Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (11)

Search Parameters:
Keywords = MQTT-SN

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
33 pages, 849 KB  
Review
Transport and Application Layer Protocols for IoT: Comprehensive Review
by Ionel Petrescu, Elisabeta Niculae, Viorel Vulturescu, Andrei Dimitrescu and Liviu Marian Ungureanu
Technologies 2025, 13(12), 583; https://doi.org/10.3390/technologies13120583 - 11 Dec 2025
Viewed by 398
Abstract
The Internet of Things (IoT) connects billions of heterogeneous devices, necessitating lightweight, efficient, and secure communication protocols to support a diverse range of use cases. While physical and network-layer technologies enable connectivity, transport and application-layer protocols determine how IoT devices exchange, manage, and [...] Read more.
The Internet of Things (IoT) connects billions of heterogeneous devices, necessitating lightweight, efficient, and secure communication protocols to support a diverse range of use cases. While physical and network-layer technologies enable connectivity, transport and application-layer protocols determine how IoT devices exchange, manage, and secure information. The diverse and constrained nature of IoT devices presents a challenge in selecting appropriate communication protocols, with no one-size-fits-all solution existing. This article provides a comprehensive review of key transport and application protocols in IoT, including MQTT, MQTT-SN, CoAP, LwM2M, AMQP, XMPP, WebSockets, HTTP/HTTPS, and OPC UA. Each protocol is examined in terms of its design principles, communication patterns, reliability mechanisms, and security features. The discussion highlights their suitability for different deployment scenarios, ranging from resource-constrained sensor networks to industrial automation and cloud-integrated consumer devices. By mapping protocol characteristics to IoT requirements, such as scalability, interoperability, power efficiency, and manageability, the article provides guidelines for selecting the optimal protocol stack to optimize IoT system performance and long-term sustainability. Our analysis reveals that while MQTT dominates cloud telemetry, CoAP and LwM2M are superior in IP-based constrained networks, and emerging solutions like OSCORE are critical for end-to-end security. Full article
Show Figures

Figure 1

36 pages, 3753 KB  
Article
Energy Footprint and Reliability of IoT Communication Protocols for Remote Sensor Networks
by Jerzy Krawiec, Martyna Wybraniak-Kujawa, Ilona Jacyna-Gołda, Piotr Kotylak, Aleksandra Panek, Robert Wojtachnik and Teresa Siedlecka-Wójcikowska
Sensors 2025, 25(19), 6042; https://doi.org/10.3390/s25196042 - 1 Oct 2025
Cited by 1 | Viewed by 915
Abstract
Excessive energy consumption of communication protocols in IoT/IIoT systems constitutes one of the key constraints for the operational longevity of remote sensor nodes, where radio transmission often incurs higher energy costs than data acquisition or local computation. Previous studies have remained fragmented, typically [...] Read more.
Excessive energy consumption of communication protocols in IoT/IIoT systems constitutes one of the key constraints for the operational longevity of remote sensor nodes, where radio transmission often incurs higher energy costs than data acquisition or local computation. Previous studies have remained fragmented, typically focusing on selected technologies or specific layers of the communication stack, which has hindered the development of comparable quantitative metrics across protocols. The aim of this study is to design and validate a unified evaluation framework enabling consistent assessment of both wired and wireless protocols in terms of energy efficiency, reliability, and maintenance costs. The proposed approach employs three complementary research methods: laboratory measurements on physical hardware, profiling of SBC devices, and simulations conducted in the COOJA/Powertrace environment. A Unified Comparative Method was developed, incorporating bilinear interpolation and weighted normalization, with its robustness confirmed by a Spearman rank correlation coefficient exceeding 0.9. The analysis demonstrates that MQTT-SN and CoAP (non-confirmable mode) exhibit the highest energy efficiency, whereas HTTP/3 and AMQP incur the greatest energy overhead. Results are consolidated in the ICoPEP matrix, which links protocol characteristics to four representative RS-IoT scenarios: unmanned aerial vehicles (UAVs), ocean buoys, meteorological stations, and urban sensor networks. The framework provides well-grounded engineering guidelines that may extend node lifetime by up to 35% through the adoption of lightweight protocol stacks and optimized sampling intervals. The principal contribution of this work is the development of a reproducible, technology-agnostic tool for comparative assessment of IoT/IIoT communication protocols. The proposed framework addresses a significant research gap in the literature and establishes a foundation for further research into the design of highly energy-efficient and reliable IoT/IIoT infrastructures, supporting scalable and long-term deployments in diverse application environments. Full article
(This article belongs to the Collection Sensors and Sensing Technology for Industry 4.0)
Show Figures

