The Use of MQTT in M2M and IoT Systems: A Survey

被引:192
作者
Mishra, Biswajeeban [1 ]
Kertesz, Attila [1 ]
机构
[1] Univ Szeged, Dept Software Engn, H-6720 Szeged, Hungary
基金
匈牙利科学研究基金会;
关键词
IoT; IoT protocols; MQTT; MQTT brokers; survey;
D O I
10.1109/ACCESS.2020.3035849
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays billions of smart devices or things are present in Internet of Things (IoT) environments, such as homes, hospitals, factories, and vehicles, all around the world. As a result, the number of interconnected devices is continuously and rapidly growing. These devices communicate with each other and with other services using various communication protocols for the transportation of sensor or event data. These protocols enable applications to collect, store, process, describe, and analyze data to solve a variety of problems. IoT also aims to provide secure, bi-directional communication between interconnected devices, such as sensors, actuators, microcontrollers or smart appliances, and corresponding cloud services. In this paper we analyze the growth of M2M protocol research (MQTT, AMQP, and CoAP) over the past 20 years, and show how the growth in MQTT research stands out from the rest. We also gather relevant application areas of MQTT, as the most widespread M2M/IoT protocol, by performing a detailed literature search in major digital research archives. Our quantitative evaluation presents some of the important MQTT-related studies published in the past five years, which we compare to discuss the main features, advantages, and limitations of the MQTT protocol. We also propose a taxonomy to compare the properties and features of various MQTT implementations, i.e. brokers and libraries currently available in the public domain to help researchers and end-users to efficiently choose a broker or client library based on their requirements. Finally, we discuss the relevant findings of our comparison and highlight open issues that need further research and attention.
引用
收藏
页码:201071 / 201086
页数:16
相关论文
共 35 条
[1]   Edge computing technologies for Internet of Things: a primer [J].
Ai, Yuan ;
Peng, Mugen ;
Zhang, Kecheng .
DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (02) :77-86
[2]   Lucky Thirteen: Breaking the TLS and DTLS Record Protocols [J].
AlFardan, Nadhem J. ;
Paterson, Kenneth G. .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :526-540
[3]  
[Anonymous], 2015, Transaction on IoT and Cloud Computing, DOI [10.5281/ZENODO.51613, DOI 10.5281/ZENODO.51613]
[4]  
[Anonymous], IOT NUMB CONN DEV WO
[5]  
[Anonymous], 2014, MQTT VERSION 3 1 1 E
[6]  
[Anonymous], 2011, Cloud computing: Principles and paradigms
[7]  
Bandyopadhyay S., 2013, 2013 International Conference on Computing, Networking and Communications (ICNC 2013), P334, DOI 10.1109/ICCNC.2013.6504105
[8]  
Cisco, INT THINGS REF MOD
[9]  
Curtin University, INTR INT THINGS
[10]  
De Caro N, 2013, IEEE SYMP COMMUN VEH