SlideShare a Scribd company logo
PUCIT-Project Coordination Office Summary
Internet of Things Research Review Date: 26 January 2015
© Punjab University College of Information Technology, University Of The Punjab.
1
PUCIT
Punjab University College of Information
Technology
Internet Of Things Research Review
Group Members
ABDULLAH AZIZ BCSF11A021
WAQAR NISAR BCSF11A054
ABID MAJEED MALIK BCSF11A051
KASHMALA JAVAID BCSF11A015
Summary
PUCIT-Project Coordination Office Summary
Internet of Things Research Review Date: 26 January 2015
© Punjab University College of Information Technology, University Of The Punjab.
2
1. Introduction
Internet of Things is an environment of smart small hosting devices (because they get
attached with any device and make them smart device) which are Always, Anywhere and
Anytime (3As of IoT) connected with each other and sending some data or information
which can further be processed over cloud to generate meaningful analytic result that can
help a lot or to trigger an automatic action according to the analysis. These small devices
are called the "THING" of Internet of Things and this environment comprises of 3
ingredients called Device, Network and Application also known as DNA of Internet of
Things.
1.1 Criteria for a “THING” to be a part of INTERNET OF THINGS
1. It should send some sensory data (like pressure temperature humidity).
2. It should have unique identification so that it will get identify while
communicating.
3. It should communicate with similar itself and Internet gateway as well like WiFi.
2. The internet of things application domains
The IoT can be applied in a whole range of domains as follows and many more else.
1. Medical/Health
2. Retail, logistics and supply chain management
3. Transport
4. Insurance
5. Agriculture
6. Telecommunication
7. Education
8. Environment monitoring
9. Manufacturing
10. Home automation
11. Information security
12. Energy
PUCIT-Project Coordination Office Summary
Internet of Things Research Review Date: 26 January 2015
© Punjab University College of Information Technology, University Of The Punjab.
3
3.Technologies of Internet of things
Technologies of Internet of things are:
3.1. Hardware
3.1.1 Wireless SoC (system on chip):
Manufactures like Gainspan, Wiznet, Nordic Semiconductor, TI and others are creating
self-contained, RF-certified module solutions that have TCP, UDP and IP on chip. These
solutions include built-in security features, can reduce certification times and allow
companies to add communication to any microcontroller-based (MCU-based) product
with little RF expertise.
3.1.2 Prototyping boards and platforms:
From the Arduino to the Raspberry Pi to the new BeagleBone Black, there are a large
number of community DIY and prototyping platforms available that are making its
possible to create your own Internet of Things project.
PUCIT-Project Coordination Office Summary
Internet of Things Research Review Date: 26 January 2015
© Punjab University College of Information Technology, University Of The Punjab.
4
3.2. Backbone
A few key components to Internet of Things architecture.
3.2.1 IPv4 and IPv6
Internet Protocol version 6 (IPv6) is the latest revision of the Internet Protocol (IP), the
communications protocol that provides an identification and location system for
computers on networks and routes traffic across the Internet.
Every device on the Internet must be assigned an IP address in order to communicate
with other devices. With the ever-increasing number of new devices being connected to
the Internet, the need arose for more addresses than IPv4 is able to accommodate. IPv6
uses a 128-bit address, allowing 2128, or approximately 3.4×1038 addresses, or more
than 7.9×1028 times as many as IPv4, which uses 32-bit addresses.
3.2.2 UDP
The User Datagram Protocol (UDP) is one of the core members of the Internet protocol
suite (the set of network protocols used for the Internet). With UDP, computer
applications can send messages, in this case referred to as datagrams, to other hosts on an
Internet Protocol (IP) network without prior communications to set up special
transmission channels or data paths.
3.2.3 TCP
The Transmission Control Protocol (TCP) is intended for use as a highly reliable host-to-
