ABSTRACT
With the increasing numbers of clients connected to the Internet, the IPv4 address pool is nearly saturated. The industry introduces solutions of using IPv4/IPv6 dual-stack connection or NAT to mitigate the saturation. Nevertheless, these resolutions either create security issues or compromise the end-to-end communication ability. Our paper conducts research on end-to-end communication under NAT based on the MQTT protocol by subscribing and publishing messages to a particular topic. We propose a network architecture that utilizes a broker to relay the client's and the server's message, design the software implementation, and attach a sequence number into the payload of messages to resolve the shifting in MQTT's asynchronous transmission. We also evaluate the MQTT protocol's performance in variant QoS settings compared with widely used HTTP and analyze the network traffic using Wireshark, demonstrating that MQTT outperforms HTTP in 4G cellular networks. However, the developer should be aware of the lack of mature frameworks such as Django, and further research needs to be conducted.
- Philipp Richter, Mark Allman, Randy Bush, and Vern Paxson. 2015. A Primer on IPv4 Scarcity. SIGCOMM Comput. Commun. Rev. 45, 2 (April 2015), 21–31. DOI:https://doi.org/10.1145/2766330.2766335.Google ScholarDigital Library
- Robert Cannon. 2010. Potential Impacts on Communications from IPv4 Exhaustion & IPv6 Transition. SSRN Journal (2010). DOI:https://doi.org/10.2139/ssrn.1735456.Google Scholar
- Atena Shiranzaei and Rafiqul Zaman Khan. 2018. IPv6 Security Issues—A Systematic Review. In Next-Generation Networks (Advances in Intelligent Systems and Computing), Springer, Singapore, 41–49. DOI:https://doi.org/10.1007/978-981-10-6005-2_5.Google Scholar
- J. Zhong and W. Liu. 2018. IPv6 Security Test Model Research based on Cloud Computing Environment. In 2018 IEEE International Conference of Safety Produce Informatization (IICSPI), 796–799. DOI:https://doi.org/10.1109/IICSPI.2018.8690337.Google ScholarCross Ref
- Ryusei Saka and Minoru Uehara. 2019. Web API-Based NAT Traversal in Managed Network Blocks. In Complex, Intelligent, and Software Intensive Systems (Advances in Intelligent Systems and Computing), Springer International Publishing, Cham, 660–669. DOI:https://doi.org/10.1007/978-3-319-93659-8_60.Google Scholar
- F. Huang, L. Yu, T. Shen, and S. Hu. 2019. The P2P Solution Research and Design Based on NAT Traversing Technology. In 2019 IEEE 3rd Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), 1347–1351. DOI:https://doi.org/10.1109/IMCEC46724.2019.8984136.Google Scholar
- M. Boucadair, R. Penno, and D. Wing. 2013. Universal Plug and Play (UPnP) Internet Gateway Device - Port Control Protocol Interworking Function (IGD-PCP IWF). RFC Editor. DOI:https://doi.org/10.17487/rfc6970.Google ScholarDigital Library
- CallStranger CVE-2020-12695. Retrieved November 10, 2020 from http://callstranger.com/Google Scholar
- Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash. 2015. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutorials 17, 4 (2015), 2347–2376. DOI:https://doi.org/10.1109/COMST.2015.2444095.Google ScholarDigital Library
- Z. B. Babovic, J. Protic, and V. Milutinovic. 2016. Web Performance Evaluation for Internet of Things Applications. IEEE Access 4, (2016), 6974–6992. DOI:https://doi.org/10.1109/ACCESS.2016.2615181.Google Scholar
- Andrew Banks, Ed Briggs, Ken Borgendale, and Rahul Gupta. 2019. MQTT Version 5.0. Retrieved October 27, 2020 from https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-v5.0.pdf.Google Scholar
- M. Laine. 2012. Performance Evaluation of XMPP on the Web. (2012). Retrieved November 16, 2020 from /paper/Performance-Evaluation-of-XMPP-on-the-Web-Laine/23f85450ab0cec26bd2e72ccaa09704682d79dcd.Google Scholar
Recommendations
IoT Protocols – MQTT versus CoAP
NISS '21: Proceedings of the 4th International Conference on Networking, Information Systems & SecurityThe usage of Internet of Things has increased in the recent years allowing a new way of connecting devices together. Many transactions happen over the IoT calling for protocols to ensure the efficiency and management of the communication traffic. This ...
Comments