Computer Science ›› 2024, Vol. 51 ›› Issue (2): 278-285.doi: 10.11896/jsjkx.230100108

• Computer Network • Previous Articles     Next Articles

CARINA:An Efficient Application Layer Protocol Conversion Approach for IoT Interoperability

WANG Lina, LAI Kunhao, YANG Kang   

  1. Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,School of Cyber Science and Engineering, Wuhan University,Wuhan 430000,China
  • Received:2023-01-19 Revised:2023-05-29 Online:2024-02-15 Published:2024-02-22
  • About author:WANG Lina,born in 1964,Ph.D,professor,Ph.D supervisor.Her main research interests include information hiding,deep learning and Internet of things.
  • Supported by:
    National Natural Science Foundation of China(61876134) and National Key Technology Research and Development Program of the Ministry of Science and Technology of China(2020YFB1805400).

Abstract: To solve the interoperability problems caused by numerous IoT devices and protocols with varying architectures and application scenarios,this paper proposes an efficient and scalable application layer protocol conversion approach.This approach uses protocol packet parsing and key method mapping for widely used HTTP and other three protocols.Considering the significant differences in the underlying architecture,message format,communication mode,and application scenario of the four protocols,the proposed approach solves the uniformity of information storage for different protocols by parsing the original data pa-ckets of the protocols and extracting key information,and storing the information in the form of key-value pairs.By constructing the key method mapping table,the methods of different protocols are mapped,realizing the interconnection between different protocols.Experimental results show that the proposed approach performs well in message conversion between the four protocols.It demonstrates a significantly improved conversion speed compared to the Ponte method of a comparable type,with a nearly 10-fold difference observed in some cases when subjected to the same test conditions.Furthermore,it supports twice as many conversion types as Ponte.Experimental results show that the proposed method outperforms state-of-the-art methods in terms of scalability and efficiency.

Key words: Internet of things, Application layer protocol, Protocol conversion, Interoperability

CLC Number: 