Figure 1

10 pages, 2169 KB  
Proceeding Paper
Comparative Performance Analysis of Data Transmission Protocols for Sensor-to-Cloud Applications: An Experimental Evaluation
by Filip Tsvetanov and Martin Pandurski
Eng. Proc. 2025, 104(1), 35; https://doi.org/10.3390/engproc2025104035 - 25 Aug 2025
Viewed by 887
Abstract
This paper examines some of the most popular protocols for transmitting sensor data to cloud structures from publish/subscribe and request/response IoT models. The selection of a highly efficient message transmission protocol is essential, as it depends on the specific characteristics and purpose of [...] Read more.
This paper examines some of the most popular protocols for transmitting sensor data to cloud structures from publish/subscribe and request/response IoT models. The selection of a highly efficient message transmission protocol is essential, as it depends on the specific characteristics and purpose of the developed IoT system, which includes communication requirements, message size and format, energy efficiency, reliability, and cloud specifications. No standardized protocol can cover all the diverse application scenarios; therefore, for each developed project, the most appropriate protocol must be selected that meets the project’s specific requirements. This work focuses on finding the most appropriate protocol for integrating sensor data into a suitable open-source IoT platform, ThingsBoard. First, we conduct a comparative analysis of the studied protocols. Then, we propose a project that represents an experiment for transmitting data from a stationary XBee sensor network to the ThingsBoard cloud via HTTP, MQTT-SN, and CoAP protocols. We observe the parameters’ influence on the delayed transmission of packets and their load on the CPU and RAM. The results of the experimental studies for stationary sensor networks collecting environmental data give an advantage to the MQTT-SN protocol. This protocol is preferable to the other two protocols due to the lower delay and load on the processor and memory, which leads to higher energy efficiency and longer life of the sensors and sensor networks. These results can help users make operational judgments for their IoT applications. Full article
Show Figures

Figure 1

21 pages, 2471 KB  
Article
Enhancing MQTT-SN Security with a Lightweight PUF-Based Authentication and Encrypted Channel Establishment Scheme
by Xiang Gong, Ting Kou and Yan Li
Symmetry 2024, 16(10), 1282; https://doi.org/10.3390/sym16101282 - 29 Sep 2024
Cited by 2 | Viewed by 2467
Abstract
The communication of Industrial Internet of Things (IIoT) devices faces important security and privacy challenges. With the rapid increase in the number of devices, it is difficult for traditional security mechanisms to balance performance and security. Although schemes based on encryption and authentication [...] Read more.
The communication of Industrial Internet of Things (IIoT) devices faces important security and privacy challenges. With the rapid increase in the number of devices, it is difficult for traditional security mechanisms to balance performance and security. Although schemes based on encryption and authentication exist, there are still difficulties in achieving lightweight security. In this paper, an authentication and key exchange scheme combining hardware security features and modern encryption technology is proposed for the MQTT-SN protocol, which is not considered security. The scheme uses Physical Unclonable Functions (PUFs) to generate unpredictable responses, and combines random numbers, time stamps, and shared keys to achieve two-way authentication and secure communication between devices and broker, effectively preventing network threats such as replay and man-in-the-middle attacks. Through verification, the proposed scheme has proved effective in terms of security and robustness, has computational and communication cost advantages compared with recent schemes, and provides higher availability. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

