Top 17 protocols in IoT and their use-cases

October 24, 2024

Understanding IoT protocols is the foundation for those working in this field. There are many different types of connectivity and data transfer, which we will explore and provide examples of use cases in this article.

According to @IoT Analytics, the number of IoT devices worldwide reaches 16.7 billion. Analysts estimate that by 2025, the number of simultaneously connected devices will be 30.9 billion.

The ease of setup and availability of IoT standards and protocols, including low-performance wide area networks (LoraWan) and high-performance 5G, are greatly accelerating the growth of the entire IoT sphere.

Why are IoT protocols being used?

The whole point of IoT is the transmission of data from a sensor to a central server that processes the received information. This interaction is possible thanks to "IoT protocols", which enable us to receive actual data about the environment or any other information. Simply put, without a "protocol" for data transmission, the sensors themselves are completely useless.

Number of protocols in the IoT

Each of the protocols has its functions and purposes that make them preferable in specific cases.

Let's list the main factors that influence the choice of protocol:

  • Energy efficiency;
  • Location;
  • Cost;
  • Interference.

All of this affects the choice of which protocol is optimal for IoT device management.

Communication Protocols

IoT Communication Protocols

These protocols are implemented for fast data exchange between devices. Such protocols as MQTT protocol in IoT are designed for the instantaneous exchange of information to the server, without using a large amount of energy and computing power.

Performance indicators in this category are cheapness, reliability, and speed of the protocol. There are many protocols in this category, and each of them is unique and meets specific needs. These protocols work on the machine-to-machine (M2M) principle and are the basis for building communication between devices. Communication protocols include:

  • MQTT 
  • CoAP
  • HTTP/HTTPS
  • AMQP
  • Bluetooth/BLE
  • Zigbee
  • Z-Wave
  • LoRaWAN
  • NB-IoT

Networking Protocols

Networking protocols in IoT are essential for ensuring that devices can communicate effectively and efficiently within the network. These protocols define how data is transmitted and received over the network. Lorawan protocol in IoT, which is famous for its energy efficiency and ease of configuration, makes it the best choice for beginners.

However, energy efficiency and simplicity are not enough to choose a network protocol. Like any other class, each network protocol has both its strengths and weaknesses. The most popular network protocols include:

  • Wi-Fi
  • Ethernet
  • Cellular (4G/5G)
  • Zigbee
  • Z-Wave
  • LoRaWAN
  • Sigfox
  • NB-IoT
  • Thread

Security Protocols

IoT security protocols are critical to protecting data, ensuring privacy, and maintaining the integrity of devices that communicate with each other. Each of the protocols is designed to protect both the entire ecosystem and each device individually. Here is a list of the most popular security protocols that have found their place in IoT:

  • TLS/SSL
  • DTLS
  • IPSec
  • HTTPS
  • OAuth 2.0
  • WPA3
  • SSH
  • S/MIME

Application Protocols

Application protocols in the IoT are critical for enabling communication between devices and applications, ensuring interoperability, and facilitating data exchange. It is protocols of this type that are integral to building systems in industry. The most popular representatives of this class of protocols are MQTT (Message Queuing Telemetry Transport) and OPC UA (Open Platform Communications Unified Architecture). These two protocols are at the heart of building IoT solutions due to their security, flexibility, and fault tolerance. Application protocols include:

  • MQTT
  • CoAP
  • HTTP/HTTPS
  • AMQP
  • XMPP
  • DDS
  • OPC UA

Protocols in detail

In this section, we'll group and analyze each of the previously mentioned protocols in more detail. Please note that the same protocol can have several applications.

