You are currently viewing a new version of our website. To view the old version click .
Symmetry
  • Article
  • Open Access

13 October 2025

Leveraging Hierarchical Asymmetry for Efficient Resource Discovery in Message Queuing Telemetry Transport

,
and
1
Department of Information Management, National Chi Nan University, Nantou 54561, Taiwan
2
Department of Computer Science & Information Engineering, National Chi Nan University, Nantou 54561, Taiwan
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue Applications of Symmetry/Asymmetry in Artificial Intelligence and Deep Metaheuristics

Abstract

With the rapid growth of the Internet of Things, efficient resource discovery has become essential for effective resource management. Although Message Queuing Telemetry Transport is one of the most widely adopted IoT communication protocols, it lacks a native resource discovery mechanism or any resource discovery standards. The existing Message Queuing Telemetry Transport resource discovery relies on symmetric full-mesh synchronization, which causes excessive traffic and unacceptable latency as the system scales up: this restricts its use to only small-size deployments. To overcome these limitations, this paper proposes a Hierarchical Message Queuing Telemetry Transport resource discovery and distribution framework, inspired by the hierarchical design of the Domain Name System. By introducing hierarchical asymmetry, the framework reduces communication overhead, enhances scalability, and maintains efficient real-time query performance, as demonstrated by implementation and simulation results.

1. Introduction

In large-scale Internet of Things (IoT) systems [1,2], devices and services are typically highly distributed. Efficient resource discovery (RD) and the supported queries are critical for ensuring system operation and scalability [3,4]. Within the broader Internet environment, multiple mechanisms such as Domain Name System (DNS), UPnP, mDNS, and LDAP have been employed for resource management. However, these methods demonstrate different design philosophies such as hierarchical vs. flat, and symmetric vs. asymmetric roles, but they are not applicable to resource-constrained Message Queuing Telemetry Transport (MQTT)-based IoT scenarios.
MQTT is a lightweight communication protocol widely adopted in the IoT domain. Following a publish/subscribe architecture, it consists of three roles—broker, publisher, and subscriber. Message subscription and forwarding are based on the core concept of topics. MQTT is well suited for constrained devices due to its low bandwidth requirements and implementation simplicity. Nevertheless, MQTT does not natively provide any resource directory functionalities.
To address this gap, Pereira et al. [1] proposed MQTT-RD—an MQTT-based resource directory. This approach organizes topic-based MQTT resources into a searchable directory and allows users to obtain complete directory information by subscribing to specific topics. While this method provides a certain degree of resource discovery capability, both Pereira et al. [1] and our experiments indicate that, as the system scales up, the full-mesh synchronization adopted by MQTT-RD results in excessive traffic and processing load; the system stalls even at modest scales—for example, with only 20 sniffers (a sniffer is an RD operating entity). This is due to the symmetric roles of the sniffers, which inevitably leads to disproportionate growth in connections and message overhead. In a short summary, this symmetric design makes the system unscalable.
To overcome these limitations, this paper introduces hierarchical MQTT resource discovery and distribution (HMQTT-RDD). In contrast to MQTT-RD’s symmetric mesh architecture, HMQTT-RDD adopts the asymmetric hierarchy-and-partition management concept of DNS to arrange the sniffers and their management domains. This design reduces synchronization overhead and improves scalability in resource-constrained IoT environments.
The main contributions of this paper are summarized as follows:
  • Detailed evaluations and analysis of MQTT-RD: We experiment the MQTT-RD implementation. We qualitatively and quantitatively evaluate the overhead of MQTT-RD. We highlight the key structural weaknesses which cause its communication overhead and latency bottlenecks.
  • The new HMQTT-RDD framework: We provide a hierarchical management principle that reduces cross-domain synchronization overhead.
  • Implementation and validation of effectiveness: We implement HMQTT-RDD and deploy it in a virtualized IoT environment to demonstrate its effectiveness.
  • Performance analysis: We evaluate MQTT-RD and HMQTT-RDD in terms of background traffic, synchronization latency, and directory query efficiency.
The remainder of this paper is organized as follows: Section 2 reviews related work; Section 3 presents our qualitative analysis and quantitative evaluations of MQTT-RD; Section 4 presents HMQTT-RDD; Section 5 discusses the experimental results; Section 6 concludes the paper.