host protocol between hosts in packet-switched computer communication networks, and
in interconnected systems of such networks.
3.2.4 6LoWPAN
6LoWPAN is an acronym of IPv6 over Low power Wireless Personal Area Networks.
The 6LoWPAN group has defined encapsulation and header compression mechanisms
that allow IPv6 packets to be sent to and received from over IEEE 802.15.4 based
networks.
3.3 Communication:
3.3.1 RFID - ISO/IEC Standards list
A radio-frequency identification system uses tags, or labels attached to the objects to be
identified. Two-way radio transmitter-receivers called interrogators or readers send a
signal to the tag and read its response. The readers generally transmit their observations
to a computer system running RFID software or RFID middleware.
PUCIT-Project Coordination Office Summary
Internet of Things Research Review Date: 26 January 2015
© Punjab University College of Information Technology, University Of The Punjab.
5
RFID tags can be either passive, active or battery assisted passive. An active tag has an
on-board battery and periodically transmits its ID signal. A battery assisted passive
(BAP) has a small battery on board and is activated when in the presence of a RFID
reader.
Frequency:
120–150 kHz (LF), 13.56 MHz (HF), 433 MHz (UHF), 865-868 MHz (Europe)902-928
MHz (North America) UHF, 2450-5800 MHz (microwave), 3.1–10 GHz (microwave)
Range: 10cm to 200m
Examples: Road tolls, Building Access, Inventory
3.3.2 EnOcean - ISO/IEC 14543-3-10 (Alliance)
The EnOcean technology is an energy harvesting wireless technology used primarily in
building automation systems; but is also applied to other applications in industry,
transportation, logistics and smart homes.
Modules based on EnOcean technology combine micro energy converters with ultra low
power electronics and enable wireless communications between batteryless wireless
sensors, switches, controllers and gateways.
Frequency: 315 MHz, 868 MHz, 902 MHz
Range: 300m Outdoor, 30m Indoors
Examples: Wireless switches, sensors and controls
3.3.3 NFC - ISO/IEC 18092 and ISO/IEC 14443-2,3,4, JIS X6319-4
NFC is a set of short-range wireless technologies, typically requiring a distance of 10 cm
or less. NFC operates at 13.56 MHz on ISO/IEC 18000-3 air interface and at rates
ranging from 106 kbit/s to 424 kbit/s.
NFC always involves an initiator and a target; the initiator actively generates an RF field
that can power a passive target. This enables NFC targets to take very simple form factors
such as tags, stickers, key fobs, or cards that do not require batteries. NFC peer-to-peer
communication is possible, provided both devices are powered.
Frequency: 13.56 MHz
Range: < 0.2 m
Examples: Smart Wallets/Cards, Action Tags, Access Control
PUCIT-Project Coordination Office Summary
Internet of Things Research Review Date: 26 January 2015
© Punjab University College of Information Technology, University Of The Punjab.
6
3.3.4 Bluetooth
Bluetooth is a wireless technology standard for exchanging data over short distances
(using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz)
from fixed and mobile devices, creating personal area networks (PANs) with high levels
of security.
Frequency: 2.4GHz
Range: 1-100m
Examples: Hands-free headphone
3.3.5 WiFi
Wi-Fi is a technology that allows an electronic device to exchange data wirelessly (using
radio waves) over a computer network, including high-speed Internet connections. The
Wi-Fi Alliance defines Wi-Fi as any "wireless local area network (WLAN) products that
are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11
standards.
Frequency: 2.4 GHz, 3.6 GHz and 4.9/5.0 GHz bands.
Range: Common range is up to 100m but can be extended.
Applications: Routers, Tablets, etc
3.3.6 GSM
GSM (Global System for Mobile communications) is an open, digital cellular technology
used for transmitting mobile voice and data services.
Terrestrial GSM networks now cover more than 90% of the world’s population. GSM
satellite roaming has also extended service access to areas where terrestrial coverage is
not available.
Frequency: Europe: 900MHz & 1.8GHz, US: 1.9GHz & 850MHz, Full List can be
found here.
Data Rate: 9.6 kbps
Examples: Cell phones, M2M, smart meter, asset tracking.