29 pages, 4830 KB  
Article
Enabling Seamless Connectivity: Networking Innovations in Wireless Sensor Networks for Industrial Application
by Shathya Duobiene, Rimantas Simniškis and Gediminas Račiukaitis
Sensors 2024, 24(15), 4881; https://doi.org/10.3390/s24154881 - 27 Jul 2024
Cited by 1 | Viewed by 2194
Abstract
The wide-ranging applications of the Internet of Things (IoT) show that it has the potential to revolutionise industry, improve daily life, and overcome global challenges. This study aims to evaluate the performance scalability of mature industrial wireless sensor networks (IWSNs). A new classification [...] Read more.
The wide-ranging applications of the Internet of Things (IoT) show that it has the potential to revolutionise industry, improve daily life, and overcome global challenges. This study aims to evaluate the performance scalability of mature industrial wireless sensor networks (IWSNs). A new classification approach for IoT in the industrial sector is proposed based on multiple factors and we introduce the integration of 6LoWPAN (IPv6 over low-power wireless personal area networks), message queuing telemetry transport for sensor networks (MQTT-SN), and ContikiMAC protocols for sensor nodes in an industrial IoT system to improve energy-efficient connectivity. The Contiki COOJA WSN simulator was applied to model and simulate the performance of the protocols in two static and moving scenarios and evaluate the proposed novelty detection system (NDS) for network intrusions in order to identify certain events in real time for realistic dataset analysis. The simulation results show that our method is an essential measure in determining the number of transmissions required to achieve a certain reliability target in an IWSNs. Despite the growing demand for low-power operation, deterministic communication, and end-to-end reliability, our methodology of an innovative sensor design using selective surface activation induced by laser (SSAIL) technology was developed and deployed in the FTMC premises to demonstrate its long-term functionality and reliability. The proposed framework was experimentally validated and tested through simulations to demonstrate the applicability and suitability of the proposed approach. The energy efficiency in the optimised WSN was increased by 50%, battery life was extended by 350%, duplicated packets were reduced by 80%, data collisions were reduced by 80%, and it was shown that the proposed methodology and tools could be used effectively in the development of telemetry node networks in new industrial projects in order to detect events and breaches in IoT networks accurately. The energy consumption of the developed sensor nodes was measured. Overall, this study performed a comprehensive assessment of the challenges of industrial processes, such as the reliability and stability of telemetry channels, the energy efficiency of autonomous nodes, and the minimisation of duplicate information transmission in IWSNs. Full article
(This article belongs to the Special Issue IoT Sensors Development and Application for Environment & Safety)
Show Figures

Figure 1

19 pages, 1449 KB  
Article
Adaptive Quality of Service Control for MQTT-SN
by Fabio Palmese, Alessandro E. C. Redondi and Matteo Cesana
Sensors 2022, 22(22), 8852; https://doi.org/10.3390/s22228852 - 16 Nov 2022
Cited by 13 | Viewed by 3148
Abstract
Internet of Things and wireless sensor network applications are becoming more and more popular these days, supported by new communication technologies and protocols tailored to their specific requirements. This paper focuses on improving the performance of a Wireless Sensor Network operated by the [...] Read more.
Internet of Things and wireless sensor network applications are becoming more and more popular these days, supported by new communication technologies and protocols tailored to their specific requirements. This paper focuses on improving the performance of a Wireless Sensor Network operated by the MQTT-SN protocol, one of the most popular publish/subscribe protocols for IoT applications. In particular, we propose a dynamic Quality of Service (QoS) controller for the MQTT-SN protocol, capable of evaluating the status of the underlying network in terms of end-to-end delay and packet error rate, reacting consequently by assigning the best QoS value to a node. We design and implement the QoS controller in a simulated environment based on the ns-3 network emulator, and we perform extensive experiments to prove its effectiveness compared to a non-controlled scenario. The reported results show that, by controlling the quality of service, it is possible to effectively manage the number of packets successfully received by each device and their average latency, to improve the quality of the communication of each end node. Full article
(This article belongs to the Special Issue Architectures, Protocols and Algorithms of Sensor Networks)
Show Figures

