning
Deep learning
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 

Semelhante a Overview on Application protocols in Internet of Things

F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
Istabraq M. Al-Joboury
 
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Istabraq M. Al-Joboury
 

Semelhante a Overview on Application protocols in Internet of Things (20)

Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
MQTT ppt presentation message quening telemetry transport
MQTT ppt presentation message quening telemetry transportMQTT ppt presentation message quening telemetry transport
MQTT ppt presentation message quening telemetry transport
 
What is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfWhat is the application protocol for IoT.pdf
What is the application protocol for IoT.pdf
 
Message queue telemetry transport and lightweight machine-tomachine comparis...
Message queue telemetry transport and lightweight machine-tomachine comparis...Message queue telemetry transport and lightweight machine-tomachine comparis...
Message queue telemetry transport and lightweight machine-tomachine comparis...
 
Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Iot
IotIot
Iot
 
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
 
CCN AAT 2023 for mqtt protocol ppt presentation
CCN AAT 2023 for mqtt protocol ppt presentationCCN AAT 2023 for mqtt protocol ppt presentation
CCN AAT 2023 for mqtt protocol ppt presentation
 
What's the Right Messaging Standard for the IoT?
What's the Right Messaging  Standard for the IoT?What's the Right Messaging  Standard for the IoT?
What's the Right Messaging Standard for the IoT?
 
Important topics.pptx
Important topics.pptxImportant topics.pptx
Important topics.pptx
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
K010426371
K010426371K010426371
K010426371
 
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
 

Mais de JIGAR MAKHIJA

Mais de JIGAR MAKHIJA (20)

Php gd library
Php gd libraryPhp gd library
Php gd library
 
Php pattern matching
Php pattern matchingPhp pattern matching
Php pattern matching
 
Php cookies
Php cookiesPhp cookies
Php cookies
 
Php functions
Php functionsPhp functions
Php functions
 
Php sessions
Php sessionsPhp sessions
Php sessions
 
Php server variables
Php server variablesPhp server variables
Php server variables
 
Db function
Db functionDb function
Db function
 
C++ version 1
C++  version 1C++  version 1
C++ version 1
 
C++ Version 2
C++  Version 2C++  Version 2
C++ Version 2
 
SAP Ui5 content
SAP Ui5 contentSAP Ui5 content
SAP Ui5 content
 
Solution doc
Solution docSolution doc
Solution doc
 
125 green iot
125 green iot125 green iot
125 green iot
 
Msp430 g2 with ble(Bluetooth Low Energy)
Msp430 g2 with ble(Bluetooth Low Energy)Msp430 g2 with ble(Bluetooth Low Energy)
Msp430 g2 with ble(Bluetooth Low Energy)
 
Embedded system lab work
Embedded system lab workEmbedded system lab work
Embedded system lab work
 
Presentation on iot- Internet of Things
Presentation on iot- Internet of ThingsPresentation on iot- Internet of Things
Presentation on iot- Internet of Things
 
Oracle
OracleOracle
Oracle
 
Learn Japanese -Basic kanji 120
Learn Japanese -Basic kanji 120Learn Japanese -Basic kanji 120
Learn Japanese -Basic kanji 120
 
View Alignment Techniques
View Alignment TechniquesView Alignment Techniques
View Alignment Techniques
 
Letters (complaints & invitations)
Letters (complaints & invitations)Letters (complaints & invitations)
Letters (complaints & invitations)
 
Letter Writing invitation-letter
Letter Writing invitation-letterLetter Writing invitation-letter
Letter Writing invitation-letter
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 

