Management of resource constrained devices in the internet of things

The embedded computing devices deployed within the Internet of Things are expected to be resource constrained. This resource constraint not only applies to memory and processing capabilities, but the low-power radio standards utilized further constrain the network interfaces. The IPv6 protocol provides a suitable basis for interoperability in the IoT, due to its large address space and a number of existing protocols that function over IP and its flexibility. We investigate how existing IP-based network management protocols can be implemented on resource-constrained devices. We present the resource requirements for SNMP and NETCONF on an 8-bit AVR based device.

[1]  Bert Wijnen,et al.  An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks , 2002, RFC.

[2]  Jürgen Schönwälder,et al.  Evaluation of the Resource Requirements of SNMP Agents on Constrained Devices , 2011, AIMS.

[3]  Rob Enns,et al.  NETCONF Configuration Protocol , 2006, RFC.

[4]  Colin O'Flynn,et al.  Making sensor networks IPv6 ready , 2008, SenSys '08.

[5]  Jürgen Schönwälder,et al.  On the Impact of Security Protocols on the Performance of SNMP , 2011, IEEE Transactions on Network and Service Management.

[6]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[7]  Jürgen Schönwälder,et al.  Network configuration management using NETCONF and YANG , 2010, IEEE Communications Magazine.

[8]  David E. Culler,et al.  A Network-Centric Approach to Embedded Software for Tiny Devices , 2001, EMSOFT.

[9]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[10]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[11]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[12]  Joseph Salowey,et al.  AES-GCM Cipher Suites for TLS , 2008 .

[13]  David A. McGrew,et al.  AES-CCM Cipher Suites for Transport Layer Security (TLS) , 2012, RFC.