ABSTRACT
The information-centric networking (ICN) paradigm offers replication of autonomously verifiable content throughout a network, in which content is bound to names instead of hosts. This has proven beneficial in particular for the constrained IoT. Several approaches, the most prominent of which being Named Data Networking, propose access to named content directly on the network layer. Independently, the IETF CoAP protocol group started to develop mechanisms that support autonomous content processing and in-network storage.
In this paper, we explore the emerging CoAP protocol building blocks and how they contribute to an information-centric network architecture for a data-oriented RESTful Web of Things. We discuss design options and measure characteristic performances of different network configurations, which deploy CoAP proxies and OSCORE content object security, and compare with NDN. Our findings indicate an almost continuous design space ranging from plain CoAP at the one end to NDN on the other. On both ends---ICN and CoAP---we identify protocol features and aspects whose mutual transfer potentially improves design and operation of the other.
Supplemental Material
- ACM. Jan., 2017. Result and Artifact Review and Badging. http://acm.org/publications/policies/artifact-review-badging.Google Scholar
- Cedric Adjih, Emmanuel Baccelli, Eric Fleury, Gaetan Harter, Nathalie Mitton, Thomas Noel, Roger Pissard-Gibollet, Frederic Saint-Marcel, Guillaume Schreiner, Julien Vandaele, and Thomas Watteyne. 2015. FIT IoT-LAB: A large scale open experimental IoT testbed. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). 459--464.Google Scholar
- Alexander Afanasyev, Priya Mahadevan, Ilya Moiseenko, Ersin Uzun, and Lixia Zhang. 2013. Interest Flooding Attack and Countermeasures in Named Data Networking. In Proc. of IFIP Networking. IEEE Press, Piscataway, NJ, USA.Google Scholar
- Bengt Ahlgren, Matteo D'Ambrosio, Marco Marchisio, Ian Marsh, Christian Dannewitz, Börje Ohlman, Kostas Pentikousis, Ove Strandberg, René Rembarz, and Vinicio Vercellone. 2008. Design Considerations for a Network of Information. In Proc. of Re-Architecting the Internet Workshop (ReARCH) (Madrid, Spain) (ReARCH '08). ACM, New York, NY, USA, 66:1--66:6.Google ScholarDigital Library
- Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, and Börje Ohlman. 2012. A Survey of Information-Centric Networking. IEEE Communications Magazine 50, 7 (July 2012), 26--36.Google ScholarCross Ref
- Bengt Ahlgren, Anders Lindgren, and Yanqiu Wu. 2016. Demo: Experimental Feasibility Study of CCN-lite on Contiki Motes for IoT Data Streams. In Proceedings of the 2016 conference on 3rd ACM Conference on Information-Centric Networking. ACM, New York, NY, USA, 221--222.Google ScholarDigital Library
- M. Amadeo, C. Campolo, A. Iera, and A. Molinaro. 2014. Named data networking for IoT: An architectural perspective. In 2014 European Conference on Networks and Communications (EuCNC). IEEE, Piscataway, NJ, USA, 1--5.Google Scholar
- Christian Amsuess, John Mattsson, and Goeran Selander. 2020. CoAP: Echo, Request-Tag, and Token Processing. Internet-Draft - work in progress 10. IETF.Google Scholar
- Atmel. 2009. Low Power 2.4 GHz Transceiver for ZigBee, IEEE 802.15.4, 6LoWPAN, RF4CE, SP100, WirelessHART, and ISMApplications. Atmel Corporation. http://www.atmel.com/images/doc8111.pdfGoogle Scholar
