IoT Communication Protocols and Applications
IoT Communication Protocols and Applications
Limited devices’ energy consumption: devices may be equipped with small batteries
Low device cost: the application scenario may require the deployment of a high
number of devices
Long device lifetime: devices may be physically difficult to reach after deployment or
their too frequent change may make the network cost too high
4 Wireless communication protocols
Tens of wireless communication protocols have been defined ad-hoc or «rearrenged» over
time to make them more compatible with the evolving applications and service requirements
5 Wireless communication protocols
6 Wireless communication protocols
WIRELESS PROTOCOLS
COVERAGE RANGE
Very short range Short range Medium range Long range Very long range
up to 10 cm up to 10 metri up to 100 metri up to 100 km
(RFID, NFC) (WBAN, Bluetooth) (Wi-Fi, Zigbee, Z-Wave) (cellulare, LPWAN) (satellitare)
TRANSMISSION POWER
RFID systems are based on electronic devices (transponder) able to store data inside
them
The data exchange between these devices and RFID readers takes place through
electromagnetic waves
8 Radio Frequency Identification (RFID)
System architecture
RFID systems are composed of two main components:
Transponder (tag):
device storing the
information related to the
object to identify
Reader: device aims to
read / write information
from / on transponders
Each transponder is typically composed of an antenna and a microchip
Each reader is typically composed of a radio module, for the data exchanges with the
transponders, and another interface, such as a serial port, for the link with other systems,
such as PC containing data databases
Line-of-Sight (LoS) condition between readers and transponders is not required
9 Radio Frequency Identification (RFID)
Transponder – Passive vs Active
Passive: they do not have any power source. They activate when entering within the
reader coverage area, since the readers give them enough power to transmit data
Semi-passive: they are equipped with a battery that powers on the microchip for
long periods (years) but does not give them enough power to transmit data, which is
given by the reader
Active: they are equipped with a battery that both powers on the microchip and give
them enough power to transmit data
10 Radio Frequency Identification (RFID)
Transponder – Operational frequencies
This choice is made considering the application scenario and the possible transponder
limitations
11 Radio Frequency Identification (RFID)
Transponder – Operational space range
Close-coupling:
Passive transponder
Range: 0-1 cm (they must be inserted into the player or placed on its external
surface)
Used in applications with high security requirements and do not need a long
operational range, such as magnetic cards to open doors or for contactless
payment cards
12 Radio Frequency Identification (RFID)
Transponder – Operational space range
Remote-coupling:
Passive transponder
Range: 0-1 m
Standard: Proximity (ISO 14443) and Vicinity (ISO 15693 e ISO 18000-3)
13 Radio Frequency Identification (RFID)
Transponder – Operational space range
Long-range:
Active transponder
Range: > 1m
Sequential: readers remain active only for short, fixed and cyclical periods of
time. Transponders only send data during these periods
15 Radio Frequency Identification (RFID)
Further information
With the exception of 1-bit transponders, which can assume one out of only
two possible states: “transponder active” or “transponder deactivated”. Typically
used in shops for the protection of goods (anti-theft)
There are transponders enabled only for reading (transmitting) data (read-only)
and others also capable of receiving and storing data (read-write)
16 Radio Frequency Identification (RFID)
Further information
This protocol defines the physical and logical requirements for a passive-
backscatter, Interrogator-Talks-First (ITF), RFID system operating in the 860 MHz
– 960 MHz frequency range
18 Radio Frequency Identification (RFID)
Standard
ISO/IEC 14443 (Smart card contactless): Cards and security devices for
personal identification – Contactless proximity objects (0-10 cm)
The data units are NFC Data Exchange Format (NDEF) messages
21 Radio Frequency Identification (RFID)
Near Field Communication (NFC)
NFC supports different modes of
operation
In reader/writer mode, one of the
NFC devices (the polling device) is
active and requests and reads data
from the other device (the tag)
The NFC tag is passive. It does
not generate an electromagnetic
field, but it modulates the field that
