Cover
Vol. 1 No. 2 (2025)

Published: December 1, 2025

Pages: 74-81

Original Article

Empirical Evaluation of MQTT, CoAP and HTTP for Smart City IoT Applications

Abstract

Smart city applications demand lightweight, efficient and dependable communication protocols to facilitate the functioning of resource-limited Internet of Things (IoT) devices. This work performs an extensive empirical study of the three most prominent IoT standards; Message Queuing Telemetry Transport (MQTT), the Constrained Application Protocol (CoAP) and Hypertext Transfer Protocol (HTTP) by emulating real-world smart city use cases using a Raspberry Pi based testbed. The primary metrics based on which the protocols are analyzed are latency, message overhead, delivery rate and energy consumption. ANOVA and Tukey's HSD tests are used to determine the statistical significance of experimental data. The test results indicate that CoAP under (QoS-1 reliability) shows the least latency and energy consumption and MQTT due to its support for Quality of Service (QoS) is the most reliable. Among the others, HTTP is in general performance terms certainly at the bottom of all metrics mainly for its verbosity and synchronous nature. The paper then also suggests a decision flowchart for developers to choose the suitable protocol according to application requirements. The results are more than just numbers on a graph, and the research can be deployed for advice for protocol selection in practice, where this study helps identify issues with encryption overhead (over 75\%) while showcasing multi-hop network scalability and adaptive switch mechanisms as areas that remain to be resolved. Such findings can be used as a basis for design approaches to construct secure, efficient and scalable communication protocols in urban IoT settings.