Figure 1

24 pages, 1166 KB  
Article
Security Analysis of the MQTT-SN Protocol for the Internet of Things
by José Roldán-Gómez, Javier Carrillo-Mondéjar, Juan Manuel Castelo Gómez and Sergio Ruiz-Villafranca
Appl. Sci. 2022, 12(21), 10991; https://doi.org/10.3390/app122110991 - 30 Oct 2022
Cited by 34 | Viewed by 7717
Abstract
The expansion of the Internet of Things (IoT) paradigm has brought with it the challenge of promptly detecting and evaluating attacks against the systems coexisting in it. One of the most recurrent methods used by cybercriminals is to exploit the vulnerabilities found in [...] Read more.
The expansion of the Internet of Things (IoT) paradigm has brought with it the challenge of promptly detecting and evaluating attacks against the systems coexisting in it. One of the most recurrent methods used by cybercriminals is to exploit the vulnerabilities found in communication protocols, which can lead to them accessing, altering, and making data inaccessible and even bringing down a device or whole infrastructure. In the case of the IoT, the Message Queuing Telemetry Transport (MQTT) protocol is one of the most-used ones due to its lightness, allowing resource-constrained devices to communicate with each other. Improving its effectiveness, a lighter version of this protocol, namely MQTT for Sensor Networks (MQTT-SN), was especially designed for embedded devices on non-TCP/IP networks. Taking into account the importance of these protocols, together with the significance that security has when it comes to protecting the high-sensitivity data exchanged in IoT networks, this paper presents an exhaustive assessment of the MQTT-SN protocol and describes its shortcomings. In order to do so, seven different highly heterogeneous attacks were designed and tested, evaluating the different security impacts that they can have on a real MQTT-SN network and its performance. Each one of them was compared with a non-attacked implemented reference scenario, which allowed the comparison of an attacked system with that of a system without attacks. Finally, using the knowledge extracted from this evaluation, a threat detector is proposed that can be deployed in an IoT environment and detect previously unmodeled attacks. Full article
(This article belongs to the Special Issue Recent Advances in Cybersecurity and Computer Networks)
Show Figures

Figure 1

27 pages, 840 KB  
Article
Internet of Things (IoT) Platform for Multi-Topic Messaging
by Mahmoud Hussein, Ahmed I. Galal, Emad Abd-Elrahman and Mohamed Zorkany
Energies 2020, 13(13), 3346; https://doi.org/10.3390/en13133346 - 30 Jun 2020
Cited by 13 | Viewed by 3597
Abstract
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet [...] Read more.
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messaging. Most current IoT applications depend on real-time systems. Therefore, an RTOS (real-time operating system) as a famous OS (operating system) is used for the embedded systems to provide the constraints of real-time features, as required by these real-time systems. Using RTOS for IoT applications adds important features to the system, including reliability. Many of the undertaken research works into IoT platforms have only focused on specific applications; they did not deal with the real-time constraints under a real-time system umbrella. In this work, the design of the multi-topic IoT protocol and platform is implemented for real-time systems and also for general-purpose applications; this platform depends on the proposed multi-topic communication protocol, which is implemented here to show its functionality and effectiveness over similar protocols. Full article
(This article belongs to the Special Issue IoT and Sensor Networks in Industry and Society)
Show Figures

