skip to main content
10.1145/3405656.3418718acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

Toward a RESTful Information-Centric Web of Things: A Deeper Look at Data Orientation in CoAP

Published:22 September 2020Publication History

ABSTRACT

The information-centric networking (ICN) paradigm offers replication of autonomously verifiable content throughout a network, in which content is bound to names instead of hosts. This has proven beneficial in particular for the constrained IoT. Several approaches, the most prominent of which being Named Data Networking, propose access to named content directly on the network layer. Independently, the IETF CoAP protocol group started to develop mechanisms that support autonomous content processing and in-network storage.

In this paper, we explore the emerging CoAP protocol building blocks and how they contribute to an information-centric network architecture for a data-oriented RESTful Web of Things. We discuss design options and measure characteristic performances of different network configurations, which deploy CoAP proxies and OSCORE content object security, and compare with NDN. Our findings indicate an almost continuous design space ranging from plain CoAP at the one end to NDN on the other. On both ends---ICN and CoAP---we identify protocol features and aspects whose mutual transfer potentially improves design and operation of the other.

Skip Supplemental Material Section

Supplemental Material

p77-gundogan-presentation.mp4

mp4

52.3 MB

References

  1. ACM. Jan., 2017. Result and Artifact Review and Badging. http://acm.org/publications/policies/artifact-review-badging.Google ScholarGoogle Scholar
  2. Cedric Adjih, Emmanuel Baccelli, Eric Fleury, Gaetan Harter, Nathalie Mitton, Thomas Noel, Roger Pissard-Gibollet, Frederic Saint-Marcel, Guillaume Schreiner, Julien Vandaele, and Thomas Watteyne. 2015. FIT IoT-LAB: A large scale open experimental IoT testbed. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). 459--464.Google ScholarGoogle Scholar
  3. Alexander Afanasyev, Priya Mahadevan, Ilya Moiseenko, Ersin Uzun, and Lixia Zhang. 2013. Interest Flooding Attack and Countermeasures in Named Data Networking. In Proc. of IFIP Networking. IEEE Press, Piscataway, NJ, USA.Google ScholarGoogle Scholar
  4. Bengt Ahlgren, Matteo D'Ambrosio, Marco Marchisio, Ian Marsh, Christian Dannewitz, Börje Ohlman, Kostas Pentikousis, Ove Strandberg, René Rembarz, and Vinicio Vercellone. 2008. Design Considerations for a Network of Information. In Proc. of Re-Architecting the Internet Workshop (ReARCH) (Madrid, Spain) (ReARCH '08). ACM, New York, NY, USA, 66:1--66:6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, and Börje Ohlman. 2012. A Survey of Information-Centric Networking. IEEE Communications Magazine 50, 7 (July 2012), 26--36.Google ScholarGoogle ScholarCross RefCross Ref
  6. Bengt Ahlgren, Anders Lindgren, and Yanqiu Wu. 2016. Demo: Experimental Feasibility Study of CCN-lite on Contiki Motes for IoT Data Streams. In Proceedings of the 2016 conference on 3rd ACM Conference on Information-Centric Networking. ACM, New York, NY, USA, 221--222.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Amadeo, C. Campolo, A. Iera, and A. Molinaro. 2014. Named data networking for IoT: An architectural perspective. In 2014 European Conference on Networks and Communications (EuCNC). IEEE, Piscataway, NJ, USA, 1--5.Google ScholarGoogle Scholar