is generated by the polling device
The tag contains data which can be
read and written by the polling
device
22 Radio Frequency Identification (RFID)
Near Field Communication (NFC)
Range: 0-20 cm
5. Ski pass
6. Anti-theft protection
24 Radio Frequency Identification (RFID)
Applications
Frequency: 2.4 GHz (2.40-2.48 GHz) ISM (Industrial, Scientific and Medical) license-
free
Each transmission “hops” among the channels 1600 times per second (Frequency
Hopping Spread Spectrum – FHSS) to reduce interference both between nearby
devices and from external sources
6 versions with different variations have been defined adding further functionalities
The currently last version is 6.0 (August 2024) and its detailed specification can be found
here: https://www.bluetooth.com/specifications/specs/core-specification-6-0/
28 Bluetooth
Network architecture
When connected to the network, each device identifies the other active devices through a
24-bit code (Class Of Device - COD) in order to activate the related services
29 Bluetooth
Network topologies
Scatternet: composed of two or more piconets connected to each other through one
or more common slaves
As the number of slaves in the same piconet or scatternet increases, the probability of
data packet collision and number of collisions increases, with a consequent performance
degradation
30 Bluetooth
Connection procedure
To transmit and/or receive data, a device must “physically” connect to another before
starting the data exchange.
1. Inquiry: a new device entering the piconet sends a packet (inquiry) in order to
“discover” if there are other devices within the coverage range: if there are, it will
receive a reply from each of them containing some data, including their address
3. Connection: after the connection establishment, the slave can operate in 4 different
modes:
ii. Sniff: energy-saving mode in which the device is at rest (sleep) and periodically “wakes
up” to “hear” if there are data transmissions destined to it on the shared channel
iii. Hold: energy-saving mode in which the device is at rest for a certain fixed time interval
after which it comes back to the active mode
iv. Park: most energy-saving mode, the master imposes the slave to enter this idle mode, the
slave stays there until the master tells it to “wake up”
32 Bluetooth
Connection types
It is also possible to transmit multislot packets, i.e. packets which, given their size, can
occupy up to 5 consecutive slots
34 Bluetooth
Device classes
There are four device classes that differ from the transmission power and,
consequently, the coverage range:
Maximum data rate: 125 kbps, 500 kbps, 1 Mbps, and 2 Mbps
Defines an additional device class (1.5) with 10 mW (10 dBm) transmission power
and 20 m coverage range
36 Bluetooth
Security
Each device has a unique 48-bit address (BD_ADDR) where the first 24 bits
uniquely identify the manufacturing organization and the last 24 bits identify the
single device among those built by the same organization
Two error correction schemes: Forward Error Correction (FEC) 1/3 and
FEC 2/3
It provides device authentication with 128-bit key and data encryption with 8
to 128-bit keys
37 Bluetooth
Application profiles
To ease the use of Bluetooth devices and distinguish the functions that each device can
perform, a set of 37 possible application profiles have been defined. For example:
Advanced Audio Distribution Profile (A2DP): defines how multimedia content can
be transmitted and played from one device to another through a Bluetooth connection
Audio/Video Remote Control Profile (AVRCP): defines how a device can be used
as a TV “remote control” or other audio/video devices
Basic Printing Profile (BPP): defines the sending of text, email, and other printer-
like content
38 Bluetooth
Application profiles
Cordless Telephony Profile (CTP): defines the use of Bluetooth-based cordless phones
File Transfer Profile (FTP): defines the ability to add, edit, or transfer files from one
device to another one
Handset Profile (HSP): defines how Bluetooth headsets can interface with mobile
phones or game consoles to initiate/end calls or change the volume of the audio output
Human Interface Device Profile (HIDP): defines how devices with simple buttons
and indicators (mouse, keyboards, joysticks, ...) can interface with PCs and video game
consoles
39 ZigBee
The 1.0 specification was approved in 2004 and is publicly available, while the latest
specification (3.0) was initially released in 2014 and subsequently improved until 2017
https://csa-iot.org/developer-resource/specifications-download-request/