  • TP393
[1]AL-FUQAHA A,GUIZANI M,MOHAMMADI M,et al.Inter-net of things:A survey on enabling technologies,protocols,and applications[J].IEEE Communications Surveys & Tutorials,2015,17(4):2347-2376.
[2]LOMBARDI M,PASCALE F,SANTANIELLO D.Internet ofthings:A general overview between architectures,protocols and applications[J].Information,2021,12(2):87.
[3]ZHOU J,WEI G.Two patterns in conversion between HTTP2 and CoAP:Request-Reponse and Publish-Subscribe[C]//2019 IEEE 3rd Information Technology,Networking,Electronic and Automation Control Conference(ITNEC).IEEE,2019:1178-1184.
[4]DA CRUZ MAURO A A,RODRIGUES J J P C,LORENZ P,et al.A proposal for bridging application layer protocols to HTTP on IoT solutions[J].Future Generation Computer Systems,2019,97:145-152.
[5]DA CRUZ MAURO A A,RODRIGUES J J P C,PARADELLO E S,et al.A proposal for bridging the message queuing telemetry transport protocol to HTTP on IoT solutions[C]//2018 3rd International Conference on Smart and Sustainable Technologies(SpliTech).IEEE,2018:1-5.
[6]WAHER P.Bridging MQTT & XMPP Internet of Things networks[J].Computer Science,Engineering,2014,19(5):253-261.
[7]DAVE M,PATEL M,DOSHI J,et al.Ponte Message Broker Bridge Configuration Using MQTT and CoAP Protocol for Interoperability of IoT[C]//International Conference on Computing Science,Communication and Security.Singapore:Springer,2020:184-195.
[8]SAITO K,NISHI H.Application Protocol Conversion Corresponding to Various IoT Protocols[C]//IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society.IEEE,2020:5219-5225.
[9]SHELBY Z,HARTKE K,BORMANN C.The constrained application protocol(CoAP)[EB/OL].https://tools.ietf.org/html/rfc7252.
[10]HUNKELER U,TRUONG H L,STANFORD-CLARK A.MQTT-S-A publish/subscribe protocol for Wireless Sensor Networks[C]//2008 3rd International Conference on Communication Systems Software and Middleware and Workshops(COMSWARE’08).IEEE,2008:791-798.
[11]STANDARD O.MQTT version 3.1.1[EB/OL].https://docs.oasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt-v3.1.1-os.html.
[12]STANDARD O.Oasis advanced message queuing protocol(amqp) version 1.0[J].International Journal of Aerospace Engineering,2012,2018:1-124.
[13]DOBBELAERE P,ESMAILI K.Kafka versus RabbitMQ:Acomparative study of two industry reference publish/subscribe implementations:Industry Paper[C]//Proceedings of the 11th ACM International Conference on Distributed and Event-Based Systems.2017:227-238.
[14]COLLINA M,CORAZZA G,VANELLI-CORALLI A.Introducing the QEST broker:Scaling the IoT by bridging MQTT and REST[C]//2012 IEEE 23rd International Symposium on Personal,Indoor and Mobile Radio Communications(PIMRC).IEEE,2012:36-41.
[15]ZONG N.Research and implementation of protocol conversionproxy between HTTP and CoAP in M2M communication [D].Beijing:Beijing University of Posts and Telecommunications,2016.
[16]ZHOU J P.Research on interoperability between HTTP2 and CoAP based on IoT [D].Beijing:Beijing University of Posts and Telecommunications,2019.
[17]ZAINUDIN A,SYAIFUDIN M F,SYAHRONI N.Design andimplementation of node gateway with MQTT and CoAP protocol for IoT applications[C]//2019 4th International Conference on Information Technology,Information Systems and Electrical Engineering(ICITISEE).IEEE,2019:155-159.
[18]Eclipse Foundation.Eclipse IoT [EB/OL].Available:https://projects.eclipse.org/projects/iot.
[19]DE AM MACÊDO W L,DA R T,MORENO E D.GoThings-AnApplication-layer Gateway Architecture for the Internet of Things[C]//WEBIST.2015:135-140.
[20]YANG S J,WEI T C.Design Issues for Communication Protocols Conversion Scheme of IoT Devices[J].Journal of Internet Technology,2021,22(3):657-667.
[21]SEEGER M,ULTRA-LARGE-SITES S.Key-value stores:apractical overview[D].Stuttgart:Computer Science and Media,2009:1-21.
[22] LIGHT R A.Mosquitto:server and client implementation of the MQTT protocol[J].Journal of Open Source Software,2017,2(13):265-267.
[1] SHANG Yuling, LI Peng, ZHU Feng, WANG Ruchuan. Overview of IoT Traffic Attack Detection Technology Based on Fuzzy Logic [J]. Computer Science, 2024, 51(3): 3-13.
[2] ZHONG Yue, GU Jieming, CAO Honglin. Survey of Lightweight Block Cipher [J]. Computer Science, 2023, 50(9): 3-15.
[3] ZHANG Naixin, CHEN Xiaorui, LI An, YANG Leyao, WU Huaming. Edge Offloading Framework for D2D-MEC Networks Based on Deep Reinforcement Learningand Wireless Charging Technology [J]. Computer Science, 2023, 50(8): 233-242.
[4] LIU Yingjun, LUO Yang, YANG Yujun, LIU Yuanni. Anonymous Authentication Protocol for Medical Internet of Things [J]. Computer Science, 2023, 50(8): 359-364.
[5] LI Xiaohuan, CHEN Bitao, KANG Jiawen, YE Jin. Coalition Game-assisted Joint Resource Optimization for Digital Twin-assisted Edge Intelligence [J]. Computer Science, 2023, 50(2): 42-49.
[6] ZHOU Tianyu, GUAN Zheng. Study on Relay Decision in Wireless Heterogeneous Networks Based on Deep ReinforcementLearning [J]. Computer Science, 2023, 50(11A): 221000088-5.
[7] WANG Zichen, YUAN Chengsheng, WANG Yili, GUO Ping, FU Zhangjie. Lightweight Group Key Agreement for Industrial Internet of Things [J]. Computer Science, 2023, 50(11A): 230700075-10.
[8] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[9] ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743.
[10] DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24.
[11] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[12] ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337.
[13] LI Dun-feng, XIAO Yao, FENG Yong. Efficient Routing Strategy for IoT Data Transaction Based on Payment Channel Network [J]. Computer Science, 2022, 49(11A): 211100010-5.
[14] CHEN Bin, XU Huan, XI Jian-fei, LEI Mei-lian, ZHANG Rui, QIN Shi-han. Power Internet of Things Device Access Management Based on Cryptographic Accumulator [J]. Computer Science, 2022, 49(11A): 210900218-6.
[15] WANG Chen-hua, HOU Shou-lu, LIU Xiu-lei. Cost-aware IoT Data Processing in Edge-Cloud Collaborative Computing [J]. Computer Science, 2022, 49(11A): 211000101-7.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!