3. Detailed Analysis of MQTT-RD

MQTT-RD introduces a resource directory (RD) service maintained by specialized clients called sniffers, which record the devices, the supported topics, and the sniffers, along with related attributes such as status and broker information. The broker continues to function solely as a message forwarder, while regular clients (publishers and subscribers) retain their original roles. With this design, MQTT-RD provides directory-based resource discovery fully compatible with the MQTT protocol standards.
Building on this foundation, MQTT-RD exhibits several defining characteristics. First, it leverages the MQTT topic mechanism to emulate registration and discovery operations. Second, it relies on a full-mesh synchronization model, where each sniffer exchanges update messages with every other sniffer to maintain global directory consistency. Third, all Internet sniffers are symmetric in role, handling registration, deletion, query, and synchronization alike. While these traits simplify design and deployment, they introduce critical drawbacks: as the number of sniffers increases, traffic grows drastically, resulting in escalating system operation deterioration. Both the RD maintenance messages and sniffer status-probing traffic such as PingAlive burden the system, limiting scalability and stability. To ensure directory consistency across sniffers, MQTT-RD adopts a full-mesh synchronization mechanism. Its core design can be summarized into the following elements:
  • Sniffer: An MQTT entity which implements resource discovery, management, and exchange across different networks [22,23].
  • Resource Directory: Each sniffer maintains a directory containing information about devices, other sniffers, and their supported topics.
  • Topic-Based Management: Utilizes specific topics for RD registration, query, and synchronization. The key topics and their functions are summarized in Table 2.
    Table 2. Topics used for resource discovery.
As illustrated in Figure 1, the MQTT-RD architecture consists of a cloud broker, Internet sniffer, local sniffer, local broker, and devices to support registration, synchronization, and query; they all communicate with each other via MQTT to achieve resource registration, synchronization, and query functionalities.
Figure 1. Overview of the MQTT-RD architecture.
Pereira et al. [1] implemented and simulated MQTT-RD. In their preliminary study, they reported that as the system scales up to 20 Internet sniffers, the volume of synchronization messages grows tremendously, leading to excessive background traffic and system stall.
According to the description in the MQTT-RD literature, when the number of sniffers exceeds 20, the system experiences abnormal behavior or even crashes. Therefore, we further simulate MQTT-RD and thoroughly analyze the codes/systems to have a detailed understanding of the limitations and weaknesses [24]. Our results confirm that, when the number of sniffers goes up nearly 20, the synchronization among sniffers crashes, which prevents the resource directory from maintaining consistency.
As illustrated in Figure 2, each Internet sniffer in MQTT-RD communicates with all others in a full-mesh topology. During synchronization, every Internet sniffer must transmit messages to the remaining Internet N 1 sniffers. Two main message types are RD synchronization updates and PingAlive packets. The total number of packets per synchronization round can be expressed as N   ×   ( N 1 ) .
Figure 2. MQTT-RD sniffer full-mesh synchronization.
From this observation, two major weaknesses can be identified:
  • Significant increase in registration overhead and RD synchronization latency.
  • Rapid growth of background traffic caused by the PingAlive mechanism.
These trends are quantified in Table 3 and illustrated in Figure 3, which presents the estimated communication overhead of MQTT-RD for the various numbers of sniffers. The data show that both registration and PingAlive overheads grow rapidly as the system scales up, which confirms the scalability weaknesses of the full-mesh design.
Table 3. Estimated communication overhead of MQTT-RD.
Figure 3. Estimated communication overhead of MQTT-RD with varying sniffer numbers.