And more like:
• 3G
• 4G LTE
• ANT
• DASH7
• ETHERNET
• GPRS
• PLC/POWERLINE
PUCIT-Project Coordination Office Summary
Internet of Things Research Review Date: 26 January 2015
© Punjab University College of Information Technology, University Of The Punjab.
7
• Z-WAVE
• ZigBee
3.4 Software
There are lot of Operating System for Internet of things like:
3.4.1 Riot OS
RIOT OS is an operating system for Internet of Things (IoT) devices. It is based on a
microkernel and designed for energy efficiency, hardware independent development, a
high degree of modularity.
• Support for 6LoWPAN, IPv6, RPL, TCP, and UDP
• Built for maximum energy-efficiency and low resource requirements: Min RAM
(~ 1.5kB) and Min ROM (~ 5kB)
• Ability to operate on several platforms (Embedded devices and common PCs)
• Standard programming in C or C++ and can run both 16 and 32-bit platforms
3.4.2 Thingsquare Mist
Thingsquare Mist brings resilient wireless mesh networking and true Internet-
connectivity to the Internet of Things. The Thingsquare Mist open source firmware is
exceptionally lightweight, battle-proven, and works with multiple microcontrollers with a
range of radios.
Thingsquare Mist typically runs on hardware with 64-256 kilobytes of flash and 16-32
kilobytes of RAM."
4. Internet Of Things Protocols
There is a broad set of protocols which are promoted as the silver bullet of IoT
communication for he higher level M2M protocol in the protocol stack. Note that these
IoT or M2M protocols focus on the application data transfer and processing. The
following list summarizes the protocols generally considered.
• CoAP
• Continua – Home Health Devices
• DDS
• DPWS: WS-Discovery, SOAP, WSAddressing, WDSL, & XML Schema
• HTTP/REST
• MQTT
• UPnP
• XMPP
• ZeroMQ
PUCIT-Project Coordination Office Summary
Internet of Things Research Review Date: 26 January 2015
© Punjab University College of Information Technology, University Of The Punjab.
8
These protocols have their features summarized in the following table. Several key
factors related to infrastructure and deployment are considered separately below.
PUCIT-Project Coordination Office Summary
Internet of Things Research Review Date: 26 January 2015
© Punjab University College of Information Technology, University Of The Punjab.
9
5. Data Serialization
One set of features has been obscured during this discussion and at times is critical to the
system performance. This is the issue of data representation and serialization. Many of
the options presented include serialization protocols. A list of these data representations
include:
• XML
• EXI – a binary version of XML representation
• JSON
• BSON – BINARY JSON
• ASN.1
• XDR
• YAML
These protocols were originally text based and then migrated to binary for efficiency. In
the above protocols where data transfer over wireless links with limited bandwidth is
required, many of these protocols added binary serialization of data and data descriptions.
Examples of this are in pairs:
• XML and EXI
• JSON and BSON
ASN.1 is the original binary version protocol uses for this type of data representation
while XDR is an early protocol which supports binary transmission. Yaml is a
serialization protocol which has evolved into a more complete IoT protocol for research
purposes called Yaml4 by the researcher involved.
6. Conculusion
The study investigated who the current role players in the IoT were, what they are
involved in and how this shapes the future direction of IoT research. IoT is an exciting
and innovative field that talks about integrating various traditional technologies to
produce new applications. Therefore it is about transforming the expert from one that is
focused on one area of expertise to an all rounder that understands the various
technologies and how they can be brought together. The research raises an awareness on
the availability of the focused expertise from an international perspective, so that
collaboration can be encouraged to produce these applications. Because IoT is a new field
that is about redefining the role of the researcher, it also calls for a redefinition of the
direction that current traditional research takes. It also opens opportunities for
collaboration in multidisciplinary research.

