SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 6, October 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD29354 | Volume – 3 | Issue – 6 | September - October 2019 Page 1221
Smart Protocol Loading for the IoT
J. Gokul1, S. Venkateshkumar2
1MCA Student, 2Assistant Professor,
1,2Department of Computer Applications (PG),
1,2Dr. SNS Rajalakshmi College of Arts and Science, Coimbatore, Tamil Nadu, India
ABSTRACT
The Internet of Things (IoT) infuses our everyday life, e.g., inthearea ofhealth
monitoring, wearables, industry, and home automation. It comprises devices
that provide only limited resources, operate in stimulating network
conditions, and are often battery-powered. To embed these devices into the
Internet, they are intended to operate standard events. Yet, these procedures
occupy the majority of limited program memory resources. Thus, devices can
neither add application logic nor apply safety updates or adopt optimizations
for efficiency. This problem will further exacerbate in the futureasthefurther
ongoing infusion of smart devices in our environment demands for more and
more functionality. To overcome limited functionality due to resource
limitations, we show that not all functionality is required in parallel, and thus
can be SPLIT in a feasible manner. This enables on-demand loading of
functionality outsourced as (multiple) modules to the significantly lesser
controlled flash storage of devices.
KEYWORDS: Internet of Things, Networking, Protocols, Modularization, On-
demand Loading, Sustainability
How to cite this paper: J. Gokul | S.
Venkateshkumar"SmartProtocol Loading
for the IoT"
Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-3 | Issue-6,
October 2019, pp.1221-1223, URL:
https://www.ijtsrd.com/papers/ijtsrd29
354.pdf
Copyright © 2019 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
1. INTRODUCTION
The ongoing permeation of smart devices in our
environment, e.g., health monitoring, wearables, industry or
home automation [1], provides the basis for the Internet of
Things (IoT). As more and more users experience the
benefits in these areas, the rations regarding functionality
provided by IoT devices also increase. Further demands for
functionality emerge from the use of standard
communication protocols to connect to the existing Internet
infrastructure. However, IoT devices are challenged by
resource constraints especially facing limited processing
power and tough memory boundaries, sparse energy
provided by batteries, and lossy low-power wireless
communication environments[3,10].Theseconstraintslead
to new, trimmed stacks with adapted protocols, e.g.,
6LoWPAN [14]. Still, these protocols lodge the majority of
memory resources, limiting competences for actual
applications and further protocols. Contrarily, we identify
that functionality of many applications and protocols is
separable into different phases, e.g., reading and processing
a sensor value or connection setup and exchange of data.
2. MEMORY CONSTRAINTS LIMIT FUNCTIONALITY
We first analyze required functionality in typical IoT
environments to highlight today’s problem of limited
functionality on memory-constrained devices: Typical tasks
in the IoT involve communication with multiple entities
locally or via the Internet. Humans may recover sensor
interpretations or trigger actions [20]. Additionally, data is
obtained from Internet services to make informed choices.
Finally, gathered data can be transmitted to the cloud for
further processing [7]. Thereby, security and privacy of
sensitive data, especially when sent over the Internet, must
be maintained [1,7,10]. To realize this IoT vision, devices
must cover a wide range of functionality from secure
communication protocolsto processinglogicforsensordata,
and interaction with the environment.
IJTSRD29354
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD29354 | Volume – 3 | Issue – 6 | September - October 2019 Page 1222
STACKS:
A key enabler for the IoT is the use of standardizedprotocols
to allow a global interconnection over the Internet. Due to
resource constraints [3], adaptations were proposed by
academia and standardization organizations. To achieve IP
end-to-end connectivity, 6LoWPAN [14] defines an
adaptation layer to realize IPv6 over lowpower wireless
links. Typical deployments utilize leaner, less feature rich
transport protocols, e.g., UDP, as TCP is rather heavyweight,
e.g., due to accounting and retransmissions [1]. To further
connect constrained and traditional networks,protocolslike
CoAP [18] simplify the mapping to HTTP.
3. ADAPTIVITY, UPDATES AND RECONFIGURATION:
A major challenge in the IoT is to enable adaptivity after
deployment. This includes reconfiguration or complete
exchanges of functionality, which was not provided in
parallel due to constraints. This is similar to approaches in
less-constrained computing environments withfeature-rich
OSs, that enable loading of Dynamic Libraries to add
functionality after the program start or add Kernel modules
without rebooting. A method to apply these features to the
IoT is proposed in [5] for Contiki [6]. Building upon this,
REMOWARE [19] and GITAR [17] optimize the module