Overview on Application protocols in Internet of Things

  • 1. IoT Specific Application Protocols Jigar Makhija
  • 2. About me My name is Jigar Makhija and I was a Associate Software Engineer for LNT Infotech. I am an accomplished coder and programmer, and I enjoy using my skills to contribute to the exciting technological advances that happen every day. I graduated from the Kachchh University in 2013 with a Bachelor's Degree in Computer Applications and I post-graduated from the Indus University in 2016 with a Master’s Degree in Information Technology (MSC.IT). After that I got an opportunity as an entry-level position at LNT Infotech directly after my post-graduation and i resigned in January of 2019. After spending more and more time in programming I found that i am a quick learner with all tech-related things. I joined Amrita Vishwa Vidyapeetham as a Research Student in the Computer Science Department from January with complete different domain in the field of Internet of Things, gradually working with embedded devices i made my hands dirty with cyber security domain combining my IoT skills and still studying and finding vulnerabilities in different aspects to provide better solutions.
  • 3. The Internet of Things is a convergence of embedded systems, wireless sensor networks, control systems and automation that makes connected factories, intelligent retail, smart homes and cities and wearable devices possible. IoT technologies empower you to transform your business with data-driven insights, improved operational processes, new lines of business and more efficient use of materials. By - Microsoft
  • 5. An overview about IoT Protocols When talking about the Internet of Things, we always think about communication. Interaction between sensors, devices, gateways, servers, and user applications is the essential characteristic that makes the Internet of Things what it is. But what enables all this smart stuff to talk and interact are the IoT protocols which can be seen as languages that the IoT gear uses in order to communicate. Why should you care about IoT protocols?
  • 6. Answer to your Question: Why should you care about IoT protocols? What differentiates a smart device from ordinary devices is that it stays mute in case of a breakdown, the smart device is able to talk to other devices. if it encounters any problems and, if need be, to communicate the failure to the user or automatically call for help. But every such instance of interaction is possible when there is a medium of communication, a common ‘language’ that all the devices in a given IoT ecosystem would share and be able to use. Within the Internet of Things, the medium is provided by the IoT protocols: communication can be either through Internet protocols already in use, or the IoT protocols developed for these connected device.
  • 7. Different Aspects of IoT communication Each with its own type of protocols to suit its purposes IoT protocols can be divided in terms of the role they play within the network. There are protocols used in connectivity infrastructure (e.g. 6LowPAN), communications (Wi-Fi, Bluetooth), data transmission (MQTT, CoAP, XMPP), security (DTLS), device management as well as telemetry (LwM2M). This is one of the reasons why the Internet of Things needs standardized IoT protocols.
  • 8. Application Layer Protocols for the Internet of Things
  • 9. Introduction The critical goal of Internet of things (IoT) is to ensure effective communication between objects and build a sustained bond among them using different types of applications. The application layer is responsible for providing services and determines a set of protocols for message passing at the application level. with this interconnection, these devices need different protocols (Bluetooth, Wifi) to avoid the problem of interoperability.
  • 11. CONSTRAINED APPLICATION PROTOCOL (COAP) Constrained Application Protocol (CoAP) is request/response protocol. This protocol is only sufficient in constrained environment such as: constrained node with low capability in RAM or CPU, and constrained network, such as lower power using wireless personal area network (WPAN).
  • 12. CoAP supports publisher/subscriber architecture, this architecture provides multicast communications, and the publisher sends the message so on the other hand multi-subscribers can catch the message and takes the actions. This multicast is done in an Asynchronous way. Publish/subscribe architecture is used to support a large number of users and provide better performance than the traditional way. The most important features in CoAP are simplicity and reliability; since it supports unicast and multicast request by taking advantage of UDP, and provide the ability to Asynchronous message exchanges. CoAP is a single protocol with two layers, the first layer is the messaging layer and the second one is the request/response layer; messaging layer aims to achieve reliability based on UDP, while request/response layer aims to act the interactions and communication. CoAP uses different types of massages: Conformable Message, Non-conformable Message, Acknowledgement Message, Reset Message, Piggybacked Response, Separate Response, and Empty Message.
  • 13. Message queue telemetry transport (MQTT) is a publisher/subscriber protocol. It’s similar to the client-server Model. its simplicity, and open source code make this protocol suited only for constrained environments, such as low power, limited computation capability and memory, and limited bandwidth. It’s suitable for IoT applications and machine to machine communications. MQTT protocol can run over TCP/IP MESSAGE QUEUE TELEMETRY TRANSPORT (MQTT)
  • 14. MQTT MQTT provides a set of features that includes: the support of multi-cast communication (one to many message), and the capability to establish communications between remote devices. But the most important feature of this protocol is the minimization of network traffic by reducing transport overhead and protocol exchanges. In addition, it provides a notification mechanism when an abnormal situation occurs. MQTT protocol provides three options to achieve messaging Quality of Service (QoS)
  • 15. MQTT Vs CoAP MQTT protocol outperforms CoAP protocol in the case of high traffic network; MQTT provides higher throughput and lower latency than CoAP. The importance of MQTT protocol is due to its simplicity and the no need of high CPU and memory usage (lightweight protocol). MQTT supports a wide range of different devices and mobile platforms. On the other hand, MQTT is high sampling rate and high latency, and dedicated to simple data type only, can’t be used in real time applications.
  • 16. EXTENSIBLE MESSAGING AND PRESENCE PROTOCOL (XMPP) XMPP nowadays is one of the most common communication and messaging protocol in IoT. XMPP protocol supports both request/response and publish/subscribe models. request/response which allows bi-directional communications and publisher/subscriber model which allows multi-directional communication (push and pull the data). High scalability in XMPP is provided by decentralized architecture.
  • 17. REPRESENTATIONAL STATE TRANSFER (RESTFUL SERVICES ) It provides web services which allow communication and data exchange between different devices using HTTP in IoT environment. Different representations are used in this RESET such as JASON, XML, and text. Reset architecture uses the same methods used in HTTP, such as GET, PUT, DELETE, POST, and OPTION, to the request or response of resource usage.
  • 18. RESTFUL web services support request/response messaging model, by using HTTP commands. When using HTTPs it provides security since it uses TLS/SSL. REST with CoAP
  • 19. Major attacks affecting the application layer protocols.
  • 20. Vulnerabilities classified in Application Protocols MQTT CoAP XMPP Authentication Message parsing Unauthorized entry to a server Authorization Proxying and caching Authentication Message delivery Bootstrapping Message validation Message validation Key generation Certificate verification Message encryption IP address spoofing
  • 21. Mitigating these Issues There are still lot of research ongoing proposing mitigation measures for the AMQP, DDS and XMPP protocols yet to arrive on solid proofs .