More Related Content

What's hot

SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSSCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
ijasuc
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
IJCERT
 
LTE- Technical and Economic Implications of Band 40
LTE- Technical and Economic Implications of Band 40LTE- Technical and Economic Implications of Band 40
LTE- Technical and Economic Implications of Band 40
Karan Ahluwalia
 
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
A  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EEA  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EE
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
IJCI JOURNAL
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Saikiran Panjala
 
Pan seminar
Pan seminarPan seminar
Pan seminar
Naveen Vyas
 
Keynote on Mobile Grid and Cloud Computing
Keynote on Mobile Grid and Cloud ComputingKeynote on Mobile Grid and Cloud Computing
Keynote on Mobile Grid and Cloud Computing
Sayed Chhattan Shah
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
Biplob Orton
 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
IJCNCJournal
 
Loramesh
LorameshLoramesh
Loramesh
Yosdi Harmen
 
Zigbee based proposal
Zigbee based proposalZigbee based proposal
Zigbee based proposal
Abayneh Mekonnen
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...
eSAT Publishing House
 
Study of ZIGBEE Technology and its Application in Wireless Automation System
Study of ZIGBEE Technology and its Application in Wireless Automation SystemStudy of ZIGBEE Technology and its Application in Wireless Automation System
Study of ZIGBEE Technology and its Application in Wireless Automation System
ijtsrd
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
priyadharshini murugan
 
IoT Control Units and Communication Models
IoT Control Units and Communication ModelsIoT Control Units and Communication Models
IoT Control Units and Communication Models
National Institute of Technology Karnataka, Surathkal
 

What's hot (15)

SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSSCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
LTE- Technical and Economic Implications of Band 40
LTE- Technical and Economic Implications of Band 40LTE- Technical and Economic Implications of Band 40
LTE- Technical and Economic Implications of Band 40
 
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
A  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EEA  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EE
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
 
Pan seminar
Pan seminarPan seminar
Pan seminar
 
Keynote on Mobile Grid and Cloud Computing
Keynote on Mobile Grid and Cloud ComputingKeynote on Mobile Grid and Cloud Computing
Keynote on Mobile Grid and Cloud Computing
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
 
Loramesh
LorameshLoramesh
Loramesh
 
Zigbee based proposal
Zigbee based proposalZigbee based proposal
Zigbee based proposal
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...
 
Study of ZIGBEE Technology and its Application in Wireless Automation System
Study of ZIGBEE Technology and its Application in Wireless Automation SystemStudy of ZIGBEE Technology and its Application in Wireless Automation System
Study of ZIGBEE Technology and its Application in Wireless Automation System
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
 
IoT Control Units and Communication Models
IoT Control Units and Communication ModelsIoT Control Units and Communication Models
IoT Control Units and Communication Models
 

Viewers also liked

Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
akshay shinde
 
iot based home automation
iot based home automationiot based home automation
iot based home automation
parvathy s m
 
Arduino based Home Automation System with Android
Arduino based Home Automation System with AndroidArduino based Home Automation System with Android
Arduino based Home Automation System with Android
Sayan Seth
 
Internet of things for Smart Home
Internet of things for Smart Home Internet of things for Smart Home
Internet of things for Smart Home
Khwaja Aamer
 
Presentation on home automation
Presentation on home automationPresentation on home automation
Presentation on home automation
Subhash Kumar Yadav
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoT
Athira_1993
 
Literature Review
Literature ReviewLiterature Review
Literature Review
Anaika Alexander
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
Dr. Mazlan Abbas
 

Viewers also liked (8)

Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 
iot based home automation
iot based home automationiot based home automation
iot based home automation
 
Arduino based Home Automation System with Android
Arduino based Home Automation System with AndroidArduino based Home Automation System with Android
Arduino based Home Automation System with Android
 
Internet of things for Smart Home
Internet of things for Smart Home Internet of things for Smart Home
Internet of things for Smart Home
 
Presentation on home automation
Presentation on home automationPresentation on home automation
Presentation on home automation
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoT
 
Literature Review
Literature ReviewLiterature Review
Literature Review
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 

Similar to Research review of iot

Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
ChAnushaECE
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
Dr.M.Karthika parthasarathy
 
Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
Virendra Thakur
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
Harish Vadada
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
aravindhawan
 