https://zigbeealliance.org/wp-content/uploads/2019/11/docs-05-3474-21-0csg-zigbee-
specification.pdf
40 ZigBee
General information
The available band is divided into 16 channels of 2 MHz each and involves the use of
the Direct Sequence Spread Spectrum (DSSS) technique
Frequency: ISM license-free 868 MHz (Europe), 915 MHz (USA) e 2,4 GHz (World)
Modulation: Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift Keying
(QPSK)
ZigBee Router: aims to extend the network coverage, routes the data packets destined
to or generated by the End Devices
ZigBee End Device: data source and/or destination, communicates only with the
associated parent node (a router or the coordinator)
42 ZigBee
Network architecture
ZigBee Star: star network, one or more end
devices are connected and managed directly by
the coordinator
ZigBee Tree: tree network, one or more routers
extend the network coverage, uses a hierarchical
routing strategy
ZigBee Mesh: mesh network, one or more
routers are used to extend the network coverage,
uses a non-hierarchical routing strategy, typically
used to distribute some coordinator functions
(for example, related to security)
There can be only one coordinator per network. Coordinator differ from routers from the
software an logical viewpoint but not at the hardware level
43 ZigBee
Channel access
The different devices can access the channel to transmit data by using the Carrier Sense
Multiple Access / Collision Avoidance (CSMA/CA) technique
Before starting to transmit, a device “senses”
the channel to understand if there are other
ongoing transmissions
ZigBee also defines a set of application profiles that are structured in two categories:
public and manufacturer-specific
Personal Home & Hospital Care (PHHC): includes devices aim to provide non-
invasive medical monitoring and treatment
The LPWA protocols have been defined to address the requirements of applications
that cannot be satisfied by the short-range communication protocols (Bluetooth,
ZigBee, Z-Wave, ...), the “classic” protocol for wireless networks (Wi-Fi) and those
based on the cellular network (GSM, UMTS, LTE, ...)
They are particularly suitable for delay-tolerant services that do not require
transmission/reception of large amounts of data but require a low energy
consumption enough to guarantee a long operational life (years) despite being
equipped with small batteries
They are mainly used for massive Machine Type Communication (mMTC)
applications, instead of critical MTC (cMTC) applications that require higher data
transmission speeds, lower latencies, and great reliability
49 Low Power Wide Area Network (LPWAN)
Applications
50 Low Power Wide Area Network (LPWAN)
Main features
SigFox is a proprietary solution in which the devices send/receive data to/from the network
connecting to an ad-hoc deployed throughput the covered area making a star topology
network
56 LPWA proprietary protocols
SigFox
Uplink: each device sends multiple copies (3 by default) of each message through 3 different
randomly chosen channels in order to increase the probability of correct reception. Each copy
can be received by more than one base station. Each station sends the received messages to the
SigFox Cloud platform which eliminates duplicate messages and sends a copy of each message to
the end user, acting as an interface between users and IoT devices
57 LPWA proprietary protocols
SigFox
Downlink: A message can be delivered to a device only in the time periods when it explicitly
communicated its reception availability. The rest of the time, the device is not listening to save
power
58 LPWA proprietary protocols
SigFox
Frequency: ISM license-free Sub-GHz 868 MHz (Europe) and 902 MHz (USA)
Modulation: Differential Binary Phase Shift Keying (D-BPSK) in uplink and Gaussian
Frequency Shift Keying (GFSK) in downlink
Data rate: between 100 bps and 600 bps in uplink (depending on the geographical area)
and 600 bps in downlink
59 LPWA proprietary protocols
SigFox
Message size: header 14 Byte fixed, data payload 12 Bytes maximum in uplink and 8
Bytes maximum in downlink (depending on the geographical area)
Each end-device has to perform an activation process before start transmitting in the
network
End-device Address (DevAddr): 32-bit address that uniquely identifies the end-device
within the network. It is allocated by the Network Server
Network Session Key (NwkSKey): 128-bit network session key specific to each end-
device, created and shared between the end-device and the Network Server, and used to