4. Design of Hierarchical MQTT Resource Discovery and Distribution

HMQTT-RDD adopts three design principles inspired by DNS—hierarchical structure, domain-based management, and recursive queries. These principles replace the flat full-mesh synchronization of MQTT-RD, which leads to dramatic traffic growth and latency.
  • Tree structure: HMQTT-RDD replaces the flat full-mesh of MQTT-RD with a hierarchical tree to avoid tremendous overhead growth and to distribute responsibilities across layers.
  • Domain-based management: HMQTT-RDD assigns each sniffer a domain-based responsibility.
  • Recursive queries: Queries are resolved locally whenever possible, with only unresolved requests forwarded upward. This follows the recursive model of DNS but is tailored for IoT, where low latency is critical in contrast to DNS’s tolerance for higher delays.
Compared with MQTT-RD, HMQTT-RDD eliminates excessive synchronization traffic, reduces query delay by localizing lookups, and maintains eventual consistency in dynamic environments. It further improves availability by allowing regional service continuity and supports lightweight deployment suited to constrained IoT devices.
HMQTT-RDD improves upon MQTT-RD by addressing three major limitations: it reduces synchronization overhead, localizes query latency, and ensures eventual consistency in dynamic environments. In addition, HMQTT-RDD offers regional availability and supports lightweight deployment, which are essential for IoT scenarios. Unlike DNS, which maintains relatively static domain-to-IP mappings with periodic updates, HMQTT-RDD must handle dynamic IoT resources that change frequently. To address this, it relies on event-driven synchronization among sniffers. Similarly, while DNS depends on authoritative servers deployed in stable infrastructures, sniffers in HMQTT-RDD are lightweight clients designed to operate in volatile IoT environments. Furthermore, recursive queries in DNS can tolerate higher latencies, whereas HMQTT-RDD ensures that most queries are resolved locally to satisfy the low-latency requirements of IoT.
Table 4 compares the design orientations of DNS, MQTT-RD, and HMQTT-RDD across naming, management objective, update model, and topology. MQTT-RD adopts a flat, full-mesh arrangement of sniffers with event-driven peer-to-peer synchronization and a global, non-partitioned directory. By contrast, HMQTT-RDD inherits DNS’s hierarchical and asymmetric principles but modifies the update model and query mechanism to better match IoT dynamics—partitioning responsibilities across a sniffer hierarchy and using layer-based, event-driven synchronization with local-first lookups. These adaptations clearly improve upon MQTT-RD’s flat full-mesh design and demonstrate that HMQTT-RDD is a tailored solution for IoT rather than a direct copy of DNS.
Table 4. Comparison of design orientations: DNS, MQTT-RD, and HMQTT-RDD.

4.1. Hierarchical Management Protocol

In HMQTT-RDD, sniffers are organized into a hierarchical structure (Figure 4). Within this protocol, a client query is first processed by its local sniffer; if the requested information is outside the domain and not in the cache (not yet implemented), the query is escalated to the root, which maintains the global directory. Cross-root coordination is beyond the current scope and left as future work. The three sniffer types are defined as follows:
  • Root: Located at the top layer, the root sniffer aggregates resource information from all sniffers and provides global resource query services.
  • Intermediate: Sniffers in the intermediate levels receive synchronization messages from the lower-level sniffers in its domain, updates its directory, handle registration, and reports the results to the upper layer.
  • Leaf: Sniffers in the leaf levels directly manage devices within their domain, handle registration and status updates, and report them to the upper layer.
Figure 4. Hierarchical architecture of HMQTT-RDD.

4.2. Synchronization and PingAlive Protocols

HMQTT-RDD employs a step-wise synchronization mechanism for resource updates (Figure 5). In this approach, each sniffer aggregates resource information within its domain and forwards the aggregated results to its upper layer, instead of performing full-mesh synchronization with every other sniffer as in MQTT-RD.
Figure 5. Step-wise synchronization and PingAlive in HMQTT-RDD.
To monitor the liveness of sniffers, HMQTT-RDD employs a unidirectional hierarchical PingAlive (contrasted with the mesh-based PingAlive in MQTT-RD). Each sniffer sends PingAlive messages only to its parent (upper layer). The parent implements a timeout mechanism to verify the liveness of its child sniffers, confining failures within their domains.

