Please use this identifier to cite or link to this item:
https://dspace.univ-ouargla.dz/jspui/handle/123456789/40201| Title: | Comparative Analysis and dataset generation for evaluating IoT Protocols: MQTT-SN , CoAP |
| Authors: | KHELILI, Khalida Farida KHALED KHODJA, ELYES BENCASI, MONSAF |
| Keywords: | Internet of Things IoT protocol machine learning CoAP MQTT-SN |
| Issue Date: | 2025 |
| Publisher: | UNIVERSITY OF KASDI MERBAH OUARGLA |
| Citation: | FACULTY OF NEW TECHNOLOGIES OF INFORMATION AND COMMUNICATION |
| Abstract: | The rapid growth of the Internet of Things (IoT) has intensified the need for efficient communication protocols in constrained environments. This study evaluates two key IoT protocols, MQTT and CoAP, through systematic simulations in COOJA/Contiki OS, analyzing their energy efficiency, latency, throughput, and reliability under varied network conditions. We generate a machine learning-ready dataset capturing protocol performance across different payload sizes, transmission intervals, and network scales. This dataset can be used to enables predictive analysis of protocol behavior and supports data-driven IoT system design. Results show MQTT achieves better energy efficiency and scalability for large networks, while CoAP excels in low-latency scenarios. Beyond performance comparison, this work provides: (1) a methodological framework for protocol evaluation, and (2) a structured dataset for future IoT research, bridging protocol analysis with machine learning applications. The combined results and dataset offer practical insights for protocol selection in smart infrastructure and industrial IoT deployments, where constrained resources demand optimized communication solutions. |
| Description: | Network administration and security) |
| URI: | https://dspace.univ-ouargla.dz/jspui/handle/123456789/40201 |
| Appears in Collections: | Département d'informatique et technologie de l'information - Master |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| KHALED KHODJA-BENCASI.pdf | Network administration and security) | 4,13 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.