Graphical abstract

12 pages, 854 KB  
Proceeding Paper
Performance Evaluation of CoAP and MQTT_SN in an IoT Environment
by Mónica Martí, Carlos Garcia-Rubio and Celeste Campo
Proceedings 2019, 31(1), 49; https://doi.org/10.3390/proceedings2019031049 - 20 Nov 2019
Cited by 21 | Viewed by 5202
Abstract
The fast growth of the Internet of Things (IoT) has made this technology one of the most promising paradigms of recent years. Wireless Sensor Networks (WSNs) are one of the most important challenges of the Internet of things. These networks are made up [...] Read more.
The fast growth of the Internet of Things (IoT) has made this technology one of the most promising paradigms of recent years. Wireless Sensor Networks (WSNs) are one of the most important challenges of the Internet of things. These networks are made up of devices with limited processing power, memory, and energy. The constrained nature of WSNs makes it necessary to have specific restricted protocols to work in these environments. In this paper, we present an energy consumption and network traffic study of the main IoT application layer protocols, the Constrained Application Protocol (CoAP), and the version of Message Queue Telemetry Transport (MQTT) for sensor networks (MQTT_SN). The simulations presented evaluate the performance of these protocols with different network configurations. Full article
Show Figures

Figure 1

23 pages, 5374 KB  
Article
A MQTT/MQTT-SN-Based User Energy Management System for Automated Residential Demand Response: Formal Verification and Cyber-Physical Performance Evaluation
by Kunqi Jia, Jucheng Xiao, Shuai Fan and Guangyu He
Appl. Sci. 2018, 8(7), 1035; https://doi.org/10.3390/app8071035 - 25 Jun 2018
Cited by 15 | Viewed by 5143
Abstract
As one of the typical cyber physical systems (CPS), the user energy management system (UEMS) plays an increasingly significant role in the smart grid, such as participating in automated demand response (ADR). Traditional analyses related to the UEMS in ADR programming mainly focus [...] Read more.
As one of the typical cyber physical systems (CPS), the user energy management system (UEMS) plays an increasingly significant role in the smart grid, such as participating in automated demand response (ADR). Traditional analyses related to the UEMS in ADR programming mainly focus on energy management strategies or algorithms, where the interdependence and interplay between the cyber system and the physical system is neglected. This paper firstly presents an ADR control strategy of the UEMS with the objective of minimizing electricity bills and meeting users’ comfort constraints. Then, a hybrid scheme including Message Queuing Telemetry Transport (MQTT) and Message Queuing Telemetry Transport for Sensor Network (MQTT-SN), which are publish-subscribe communication protocols, is developed to establish the cyber system of the UEMS. To evaluate the cyber-physical performance of the UEMS in ADR programs, the hybrid dynamic models of major behaviors of the UEMS are proposed and a UPPAAL (http://www.uppaal.org/)-based methodology of the formal specification and verification is also proposed. In case studies, the impact of communication reliability on the proposed ADR control strategy is studied and the quality of service (QoS) mechanism provided by MQTT/MQTT-SN is demonstrated as a cost-effective solution for the ADR control strategy under unreliable communication. Full article
(This article belongs to the Special Issue Smart Grid and Information Technology)
Show Figures

Figure 1

13 pages, 1163 KB  
Article
Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications
by Hui-Ling Chang, Cheng-Gang Wang, Mong-Ting Wu, Meng-Hsun Tsai and Chia-Ying Lin
Sensors 2016, 16(10), 1560; https://doi.org/10.3390/s16101560 - 22 Sep 2016
Cited by 10 | Viewed by 6194
Abstract
Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) and Constrained Application Protocol (CoAP) are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device [...] Read more.
Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) and Constrained Application Protocol (CoAP) are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device does not receive the acknowledgement (ACK) before retransmission timeout (RTO) expires, the device will retransmit data. Setting an appropriate RTO is important because the delay may be large or retransmission may be too frequent when the RTO is inappropriate. We propose a Gateway-assisted CoAP (GaCoAP) to dynamically compute RTO for devices. Simulation models are proposed to investigate the performance of GaCoAP compared with four other methods. The experiment results show that GaCoAP is more suitable for IoT devices. Full article
Show Figures

Figure 1

Back to TopTop