4.3. Resource Query Protocol

In HMQTT-RDD, RD-exchange messages and queries are transmitted through MQTT topics, with the following optimization strategies:
  • Publication interval adjustment with retained messages: The publication frequency of /getlist is extended to 60 s to reduce the traffic overhead caused by frequent broadcasts. At the same time, the MQTT retained mechanism facilitates clients obtaining the most recent data even outside the publication interval; it balances query timeliness and traffic reduction.
  • Localized directory maintenance: Each sniffer maintains only the resource directory of its own domain rather than the global directory (global directory cache will be implemented in future work). This avoids unnecessary cross-domain synchronization and transmission; it further improves system scalability.
Based on this design, clients first query their local sniffer for resource information. If the query misses, the client then redirects the request to the root sniffer according to the directory information (Figure 6). Thus, even in the worst case, the client only needs to perform one additional upward query. This process ensures both query efficiency and system scalability while avoiding the overhead associated with global queries.
Figure 6. Hierarchical client query in HMQTT-RDD.

4.4. Resource Directory Data Structure

The resource directory is one of the core components of the HMQTT-RDD architecture; it is responsible for supporting the storage, maintenance, and information exchange of sniffers. Its main contents, summarized in Table 5, include sniffer identification information, hierarchical roles, key communication parameters, and the list of managed devices.
Table 5. Resource directory fields in HMQTT-RDD.

5. Experiments and Performance Evaluation

This section evaluates the efficiency of the proposed HMQTT-RDD architecture. The evaluation is conducted through experiments in three aspects:
  • Synchronization cost: Observing the communication overhead incurred during synchronization under different architectures.
  • PingAlive mechanism: Comparing the status-probing traffic between MQTT-RD and HMQTT-RDD.
  • Client query performance: Analyzing the latency and hit rate of single-query and two-step query processes.

5.1. Experimental Environment

The current experiment adopts a binary tree (a general hierarchical structure could also be adjusted) as the baseline scenario for evaluating the feasibility and performance differences of HMQTT-RDD. Such a configuration provides a simple environment which easily highlights the advantages of hierarchical design compared to traditional MQTT-RD; this simple baseline experiment could be extended for subsequent comparisons. We note that the design of HMQTT-RDD is a general hierarchical structure: it can be flexibly deployed as other topologies, such as ternary trees or multi-root backup mechanisms, to accommodate different scales and application requirements in IoT environments.
The experiments were conducted on a virtual platform to simulate hierarchical management scenarios under the HMQTT-RDD architecture. Table 6 summarizes the specifications of the virtualized platform and software environment used in the experiments. Table 7 details the sniffer configuration, including hierarchical roles and parent–child relations. The hierarchical structure of the entire setup is depicted in Figure 7.
Table 6. Virtualized platform and software environment for HMQTT-RDD experiments.
Table 7. Sniffer configuration in the hierarchical setup.
Figure 7. HMQTT-RDD experiment deployment (binary hierarchy baseline).

5.2. Evaluation Metrics

To evaluate the proposed approach, this study adopts three performance metrics: registration overhead, PingAlive overhead, and client query delay. Table 8 summarizes these metrics, which capture the primary communication behaviors of the system and serve as the basis for comparing different architectures. Importantly, these metrics are not limited to the binary configuration used in this study but can also be applied to other hierarchical structures (e.g., ternary trees or multi-root mechanisms), ensuring generality of the evaluation.
Table 8. Evaluation metrics for HMQTT-RDD experiments.

5.3. Experimental Procedure

5.3.1. Registration and PingAlive Overhead

In the designed hierarchical topology (Figure 7, consisting of one root, two intermediate, and two leaf sniffers), all sniffers complete initialization before entering the synchronization test. In each test round, every sniffer processes one synchronization message, iterated over 10 rounds; this results in a total of 50 synchronization events. The system records the time required for each message to complete synchronization. After the synchronization phase, the system enters a fixed stabilization period, during which the last 20 PingAlive messages are collected to compute the average delay. The above process is repeated four times under the same environment, and the aggregated results are reported as the evaluation outcome.