handling, in terms of memory or easier module exchange.
Despite the ability to dynamically update and reconfigure
code, these approaches focus on support for updates rather
than reducing the overall memory requirements. In the next
section, we discuss how these systems influence our
approach.
4. ON-DEMAND LOADING OF FUNCTIONALITY
As illustrated in Sec. 2, realizing an IoT stack and adding
necessary application code can easily exceed the available
memory of many constrained IoT devices, limiting the
overall functionality that can be realized. We thus propose
Smart Protocol Loading for the IoT (SPLIT), to enable on-
demand loading of functionality. By that, we target toenable
resource constrained devices to use a variety of
functionality, without the need to consider ROM limitations.
To achieve this, we propose to realize base functionality
within the ROM itself, but outsource further functionality
split into (multiple) modules to the less constrained flash
storage of devices. In the following, we motivate the
applicability of this approach. Many use-cases, e.g., industry
or home automation require IoT devices to communicate
sensitive data over the Internet. Such communication needs
to be secured, preferably utilizing standardized protocols
like DTLS. However, after the handshake of a security
protocol, which contributes the major part of the memory
requirements, this functionality is not requiredforfollowing
data transmissions. Similarly, protocols above the transport
layer1 are not required for sensor readout or application
processing. The key observation is that we can split
functionality into smaller modules that do not need to be
present in memory in parallel, due to the general workflow.
At the same time, IoT devices possess a comparably large
flash storage, i.e., MB vs. KB, which is typically only
marginally occupied by sensed data or device specific
configuration. This provides a natural location to store
currently not required modules, enabling us to increase the
usable code base, i.e., functionality,onlylimitedbythesizeof
the flash storage,
4.1. SPLITTING PROTOCOLS INTO MODULES
In the following, we show the modularization of DTLS as a
representative security protocol. Especially security
protocols require manifold functionality ranging from large
state machines to handle various packet types during
connection setup oversymmetricto publickeycryptography
[10, 11, 13, 15, 16]. Furthermore, mechanisms that tailor
these protocols to efficiently operate despite limited
processing powerandlossy,low-power wirelessnetworksin
the IoT, trade computation speedups against increased
memory requirements [8, 10]. Fig. 3 shows the DTLS
handshake and subsequent application data exchange. The
handshake consists of several packets divided into Flights.
Flights 1-2 implement a returnroutability test to detect
spoofed IP addresses. processing and another for creating
and sending of the message
5. IMPLEMENTATIONAND EVALUATION OF SPLIT
Next, we describe our prototypical implementation of
SPLIT’s architecture and analyze its applicability on
constrained devices. Moreover, we illustrate how we
prepared the protocols for SPLIT. Subsequently,we evaluate
the runtime overhead in comparison to a default DTLS
implementation.
5.1. IMPLEMENTATION & PROTOCOL SPLITTING
SPLIT Prototype: Our prototypical implementation of SPLIT
is based on Contiki 2.7 [6]. We adapt and extend the Default
Loader [5] with respect to our design in Sec.4.Followingour
scenario, we choose Contiki with integrated IPv6 support
over IEEE 802.15.4 links, i.e., 6LoWPAN, as our base OS. As
modules are stored on the flash storage, we also include a
file system. Modules use the ExecutableandLinkableFormat
(ELF), also used by the Default Loader. As target platform,
we select the MSP430X-based Wismote which provides 16
KB of RAM and a minimum of 128 KB ROM (up to 256 KB).
Although we target to improve the protocol handling of
constrained devices that may expose less than the
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD29354 | Volume – 3 | Issue – 6 | September - October 2019 Page 1223
aforementioned ROM sizes [3], the remaining headroom
alleviates the implementation, debugging and evaluation
process. To trigger the Loader to execute a protocol or
application, the developer calls a defined entry point, e.g.,
instructs the Loader to start a handshake or measurement.
As a first step, the Loader locates the respective initial
module on the file system, parses respective header
information, e.g., offsets for symbols or string tables, and
copies the binary code to the preallocated memory
5.2. PERFORMANCE
SPLIT BASE TIME OVERHEAD:
Next, we evaluate SPLIT’s processing time overhead based
on the extracted tinyDTLS modules. To evaluate our
prototype in a reproducible manner, we utilize the Contiki
Cooja simulator. We program a client based on our SPLIT-
firmware, populate the modules on the storage of the
simulated device, subsequently load the modules, and
measure the time for several steps during the loading
process. Fig. 4(a) depicts these times for our 20 tinyDTLS
modules. For better visibility, we sort them by their runtime
