Review Article

Network Protocols, Schemes, and Mechanisms for Internet of Things (IoT): Features, Open Challenges, and Trends

Table 3

Characteristics and availability of IoT network protocols.

Encapsulation Technology6LoWPAN6TiSCHZIGBEE IP6Lo-G.99596Lo-BLE6Lo-NFC6Lo-MS/TP6Lo-DECT/ULE802.11ah - Wi-Fi HaLow

Data Link TechnologyIEEE 802.15.4IEEE 802.15.4e (TSCH)Zigbee Smart Energy - IEEE 802.15.4ITU-T G.9959Bluetooth LEISO/IEC 18000-3 air interfaceRS-485 physical layerDECT ultra low energy PHYIEEE 802.11ah

UsageWide range of applicationsIndustrial automation Smart homes, remote controls and healthcare systemsHome automationInteract/Smart homeHealth care ServiceDistrict heating - automation networksMeter readingRural communications and offloading cell phone tower traffic

Data Rates(i) 250 Kbps at 2.4 GHz frequency band
(ii) 40 Kbps at 915 MHz frequency band
(iii) 20 Kbps at 868 MHz frequency band
Same as in LR-WPANsSame as in LR-WPANsAccording to the RF profile:
(i) R1: 9.6 Kbit/s
(ii) R2: 40 Kbit/s
(iii) R3: 100 Kbit/s
1 Mbit/s at 2.4 GHz frequency ISM band106 Kbit/s to 424 kbit/s at 13.56 MHz frequency ISM band115.2 Kbit/s at shielded twisted pair wiring1.152 Mbit/s symbol rate at 1880 - 1920 MHz frequency bandUp to 347 Mbit/s at 900 MHz frequency band

MobilityA mobility management mechanism provided depending the applicationA mobility management mechanism provided depending the applicationA mobility management mechanism provided depending the applicationNoLowModerateNoNoNo

TopologyStar, P2P and Multihop meshStar, P2P and multihop meshStar, P2P, cluster tree and meshStar, tree and meshStar, scatternets and no meshP2P and L2-MeshBus and MS/TPStar and no meshStar and no mesh

SecurityHigh and privacy requiredHigh and privacy requiredHigh and privacy requiredHigh and privacy requiredPartiallyHighHigh and authentication requiredHigh and privacy requiredHigh and privacy required

BufferingLowLowLowLowLowLowLowLowLow

LatencyHighHighHighHighLowHighHighLowHigh

Applicable Routing protocols(i) RPL
(ii) AODV
(i) RPL
(ii) P2P RPL
(iii) AODV
RPL(i) RPL
(ii) P2P RPL
RPLNone neededNone neededRPLRPL

Advantages(i) Small packet size
(ii) Low bandwidth
(iii) Low power
(iv) Low cost
(v) Location of the devices not predefined (ad-hoc)
(vi) Scalability
(i) Large scaling capabilities
(ii) High reliability against interference
(iii) Low power consumption
(i) Low power
(ii) Low cost
(iii) Low bandwidth
(iv) Scalability
(v) Reduces environmental impact
(vi) Easy to use
(vii) Interoperability specification
(i) Low cost
(ii) Low power
(iii) Reliability
(iv) Real-time applications
(v) Collision avoidance mechanisms
(i) Low power
(ii) Small battery
(iii) Small amounts of data
(i) Simple, quick and safe transactions with a maximum communication speed.
(ii) Compatible with existing contactless card infrastructure
(i) Low cost
(ii) No mesh, broadcast, or fragmentation headers
(iii) Remains the only wired 6Lo PHY
(iv) Served as a pattern in formation of the IETF 6Lo working group
(i) Low power
(ii) Stable and long range
(iii) Two way voice and video
(iv) High capacity
(v) Long battery life
(vi) Interference free
(i) Lower energy consumption
(ii) Wide coverage range