- Emmanuel Baccelli, Cenk Gündogan, Oliver Hahm, Peter Kietzmann, Martine Lenders, Hauke Petersen, Kaspar Schleiser, Thomas C. Schmidt, and Matthias Wählisch. 2018. RIOT: an Open Source Operating System for Low-end Embedded Devices in the IoT. IEEE Internet of Things Journal 5, 6 (December 2018), 4428--4440. http://dx.doi.org/10.1109/JIOT.2018.2815038Google ScholarCross Ref
- Emmanuel Baccelli, Oliver Hahm, Mesut Günes, Matthias Wählisch, and Thomas C. Schmidt. 2013. RIOT OS: Towards an OS for the Internet of Things. In Proc. of the 32nd IEEE INFOCOM. Poster. IEEE Press, Piscataway, NJ, USA, 79--80.Google Scholar
- Emmanuel Baccelli, Christian Mehlis, Oliver Hahm, Thomas C. Schmidt, and Matthias Wählisch. 2014. Information Centric Networking in the IoT: Experiments with NDN in the Wild. In Proc. of 1st ACM Conf. on Information-Centric Networking (ICN-2014) (Paris). ACM, New York, 77--86. http://dx.doi.org/10.1145/2660129.2660144Google ScholarDigital Library
- Andrew Banks and Rahul Gupta (Eds.). 2014. MQTT Version 3.1.1. OASIS Standard. OASIS. http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt-v3.1.1-os.htmlGoogle Scholar
- C. Bormann, M. Ersue, and A. Keranen. 2014. Terminology for Constrained-Node Networks. RFC 7228. IETF.Google Scholar
- Stephen E. Deering and David R. Cheriton. 1990. Multicast Routing in Datagram Internetworks and Extended LANs. ACM Trans. Comput. Syst. 8, 2 (1990), 85--110.Google ScholarDigital Library
- Esko Dijk, Chonggang Wang, and Marco Tiloca. 2020. Group Communication for the Constrained Application Protocol (CoAP). Internet-Draft - work in progress 01. IETF.Google Scholar
- Jasenka Dizdarevic, Francisco Carpio, Admela Jukan, and Xavi Masip-Bruin. 2019. Survey of Communication Protocols for Internet-of-Things and Related Challenges of Fog and Cloud Computing Integration. ACM Comput. Surv. 51, 6 (Jan. 2019), 116-1 - 116--29.Google ScholarDigital Library
- Adam Dunkels, Björn Grönvall, and Thiemo Voigt. 2004. Contiki - A Lightweight and Flexible Operating System for Tiny Networked Sensors.. In Proc. of IEEE Local Computer Networks (LCN). IEEE Computer Society, Los Alamitos, CA, USA, 455--462.Google ScholarDigital Library
- Nikos Fotiou, Hasan Islam, Dmitrij Lagutin, Teemu Hakala, and George C. Polyzos. 2016. CoAP over ICN. In Proc. of IFIP NTMS. IEEE, Piscataway, NJ, USA, 1--4.Google Scholar
- Paul Gauthier, Josh Cohen, Martin Dunsmuir, and Charles Perkins. 1999. Web Proxy Auto-Discovery Protocol. Internet-Draft - work in progress 01. IETF.Google Scholar
- Mark Gritter and David R. Cheriton. 2001. An Architecture for Content Routing Support in the Internet. In Proc. USITS'01 (San Francisco, California). USENIX Association, Berkeley, CA, USA, 4--4.Google ScholarDigital Library
- Cenk Gündogan, Christian Amsüss, Thomas C. Schmidt, and Matthias Wählisch. 2020. IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison. In Proc. of 19th IFIP Networking Conference (Paris, France). IEEE Press, Piscataway, NJ, USA, 19--27. https://ieeexplore.ieee.org/document/9142731Google Scholar
- Cenk Gündogan, Peter Kietzmann, Martine Lenders, Hauke Petersen, Thomas C. Schmidt, and Matthias Wählisch. 2018. NDN, CoAP, and MQTT: A Comparative Measurement Study in the IoT. In Proc. of 5th ACM Conference on Information-Centric Networking (ICN). ACM, New York, NY, USA, 159--171. https://doi.org/10.1145/3267955.3267967Google ScholarDigital Library
