ABSTRACT

IoT plays an important role in transmission over network or communication between M2M devices. In this article the author has describe about the IoT protocols that helps to transmit the data in an efficient way with authenticity. The two main protocols has been discussed Routing protocol and Least Interference Beacon protocol that leads to an efficient transmission with efficient energy consumption over network. RPL recognition is made by the IEFT for the routing solution of LLNs to form a standardized of IPv6 that can be directly used. Least interference beaconing protocol model is conform by the CTP. The data should be thwarted while communicating. The security and privacy issues that prevent from attackers to attack the data in middleware such as sybil attack, worm hole attack, etc. This article conclude a brief discussion of IoT protocols with security and privacy issues.