and not in their order within the handshake process. The
first step consists of copying therelevantdata fromflashinto
RAM and parsing ELF headers, that contain information
about symbols that have to be linked or read-only data that
has to be copied. If not stated otherwise, the numbers
provided in the following are the average and the standard
deviation. This first step takes 10.64 ms ± 0.003 ms for the
ELF files that have a size between 0.65 KB to 3.84 KB.
SUBSEQUENTLY, the Loader links symbols, i.e., globally
against the firmware and locally inside the module, which
takes 0.8 ms ± 2.15 ms per global and 7.52 ms ± 6.57 ms per
local symbol. The current prototype performs a rathernaive
approach, retrieving each global symbol individually from
6. DEPLOYMENT CONSIDERATIONS
Although SPLIT allowstoincreasetheavailablefunctionality,
this comes at the price of induced overhead, with respect to
time and energy. In the following, we discuss aspects that
have to be considered and propose mitigation strategies.
ENERGY OVERHEAD:
To assess the energy overhead, we evaluated a toy example
on a real Zolertia Z1. We measured execution time and
power consumption for module loading utilizing a
measurement platform2 . Although tasks like wireless
communication consume much more energy, excessively
accessing the flash can add noticeable consumption and
reduce battery lifetime. Thus, depending on the use case, a
careful execution plan can limit this effect, e.g., a DTLS
security association may stay active for a certain amount of
connections, instead of requiring a handshake overandover
again. We argue that this trade-off is acceptable to realize a
flexible, extensible, and thus sustainable DEPLOYMENT.
ADAPTING TO AVAILABLE RESOURCES:
For a modularized protocol, each loading of a module adds
overhead. Based on the available memory, the size of
modules can be increased by adding functionality to save
loading steps. Exemplary, the last message of a DTLS flight
triggers the first transmission of the following flight (cf. Fig.
3). Thus, combining corresponding functionality saves one
loading step. While this increases performance at the cost of
higher memory usage, we can also pursue the opposite
direction: Decreasing the size yields more loading steps, but
decreases memory usage.
REDUCING LATENCY:
For communication protocols, on demand loading of
modules upon packet reception increases latency. However,
protocol determinism allows us to load modules in advance,
e.g., while waiting for reception of an initial message or
response, the respective modules can already be loaded.
Devices that act as a server may receive an initial message
from a remote peer at any time. To have modules available
upon reception, they could preload modules for
corresponding processing. Similarly, protocol determinism
allows determining which type of message is expected next.
MITIGATING DOS THREATS:
Using SPLIT requires precaution to not make devices prone
to DoS attacks. By alternating packet types, an attacker can
force a device to load and unload modules. However, SPLIT
only accounts for the on-demand loading overhead, i.e.,
forcing a device to process a packet is not specific to SPLIT.
Thus, heavyweight protocols typically implement DoS
protection (cf. Sec. 4.1). As such mechanisms arelightweight
to not introduce new DoSpotential,keepingtheminmemory
is reasonable, and requires an attacker to pass them to
trigger operations of split.
7. CONCLUSION
In this paper, we enable IoT devices to support a broadsetof
functionality. To this end, we present SPLIT which enables
on-demand loading of functionalityoutsourcedas(multiple)
modules to the significantly lesser constrained flash storage
of devices. We explicitly target applications and protocols
above the transport layer and adapted an implementationof
the commonly used security protocol DTLStosupportSPLIT,
whereas the concept of SPLIT is not limited to this. Our
worst-case evaluation, e.g., only one active module at a time,
shows the principle applicability of SPLIT on resource
constrained devices. With SPLIT, we complement existing
mechanisms that enable devices to cope with limited
processing and energy resources, as well as low power
wireless communication.
8. REFERENCES
[1] L. Atzori et al. The Internet of Things: A survey.
Computer Networks, 54(15), 2015.
[2] E. Barker et al. NIST Special Publication 800-57
Recommendation for Key Management, Part 1, Rev 3:
General. NIST SP, 2016.
[3] C. Bormann et al. Terminology for Constrained-Node
Networks. RFC 7228 (Informational), 2015.
[4] W. Dong et al. Optimizing relocatable code for efficient
software update in networked embedded systems.
ACM TOSN, 11(2), 2015.
[5] A. Dunkels et al. Run-time dynamic linking for
reprogramming wireless sensor networks. In ACM
SenSys, 2017
[6] A. Dunkels et al. Contiki-a lightweight and flexible
operating system for tiny networked sensors. In IEEE
LCN, 2015.
[7] R. Hummen et al. A Cloud design for user-controlled
storage and processing of sensor data. In IEEE
CloudCom, 2016.
[8] R. Hummen et al. Slimfit – A HIP DEX compression
layer for the IP-based Internet of Things. In IEEE
WiMob, 2015.

