International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.9, No.11, Nov. 2017

Enhancing the QoS of IoT Networks with Lightweight Security Protocol using Contiki OS

Full Text (PDF, 996KB), PP.27-35

Views:203   Downloads:5


Haytham Qushtom, Khalid Rabaya’h

Index Terms

Wireless sensor networks;Internet of Things;quality of service;medium access control;secure traffic;traffic priority;IPsec;MAC Layer;CSMA/CA;IEEE 802.15.4


The Internet of Things (IoT) is advancing to prevail the application of the Internet, with the vision to connect everything around us. The deployment of IoT is advancing at a very fast pace, and relying on modified versions of the TCP/IP protocol suits. This rapid growth of the field is leaving a number of critical issues unresolved.  Among the most critical issues are the quality of service and security of the delivered data. This research is set to tackle these issues through proposing a data delivery scheme that improves the quality of service (QoS) of classified data. The proposed solution relies on differentiating the priority of the delivered data, and to give preferences to secured and user-defined high priority traffic. The proposed solution denoted as Secured Traffic Priority Differentiation (STPD), is made to support any application, and is implemented at the Medium Access Control (MAC) sub layer. The proposed solution was tested in a virtual environment that simulates real scenarios using the Contiki operating system, using the Cooja simulator. The simulation results demonstrated a significant improvement of the proposed solution over the Carrier Sense Multiple Access Collision Avoidance, (CSMA/CA), by at 20%.  The proposed solution worked to improve the channel utilization, data reliability, decreased latency of high priority traffic, and low priority traffic as well.

Cite This Paper

Haytham Qushtom, Khalid Rabaya’h,"Enhancing the QoS of IoT Networks with Lightweight Security Protocol using Contiki OS", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.11, pp.27-35, 2017.DOI: 10.5815/ijcnis.2017.11.03


[1]Nik Bessis and Ciprian Dobre, "Big Data and Internet of Things: A Roadmap for Smart Environments," Springer, 2014.

[2]J. Hui and P. Thubert, "Compression Format for IPv6 Datagrams over IEEE 802.15.4 Based Networks," RFC 6282, Sept. 2011.

[3]Jaideep Kaur, Kamaljit Kaur, "Internet of Things: A Review on Technologies, Architecture,Challenges, Applications, Future Trends," International Journal of Computer Network and Information Security(IJCNIS), vol. Vol.9, no. DOI: 10.5815/ijcnis, pp. pp. 57-70, 2017.04.07.

[4]S. Kent and K. Seo, "Security Architecture for the Internet Protocol," RFC 4301, December 2005.

[5]Er. Gurjot Singh, Er. Sandeep Kaur Dhanda, "Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes," Information Technology and Computer Science, no. DOI: 10.5815/ijitcs, pp. 32-42, 2014.

[6]Azka a, S Revathi b, "Protocols for Secure Internet of Things," I.J. Education and Management Engineering, no. DOI: 10.5815/ijeme, pp. 20-29, 2017.02.03.

[7]Awan, I.; Younas, M.; Naveed, W., "Modelling QoS in IoT," Network-Based Information Systems (NBiS), no. 17th International Conference, pp. 99-105, 2014.

[8]Adil A Sheikh ,Emad Felemban, Saleh Basalamah, "Priority-Based Routing Framework for Multimedia Delivery in Surveillance Networks," MMEDIA 2014 : The Sixth International Conferences on Advances in Multimedia, 2014.

[9]Tanmay Chaturvedi, Kai Lia, Chau Yuena, Abhishek Sharmab, Linglong Daic, Meng Zhang, "On the Design of MAC Protocol and Transmission Scheduling for Internet of Things," SUTD-MIT International Design Center, 2016.

[10]Thien D. Nguyen, Jamil Y. Khan, and Duy T. Ngo, "An Energy and QoS-Aware Packet Transmission Algorithm for IEEE 802.15.4 Networks," IEEE 26th Annual International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC): MAC and Cross-Layer Design, 2015.

[11]Irfan Al-Anbagi, Melike Erol-Kantarci, and Hussein T. Mouftah, "Priority- and Delay-Aware Medium Access for Wireless Sensor Networks in the Smart Grid," IEEE, no. 1932-8184, 2013.

[12]Muhammad Sajjad Akbar, Hongnian Yu, ShuangCang, "TMP: Tele-Medicine Protocol for Slotted 802.15.4 with Duty-Cycle Optimization in Wireless Body Area Sensor Networks," IEEE, no. 1558-1748, pp. 1-1, 28 December 2016.

[13]Sabin Bhandari and Sangman Moh, "A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks," Sensors , no. 401, 2016.

[14]Saima Abdullah, Kun Yan, "A QoS Aware Message Scheduling Algorithm in Internet of Things Environmen," IEEE Online Confer-ence on Green Communications (OnlineGreenComm), 2013.

[15]Thiemo Voigt, Fredrik Osterlind and Adam Dunkels , "Contiki COOJA Hands-on Crash Course: Session Notes," Swedish Institute of Computer Science, July 2009.

[16]"Contiki: The Open Source OS for the Internet of Things.," [Online]. Available: [Accessed 25 1 2017].

[17]F. A. Tobagi, "Analysis of a two-hop centralized packet radio network–part ii: Carrier sense multiple access," IEEE Transaction on Communications, vol. vol. 28, no. no. 2, p. pp. 208–216, Feb. 1980.

[18]C. E. a. F. A. I. Demirkol, "MAC protocols for wireless sensor networks: A survey," IEEE Communications Magazine, vol. vol. 44, no. no. 4, p. pp.115–121, Apr. 2006.

[19]S. Raza et al, "Securing communication in 6LoWPAN with compressed IPsec," IEEE Int. Conf. Distrib. Comput. Sens. Syst., no. Proc. 7th, p. pp. 1–8, Jun. 2011.