  8. Christian Amsuess, John Mattsson, and Goeran Selander. 2020. CoAP: Echo, Request-Tag, and Token Processing. Internet-Draft - work in progress 10. IETF.Google ScholarGoogle Scholar
  9. Atmel. 2009. Low Power 2.4 GHz Transceiver for ZigBee, IEEE 802.15.4, 6LoWPAN, RF4CE, SP100, WirelessHART, and ISMApplications. Atmel Corporation. http://www.atmel.com/images/doc8111.pdfGoogle ScholarGoogle Scholar
  10. Emmanuel Baccelli, Cenk Gündogan, Oliver Hahm, Peter Kietzmann, Martine Lenders, Hauke Petersen, Kaspar Schleiser, Thomas C. Schmidt, and Matthias Wählisch. 2018. RIOT: an Open Source Operating System for Low-end Embedded Devices in the IoT. IEEE Internet of Things Journal 5, 6 (December 2018), 4428--4440. http://dx.doi.org/10.1109/JIOT.2018.2815038Google ScholarGoogle ScholarCross RefCross Ref
  11. Emmanuel Baccelli, Oliver Hahm, Mesut Günes, Matthias Wählisch, and Thomas C. Schmidt. 2013. RIOT OS: Towards an OS for the Internet of Things. In Proc. of the 32nd IEEE INFOCOM. Poster. IEEE Press, Piscataway, NJ, USA, 79--80.Google ScholarGoogle Scholar
  12. Emmanuel Baccelli, Christian Mehlis, Oliver Hahm, Thomas C. Schmidt, and Matthias Wählisch. 2014. Information Centric Networking in the IoT: Experiments with NDN in the Wild. In Proc. of 1st ACM Conf. on Information-Centric Networking (ICN-2014) (Paris). ACM, New York, 77--86. http://dx.doi.org/10.1145/2660129.2660144Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Andrew Banks and Rahul Gupta (Eds.). 2014. MQTT Version 3.1.1. OASIS Standard. OASIS. http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt-v3.1.1-os.htmlGoogle ScholarGoogle Scholar
  14. C. Bormann, M. Ersue, and A. Keranen. 2014. Terminology for Constrained-Node Networks. RFC 7228. IETF.Google ScholarGoogle Scholar
  15. Stephen E. Deering and David R. Cheriton. 1990. Multicast Routing in Datagram Internetworks and Extended LANs. ACM Trans. Comput. Syst. 8, 2 (1990), 85--110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Esko Dijk, Chonggang Wang, and Marco Tiloca. 2020. Group Communication for the Constrained Application Protocol (CoAP). Internet-Draft - work in progress 01. IETF.Google ScholarGoogle Scholar
  17. Jasenka Dizdarevic, Francisco Carpio, Admela Jukan, and Xavi Masip-Bruin. 2019. Survey of Communication Protocols for Internet-of-Things and Related Challenges of Fog and Cloud Computing Integration. ACM Comput. Surv. 51, 6 (Jan. 2019), 116-1 - 116--29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Adam Dunkels, Björn Grönvall, and Thiemo Voigt. 2004. Contiki - A Lightweight and Flexible Operating System for Tiny Networked Sensors.. In Proc. of IEEE Local Computer Networks (LCN). IEEE Computer Society, Los Alamitos, CA, USA, 455--462.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Nikos Fotiou, Hasan Islam, Dmitrij Lagutin, Teemu Hakala, and George C. Polyzos. 2016. CoAP over ICN. In Proc. of IFIP NTMS. IEEE, Piscataway, NJ, USA, 1--4.Google ScholarGoogle Scholar
  20. Paul Gauthier, Josh Cohen, Martin Dunsmuir, and Charles Perkins. 1999. Web Proxy Auto-Discovery Protocol. Internet-Draft - work in progress 01. IETF.Google ScholarGoogle Scholar
  21. Mark Gritter and David R. Cheriton. 2001. An Architecture for Content Routing Support in the Internet. In Proc. USITS'01 (San Francisco, California). USENIX Association, Berkeley, CA, USA, 4--4.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Cenk Gündogan, Christian Amsüss, Thomas C. Schmidt, and Matthias Wählisch. 2020. IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison. In Proc. of 19th IFIP Networking Conference (Paris, France). IEEE Press, Piscataway, NJ, USA, 19--27. https://ieeexplore.ieee.org/document/9142731Google ScholarGoogle Scholar