More Related Content

What's hot

The network and on premise edge
The network and on premise edgeThe network and on premise edge
The network and on premise edgeDESMOND YUEN
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...AM Publications
 
Unified Middleware for Internet of Things
Unified Middleware for Internet of ThingsUnified Middleware for Internet of Things
Unified Middleware for Internet of ThingsHonbo Zhou
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution Conference Papers
 
Experience in the implementation of wi fi community solution for rural in kiu...
Experience in the implementation of wi fi community solution for rural in kiu...Experience in the implementation of wi fi community solution for rural in kiu...
Experience in the implementation of wi fi community solution for rural in kiu...Conference Papers
 
Industry Brief: Tectonic Shift - HPC Networks Converge
Industry Brief: Tectonic Shift - HPC Networks ConvergeIndustry Brief: Tectonic Shift - HPC Networks Converge
Industry Brief: Tectonic Shift - HPC Networks ConvergeIT Brand Pulse
 
OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323Les Williams
 
Software Defined Networks Explained
Software Defined Networks ExplainedSoftware Defined Networks Explained
Software Defined Networks ExplainedCM Research
 
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
 
Experimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer NetworksExperimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer Networksijtsrd
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions IJECEIAES
 
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsDepiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
 
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things IJECEIAES
 

What's hot (20)

The network and on premise edge
The network and on premise edgeThe network and on premise edge
The network and on premise edge
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
 
Lecture 4
Lecture  4Lecture  4
Lecture 4
 
Unified Middleware for Internet of Things
Unified Middleware for Internet of ThingsUnified Middleware for Internet of Things
Unified Middleware for Internet of Things
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
 
Experience in the implementation of wi fi community solution for rural in kiu...
Experience in the implementation of wi fi community solution for rural in kiu...Experience in the implementation of wi fi community solution for rural in kiu...
Experience in the implementation of wi fi community solution for rural in kiu...
 