K010426371
K010426371K010426371
K010426371
IOSR Journals
 
Important topics.pptx
Important topics.pptxImportant topics.pptx
Important topics.pptx
RiazAhmad521284
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Karthic C M
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
Steffi Keran Rani J
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
Arpan Pal
 
Zigbee sensor network integrated with 4 g for iot applications
Zigbee sensor network integrated with 4 g for iot applicationsZigbee sensor network integrated with 4 g for iot applications
Zigbee sensor network integrated with 4 g for iot applications
goodgood
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
parveen837153
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
rohitbansal761378
 
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
SANTIAGO PABLO ALBERTO
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enable
neelamsanjeevkumar
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Kate Campbell
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
IJECEIAES
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
IJCSIS Research Publications
 

Similar to Research review of iot (20)

Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
K010426371
K010426371K010426371
K010426371
 
Important topics.pptx
Important topics.pptxImportant topics.pptx
Important topics.pptx
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approach
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
Zigbee sensor network integrated with 4 g for iot applications
Zigbee sensor network integrated with 4 g for iot applicationsZigbee sensor network integrated with 4 g for iot applications
Zigbee sensor network integrated with 4 g for iot applications
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
 
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enable
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 

Recently uploaded

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 

Recently uploaded (20)

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 

Research review of iot

  • 1. PUCIT-Project Coordination Office Summary Internet of Things Research Review Date: 26 January 2015 © Punjab University College of Information Technology, University Of The Punjab. 1 PUCIT Punjab University College of Information Technology Internet Of Things Research Review Group Members ABDULLAH AZIZ BCSF11A021 WAQAR NISAR BCSF11A054 ABID MAJEED MALIK BCSF11A051 KASHMALA JAVAID BCSF11A015 Summary
  • 2. PUCIT-Project Coordination Office Summary Internet of Things Research Review Date: 26 January 2015 © Punjab University College of Information Technology, University Of The Punjab. 2 1. Introduction Internet of Things is an environment of smart small hosting devices (because they get attached with any device and make them smart device) which are Always, Anywhere and Anytime (3As of IoT) connected with each other and sending some data or information which can further be processed over cloud to generate meaningful analytic result that can help a lot or to trigger an automatic action according to the analysis. These small devices are called the "THING" of Internet of Things and this environment comprises of 3 ingredients called Device, Network and Application also known as DNA of Internet of Things. 1.1 Criteria for a “THING” to be a part of INTERNET OF THINGS 1. It should send some sensory data (like pressure temperature humidity). 2. It should have unique identification so that it will get identify while communicating. 3. It should communicate with similar itself and Internet gateway as well like WiFi. 2. The internet of things application domains The IoT can be applied in a whole range of domains as follows and many more else. 1. Medical/Health 2. Retail, logistics and supply chain management 3. Transport 4. Insurance 5. Agriculture 6. Telecommunication 7. Education 8. Environment monitoring 9. Manufacturing 10. Home automation 11. Information security 12. Energy
  • 3. PUCIT-Project Coordination Office Summary Internet of Things Research Review Date: 26 January 2015 © Punjab University College of Information Technology, University Of The Punjab. 3 3.Technologies of Internet of things Technologies of Internet of things are: 3.1. Hardware 3.1.1 Wireless SoC (system on chip): Manufactures like Gainspan, Wiznet, Nordic Semiconductor, TI and others are creating self-contained, RF-certified module solutions that have TCP, UDP and IP on chip. These solutions include built-in security features, can reduce certification times and allow companies to add communication to any microcontroller-based (MCU-based) product with little RF expertise. 3.1.2 Prototyping boards and platforms: From the Arduino to the Raspberry Pi to the new BeagleBone Black, there are a large number of community DIY and prototyping platforms available that are making its possible to create your own Internet of Things project.