5.3.2. Client Query Delay:

Here, it measures the delay between the request of an RD-topic subscription request (from a client) and the receiving of a response from the sniffer. Two kinds of scenarios are conducted: the local query is the interactions between the two machines within the same domain, and the other is the root query which involves one local client and a root sniffer (here we use the public and remote brokers on the Internet to act as a root sniffer). A local query involves one single interaction while a remote-root query consists of one local query and one remote-root query. All tests are repeated multiple times, and the average values are reported to ensure the stability and reliability of the results.

5.4. Results and Analysis

The experiment results for registration and PingAlive overhead are summarized in Table 9. For registration overhead, HMQTT-RDD achieves a latency reduction of approximately 15–29%, and it also significantly decreases the number of processed messages. This demonstrates that the hierarchical design effectively reduces the synchronization workload. For PingAlive overhead, the latency is reduced by more than 75%, and it confirms that the zone-based mechanism in HMQTT-RDD can substantially reduce background maintenance traffic and delay.
Table 9. Average delay (ms) for registration and PingAlive overhead.
Now we evaluate the asymptotic performance of registration overhead, assuming a packet size of 370 bytes. For MQTT-RD, each sniffer synchronizes its information with all others, yielding the total traffic in Equation (1). In contrast, in HMQTT-RDD, each sniffer only forwards its information upward through the hierarchy to the root, where the cost depends on the hop count h , as defined in Equation (2).
The results are summarized in Table 10 and Figure 8, showing that the hierarchical design significantly reduces synchronization traffic compared to the full-mesh approach.
T = N ( N 1 ) 370
T = s = 1 N h s 370
Table 10. Registration overhead (MB) with varying sniffer numbers.
Figure 8. Registration overhead: MQTT-RD vs. HMQTT-RDD.
The asymptotic performance of PingAlive overhead assumes a packet size of 114 bytes. In MQTT-RD, each sniffer transmits PingAlive messages to all the other N − 1 sniffers, resulting in the total traffic defined in Equation (3). In HMQTT-RDD, only non-root sniffers transmit PingAlive messages to their upper layer, leading to the reduced traffic shown in Equation (4).
The results are presented in Table 11 and Figure 9, confirming that the hierarchical design minimizes background maintenance traffic and scales efficiently with the number of sniffers.
T = N ( N 1 ) 114
T = ( N 1 ) 114
Table 11. PingAlive overhead (MB) with varying sniffer numbers.
Figure 9. PingAlive overhead: MQTT-RD vs. HMQTT-RDD.
As shown in Table 10 and Table 11, when the number of sniffers scales up to around 1000, the communication cost of HMQTT-RDD remains only 2.895 MB for registration synchronization and 0.140 MB for PingAlive. In contrast, under the same scenarios, MQTT-RD incurs 369.639 MB and 143.859 MB, respectively. These results clearly demonstrate that HMQTT-RDD can significantly reduce communication overhead in large-scale deployments while maintaining the cost within an acceptable range.
In the client query experiments, the average latency of a local query is 47.44 ms, while that of a root query is 862.19 ms, resulting in a total latency of 909.63 ms for a two-step query in the HMQTT-RDD architecture. Assuming that the hit rate of the first query is p, the expected query latency T can be expressed by Equation (5):
T = p 47.44   m s + 1 p 909.63   m s
In contrast, MQTT-RD supports only a single query, which corresponds to the local query with an average latency of approximately 47.44 ms. The query latency of HMQTT-RDD under different hit rates is summarized in Table 12. Since most device resources are deployed in the local or lower-level domains, the local hit rate in HMQTT-RDD is typically greater than 50%. Even under a hit rate as low as 50%, the expected latency remains around 0.5 s, which is acceptable and shows that the overhead of two-step queries has only a limited impact on overall system performance.
Table 12. Expected query latency of HMQTT-RDD under different hit rates.