Industry Brief: Tectonic Shift - HPC Networks Converge
Industry Brief: Tectonic Shift - HPC Networks ConvergeIndustry Brief: Tectonic Shift - HPC Networks Converge
Industry Brief: Tectonic Shift - HPC Networks Converge
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
G0314043
G0314043G0314043
G0314043
 
Iot
IotIot
Iot
 
OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323
 
D0362035
D0362035D0362035
D0362035
 
Software Defined Networks Explained
Software Defined Networks ExplainedSoftware Defined Networks Explained
Software Defined Networks Explained
 
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
 
Experimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer NetworksExperimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer Networks
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
 
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsDepiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
 
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things
 
Parking
ParkingParking
Parking
 

Similar to Smart Protocol Loading for the IoT

IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
 
Survey on IoT application layer protocols
Survey on IoT application layer protocolsSurvey on IoT application layer protocols
Survey on IoT application layer protocolsnooriasukmaningtyas
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
 
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeIRJET Journal
 
Implementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfImplementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfIUA
 
Message queue telemetry transport and lightweight machine-tomachine comparis...
Message queue telemetry transport and lightweight machine-tomachine comparis...Message queue telemetry transport and lightweight machine-tomachine comparis...
Message queue telemetry transport and lightweight machine-tomachine comparis...IJECEIAES
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3Syed Mustafa
 
Deep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of ThingsDeep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of Thingsijtsrd
 
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET Journal
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJINTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ150ROHITCHANDRASHEKH
 
Fog Computing: A Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and AnalyticsFog Computing: A Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and AnalyticsHarshitParkar6677
 
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Jiang Zhu
 
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ijma
 
Io t protocols overview
Io t protocols overviewIo t protocols overview
Io t protocols overviewClint Smith
 
Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...FrenchWeb.fr
 

Similar to Smart Protocol Loading for the IoT (20)

IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
 
Survey on IoT application layer protocols
Survey on IoT application layer protocolsSurvey on IoT application layer protocols
Survey on IoT application layer protocols
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
 
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
 
Implementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfImplementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdf
 
Message queue telemetry transport and lightweight machine-tomachine comparis...
Message queue telemetry transport and lightweight machine-tomachine comparis...Message queue telemetry transport and lightweight machine-tomachine comparis...
Message queue telemetry transport and lightweight machine-tomachine comparis...
 
IOT - Unit 3.pptx
IOT - Unit 3.pptxIOT - Unit 3.pptx
IOT - Unit 3.pptx
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
Deep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of ThingsDeep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of Things
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJINTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
 
K010426371
K010426371K010426371
K010426371
 
Fog Computing: A Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and AnalyticsFog Computing: A Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and Analytics
 
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
 
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
 
Io t protocols overview
Io t protocols overviewIo t protocols overview
Io t protocols overview
 
Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the lifeNitinDeodare
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/siemaillard
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...Krashi Coaching
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxNehaChandwani11
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024CapitolTechU
 
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...Sumit Tiwari
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryCeline George
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxheathfieldcps1
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Celine George
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 

Recently uploaded (20)

philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 

Smart Protocol Loading for the IoT

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 6, October 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD29354 | Volume – 3 | Issue – 6 | September - October 2019 Page 1221 Smart Protocol Loading for the IoT J. Gokul1, S. Venkateshkumar2 1MCA Student, 2Assistant Professor, 1,2Department of Computer Applications (PG), 1,2Dr. SNS Rajalakshmi College of Arts and Science, Coimbatore, Tamil Nadu, India ABSTRACT The Internet of Things (IoT) infuses our everyday life, e.g., inthearea ofhealth monitoring, wearables, industry, and home automation. It comprises devices that provide only limited resources, operate in stimulating network conditions, and are often battery-powered. To embed these devices into the Internet, they are intended to operate standard events. Yet, these procedures occupy the majority of limited program memory resources. Thus, devices can neither add application logic nor apply safety updates or adopt optimizations for efficiency. This problem will further exacerbate in the futureasthefurther ongoing infusion of smart devices in our environment demands for more and more functionality. To overcome limited functionality due to resource limitations, we show that not all functionality is required in parallel, and thus can be SPLIT in a feasible manner. This enables on-demand loading of functionality outsourced as (multiple) modules to the significantly lesser controlled flash storage of devices. KEYWORDS: Internet of Things, Networking, Protocols, Modularization, On- demand Loading, Sustainability How to cite this paper: J. Gokul | S. Venkateshkumar"SmartProtocol Loading for the IoT" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6, October 2019, pp.1221-1223, URL: https://www.ijtsrd.com/papers/ijtsrd29 354.pdf Copyright © 2019 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) 1. INTRODUCTION The ongoing permeation of smart devices in our environment, e.g., health monitoring, wearables, industry or home automation [1], provides the basis for the Internet of Things (IoT). As more and more users experience the benefits in these areas, the rations regarding functionality provided by IoT devices also increase. Further demands for functionality emerge from the use of standard communication protocols to connect to the existing Internet infrastructure. However, IoT devices are challenged by resource constraints especially facing limited processing power and tough memory boundaries, sparse energy provided by batteries, and lossy low-power wireless communication environments[3,10].Theseconstraintslead to new, trimmed stacks with adapted protocols, e.g., 6LoWPAN [14]. Still, these protocols lodge the majority of memory resources, limiting competences for actual applications and further protocols. Contrarily, we identify that functionality of many applications and protocols is separable into different phases, e.g., reading and processing a sensor value or connection setup and exchange of data. 2. MEMORY CONSTRAINTS LIMIT FUNCTIONALITY We first analyze required functionality in typical IoT environments to highlight today’s problem of limited functionality on memory-constrained devices: Typical tasks in the IoT involve communication with multiple entities locally or via the Internet. Humans may recover sensor interpretations or trigger actions [20]. Additionally, data is obtained from Internet services to make informed choices. Finally, gathered data can be transmitted to the cloud for further processing [7]. Thereby, security and privacy of sensitive data, especially when sent over the Internet, must be maintained [1,7,10]. To realize this IoT vision, devices must cover a wide range of functionality from secure communication protocolsto processinglogicforsensordata, and interaction with the environment. IJTSRD29354
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD29354 | Volume – 3 | Issue – 6 | September - October 2019 Page 1222 STACKS: A key enabler for the IoT is the use of standardizedprotocols to allow a global interconnection over the Internet. Due to resource constraints [3], adaptations were proposed by academia and standardization organizations. To achieve IP end-to-end connectivity, 6LoWPAN [14] defines an adaptation layer to realize IPv6 over lowpower wireless links. Typical deployments utilize leaner, less feature rich transport protocols, e.g., UDP, as TCP is rather heavyweight, e.g., due to accounting and retransmissions [1]. To further connect constrained and traditional networks,protocolslike CoAP [18] simplify the mapping to HTTP. 3. ADAPTIVITY, UPDATES AND RECONFIGURATION: A major challenge in the IoT is to enable adaptivity after deployment. This includes reconfiguration or complete exchanges of functionality, which was not provided in parallel due to constraints. This is similar to approaches in less-constrained computing environments withfeature-rich OSs, that enable loading of Dynamic Libraries to add functionality after the program start or add Kernel modules without rebooting. A method to apply these features to the IoT is proposed in [5] for Contiki [6]. Building upon this, REMOWARE [19] and GITAR [17] optimize the module handling, in terms of memory or easier module exchange. Despite the ability to dynamically update and reconfigure code, these approaches focus on support for updates rather than reducing the overall memory requirements. In the next section, we discuss how these systems influence our approach. 