(Iot): Features, Open Challenges, and Trends

(Iot): Features, Open Challenges, and Trends

Hindawi Wireless Communications and Mobile Computing Volume 2018, Article ID 5349894, 24 pages https://doi.org/10.1155/2018/5349894 Review Article Network Protocols, Schemes, and Mechanisms for Internet of Things (IoT): Features, Open Challenges, and Trends Anna Triantafyllou ,1 Panagiotis Sarigiannidis ,1 and Thomas D. Lagkas 2 1 Department of Informatics and Telecommunications Engineering, University of Western Macedonia, Kozani 50100, Greece 2Computer Science Department, Te University of Shefeld International Faculty, CITY College, Tessaloniki 54626, Greece Correspondence should be addressed to Tomas D. Lagkas; [email protected] Received 29 March 2018; Revised 30 July 2018; Accepted 9 August 2018; Published 13 September 2018 Academic Editor: Juan F. Valenzuela-Vald´es Copyright © 2018 Anna Triantafyllou et al. Tis is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Internet of Tings (IoT) constitutes the next step in the feld of technology, bringing enormous changes in industry, medicine, environmental care, and urban development. Various challenges are to be met in forming this vision, such as technology interoperability issues, security and data confdentiality requirements, and, last but not least, the development of energy efcient management systems. In this paper, we explore existing networking communication technologies for the IoT, with emphasis on encapsulation and routing protocols. Te relation between the IoT network protocols and the emerging IoT applications is also examined. A thorough layer-based protocol taxonomy is provided, while how the network protocols ft and operate for addressing the recent IoT requirements and applications is also illustrated. What is the most special feature of this paper, compared to other survey and tutorial works, is the thorough presentation of the inner schemes and mechanisms of the network protocols subject to IPv6. Compatibility, interoperability, and confguration issues of the existing and the emerging protocols and schemes are discussed based on the recent advanced of IPv6. Moreover, open networking challenges such as security, scalability, mobility, and energy management are presented in relation to their corresponding features. Lastly, the trends of the networking mechanisms in the IoT domain are discussed in detail, highlighting future challenges. 1. Introduction standardization of IoT is crucial in providing advanced interoperability for all sensor devices and objects, which In recent years, the use of the Internet has become a necessity also require an identity management system. Furthermore, in many aspects of the everyday life. Te vision of a global net- network security as well as data confdentiality raises major working platform based on the smart objects communication issues [3]. Last but not least, efcient energy and data manage- has already made a big leap forward. Te so-called Internet ment systems are required, with the aim of greening the IoT of Tings (IoT) technology grows into a need for modern systems [4]. All of these challenges need to be addressed society, where people and things are virtually integrated, according to the adopted type of networking technologies. forming thus information systems, through wireless sensor Although several studies have been conducted concerning nodes and networks [1]. Tis innovation will pave the way the IoT communication technologies [5–10], none of them to the development of new applications and services, which deals with the IoT network layer, also known as transmis- will be able to leverage the connectivity of physical and virtual sion layer, and its technologies. More specifcally, in [5], entities [2]. current and emerging technologies for supporting wide area Te IoT paradigm relies on existing communication Machine-to-Machine (M2M) networks based on IoT devices technologies such as Bluetooth, ZigBee, WiFi, and Long Term were presented, while [6] was focused on the standards for Evolution-Advanced (LTE-A), just to name a few. However, IoT in the felds of data communications, services, and sup- forming an acceptable and desirable IoT system, based on port for (M2M)/IoT applications. Te authors in [7] pre- these various technologies, seems a laborious challenge. Te sented an overview of the enabling applications, protocols, 2 Wireless Communications and Mobile Computing technologies, and the recent research endeavors which ad- introduced. In Section 3, the most important existing tech- dress various aspects of IoT. In [8], a brief overview of the nologies, protocols, and schemes are presented, followed by a IETF protocol suite was proposed to support IoT devices and detailed taxonomy according to the IoT architecture and net- applications. Similarly, in [11], diferent standards ofered by working challenges. Section 4 refers to the comparison of the the Internet Engineering Task Force (IETF), the Institute of IoTnetworkprotocolsbydividingthemintotwoseparatecat- Electrical and Electronics Engineers (IEEE), and the Inter- egories, the encapsulation and routing protocols, since these national Telecommunication Union (ITU) for the IoT were together form the network layer. Open networking challenges discussed. Furthermore, [9] was focused on the evolution of are mentioned and discussed in Section 5, while Section 6 Wireless Sensor Networks (WSNs), as a critical part of the IoT is devoted to discussing current trends of the IoT domain. architecture, while sketching a framework able to harmonize Finally, Section 7 concludes this survey. new IoT installations and non-IP implementation. A similar study was conducted in [10], where recent work on low 2. The Internet of Things energy consuming networking for WSN systems and IoT was presented. 2.1. IoT Vision and Smart Objects. IoT is the evolution of Tis paper deals with the task of presenting the IoT net- Internet posing immense challenges in data collection, anal- work layer and its challenges as a separate feld of research ysis, and distribution towards a more productive use of infor- that keeps being partially and inadequately analysed through mation in order to improve the quality of life [13]. Te con- other works that concern specifc use cases of the IoT technol- cept of IoT involves the management of sensors or devices ogy or standardization eforts in diferent architectural layers. distributed around the network, so as to recognize and notify Te contribution of this work is a complete analysis and tax- users instantly about real-time events [14]. Tese devices, onomy of all suitable network communication technologies having basic computational skills, are called smart objects. for the IoT platform regardless of the network topology, Smart objects are characterized by a unique identifer, i.e., a communication range, or intended application usage. In lit- name tag for device description and an address for communi- erature, the term ‘IoT technology’ tends to become confusing cation. According to [15] there are three types of smart ob- since it can be used for specifying protocols from every archi- jects: tectural layer of the IoT platform. Aiming to provide a better understanding of the IoT architecture and technologies (i) Activity: aware objects that can collect data regarding usage, the presented taxonomy contributes to efciently sep- work activities as well as their own use arating suitable IoT technologies into data link layer proto- (ii) Policy: aware objects that can translate activities and cols, network encapsulation protocols, and routing protocols events with respect to specifed organizational poli- according to each standard. Towards this direction, another cies taxonomy concerning the IoT middleware contributes to pre- (iii) Process: aware objects, where a process is a set of senting the basic components and architectural types of this relevant tasks and activities which are ordered based basic IoT layer. Te IoT middleware provides efcient service on their position in space and time management towards the development of applications, based on the information provided by the network layer in the IoT devices are mainly characterized by their constrained IoT infrastructure. Due to this fact, providing knowledge on resources in terms of power, processing, memory, and band- the implementation and technologies of these two layers is width. Due to this fact, traditional protocols concerning quite benefcial. Compared to [12], our work goes beyond network operations and security cannot be implemented in presenting the basic communication technologies and their IoT specifc environment, with their current form [16–18]. challenges and limitations, by compiling, discussing, and However, it is the fact that, by providing embedded security to presenting in detail the role, the functionality, the advantages, the devices by design, a lot of benefts are ofered, concerning and disadvantages of most important standards, protocols, cost reduction in security architecture, increasing reliability, and schemes of the IoT network layer. As a result, a com- and improving general performance [17]. prehensive discussion of each technology is enclosed, while the present challenges and drawbacks of each technology are 2.2. IoT Applications. Duetotheuseofsmartobjects,IoTis highlighted. In addition, emphasis is given on the ability of considered to have a huge impact on a wide variety of appli- each standard to adopt the IPv6 protocol,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    25 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us