- Cenk Gündogan, Peter Kietzmann, Thomas C. Schmidt, and Matthias Wählisch. 2019. ICNLoWPAN - Named-Data Networking in Low Power IoT Networks. In Proc. of 18th IFIP Networking Conference (Warsaw, Poland). IEEE Press, Piscataway, NJ, USA, 1--9. http://dx.doi.org/10.23919/IFIPNetworking.2019.8816850Google Scholar
- Cenk Gündogan, Peter Kietzmann, Thomas C. Schmidt, and Matthias Wählisch. 2020. Information-Centric Networking for the Industrial Internet of Things. In Wireless Networks and Industrial IoT, Nurul Huda Mahmood, Nikolaj Marchenko, Mikael Gidlund, and Petar Popovski (Eds.). Springer. https://doi.org/10.1007/978-3-030-51473-0Google Scholar
- Oliver Hahm, Emmanuel Baccelli, Thomas C. Schmidt, Matthias Wählisch, Cedric Adjih, and Laurent Massoulié. 2017. Low-power Internet of Things with NDN and Cooperative Caching. In Proc. of 4th ACM Conference on Information-Centric Networking (ICN). ACM, New York, NY, USA, 98--108.Google ScholarDigital Library
- Huan he and Bo Chen. 2019. An Elliptic Curve Based Name Privacy Protection Mechanism for Sensory Data Centric Named Data Networking. In Proc. of 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN). IEEE, Piscataway, NJ, USA, 56--62.Google Scholar
- Van Jacobson, Diana K. Smetters, James D. Thornton, and Michael F. Plass. 2009. Networking Named Content. In 5th Int. Conf. on emerging Networking Experiments and Technologies (ACM CoNEXT'09) (Rome). ACM, New York, NY, USA, 1--12.Google Scholar
- Michal Król, Karim Habak, David Oran, Dirk Kutscher, and Ioannis Psaras. 2018. RICE: Remote Method Invocation in ICN. In Proceedings of the 5th ACM Conference on Information-Centric Networking (Boston, Massachusetts) (ICN '18). ACM, New York, NY, USA, 1--11.Google ScholarDigital Library
- D. Kutscher, S. Eum, K. Pentikousis, I. Psaras, D. Corujo, D. Saucez, T. Schmidt, and M. Waehlisch. 2016. Information-Centric Networking (ICN) Research Challenges. RFC 7927. IETF.Google Scholar
- Tobias Lauinger, Nikolaos Laoutaris, Pablo Rodriguez, Thorsten Strufe, Ernst Biersack, and Engin Kirda. 2012. Privacy Risks in Named Data Networking: What is the Cost of Performance? SIGCOMM Comput. Commun. Rev. 42, 5 (September 2012), 54--57.Google ScholarDigital Library
- Bertrand Mathieu, Cedric Westphal, and Patrick Truong. 2016. Towards the Usage of CCN for IoT Networks. In Internet of Things (IoT) in 5G Mobile Technologies. Springer, Cham, Switzerland, 3--24.Google Scholar
- John Mattsson, John Fornehed, Goeran Selander, Francesca Palombini, and Christian Amsuess. 2018. Controlling Actuators with CoAP. Internet-Draft - work in progress 06. IETF.Google Scholar
- Ilya Moiseenko, Lijing Wang, and Lixia Zhang. 2015. Consumer / Producer Communication with Application Level Framing in Named Data Networking. In Proceedings of the 2nd ACM Conference on Information-Centric Networking (San Francisco, California, USA) (ICN '15). ACM, New York, NY, USA, 99--108.Google ScholarDigital Library
- G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler. 2007. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944. IETF.Google Scholar
- M. Mosko, I. Solis, and C. Wood. 2019. Content-Centric Networking (CCNx) Semantics. RFC 8569. IETF.Google Scholar
- S. Y. Oh, D. Lau, and M. Gerla. 2010. Content Centric Networking in tactical and emergency MANETs. In 2010 IFIP Wireless Days. IEEE, Piscataway, NJ, USA, 1--5.Google Scholar