  • 4. PUCIT-Project Coordination Office Summary Internet of Things Research Review Date: 26 January 2015 © Punjab University College of Information Technology, University Of The Punjab. 4 3.2. Backbone A few key components to Internet of Things architecture. 3.2.1 IPv4 and IPv6 Internet Protocol version 6 (IPv6) is the latest revision of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. Every device on the Internet must be assigned an IP address in order to communicate with other devices. With the ever-increasing number of new devices being connected to the Internet, the need arose for more addresses than IPv4 is able to accommodate. IPv6 uses a 128-bit address, allowing 2128, or approximately 3.4×1038 addresses, or more than 7.9×1028 times as many as IPv4, which uses 32-bit addresses. 3.2.2 UDP The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite (the set of network protocols used for the Internet). With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without prior communications to set up special transmission channels or data paths. 3.2.3 TCP The Transmission Control Protocol (TCP) is intended for use as a highly reliable host-to- host protocol between hosts in packet-switched computer communication networks, and in interconnected systems of such networks. 3.2.4 6LoWPAN 6LoWPAN is an acronym of IPv6 over Low power Wireless Personal Area Networks. The 6LoWPAN group has defined encapsulation and header compression mechanisms that allow IPv6 packets to be sent to and received from over IEEE 802.15.4 based networks. 3.3 Communication: 3.3.1 RFID - ISO/IEC Standards list A radio-frequency identification system uses tags, or labels attached to the objects to be identified. Two-way radio transmitter-receivers called interrogators or readers send a signal to the tag and read its response. The readers generally transmit their observations to a computer system running RFID software or RFID middleware.
  • 5. PUCIT-Project Coordination Office Summary Internet of Things Research Review Date: 26 January 2015 © Punjab University College of Information Technology, University Of The Punjab. 5 RFID tags can be either passive, active or battery assisted passive. An active tag has an on-board battery and periodically transmits its ID signal. A battery assisted passive (BAP) has a small battery on board and is activated when in the presence of a RFID reader. Frequency: 120–150 kHz (LF), 13.56 MHz (HF), 433 MHz (UHF), 865-868 MHz (Europe)902-928 MHz (North America) UHF, 2450-5800 MHz (microwave), 3.1–10 GHz (microwave) Range: 10cm to 200m Examples: Road tolls, Building Access, Inventory 3.3.2 EnOcean - ISO/IEC 14543-3-10 (Alliance) The EnOcean technology is an energy harvesting wireless technology used primarily in building automation systems; but is also applied to other applications in industry, transportation, logistics and smart homes. Modules based on EnOcean technology combine micro energy converters with ultra low power electronics and enable wireless communications between batteryless wireless sensors, switches, controllers and gateways. Frequency: 315 MHz, 868 MHz, 902 MHz Range: 300m Outdoor, 30m Indoors Examples: Wireless switches, sensors and controls 3.3.3 NFC - ISO/IEC 18092 and ISO/IEC 14443-2,3,4, JIS X6319-4 NFC is a set of short-range wireless technologies, typically requiring a distance of 10 cm or less. NFC operates at 13.56 MHz on ISO/IEC 18000-3 air interface and at rates ranging from 106 kbit/s to 424 kbit/s. NFC always involves an initiator and a target; the initiator actively generates an RF field that can power a passive target. This enables NFC targets to take very simple form factors such as tags, stickers, key fobs, or cards that do not require batteries. NFC peer-to-peer communication is possible, provided both devices are powered. Frequency: 13.56 MHz Range: < 0.2 m Examples: Smart Wallets/Cards, Action Tags, Access Control
  • 6. PUCIT-Project Coordination Office Summary Internet of Things Research Review Date: 26 January 2015 © Punjab University College of Information Technology, University Of The Punjab. 6 3.3.4 Bluetooth Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Frequency: 2.4GHz Range: 1-100m Examples: Hands-free headphone 3.3.5 WiFi Wi-Fi is a technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards. Frequency: 2.4 GHz, 3.6 GHz and 4.9/5.0 GHz bands. Range: Common range is up to 100m but can be extended. Applications: Routers, Tablets, etc 3.3.6 GSM GSM (Global System for Mobile communications) is an open, digital cellular technology used for transmitting mobile voice and data services. Terrestrial GSM networks now cover more than 90% of the world’s population. GSM satellite roaming has also extended service access to areas where terrestrial coverage is not available. Frequency: Europe: 900MHz & 1.8GHz, US: 1.9GHz & 850MHz, Full List can be found here. Data Rate: 9.6 kbps Examples: Cell phones, M2M, smart meter, asset tracking. And more like: • 3G • 4G LTE • ANT • DASH7 • ETHERNET • GPRS • PLC/POWERLINE
