Performance Analysis of IoT Adaption Layer Protocol

Authors

  • Nikshepa .

  • Vasudeva Pai

  • Karthik Pai

  • Udaya Kumar K Shenoy

How to Cite

., N., Pai, V., Pai, K., & Kumar K Shenoy, U. (2018). Performance Analysis of IoT Adaption Layer Protocol. International Journal of Engineering and Technology, 7(3.34), 781-785. https://doi.org/10.14419/ijet.v7i3.34.19560

Received date: September 12, 2018

Accepted date: September 12, 2018

DOI:

https://doi.org/10.14419/ijet.v7i3.34.19560

Keywords:

IoT, 6LowPan, RPL, DODAG, Cooja

Abstract

The network communication in the real world has a significant consumption of energy and the processing power involved.  The components used for the network communication like the protocol and the other mechanisms used consumes a large amount of energy. As a result the low power networks like WSN and the IoT motes face a lot of difficulties for the processing. As a solution to this IETF group called for a new protocol that utilized a low energy in Low power and a Lossy networks. IPv6 over Low Power Wireless Personal Area Networks abbreviated as 6LowPan protocol was designed for the working in the low power networks.In the paper, we have a detailed analysis carried out on the performance of the 6LowPan protocol with different number of nodes. The performance are evaluated for number of parameters like throughput, latency, power etc

 

References

  1. [1] Dragmoir, D., Gheaorge, L., Costea, S. and Radovici, A. “A Survey on Secure Communication Protocols for IoT Systemsâ€, International Workshop on Secure Internet of Things, 2016.

    [2] Sonavane, S.S. and Deshmukh, S. “Security Protocols for Internet of Things: A Surveyâ€, IEEE Conference, 2017.

    [3] Granjal, J., Moteiro, E. and Silva, J.S., “Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issuesâ€, IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 17, NO. 3, 2015.

    [4] Aljarrah, E., Yassein, M.B. and Aljawarneh, S., “Routing Protocol of Low-Power and Lossy Network:Survey and Open Issuesâ€, IEEE onference, 2016.

    [5] Kamble, A., Malemath, V.S. and Patil, D., “Security Attacks and Secure Routing Protocols in RPL-based Internet of Things:Surveyâ€, International Conference on Emerging Trends & Innovation in ICT (ICEI), 2017.

    [6] Pongle, P. and Chavan, G., “A Survey: Attacks on RPL and 6LoWPAN in IoTâ€, International Conference on Pervasive Computing (ICPC), 2015.

    [7] Chen, Y. and Kunz, T., “Performance Evaluation of IoT Protocols under a Constrained Wireless Access Networkâ€, 2016.

    [8] Al-Sarawi,S., Anbar, M., Alieyan, K. and Alzubaidi, M., “Internet of Things (IoT) Communication Protocols : Reviewâ€, 8th International Conference on Information Technology (ICIT)â€, 2017

    [9] Gardasevic, G., Mijovic, S., Stakjic, A. and Buratti, C., “On the Performance of 6LoWPAN through Experimentationâ€, IEEE Conference, 2015.

    [10] Cody-Kenny, B., Guerin, D., Ennis, Desmond., Carbaj, R.S., Huggard, M. and Goldrick, C.M. “Performance Evaluation of the 6LoWPAN protocol on MICAz and TelosB motesâ€, School of Computer Science and Statistics Trinity College Dublin Dublin 2, Ireland.

    [11] Bhat, S., Pai, V. and Kallapur, P., V.,â€Energy Efficient Clustering Routing Protocol based on LEACH for WSNâ€, International Journal of Computer Applications, Vol. 120, No. 13, June 2015.

    [12] Pavan, R., Pai, V. and Kallapur, P., V., â€Energy Efficient Clustered Routing Protocols of LEACHâ€, International Journal of Research in Applied Science & Engineering Technology, Vol. 3, Issue V, May 2015.

Downloads

How to Cite

., N., Pai, V., Pai, K., & Kumar K Shenoy, U. (2018). Performance Analysis of IoT Adaption Layer Protocol. International Journal of Engineering and Technology, 7(3.34), 781-785. https://doi.org/10.14419/ijet.v7i3.34.19560

Received date: September 12, 2018

Accepted date: September 12, 2018