  23. Cenk Gündogan, Peter Kietzmann, Martine Lenders, Hauke Petersen, Thomas C. Schmidt, and Matthias Wählisch. 2018. NDN, CoAP, and MQTT: A Comparative Measurement Study in the IoT. In Proc. of 5th ACM Conference on Information-Centric Networking (ICN). ACM, New York, NY, USA, 159--171. https://doi.org/10.1145/3267955.3267967Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Cenk Gündogan, Peter Kietzmann, Thomas C. Schmidt, and Matthias Wählisch. 2019. ICNLoWPAN - Named-Data Networking in Low Power IoT Networks. In Proc. of 18th IFIP Networking Conference (Warsaw, Poland). IEEE Press, Piscataway, NJ, USA, 1--9. http://dx.doi.org/10.23919/IFIPNetworking.2019.8816850Google ScholarGoogle Scholar
  25. Cenk Gündogan, Peter Kietzmann, Thomas C. Schmidt, and Matthias Wählisch. 2020. Information-Centric Networking for the Industrial Internet of Things. In Wireless Networks and Industrial IoT, Nurul Huda Mahmood, Nikolaj Marchenko, Mikael Gidlund, and Petar Popovski (Eds.). Springer. https://doi.org/10.1007/978-3-030-51473-0Google ScholarGoogle Scholar
  26. Oliver Hahm, Emmanuel Baccelli, Thomas C. Schmidt, Matthias Wählisch, Cedric Adjih, and Laurent Massoulié. 2017. Low-power Internet of Things with NDN and Cooperative Caching. In Proc. of 4th ACM Conference on Information-Centric Networking (ICN). ACM, New York, NY, USA, 98--108.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Huan he and Bo Chen. 2019. An Elliptic Curve Based Name Privacy Protection Mechanism for Sensory Data Centric Named Data Networking. In Proc. of 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN). IEEE, Piscataway, NJ, USA, 56--62.Google ScholarGoogle Scholar
  28. Van Jacobson, Diana K. Smetters, James D. Thornton, and Michael F. Plass. 2009. Networking Named Content. In 5th Int. Conf. on emerging Networking Experiments and Technologies (ACM CoNEXT'09) (Rome). ACM, New York, NY, USA, 1--12.Google ScholarGoogle Scholar
  29. Michal Król, Karim Habak, David Oran, Dirk Kutscher, and Ioannis Psaras. 2018. RICE: Remote Method Invocation in ICN. In Proceedings of the 5th ACM Conference on Information-Centric Networking (Boston, Massachusetts) (ICN '18). ACM, New York, NY, USA, 1--11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. D. Kutscher, S. Eum, K. Pentikousis, I. Psaras, D. Corujo, D. Saucez, T. Schmidt, and M. Waehlisch. 2016. Information-Centric Networking (ICN) Research Challenges. RFC 7927. IETF.Google ScholarGoogle Scholar
  31. Tobias Lauinger, Nikolaos Laoutaris, Pablo Rodriguez, Thorsten Strufe, Ernst Biersack, and Engin Kirda. 2012. Privacy Risks in Named Data Networking: What is the Cost of Performance? SIGCOMM Comput. Commun. Rev. 42, 5 (September 2012), 54--57.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Bertrand Mathieu, Cedric Westphal, and Patrick Truong. 2016. Towards the Usage of CCN for IoT Networks. In Internet of Things (IoT) in 5G Mobile Technologies. Springer, Cham, Switzerland, 3--24.Google ScholarGoogle Scholar
  33. John Mattsson, John Fornehed, Goeran Selander, Francesca Palombini, and Christian Amsuess. 2018. Controlling Actuators with CoAP. Internet-Draft - work in progress 06. IETF.Google ScholarGoogle Scholar
  34. Ilya Moiseenko, Lijing Wang, and Lixia Zhang. 2015. Consumer / Producer Communication with Application Level Framing in Named Data Networking. In Proceedings of the 2nd ACM Conference on Information-Centric Networking (San Francisco, California, USA) (ICN '15). ACM, New York, NY, USA, 99--108.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler. 2007. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944. IETF.Google ScholarGoogle Scholar