References

  1. R. Mishra and A. Mishra, “Current research on internet of things (IoT) security protocols: A survey,” Computers & Security, p. 104310, 2025, https://doi.org/10.1016/j.cose.2024.104310.
  2. K. Ramani, G.H. Bindu, M. Haritha, N.P. Latha, and I. Suneetha, "IoT protocols", Innovations in computational Intelligence, Big Data Analytics and Internet of Things, p. 179, 2024.
  3. B. Mohammed, M. Al-Shareeda, R. Homod, Y. Alkhabra, Z. Al-Mekhlafi, G. Alshammari, A. Alanazi, “Taxonomy-based lightweight cryptographic frameworks for secure industrial IoT: A survey,” IEEE Internet of Things Journal, 2025, https://doi.org/10.1109/JIOT.2025.3595649
  4. A. Daniel, N. Krishnaraj, S. Venkatraman, and P. Mah- eswaravenkatesh, “Post-quantum lightweight cryptography algorithms and approaches for IoT and blockchain security,” in Advances in Computers, vol. 138, pp. 349–376, Elsevier, 2025, https://doi.org/10.1016/bs.adcom.2025.03.001
  5. Z. Aziz and A. Abed, Harnessing Large Language Models for Enhanced Cybersecurity: A Review of Their Role in Defending Against APT and Cyber Attacks, in International Journal of Mechatronics, Robotics, and Artificial Intelligence (IJMRAI), vol. 1, issue 1, pp. 54-62, June 2025, doi:10.33971/ijmrai.1.1.8
  6. G. Said, A. Ghani, A. Ullah, M. Azeem, M. Bilal, and K. S. Kwak, “Light-weight secure aggregated data sharing in IoT-enabled wireless sensor networks,” IEEE Access, vol. 10, pp. 33571–33585, 2022, https://doi.org/10.1109/ACCESS.2022.3160231
  7. M. Rana, Q. Mamun, and R. Islam, “Lightweight cryptography in IoT networks: A survey,” Future Generation Computer Systems, vol. 129, pp. 77–89, 2022, https://doi.org/10.1016/j.future.2021.11.011
  8. R. Shah, and S. Correia, “Encryption of data over http (hypertext transfer protocol)/https (hypertext transfer protocol secure) requests for secure data transfers over the internet,” in 2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT), pp. 587–590, IEEE, 2021, https://doi.org/10.1109/RTEICT52294.2021.9573978
  9. A.A. Abed, “Internet of Things (IoT): Architecture and design”, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), IEEE, pp. 1–3, 2016.
  10. K. Tran, A. Phram, N. Nguyen, and P. Dang, "Analysis and performance comparison of IoT message transfer protocol applying in real photovoltaic system, International Journal of Networked and Distributed Computing, vol. 12, no. 1, pp. 131–143, 2024, https://doi.org/10.1007/s44227-024-00021-4
  11. M. Talau, T. Herek, M. Fonseca, and E. Wille, “Improving TCP performance over a common IoT scenario using the early window tailoring method,” Computer Networks, vol. 234, p. 109875, 2023, https://doi.org/10.1016/j.comnet.2023.109875
  12. P. Sun, S. Shen, Y. Wan, Z. Wu, Z. Fang, and X.-z. Gao, “A survey of IoT privacy security: Architecture, technology, challenges, and trends,” IEEE internet of things journal, vol. 11, no. 21, pp. 34567–34591, 2024, https://doi.org/10.1109/JIOT.2024.3372518
  13. H. Jaafer, and A. Abed, “Towards Smart Manufacturing: Implementing PI Control on PLCs in IIoT-Driven Industrial Automation”, in International Journal of Mechatronics, Robotics, and Artificial Intelligence (IJMRAI), vol. 1, issue 1, pp. 19-29, June 2025, doi:10.33971/ijmrai.1.1.4
  14. V. Quincozes, S. Quincozes, J. Kazienko, S. Gama, O. Cheikhrouhou, and A. Koubaa, “A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (xaiot),” International Journal of Information Security, vol. 23, no. 3, pp. 1975–2002, 2024, https://doi.org/10.1007/s10207-024-00828-w
  15. C. Gemirter, S. enturca, and S. Baydere, “A comparative evaluation of amqp, mqtt and http protocols using real-time public smart city data,” in 2021 6th International Conference on Computer Science and Engineering (UBMK), pp. 542–547, IEEE, 2021, https://doi.org/10.1109/UBMK52708.2021.9559032
  16. D. Koutras, G. Dimitrakopoulos, V. Malamas, P. Kotzanikolaou, and C. Douligeris, “Comparative analysis and implementation of http3, mqtt, and coap for IoT applications,” in Proceedings of the 28th Pan-Hellenic Conference on Progress in Computing and Informatics, pp. 127–132, 2024, https://doi.org/10.1145/3716554.3716830
  17. C. D’Ortona, D. Tarchi, and C. Raffaelli, “Open-source mqtt-based end-to-end IoT system for smart city scenarios,” Future Internet, vol. 14, no. 2, p. 57, 2022, https://doi.org/10.3390/fi14020057
  18. X. Hu, J. Li, Y. He, and Y. Wang, “Research and implementation of lightweight security solutions for IoT mqtt protocol,” in 2025 IEEE 7th International Conference on Communications, Information System and Computer Engineering (CISCE), pp. 1166–1171, IEEE, 2025, https://doi.org/10.1109/CISCE65916.2025.11065441
  19. S. Kaganurmath, N. Cholli, and M. Anala, “Dlks- mqtt: A lightweight key sharing protocol for secure IoT communications,” Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21532–21538, 2025, https://doi.org/10.48084/etasr.10216
  20. K. Khalil, A. Kumar, and M. Bayoumi, “Hardware acceleration of coap protocol for high-speed and low-power internet of things communication,” IEEE Internet of Things Journal, 2024, https://doi.org/10.1109/JIOT.2024.3502549
  21. S. Oliver and T. Purusothaman, “Lightweight and secure mutual authentication scheme for IoT devices using coap protocol.,” Computer Systems Science & Engineering, vol. 41, no. 2, 2022, https://doi.org/10.32604/csse.2022.020888
  22. Y. Yang, S. Lee, G. Chen, C. Yang, Y. Huang, and T. Hou, “An implementation of high efficient smart street light management system for smart city,” IEEE access, vol. 8, pp. 38568–38585, 2020, https://doi.org/10.1109/ACCESS.2020.2975708
  23. M. Faleh, A. Abdulsada, A. Alaidany, M. Al-Shareeda, M. Almaiah, and R. Shehab, “Secremen: A lightweight quantum-resilient authentication framework for IoT-edge networks,” Journal of Robotics and Control (JRC), vol. 6, no. 4, pp. 1681–1692, 2025.
  24. R. Alyami, “Secure IoT transmission in 6g smart cities: a quantum-resilient hybrid Galois field and reed-Solomon approach,” The Journal of Supercomputing, vol. 81, no. 4, pp. 1–37, 2025, https://doi.org/10.1007/s11227-025-07084-2
  25. C. Sanders, “Practical packet analysis: Using Wireshark to solve real-world network problems”, no starch press, 2017.
  26. V. Ndatinya, Z. Xiao, V. Manepalli, K. Meng, and Y. Xiao, “Network forensics analysis using Wireshark”, International Journal of Security and Network, vol.10, no.2, pp. 91-106, 2015, https://doi.org/10.1504/IJSN.2015.070421