  • 7. PUCIT-Project Coordination Office Summary Internet of Things Research Review Date: 26 January 2015 © Punjab University College of Information Technology, University Of The Punjab. 7 • Z-WAVE • ZigBee 3.4 Software There are lot of Operating System for Internet of things like: 3.4.1 Riot OS RIOT OS is an operating system for Internet of Things (IoT) devices. It is based on a microkernel and designed for energy efficiency, hardware independent development, a high degree of modularity. • Support for 6LoWPAN, IPv6, RPL, TCP, and UDP • Built for maximum energy-efficiency and low resource requirements: Min RAM (~ 1.5kB) and Min ROM (~ 5kB) • Ability to operate on several platforms (Embedded devices and common PCs) • Standard programming in C or C++ and can run both 16 and 32-bit platforms 3.4.2 Thingsquare Mist Thingsquare Mist brings resilient wireless mesh networking and true Internet- connectivity to the Internet of Things. The Thingsquare Mist open source firmware is exceptionally lightweight, battle-proven, and works with multiple microcontrollers with a range of radios. Thingsquare Mist typically runs on hardware with 64-256 kilobytes of flash and 16-32 kilobytes of RAM." 4. Internet Of Things Protocols There is a broad set of protocols which are promoted as the silver bullet of IoT communication for he higher level M2M protocol in the protocol stack. Note that these IoT or M2M protocols focus on the application data transfer and processing. The following list summarizes the protocols generally considered. • CoAP • Continua – Home Health Devices • DDS • DPWS: WS-Discovery, SOAP, WSAddressing, WDSL, & XML Schema • HTTP/REST • MQTT • UPnP • XMPP • ZeroMQ
  • 8. PUCIT-Project Coordination Office Summary Internet of Things Research Review Date: 26 January 2015 © Punjab University College of Information Technology, University Of The Punjab. 8 These protocols have their features summarized in the following table. Several key factors related to infrastructure and deployment are considered separately below.
  • 9. PUCIT-Project Coordination Office Summary Internet of Things Research Review Date: 26 January 2015 © Punjab University College of Information Technology, University Of The Punjab. 9 5. Data Serialization One set of features has been obscured during this discussion and at times is critical to the system performance. This is the issue of data representation and serialization. Many of the options presented include serialization protocols. A list of these data representations include: • XML • EXI – a binary version of XML representation • JSON • BSON – BINARY JSON • ASN.1 • XDR • YAML These protocols were originally text based and then migrated to binary for efficiency. In the above protocols where data transfer over wireless links with limited bandwidth is required, many of these protocols added binary serialization of data and data descriptions. Examples of this are in pairs: • XML and EXI • JSON and BSON ASN.1 is the original binary version protocol uses for this type of data representation while XDR is an early protocol which supports binary transmission. Yaml is a serialization protocol which has evolved into a more complete IoT protocol for research purposes called Yaml4 by the researcher involved. 6. Conculusion The study investigated who the current role players in the IoT were, what they are involved in and how this shapes the future direction of IoT research. IoT is an exciting and innovative field that talks about integrating various traditional technologies to produce new applications. Therefore it is about transforming the expert from one that is focused on one area of expertise to an all rounder that understands the various technologies and how they can be brought together. The research raises an awareness on the availability of the focused expertise from an international perspective, so that collaboration can be encouraged to produce these applications. Because IoT is a new field that is about redefining the role of the researcher, it also calls for a redefinition of the direction that current traditional research takes. It also opens opportunities for collaboration in multidisciplinary research.