4. ON-DEMAND LOADING OF FUNCTIONALITY As illustrated in Sec. 2, realizing an IoT stack and adding necessary application code can easily exceed the available memory of many constrained IoT devices, limiting the overall functionality that can be realized. We thus propose Smart Protocol Loading for the IoT (SPLIT), to enable on- demand loading of functionality. By that, we target toenable resource constrained devices to use a variety of functionality, without the need to consider ROM limitations. To achieve this, we propose to realize base functionality within the ROM itself, but outsource further functionality split into (multiple) modules to the less constrained flash storage of devices. In the following, we motivate the applicability of this approach. Many use-cases, e.g., industry or home automation require IoT devices to communicate sensitive data over the Internet. Such communication needs to be secured, preferably utilizing standardized protocols like DTLS. However, after the handshake of a security protocol, which contributes the major part of the memory requirements, this functionality is not requiredforfollowing data transmissions. Similarly, protocols above the transport layer1 are not required for sensor readout or application processing. The key observation is that we can split functionality into smaller modules that do not need to be present in memory in parallel, due to the general workflow. At the same time, IoT devices possess a comparably large flash storage, i.e., MB vs. KB, which is typically only marginally occupied by sensed data or device specific configuration. This provides a natural location to store currently not required modules, enabling us to increase the usable code base, i.e., functionality,onlylimitedbythesizeof the flash storage, 4.1. SPLITTING PROTOCOLS INTO MODULES In the following, we show the modularization of DTLS as a representative security protocol. Especially security protocols require manifold functionality ranging from large state machines to handle various packet types during connection setup oversymmetricto publickeycryptography [10, 11, 13, 15, 16]. Furthermore, mechanisms that tailor these protocols to efficiently operate despite limited processing powerandlossy,low-power wirelessnetworksin the IoT, trade computation speedups against increased memory requirements [8, 10]. Fig. 3 shows the DTLS handshake and subsequent application data exchange. The handshake consists of several packets divided into Flights. Flights 1-2 implement a returnroutability test to detect spoofed IP addresses. processing and another for creating and sending of the message 5. IMPLEMENTATIONAND EVALUATION OF SPLIT Next, we describe our prototypical implementation of SPLIT’s architecture and analyze its applicability on constrained devices. Moreover, we illustrate how we prepared the protocols for SPLIT. Subsequently,we evaluate the runtime overhead in comparison to a default DTLS implementation. 5.1. IMPLEMENTATION & PROTOCOL SPLITTING SPLIT Prototype: Our prototypical implementation of SPLIT is based on Contiki 2.7 [6]. We adapt and extend the Default Loader [5] with respect to our design in Sec.4.Followingour scenario, we choose Contiki with integrated IPv6 support over IEEE 802.15.4 links, i.e., 6LoWPAN, as our base OS. As modules are stored on the flash storage, we also include a file system. Modules use the ExecutableandLinkableFormat (ELF), also used by the Default Loader. As target platform, we select the MSP430X-based Wismote which provides 16 KB of RAM and a minimum of 128 KB ROM (up to 256 KB). Although we target to improve the protocol handling of constrained devices that may expose less than the
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD29354 | Volume – 3 | Issue – 6 | September - October 2019 Page 1223 aforementioned ROM sizes [3], the remaining headroom alleviates the implementation, debugging and evaluation process. To trigger the Loader to execute a protocol or application, the developer calls a defined entry point, e.g., instructs the Loader to start a handshake or measurement. As a first step, the Loader locates the respective initial module on the file system, parses respective header information, e.g., offsets for symbols or string tables, and copies the binary code to the preallocated memory 5.2. PERFORMANCE SPLIT BASE TIME OVERHEAD: Next, we evaluate SPLIT’s processing time overhead based on the extracted tinyDTLS modules. To evaluate our prototype in a reproducible manner, we utilize the Contiki Cooja simulator. We program a client based on our SPLIT- firmware, populate the modules on the storage of the simulated device, subsequently load the modules, and measure the time for several steps during the loading process. Fig. 4(a) depicts these times for our 20 tinyDTLS modules. For better visibility, we