encrypt and decrypt the payload field of MAC-only data frames
Application Session Key (AppSKey): 128-bit application session key specific to each
end-device, already stored at both end-device and Application Server sides, and used by
both the Application Server and the end-device to encrypt and decrypt the payload field
of application-specific data frames
66 LPWA proprietary protocols
LoRaWAN
Class B: a greater number of reception opportunities than in Class A can follow each
transmission opportunity at scheduled time instants synchronized with the base
stations. Its main purpose is to have an end-device available for reception at a
predictable time, in addition to the reception windows that follows the random uplink
transmission from the end-device
Class C: the devices are always on and ready to receive except when they are
transmitting. Its main purpose is to maximize the downlink bandwidth at the cost of a
higher energy consumption
71 LPWA proprietary protocols
LoRaWAN
Solutions that consider the real-time knowledge of the goods in terms of current
positions, current and historical temperatures, current and historical pressure, …
The article ‘‘Intelligent Cargo Tracking System Based on the Internet of Things’’ proposes an
architecture for a goods smart tracking system based on RFID for the data
collection and UMTS to send these data to an online database where they are analysed
by using AI techniques
The article ‘‘EURIDICE – IoT applied to Logistics using the Intelligent Cargo Concept’’ describes
a smart system for multiple operation management, such as goods tracking and
monitoring and their possible re-route without human intervention
76 Application examples
Smart goods packing
Solutions to make the goods packing operation more autonomous and efficient
Autonomous system to manage, prepare, pack, and ship the goods triggered by each
order made by the customers through an e-commerce platform (think about Amazon…)
(figure from the article ‘‘A three-dimensional adaptive PSO-based packing algorithm for an IoT-
based automated e-fulfillment packing system’’)
77 Application examples
Smart goods load/unload
Solutions regarding the smart goods load and unload that, if properly organized, can
lead to lower handling times and movement costs (‘vertical’ movements)
Smart forklift with a data collection and transmission system based on wireless technologies
(figure from the article ‘‘IoT-based data transmitting system using a UWB and RFID system in smart
warehouse’’)
78 Application examples
Smart goods transportation
Solutions regarding smart goods transportation through different means (wheel, water,
air, …) that, if properly organized, can lead to lower transportation times and costs
(‘horizontal’ movement with related functionalities, such as optimal route computation)
AGV: Autonomous
Guided Vehicle
System to manage autonomous vehicles based on ZigBee and WiFi protocols for the data
exchange among vehicles and between vehicle and control infrastructure
(figure from the article ‘‘Wireless communication technologies in automated guided vehicles: Survey and Analysis’’)
79 Application examples
Port automation
Example of a system to automate port operations
(figure from the article ‘‘Ultra-Reliable and Low-Latency 5G Systems for Port Automation’)
80 Application examples
eHealth
The eHealth sector is benefitting from a deeper integration with the ICT technologies
This not only improved the capabilities of the medical instrumentations, but is improving
several functionalities, such as disease diagnosis and patient monitoring, through a more
capillary and efficient data collection and management
(figure from the article ‘‘A New 5G eHealth Architecture Based on Optical Camera
Communication: An Overview, Prospects, and Applications’’)
82 Application examples
eHealth
(figure from the article ‘‘An Implantable System for Neural Communication and Stimulation:
Design and Implementation’’)
83 Application examples
Vehicular communications
Vehicles are becoming “smarter” and able to offer additional functionalities
To do so, they need to collect and process a huge amount of data and talk to each others
(V2V), to the pedestrian (V2P), to the communication infrastructure (V2I), and to the core
part of the communication network (V2N). Generally speaking, exchange data with
everything around them (V2X)
(figure from the article ‘‘V2X Support in 3GPP Specifications: From 4G to 5G and Beyond’’)
85 Application examples
Vehicular communications
(figure from the article ‘‘HAPS-ITS: Enabling Future ITS Services in Trans-Continental Highways’)