Performance Analysis of IoT Adaption Layer Protocol

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The network communication in the real world has a significant consumption of energy and the processing power involved.  The components used for the network communication like the protocol and the other mechanisms used consumes a large amount of energy. As a result the low power networks like WSN and the IoT motes face a lot of difficulties for the processing. As a solution to this IETF group called for a new protocol that utilized a low energy in Low power and a Lossy networks. IPv6 over Low Power Wireless Personal Area Networks abbreviated as 6LowPan protocol was designed for the working in the low power networks.In the paper, we have a detailed analysis carried out on the performance of the 6LowPan protocol with different number of nodes. The performance are evaluated for number of parameters like throughput, latency, power etc

     


  • Keywords


    IoT, 6LowPan, RPL, DODAG, Cooja

  • References


      [1] Dragmoir, D., Gheaorge, L., Costea, S. and Radovici, A. “A Survey on Secure Communication Protocols for IoT Systems”, International Workshop on Secure Internet of Things, 2016.

      [2] Sonavane, S.S. and Deshmukh, S. “Security Protocols for Internet of Things: A Survey”, IEEE Conference, 2017.

      [3] Granjal, J., Moteiro, E. and Silva, J.S., “Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues”, IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 17, NO. 3, 2015.

      [4] Aljarrah, E., Yassein, M.B. and Aljawarneh, S., “Routing Protocol of Low-Power and Lossy Network:Survey and Open Issues”, IEEE onference, 2016.

      [5] Kamble, A., Malemath, V.S. and Patil, D., “Security Attacks and Secure Routing Protocols in RPL-based Internet of Things:Survey”, International Conference on Emerging Trends & Innovation in ICT (ICEI), 2017.

      [6] Pongle, P. and Chavan, G., “A Survey: Attacks on RPL and 6LoWPAN in IoT”, International Conference on Pervasive Computing (ICPC), 2015.

      [7] Chen, Y. and Kunz, T., “Performance Evaluation of IoT Protocols under a Constrained Wireless Access Network”, 2016.

      [8] Al-Sarawi,S., Anbar, M., Alieyan, K. and Alzubaidi, M., “Internet of Things (IoT) Communication Protocols : Review”, 8th International Conference on Information Technology (ICIT)”, 2017

      [9] Gardasevic, G., Mijovic, S., Stakjic, A. and Buratti, C., “On the Performance of 6LoWPAN through Experimentation”, IEEE Conference, 2015.

      [10] Cody-Kenny, B., Guerin, D., Ennis, Desmond., Carbaj, R.S., Huggard, M. and Goldrick, C.M. “Performance Evaluation of the 6LoWPAN protocol on MICAz and TelosB motes”, School of Computer Science and Statistics Trinity College Dublin Dublin 2, Ireland.

      [11] Bhat, S., Pai, V. and Kallapur, P., V.,”Energy Efficient Clustering Routing Protocol based on LEACH for WSN”, International Journal of Computer Applications, Vol. 120, No. 13, June 2015.

      [12] Pavan, R., Pai, V. and Kallapur, P., V., ”Energy Efficient Clustered Routing Protocols of LEACH”, International Journal of Research in Applied Science & Engineering Technology, Vol. 3, Issue V, May 2015.


 

View

Download

Article ID: 19560
 
DOI: 10.14419/ijet.v7i3.34.19560




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.