Call for Paper - June 2019 Edition
IJCA solicits original research papers for the June 2019 Edition. Last date of manuscript submission is May 20, 2019. Read More

Internet of Things (IoT) Protocols: A Brief Exploration of MQTT and CoAP

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Authors:
Danish Bilal Ansari, Atteeq-Ur-Rehman, Rizwan Ali Mughal
10.5120/ijca2018916438

Danish Bilal Ansari, Atteeq-Ur-Rehman and Rizwan Ali Mughal. Internet of Things (IoT) Protocols: A Brief Exploration of MQTT and CoAP. International Journal of Computer Applications 179(27):9-14, March 2018. BibTeX

@article{10.5120/ijca2018916438,
	author = {Danish Bilal Ansari and Atteeq-Ur-Rehman and Rizwan Ali Mughal},
	title = {Internet of Things (IoT) Protocols: A Brief Exploration of MQTT and CoAP},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2018},
	volume = {179},
	number = {27},
	month = {Mar},
	year = {2018},
	issn = {0975-8887},
	pages = {9-14},
	numpages = {6},
	url = {http://www.ijcaonline.org/archives/volume179/number27/29126-2018916438},
	doi = {10.5120/ijca2018916438},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The concept of the Internet of Things emerged a long time ago, having enormous development in sensing devices and every-day-objects connected to the internet. With current internet infrastructure, wireless communication plays a vital role in IoT devices allowing them to transmit messages. Therefore, the vitality of these messages lies in authentication. Numerous key management techniques have also been introduced to provide a secured transmission over the internet. In the context of IoT, many protocols have been devised for authenticated and secured transmission, including XMPP, AMQP, and LWM2M. Addition to above, MQTT and CoAP are also extensively used protocols in most M2M communication. This survey paper is an exploration of these protocols and also exemplify the comparison between them.

References

  1. https://en.wikipedia.org/wiki/Internet_of_things
  2. https://www.gartner.com/newsroom/id/3598917
  3. D. Locke, “MQ telemetry transport (MQTT) v3.1 protocol specification” IBM developer Works Technical Library 2010, http://www.ibm.com/developerworks/webservices/library/wsmqtt/index.html.
  4. https://en.wikipedia.org/wiki/MQTT
  5. Chen, Whei-Jen and Gupta, Rahul and Lampkin, Valerie and Robertson, Dale M. and Subrahmanyam, Nagesh, “Responsive Mobile User Experience Using MQTT and IBM MessageSight” IBM Corp., 2014
  6. Cristian Mateos, Andres Pablo Flores, Alejandra Cechich and Alejandro Zunino, “RESTful Service Composition at a Glance: a Survey”, 2015
  7. https://en.wikipedia.org/wiki/Constrained_Application_Protocol
  8. Pallavi Sethi and Smruti R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications”
  9. Z. Shelby, ARM, K. Hartke, C. Bormann, “The Constrained Application Protocol (CoAP)”, https://tools.ietf.org/html/rfc7252
  10. https://www.hivemq.com/blog/mqtt-essentials-part-3-client-broker-connection-establishment
  11. Isam Ishaq, Jeroen Hoebeke, Ingrid Moerman and Piet Demeester, “IETF Standardization in the Field of the Internet of Things (IoT): A Survey”, 2013
  12. https://en.wikipedia.org/wiki/Encryption
  13. Sotirios Katsikeas, Konstantinos Fysarakis, Andreas Miaoudakis, Amaury Van Bemten, Ioannis Askoxylakis, Ioannis Papaefstathiou and Anargyros Plemenos, “Lightweight & Secure Industrial IoT Communications via the MQ Telemetry Transport Protocol”, 2017
  14. Thamer Alghamdi, A. Lasebae and Mahdi Aiash, “Security Analysis of the Constrained Application Protocol in the Internet of Things”, 2013
  15. Ajit A. Chavan, Mininath K. Nighot, “Secure CoAP Using Enhanced DTLS for Internet of Things”, 2014.

Keywords

Internet of Things, IOT, MQTT, COAP, Messaging Format of MQTT and CoAP, Security in MQTT and CoAP