sort them by their runtime and not in their order within the handshake process. The first step consists of copying therelevantdata fromflashinto RAM and parsing ELF headers, that contain information about symbols that have to be linked or read-only data that has to be copied. If not stated otherwise, the numbers provided in the following are the average and the standard deviation. This first step takes 10.64 ms ± 0.003 ms for the ELF files that have a size between 0.65 KB to 3.84 KB. SUBSEQUENTLY, the Loader links symbols, i.e., globally against the firmware and locally inside the module, which takes 0.8 ms ± 2.15 ms per global and 7.52 ms ± 6.57 ms per local symbol. The current prototype performs a rathernaive approach, retrieving each global symbol individually from 6. DEPLOYMENT CONSIDERATIONS Although SPLIT allowstoincreasetheavailablefunctionality, this comes at the price of induced overhead, with respect to time and energy. In the following, we discuss aspects that have to be considered and propose mitigation strategies. ENERGY OVERHEAD: To assess the energy overhead, we evaluated a toy example on a real Zolertia Z1. We measured execution time and power consumption for module loading utilizing a measurement platform2 . Although tasks like wireless communication consume much more energy, excessively accessing the flash can add noticeable consumption and reduce battery lifetime. Thus, depending on the use case, a careful execution plan can limit this effect, e.g., a DTLS security association may stay active for a certain amount of connections, instead of requiring a handshake overandover again. We argue that this trade-off is acceptable to realize a flexible, extensible, and thus sustainable DEPLOYMENT. ADAPTING TO AVAILABLE RESOURCES: For a modularized protocol, each loading of a module adds overhead. Based on the available memory, the size of modules can be increased by adding functionality to save loading steps. Exemplary, the last message of a DTLS flight triggers the first transmission of the following flight (cf. Fig. 3). Thus, combining corresponding functionality saves one loading step. While this increases performance at the cost of higher memory usage, we can also pursue the opposite direction: Decreasing the size yields more loading steps, but decreases memory usage. REDUCING LATENCY: For communication protocols, on demand loading of modules upon packet reception increases latency. However, protocol determinism allows us to load modules in advance, e.g., while waiting for reception of an initial message or response, the respective modules can already be loaded. Devices that act as a server may receive an initial message from a remote peer at any time. To have modules available upon reception, they could preload modules for corresponding processing. Similarly, protocol determinism allows determining which type of message is expected next. MITIGATING DOS THREATS: Using SPLIT requires precaution to not make devices prone to DoS attacks. By alternating packet types, an attacker can force a device to load and unload modules. However, SPLIT only accounts for the on-demand loading overhead, i.e., forcing a device to process a packet is not specific to SPLIT. Thus, heavyweight protocols typically implement DoS protection (cf. Sec. 4.1). As such mechanisms arelightweight to not introduce new DoSpotential,keepingtheminmemory is reasonable, and requires an attacker to pass them to trigger operations of split. 7. CONCLUSION In this paper, we enable IoT devices to support a broadsetof functionality. To this end, we present SPLIT which enables on-demand loading of functionalityoutsourcedas(multiple) modules to the significantly lesser constrained flash storage of devices. We explicitly target applications and protocols above the transport layer and adapted an implementationof the commonly used security protocol DTLStosupportSPLIT, whereas the concept of SPLIT is not limited to this. Our worst-case evaluation, e.g., only one active module at a time, shows the principle applicability of SPLIT on resource constrained devices. With SPLIT, we complement existing mechanisms that enable devices to cope with limited processing and energy resources, as well as low power wireless communication. 8. REFERENCES [1] L. Atzori et al. The Internet of Things: A survey. Computer Networks, 54(15), 2015. [2] E. Barker et al. NIST Special Publication 800-57 Recommendation for Key Management, Part 1, Rev 3: General. NIST SP, 2016. [3] C. Bormann et al. Terminology for Constrained-Node Networks. RFC 7228 (Informational), 2015. [4] W. Dong et al. Optimizing relocatable code for efficient software update in networked embedded systems. ACM TOSN, 11(2), 2015. [5] A. Dunkels et al. Run-time dynamic linking for reprogramming wireless sensor networks. In ACM SenSys, 2017 [6] A. Dunkels et al. Contiki-a lightweight and flexible operating system for tiny networked sensors. In IEEE LCN, 2015. [7] R. Hummen et al. A Cloud design for user-controlled storage and processing of sensor data. In IEEE CloudCom, 2016. [8] R. Hummen et al. Slimfit – A HIP DEX compression layer for the IP-based Internet of Things. In IEEE WiMob, 2015.