Review Article

QoS Strategies for Wireless Multimedia Sensor Networks in the Context of IoT at the MAC Layer, Application Layer, and Cross-Layer Algorithms

Table 3

Differences and problems with application layer protocols.

ProtocolArchitectureTransportQoS optionsSecurityWeaknesses

CoAPRequest/responseUDPDTLSNo in-built security features. DTLS does not support multicast
MQTTPublish/subscribeTCPTLS/SSLInsufficient security at the protocol level since payload values are not encrypted
SMQTTPublish/subscribeTCPCP/KP-ABEKey revocation and group pub/sub for distributed SMQTT are still a challenge
MQTT-SNPublish/subscribeUDPTLS/SSLSSL/TLS suffers from attacks like BEAST, CRIME, RC4, and Heartbleed
XMPPRequest/response
Publish/subscribe
TCPXTLS/SSLSusceptible to spamming attacks and lacks worldwide support
AMQPPublish/subscribeTCPTLS/SSLInappropriate for real-time applications
DDSPublish/subscribeTCP/UDPTLS/SSLMemory intensive and no open-source libraries for constrained devices
RESTRequest/responseHTTPXHTTPSHard to implement. Uses HTTP, so incompatible with constrained apps
WebSocketsPublish/subscribe
Client/server
TCPXTLS/SSLBad user experience for IoT apps since it runs the client/server architecture
STOMPClient/serverTCPHTTPThe broker can act as a bottleneck