- K. Pentikousis, B. Ohlman, E. Davies, S. Spirou, and G. Boggia. 2016. Information-Centric Networking: Evaluation and Security Considerations. RFC 7945. IETF.Google Scholar
- Jakob Pfender, Alvin Valera, and Winston K.G. Seah. 2019. Easy as ABC: A Lightweight Centrality-Based Caching Strategy for Information-Centric IoT. In Proceedings of the 6th ACM Conference on Information-Centric Networking (Macao, China) (ICN '19). ACM, New York, NY, USA, 100--111.Google Scholar
- Ioannis Psaras, Wei Koong Chai, and George Pavlou. 2012. Probabilistic In-network Caching for Information-centric Networks. In Proc. of the second ICN workshop on Information-centric networking (Helsinki, Finland). ACM, New York, NY, USA, 55--60.Google ScholarDigital Library
- A. Rahman and E. Dijk. 2014. Group Communication for the Constrained Application Protocol (CoAP). RFC 7390. IETF.Google Scholar
- E. Rescorla and N. Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347. IETF.Google Scholar
- Jerome H. Saltzer, David P. Reed, and David D. Clark. 1984. End-to-End Arguments in System Design. ACM Trans. Comput. Syst. 2, 4 (Nov 1984), 277--288.Google ScholarDigital Library
- J. Schaad. 2017. CBOR Object Signing and Encryption (COSE). RFC 8152. IETF.Google Scholar
- Quirin Scheitle, Matthias Wählisch, Oliver Gasser, Thomas C. Schmidt, and Georg Carle. 2017. Towards an Ecosystem for Reproducible Research in Computer Networking. In Proc. of ACM SIGCOMM Reproducibility Workshop. ACM, New York, NY, USA, 5--8.Google ScholarDigital Library
- T. Schmidt, S. Gao, H. Zhang, and M. Waehlisch. 2014. Mobile Multicast Sender Support in Proxy Mobile IPv6 (PMIPv6) Domains. RFC 7287. IETF.Google Scholar
- T. Schmidt, M. Waehlisch, and G. Fairhurst. 2010. Multicast Mobility in Mobile IP Version 6 (MIPv6): Problem Statement and Brief Survey. RFC 5757. IETF.Google Scholar
- T. Schmidt, M. Waehlisch, and S. Krishnan. 2011. Base Deployment for Multicast Listener Support in Proxy Mobile IPv6 (PMIPv6) Domains. RFC 6224. IETF.Google Scholar
- E. M. Schooler, D. Zage, J. Sedayao, H. Moustafa, A. Brown, and M. Ambrosin. 2017. An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds. In IEEE 37th Intern. Conference on Distributed Computing Systems (ICDCS). IEEE, Piscataway, NJ, USA, 1717--1728.Google Scholar
- G. Selander, J. Mattsson, F. Palombini, and L. Seitz. 2019. Object Security for Constrained RESTful Environments (OSCORE). RFC 8613. IETF.Google Scholar
- Wenato Shang, Alex Afanasyev, and Lixia Zhang. 2016. The Design and Implementation of the NDN Protocol Stack for RIOT-OS. In Proc. of IEEE GLOBECOM 2016. IEEE, Washington, DC, USA, 1--6.Google ScholarCross Ref
- Z. Shelby, K. Hartke, and C. Bormann. 2014. The Constrained Application Protocol (CoAP). RFC 7252. IETF.Google Scholar
- Junxiao Shi and Beichuan Zhang. 2012. NDNLP:A Link Protocol for NDN. NDN, Technical Report NDN-0006. NDN Team.Google Scholar
- Manolis Sifalakis, Basil Kohler, Christopher Scherb, and Christian Tschudin. 2014. An Information Centric Network for Computing the Distribution of Computations. In Proceedings of the 1st ACM Conference on Information-Centric Networking (Paris, France) (ICN '14). ACM, New York, NY, USA, 137--146.Google ScholarDigital Library
- Marco Tiloca and Esko Dijk. 2020. Proxy Operations for CoAP Group Communication. Internet-Draft - work in progress 01. IETF.Google Scholar
