Open Access
Subscription Access
The Effect of Using COAP Protocol on Reducing Energy Consumption in Smart Houses (Case Study:Uromieh Culture House)
Over the past few years, protocols, implementations, and optimal uses and the use of internet of things have grown dramatically. Among the communication protocols, the COAP is the most distinctive one. The protocol, has the ability of better and lighter performance in restricted resource networks and devices. There are a lot of implementations about COAP each has its own features and supplies. So, selecting the factors having effects on improvement of COAP protocol and also the implementation method suitable for the features of each of these supplies is important. So, optimal communication protocol which reduces traffic load is highly important and is now, of the main challenges in the IOT industry and smart houses which, in recent years, has attracted many researchers’ attention. This study provides some features and an analytical comparison of many variables influencing the optimal performance of COAP. The present study has been conducted to answer the main question of the study: does the use of COAP have any effects on reducing energy consumption in the smart houses? The study has been conducted in the Uromieh Culture House and while studying the effective factors or important variables in improving the COAP performance, has tested the accuracy or inaccuracy of the hypotheses such as the main hypothesis of the study that there is a meaningful and positive relationship between using the COAP protocol and reducing energy consumption in organizations. Finally, a new approach will be introduced in this research causing improvement in the COAP efficiency. Then, its performance will be analyzed regarding reducing in energy consumption, delay in sending data, reducing memory and CPU consumption, the amount of information transmitted in each communication, firmness in failure and technological innovation. The present study aims at identifying the effect of using the COAP protocol on reducing energy consumption in the smart houses, Uromieh Culture House and ranking the factors influencing the implementation of performance improvement based on the smart houses. The paradigm of the present study is interpretive. In terms of purpose, the present study is of applied kind, in terms of data collection is of pluralistic one, in terms of procedure is of field and library one, in terms of data analysis method is a descriptive study and finally, in terms of time is a cross-sectional one. The statistical sample of the present study’s statistical society includes 49 people of the staff of the Uromieh Culture House who participate in the study as experts and professionals in IOT and new and emerging technologies of the smart houses fields. The results of data analysis show that the most effective factor in implementing the COAP protocol successfully on reducing energy consumption in the smart houses is to reduce energy consumption and the innovative technology factor has the least effect on successful implementation of the protocol.
Keywords
Smart House, Reducing Energy Consumption, Routing Protocols in the IOT Networks, Constarined Application Protocol, COAP Implementation, Fuzzy Hierarchical Analysis.
User
Font Size
Information
- Babovic, Protic & Milutinovic,, Z. (2016). "Web Performance Evaluation for Internet of Things Applications,". in IEEE Access, 4, 6974-6992.
- Chen. Kunz, Y. (2016). "Performance evaluation of IoT protocols under a constrained wireless access network,". 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT), Cairo.
- Giang,Minkeun & Daeyoung, N. (2013). “SCoAP: An integration of CoAP protocol with web-based application.” GLOBECOM.
- Granjal, Monteiro & Silva, J. (2015). "Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues,". in IEEE Communications Surveys & Tutorials pp, 17(3), 1294-1312.
- Huq , Islam,, M. (2010). “Home area network technology assessment for demand response in smart grid environment,”. in Universities Power Engineering Conference (AUPEC), 2010 20th Australasian. IEEE.
- Konieczek, Rethfeldt & Golatowski , B. (2015). "Real-Time Communication for the Internet of Things Using jCoAP,". 2015 IEEE 18th International Symposium on Real-Time Distributed Computing, Auckland.
- Kuzlu, Pipattanasomporn & Rahman, M. (2015). “Review of Communication Technologies for Smart Homes/Building Applications,”. in IEEE Innovative Smart Grid Technologies-Asia (ISGT ASIA).
- Lewis, Igic & Zhou, R. (2009). “Assessment of Communication Methods for Smart Electricity Metering in the UK. in IEEE PES/IAS Conference on Sustainable Alternative Energy (SAE).
- Montenegro,Kushalnagar, Hui & Cull, G. (2007). “Transmissionof IPv6 Packets over IEEE 802.15.4 Networks,” Internet Requests for Comments, IETF, RFC 4944. [Online]. Retrieved from Available: http://www.rfc-editor.org/rfc/rfc4944.txt.
- Navas, Lagos, Toutain & Vijayasan, R. (2016). "Nonce-based authenticated key establishment over OAuth 2.0 IoT proof-of-possession architecture,". 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA.
- Raza, Trabalza & Voigt, S. (2013). "6LoWPAN Compressed DTLS for CoAP,". 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, Hangzhou.