5.5. Discussion

MQTT-RD suffers from structural limitations due to its symmetric and flat design. This results in tremendous growth of the synchronization overhead and background traffic, which cause the system to become unstable or even crash once the number of sniffers exceeds about twenty.
HMQTT-RDD addresses this issue through a hierarchical and asymmetric design inspired by DNS. By assigning domain-based responsibilities and reducing redundant synchronization, it significantly reduces communication costs and ensures scalability. Experiments confirm that HMQTT-RDD remains stable with nearly one thousand sniffers, reduces both registration and PingAlive overhead, and keeps query latency below 0.5 s even at a 50% local hit rate. These findings highlight that architectural choices, not parameter tuning, are the decisive factor in enabling efficient and scalable resource discovery.
Table 13 situates the proposed architecture within the broader context of related approaches. Since other methods such as LDAP, mDNS, UPnP, and web crawling/indexing do not target MQTT-based resource discovery and the targeted resources are quite different, there are no corresponding experiments to enable a fair performance comparison; therefore, we specify NA (Not Applicable) in the last row for these approaches.
Table 13. Comparison among some resource discovery mechanisms.
In the second row, “Function”, we specify the design goals of these resource discovery mechanisms; among them, we note that only MQTT-RD and HMQTT-RDD target MQTT-based IoT resource discovery. In the third row, we specify the various resource types of these mechanisms; here, we need to highlight that it is quite interesting that all the resources in an MQTT-based IoT system could be effectively specified as some topics; this makes it perfect to select MQTT as its communication protocol for transmitting both normal MQTT messages and RD messages; that is why, in the fifth row “communication protocol”, both MQTT-RD and HMQTT-RDD use only MQTT as the communication protocol for normal MQTT messages and for RD messages. And, this is why MQTT-based IoT systems need customized resource discovery mechanisms.
In the fourth row, we specify the RD entity architectures for different RD approaches. Here, we highlight the selection of the hierarchical and asymmetric design of HMQTT-RDD causing our design to significantly outperform MQTT-RD.

5.6. Remaining Challenges

Although the experiments confirm that HMQTT-RDD effectively improves upon MQTT-RD, several challenges remain.
One major challenge is that the current evaluation was conducted only in controlled test environments. In real-world IoT deployments with unstable links and frequent device churn, the scalability and stability of the system still require further validation.
The second challenge is that further improvement in traffic reduction is still possible. To address this challenge, lightweight consistency checks (for example, hash comparison of RD entries), re-synchronization mechanisms (for example, incremental updates when mismatches are detected), and caching (for example, caching across layers or cross domains) could be investigated to validate their improvement potential.
One another big challenge is the lightweight security for HMQTT-RDD. Currently, both MQTT-RD and HMQTT-RDD could apply SSL/TLS to secure authentication and transmission privacy. However, as the number of sniffers and the volume of traffic increase, the overhead of SSL/TLS would be amplified. Therefore, customized lightweight security mechanisms would be necessary and promising.
One final challenge is how to design and integrate various RD mechanisms for various IoT systems (for example, MQTT-based IoTs, COAP-based IoTs, HTTP-based IoTs, …, etc.). In the future, there would be different kinds of IoT systems for different environments or for different applications. Therefore, in the future, one big challenge is to integrate various IoT systems and their RD mechanisms.