- Marco Tiloca, Goeran Selander, Francesca Palombini, and Jiye Park. 2020. Group OSCORE - Secure Group Communication for CoAP. Internet-Draft - work in progress 09. IETF.Google Scholar
- Gareth Tyson, Nishanth Sastry, Ruben Cuevas, Ivica Rimac, and Andreas Mauthe. 2013. A Survey of Mobility in Information-centric Networks. Commun. ACM 56, 12 (Dec. 2013), 90--98.Google ScholarDigital Library
- Matthias Wählisch, Thomas C. Schmidt, and Markus Vahlenkamp. 2012. Bulk of Interest: Performance Measurement of Content-Centric Routing. In Proc. of ACM SIGCOMM, Poster Session (Helsinki). ACM, New York, 99--100. http://conferences.sigcomm.org/sigcomm/2012/paper/sigcomm/p99.pdfGoogle ScholarDigital Library
- Matthias Wählisch, Thomas C. Schmidt, and Markus Vahlenkamp. 2013. Backscatter from the Data Plane - Threats to Stability and Security in Information-Centric Network Infrastructure. Computer Networks 57, 16 (Nov. 2013), 3192--3206. http://dx.doi.org/10.1016/j.comnet.2013.07.009Google ScholarDigital Library
- T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, JP. Vasseur, and R. Alexander. 2012. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550. IETF.Google Scholar
- George Xylomenos, Christopher N. Ververidis, Vasilios A. Siris, Nikos Fotiou, Christos Tsilopoulos, Xenofon Vasilakos, Konstantinos V. Katsaros, and George C. Polyzos. 2014. A Survey of Information-Centric Networking Research. IEEE Communications Surveys and Tutorials 16, 2 (2014), 1024--1049.Google ScholarCross Ref
- Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, kc claffy, Patrick Crowley, Christos Papadopoulos, Lan Wang, and Beichuan Zhang. 2014. Named Data Networking. SIGCOMM Comput. Commun. Rev. 44, 3 (2014), 66--73.Google ScholarDigital Library
- Yu Zhang, Alexander Afanasyev, Jeff Burke, and Lixia Zhang. 2016. A survey of mobility support in Named Data Networking. In Proc. of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, Piscataway, NJ, USA, 83--88.Google ScholarCross Ref
Index Terms
- Toward a RESTful Information-Centric Web of Things: A Deeper Look at Data Orientation in CoAP
Recommendations
NDN, CoAP, and MQTT: a comparative measurement study in the IoT
ICN '18: Proceedings of the 5th ACM Conference on Information-Centric NetworkingThis paper takes a comprehensive view on the protocol stacks that are under debate for a future Internet of Things (IoT). It addresses the holistic question of which solution is beneficial for common IoT use cases. We deploy NDN and the two popular IP-...
Secure content delivery in information-centric networks: design, implementation, and analyses
ICN '13: Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networkingIn this paper, we propose a novel secure content delivery framework, for an information-centric network, which will enable content providers (e.g., Netflix and Youtube) to securely disseminate their content to legitimate users via content distribution ...
Towards Information-Centric Networking (ICN) Naming for Internet of Things (IoT): The Case of Smart Campus
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed SystemsInformation-Centric Networking (ICN) specifically Name Data Networking (NDN) is the name-base (content-base) networking and takes named-contents as "first class citizen", being considered as the ideal candidate to form the Future Internet basis. NDN ...
Comments