Protocol Description Use Cases Standards Protocol Type
MQTT Lightweight, publish-subscribe network protocol for remote locations with limited bandwidth. Remote monitoring systems, Home automation, Industrial applications, Health monitoring systems MQTT v3.1.1 (OASIS), MQTT v5.0 (OASIS) Communication Protocols
CoAP Web transfer protocol for constrained nodes and networks, enables small devices to communicate interactively over the Internet. Smart energy, Building automation, Environmental monitoring RFC 7252 (IETF) Application Protocols
HTTP/HTTPS Established protocol for data communication on the World Wide Web. HTTPS encrypts data between client and server. Web-based applications, Device management portals, Data visualization dashboards RFC 2616 (HTTP/1.1), RFC 2818 (HTTPS) Application Protocols
AMQP Open standard for passing business messages, supporting reliable communication. Financial services, Enterprise messaging, Cloud computing AMQP 1.0 (ISO/IEC 19464) Application Protocols
Bluetooth/BLE Wireless technology standard for short-distance data exchange. BLE offers reduced power consumption. Wearable devices, Proximity sensors, Health and fitness trackers Bluetooth Core Specification v5.0 Communication Protocols
Zigbee A suite of high-level communication protocols using low-power digital radios, based on IEEE 802.15.4. Home automation, Industrial Automation, Smart Lighting IEEE 802.15.4 Networking Protocols
Z-Wave Wireless communications protocol primarily for home automation, ensuring reliable and secure transmission. Home security systems, Smart thermostats, Lighting control ITU-T G.9959 Networking Protocols
LoRaWAN Protocol for wide-area networks, allowing low-powered devices to communicate over long-range wireless connections. Smart cities, Agriculture, Asset tracking LoRaWAN Specification v1.0.3 Networking Protocols
NB-IoT Radio technology standard developed by 3GPP for cellular devices and services, focusing on indoor coverage, low cost, long battery life, and high connection density. Smart metering, Smart parking, Environmental monitoring 3GPP Release 13 Networking Protocols
Wi-Fi Wireless networking technology for high data rates and wide availability. Smart home devices, Video surveillance, High-bandwidth applications IEEE 802.11 (a/b/g/n/ac/ax) Networking Protocols
Ethernet Wired networking technology for reliable and fast data transmission. Industrial automation, Fixed installations, High-reliability systems IEEE 802.3 Networking Protocols
Cellular (4G/5G) Wide-area coverage with high data rates and low latency. Connected vehicles, Remote monitoring, Smart cities 4G: 3GPP Release 8 and beyond, 5G: 3GPP Release 15 and beyond Networking Protocols
Sigfox Low-power, wide-area network technology for low-cost connectivity. Asset tracking, Environmental monitoring, Utility metering Proprietary technology Networking Protocols
Thread IP-based wireless networking protocol for secure and reliable mesh networking. Home automation, Building control, Smart lighting IEEE 802.15.4 Networking Protocols
TLS/SSL Cryptographic protocols for secure communication over a network. Secure web browsing, Email communication, IoT device communication TLS 1.2 (RFC 5246), TLS 1.3 (RFC 8446) Security Protocols
DTLS Provides security for datagram-based applications over UDP. IoT devices using CoAP, VoIP, Real-time communications DTLS 1.2 (RFC 6347) Security Protocols
IPSec A suite of protocols for securing IP communications by authenticating and encrypting each IP packet. VPNs, Secure communication between IoT devices, Enterprise network security RFC 4301 (Security Architecture for the Internet Protocol) Security Protocols
OAuth 2.0 Authorization framework for limited access to HTTP services without exposing user credentials. User authentication in IoT applications, Secure access to IoT services, Delegated access control RFC 6749 (The OAuth 2.0 Authorization Framework) Security Protocols
WPA Wi-Fi security protocol with enhanced features, stronger encryption, and protection against brute-force attacks. Secure Wi-Fi networks, IoT devices connected to Wi-Fi, Home and enterprise wireless security WPA3 (Wi-Fi Alliance Specification) Security Protocols
SSH Cryptographic protocol for secure network services, commonly used for remote login and command execution. Secure remote device management, Secure file transfers, IoT device configuration RFC 4251 (The Secure Shell (SSH) Protocol Architecture) Security Protocols
S/MIME Protocol for sending encrypted and digitally signed email messages. Secure email communication, Authentication of IoT devices, Secure notifications RFC 5751 (S/MIME 3.2 Message Specification) Security Protocols
XMPP Communication protocol based on XML for real-time communication and presence detection. Real-time communication, Presence detection, IoT device presence detection RFC 6120 (XMPP Core), RFC 6121 (XMPP IM) Application Protocols
DDS Middleware protocol for data-centric connectivity, enabling scalable and real-time data exchanges. Industrial automation, Robotics, Defense systems DDS v1.4 (OMG) Application Protocols
OPC UA Machine-to-machine communication protocol for industrial automation, ensuring secure and reliable data exchange. Industrial automation, Process control, Manufacturing OPC UA Specification (OPC Foundation) Application Protocols

Conclusion

The network of IoT devices is extensive, and each data transmission protocol is required for the purpose, for which it was designed. The choice depends on the customer's requirements, considering all possible factors that may affect the operation of the devices. Only when we have a complete understanding of how the devices work can we effectively select the right type of IoT sensors and data transfer protocols.