6. Conclusions and Future Work

This work has proposed HMQTT-RDD, a hierarchical resource directory architecture inspired by DNS, to tackle the scalability limitations of MQTT-RD. By shifting from a flat, fully symmetric structure to a hierarchical and asymmetric model, HMQTT-RDD reduces communication overhead, improves synchronization efficiency, and maintains acceptable query latency in large-scale IoT deployments. Asymptotic performance analysis and experimental evaluation confirm that this design offers clear benefits for scalable and reliable resource discovery. Based on this promising approach, some further improvements and challenges are worth studying.
One is the evaluation for large-scale real-world deployments to investigate the performance impacted by some uncontrolled environments. The second is to further investigate some performance improvement mechanisms, like caching, lightweight consistency checks, and re-synchronization mechanisms.
The third one is lightweight security for IoT systems, especially for lightweight MQTT-based IoT systems. One big challenge is the integration of various IoT systems and their corresponding RD mechanisms.
Finally, we would like to note that, as HMQTT-RD could effectively and efficiently manage various resources in MQTT-based IoT systems, one interesting extension of HMQTT-RD is to extend its resource types; current implementations only cover resources about brokers, sniffers, and devices. We might extend the resource types to cover all valuable information in IoT systems so that the huge amount of collected data could be the foundational source for AI reasoning and digital twin applications.