  36. M. Mosko, I. Solis, and C. Wood. 2019. Content-Centric Networking (CCNx) Semantics. RFC 8569. IETF.Google ScholarGoogle Scholar
  37. S. Y. Oh, D. Lau, and M. Gerla. 2010. Content Centric Networking in tactical and emergency MANETs. In 2010 IFIP Wireless Days. IEEE, Piscataway, NJ, USA, 1--5.Google ScholarGoogle Scholar
  38. K. Pentikousis, B. Ohlman, E. Davies, S. Spirou, and G. Boggia. 2016. Information-Centric Networking: Evaluation and Security Considerations. RFC 7945. IETF.Google ScholarGoogle Scholar
  39. Jakob Pfender, Alvin Valera, and Winston K.G. Seah. 2019. Easy as ABC: A Lightweight Centrality-Based Caching Strategy for Information-Centric IoT. In Proceedings of the 6th ACM Conference on Information-Centric Networking (Macao, China) (ICN '19). ACM, New York, NY, USA, 100--111.Google ScholarGoogle Scholar
  40. Ioannis Psaras, Wei Koong Chai, and George Pavlou. 2012. Probabilistic In-network Caching for Information-centric Networks. In Proc. of the second ICN workshop on Information-centric networking (Helsinki, Finland). ACM, New York, NY, USA, 55--60.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. A. Rahman and E. Dijk. 2014. Group Communication for the Constrained Application Protocol (CoAP). RFC 7390. IETF.Google ScholarGoogle Scholar
  42. E. Rescorla and N. Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347. IETF.Google ScholarGoogle Scholar
  43. Jerome H. Saltzer, David P. Reed, and David D. Clark. 1984. End-to-End Arguments in System Design. ACM Trans. Comput. Syst. 2, 4 (Nov 1984), 277--288.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. J. Schaad. 2017. CBOR Object Signing and Encryption (COSE). RFC 8152. IETF.Google ScholarGoogle Scholar
  45. Quirin Scheitle, Matthias Wählisch, Oliver Gasser, Thomas C. Schmidt, and Georg Carle. 2017. Towards an Ecosystem for Reproducible Research in Computer Networking. In Proc. of ACM SIGCOMM Reproducibility Workshop. ACM, New York, NY, USA, 5--8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. T. Schmidt, S. Gao, H. Zhang, and M. Waehlisch. 2014. Mobile Multicast Sender Support in Proxy Mobile IPv6 (PMIPv6) Domains. RFC 7287. IETF.Google ScholarGoogle Scholar
  47. T. Schmidt, M. Waehlisch, and G. Fairhurst. 2010. Multicast Mobility in Mobile IP Version 6 (MIPv6): Problem Statement and Brief Survey. RFC 5757. IETF.Google ScholarGoogle Scholar
  48. T. Schmidt, M. Waehlisch, and S. Krishnan. 2011. Base Deployment for Multicast Listener Support in Proxy Mobile IPv6 (PMIPv6) Domains. RFC 6224. IETF.Google ScholarGoogle Scholar
  49. E. M. Schooler, D. Zage, J. Sedayao, H. Moustafa, A. Brown, and M. Ambrosin. 2017. An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds. In IEEE 37th Intern. Conference on Distributed Computing Systems (ICDCS). IEEE, Piscataway, NJ, USA, 1717--1728.Google ScholarGoogle Scholar
  50. G. Selander, J. Mattsson, F. Palombini, and L. Seitz. 2019. Object Security for Constrained RESTful Environments (OSCORE). RFC 8613. IETF.Google ScholarGoogle Scholar
  51. Wenato Shang, Alex Afanasyev, and Lixia Zhang. 2016. The Design and Implementation of the NDN Protocol Stack for RIOT-OS. In Proc. of IEEE GLOBECOM 2016. IEEE, Washington, DC, USA, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  52. Z. Shelby, K. Hartke, and C. Bormann. 2014. The Constrained Application Protocol (CoAP). RFC 7252. IETF.Google ScholarGoogle Scholar
