Modeling and Evaluation of the Internet of Things Communication Protocols in Security Constrained Systems.

Colton Helbig,Safa Otoum,Yaser Jararweh

CCNC(2023)

引用 0|浏览4
暂无评分
摘要
As the term implies, the main focus when designing security constrained systems is ensuring that the defined constraints are strictly adhered to. Developers of such systems must identify a balance between providing user and data security while also ensuring that the service's functionality is good. Extra security constraints can have a direct impact on other system aspects such as the communication between different devices especially in the emerging networking systems such as the Internet of Things and edge networking. In this work, we model and evaluate the main Internet of Things communication protocols including AMQP, CoAP, MQTT and XMPP in a security constrained system. We consider different evaluation metrics such the network utilization and success rate. Different protocols will react differently to the constrained security system but the increase in the communication latency is the common factor for all protocols.
更多
查看译文
关键词
Modeling and Simulation,Internet of Things,Edge Networks,Cloud Networks,Communication Protocols
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要