Author Contributions

Conceptualization, H.-Y.C.; methodology, H.-Y.C. and A.-T.S.; software, A.-T.S.; validation, H.-Y.C., A.-T.S. and Y.-M.H.; formal analysis, H.-Y.C.; investigation, H.-Y.C. and A.-T.S.; resources, H.-Y.C.; data curation, A.-T.S.; writing—H.-Y.C. and A.-T.S.; writing—review and editing, H.-Y.C.; visualization, A.-T.S.; supervision, H.-Y.C.; project administration, H.-Y.C.; funding acquisition, H.-Y.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Ministry of Science and Technology of Taiwan, grant number MOST 111-2221-E-260-009-MY3.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Pereira, E.M.; Pinto, R.; dos Reis, J.P.C.; Gonçalves, G. MQTT-RD: A MQTT based Resource Discovery for Machine to Machine Communication. In Proceedings of the 4th International Conference on Internet of Things, Big Data and Security—IoTBDS, Crete, Greece, 2–4 May 2019; SciTePress–Science and Technology Publications, Lda: Setúbal, Portugal; pp. 115–124. [Google Scholar]
  2. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef]
  3. Musaddiq, A.; Zikria, Y.B.; Hahm, O.; Yu, H.; Bashir, A.K.; Kim, S.W. A Survey on Resource Management in IoT Operating Systems. IEEE Access 2018, 6, 8459–8482. [Google Scholar] [CrossRef]
  4. Liu, M.; Leppänen, T.; Harjula, E.; Ou, Z.; Ramalingam, A.; Ylianttila, M.; Ojala, T. Distributed resource directory architecture in Machine-to-Machine communications. In Proceedings of the 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France, 7–9 October 2013; IEEE: New York, NY, USA, 2013; pp. 319–324. [Google Scholar]
  5. Zarrin, J.; Aguiar, R.L.; Barraca, J.P. Resource discovery for distributed computing systems: A comprehensive survey. J. Parallel Distrib. Comput. 2018, 113, 127–166. [Google Scholar] [CrossRef]
  6. Meshkova, E.; Riihijärvi, J.; Petrova, M.; Mähönen, P. A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks. Comput. Netw. 2008, 52, 2097–2128. [Google Scholar] [CrossRef]
  7. Koutsonikola, V.; Vakali, A. LDAP: Framework, practices, and trends. IEEE Internet Comput. 2004, 8, 66–72. [Google Scholar] [CrossRef]
  8. Khalil, K.; Elgazzar, K.; Seliem, M.; Bayoumi, M. Resource discovery techniques in the internet of things: A review. Internet Things 2020, 12, 100293. [Google Scholar] [CrossRef]
  9. Achir, M.; Abdelli, A.; Mokdad, L.; Benothman, J. Service discovery and selection in IoT: A survey and a taxonomy. J. Netw. Comput. Appl. 2022, 200, 103331. [Google Scholar] [CrossRef]
  10. Jafari Navimipour, N.; Masoud Rahmani, A.; Habibizad Navin, A.; Hosseinzadeh, M. Resource discovery mechanisms in grid systems: A survey. J. Netw. Comput. Appl. 2014, 41, 389–410. [Google Scholar] [CrossRef]
  11. Roszkowski, M.; Lukas, C. A distributed architecture for resource discovery using metadata. D-Lib Mag. 1998, 6. [Google Scholar] [CrossRef]
  12. Hmissi, F.; Ouni, S. TD-MQTT: Transparent distributed MQTT brokers for horizontal IoT applications. In Proceedings of the 2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), Hammamet, Tunisia, 28–30 May 2022; IEEE: New York, NY, USA; pp. 479–486. [Google Scholar]
  13. van der Toorn, O.; Müller, M.; Dickinson, S.; Hesselman, C.; Sperotto, A.; van Rijswijk-Deij, R. Addressing the challenges of modern DNS a comprehensive tutorial. Comput. Sci. Rev. 2022, 45, 100469. [Google Scholar] [CrossRef]
  14. Kayas, G.; Hossain, M.; Payton, J.; Islam, S.R. An overview of UPnP-based IoT security: Threats, vulnerabilities, and prospective solutions. In Proceedings of the 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 4–7 November 2020; IEEE: New York, NY, USA, 2020; pp. 0452–0460. [Google Scholar]
  15. Cheshire, S.; Krochmal, M. Multicast DNS; RFC 6762; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2013. [Google Scholar]
  16. Kumar, M.; Bhatia, R.; Rattan, D. A survey of Web crawlers for information retrieval. WIREs Data Min. Knowl. Discov. 2017, 7, e1218. [Google Scholar] [CrossRef]
  17. Nwankwo, E.; David, M.; Onwuka, E.N. Integration of MQTT-SN and CoAP protocol for enhanced data communications and resource management in WSNs. Bull. Electr. Eng. Inform. 2024, 13, 1613–1620. [Google Scholar] [CrossRef]
  18. Cheshire, S.; Krochmal, M. DNS-Based Service Discovery; RFC 6762; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2013. [Google Scholar]
  19. Ayoub, I.; Balakrichenan, S.; Khawam, K.; Ampeau, B. DNS for IoT: A Survey. Sensors 2023, 23, 4473. [Google Scholar] [CrossRef] [PubMed]
  20. Howes, T.; Smith, M.; Good, G.S. Understanding and Deploying LDAP Directory Services; Addison-Wesley Professional: Boston, MA, USA, 2003. [Google Scholar]
  21. Najork, M.; Olston, C. Web Crawling. Found. Trends® Inf. Retr. 2010, 4, 175–246. [Google Scholar] [CrossRef]
  22. Galetić, V.; Bojić, I.; Kušek, M.; Ježić, G.; Dešić, S.; Huljenić, D. Basic principles of Machine-to-Machine communication and its impact on telecommunications industry. In Proceedings of the 2011 34th international convention MIPRO, Opatija, Croatia, 23–27 May 2011; IEEE: New York, NY, USA, 2011; pp. 380–385. [Google Scholar]
  23. Song, J.; Kunz, A.; Schmidt, M.; Szczytowski, P. Connecting and Managing M2M Devices in the Future Internet. Mob. Netw. Appl. 2013, 19, 4–17. [Google Scholar] [CrossRef]
  24. Shih, A.-T.; Chien, H.-Y.; Huang, Y.-M. Exploring the Challenges and Optimization Strategies for MQTT-RD Operation. In Proceedings of the 2025 IEEE 5th International Conference on Electronic Communications, Internet of Things and Big Data (ICEIB), New Taipei, Taiwan, 25–27 April 2025. [Google Scholar]
  25. VMware. VMware. Available online: https://www.vmware.com/ (accessed on 2 September 2025).
  26. Oracle Corporation. Openjdk. Available online: https://openjdk.org/ (accessed on 7 January 2025).
  27. Apache. Apache Ant. Available online: https://ant.apache.org/ (accessed on 7 January 2025).
  28. OASIS. MQTT Version 3.1.1. Available online: https://docs.oasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt-v3.1.1-os.html (accessed on 7 January 2025).
  29. OASIS. MQTT Version 5.0. Available online: https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-v5.0.html (accessed on 11 August 2023).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.