- Rescorla, Modadugu, , E. (2006). DTLS: Datagram Transport Layer Security, RFC 4347.
- Saleem, Crespi & Rehmani, Y. (2017). “Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions” ArXiv.
- Schroder Filho, Pissolato Filho & More, H. (2016). “The Adequacy of LoRaWAN on Smart Grids: A Comparison with RF Mesh Technology,”. in IEEE International Smart Cities Conference (ISC2).
- Shelby, Hartke & Bormann,, Z. (2014). “RFC 7252: The Constrained Application Protocol (CoAP).”.
- Yang, Wu, Yin & Zhao, Y. (2017). "A Survey on Security and Privacy Issues in Internet-of-Things,". in IEEE Internet of Things Journal, 99.
- Yi, Iwayemi & Zhou, P. (2011). “Developing ZigBee Deployment Guideline under WiFi Interference for Smart Grid Applications,”. IEEE Transactions on Smart Grid, 2(1), 110–120.
- "Evaluation of Distributed Denial of Service threat in the Internet of Things,"2016 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA
- Ancillotti, Raffaele Bruno. (2017). “Comparison of CoAP and CoCoA+ Congestion Control Mechanisms for Different IoT Application Scenarios”. 22nd IEEE Symposium on Computers and Communications.
- Capossele, Cervo, De Cicco & Petriol, A. (2015). "Security as a CoAP resource: An optimized DTLS implementation for the IoT,". 2015 IEEE International Conference on Communications (ICC), London.
- Chavan, K.Nighot, A. (2016). “Secure and Cost-effective Application Layer Protocol with Authentication Interoperability for IOT”.
- I.Ali. (2016). “Internet of Things Security, Device Authentication and Access Control: A Review”. (IJCSIS) International Journal of Computer Science and Information Security.
- Iglesias, Orive & Urbieta, M. (2017). “Analysis of CoAP Implementations for Industrial Internet of Things: A Survey”. 109.
- IOT. (2016). Internet of Things (IoT) Protocols You Need to Know About,” accessed: September. Retrieved from [Online]. Available: http://www.rs-online.com/designspark/electronics/knowledge-item/ eleven-internet-of-things-iot-protocols-you-need-to-know-about.
- KuladinithI, Koojana, Bergmann & Pötsch . (2011). “Implementation of CoAP and its Application in Transport Logistics.”
- Ludovici, A. (2013). “TinyCoAP: A Novel Constrained Application Protocol (CoAP) Implementation for Embedding RESTful Web Services in Wireless Sensor Networks Based on TinyOS”, Journal of Sensor and Actuator Networks.
- Ludovici, Calveras, A. (2015). “A Proxy Design to Leverage the Interconnection of CoAP Wireless Sensor Networks with Web Applications”, sensors, ISSN. 1424-8220.
- Pawlowski, Jara & Ogorzalek, M. (2015). Compact Extensible Authentication Protocol for the Internet of Things. Enabling Scalable and Efficient Security Commissioning. Mobile Information Systems .
- Petajajarvi, Mikhaylov, Roivainen & Han, J. (2015). “On the Coverage of LPWANs: Range Evaluation and Channel Attenuation Model for LoRa Technology,”. in 14th International Con-ference on ITS Telecommunications (ITST).
- Poorebarahimi, A., Razavi, F., & SoleimaniRoozbahani, F. (2016). Presenting VALIT Frameworks and Comparing between Them and Other Enterprise Architecture Framework. Int. J. Advanced Networking and Applications , 7(4), 2805-2809.
- Poorebrahimi, A., & SoleimaniRoozbahani, F. (2015). Effects of Security and Privacy Concerns on using of Cloud Services in Energy Industry, an Oil and Gas Company: A Case Study. Int. J. Advanced Networking and Applications , 2779-2783.
- Ranjan, Somani , A. (2016). Access Control and Authentication in the Internet of Things Environment. In: Mahmood Z. (eds) Connectivity Frameworks for Smart Devices. Computer Communications and Networks. Springer, Cham.
- Samuel, S. (2016). “A Review of Connectivity Challenges in IoT-Smart Home,”. in 3rd MEC International Conference on Big Data and Smart City (ICBDSC).
- Skodzlk, J. (2015). "CoHaRT: A P2P-based deterministic transmission of large data amounts using CoAP,". 2015 IEEE International Conference on Industrial Technology (ICIT), Seville.
- Yakubu, Adjei & Babu , O. (April 2016). A Review of Prospects and Challenges of Internet of Things. International Journal of Computer Applications, 139(10), 33-39.
Abstract Views: 247
PDF Views: 0