  53. Junxiao Shi and Beichuan Zhang. 2012. NDNLP:A Link Protocol for NDN. NDN, Technical Report NDN-0006. NDN Team.Google ScholarGoogle Scholar
  54. Manolis Sifalakis, Basil Kohler, Christopher Scherb, and Christian Tschudin. 2014. An Information Centric Network for Computing the Distribution of Computations. In Proceedings of the 1st ACM Conference on Information-Centric Networking (Paris, France) (ICN '14). ACM, New York, NY, USA, 137--146.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Marco Tiloca and Esko Dijk. 2020. Proxy Operations for CoAP Group Communication. Internet-Draft - work in progress 01. IETF.Google ScholarGoogle Scholar
  56. Marco Tiloca, Goeran Selander, Francesca Palombini, and Jiye Park. 2020. Group OSCORE - Secure Group Communication for CoAP. Internet-Draft - work in progress 09. IETF.Google ScholarGoogle Scholar
  57. Gareth Tyson, Nishanth Sastry, Ruben Cuevas, Ivica Rimac, and Andreas Mauthe. 2013. A Survey of Mobility in Information-centric Networks. Commun. ACM 56, 12 (Dec. 2013), 90--98.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Matthias Wählisch, Thomas C. Schmidt, and Markus Vahlenkamp. 2012. Bulk of Interest: Performance Measurement of Content-Centric Routing. In Proc. of ACM SIGCOMM, Poster Session (Helsinki). ACM, New York, 99--100. http://conferences.sigcomm.org/sigcomm/2012/paper/sigcomm/p99.pdfGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  59. Matthias Wählisch, Thomas C. Schmidt, and Markus Vahlenkamp. 2013. Backscatter from the Data Plane - Threats to Stability and Security in Information-Centric Network Infrastructure. Computer Networks 57, 16 (Nov. 2013), 3192--3206. http://dx.doi.org/10.1016/j.comnet.2013.07.009Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, JP. Vasseur, and R. Alexander. 2012. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550. IETF.Google ScholarGoogle Scholar
  61. George Xylomenos, Christopher N. Ververidis, Vasilios A. Siris, Nikos Fotiou, Christos Tsilopoulos, Xenofon Vasilakos, Konstantinos V. Katsaros, and George C. Polyzos. 2014. A Survey of Information-Centric Networking Research. IEEE Communications Surveys and Tutorials 16, 2 (2014), 1024--1049.Google ScholarGoogle ScholarCross RefCross Ref
  62. Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, kc claffy, Patrick Crowley, Christos Papadopoulos, Lan Wang, and Beichuan Zhang. 2014. Named Data Networking. SIGCOMM Comput. Commun. Rev. 44, 3 (2014), 66--73.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Yu Zhang, Alexander Afanasyev, Jeff Burke, and Lixia Zhang. 2016. A survey of mobility support in Named Data Networking. In Proc. of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, Piscataway, NJ, USA, 83--88.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Toward a RESTful Information-Centric Web of Things: A Deeper Look at Data Orientation in CoAP

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ICN '20: Proceedings of the 7th ACM Conference on Information-Centric Networking
            September 2020
            181 pages
            ISBN:9781450380409
            DOI:10.1145/3405656

            Copyright © 2020 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 22 September 2020

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            ICN '20 Paper Acceptance Rate15of39submissions,38%Overall Acceptance Rate133of482submissions,28%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader