Modeling and Evaluation of the Internet of Things Communication Protocols in Security Constrained Systems
Document Type
Conference Proceeding
Source of Publication
2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)
Publication Date
1-11-2023
Abstract
As the term implies, the main focus when designing security constrained systems is ensuring that the defined constraints are strictly adhered to. Developers of such systems must identify a balance between providing user and data security while also ensuring that the service's functionality is good. Extra security constraints can have a direct impact on other system aspects such as the communication between different devices especially in the emerging networking systems such as the Internet of Things and edge networking. In this work, we model and evaluate the main Internet of Things communication protocols including AMQP, CoAP, MQTT and XMPP in a security constrained system. We consider different evaluation metrics such the network utilization and success rate. Different protocols will react differently to the constrained security system but the increase in the communication latency is the common factor for all protocols.
DOI Link
ISBN
978-1-6654-9734-3
Publisher
IEEE
Volume
00
First Page
1
Last Page
6
Disciplines
Computer Sciences
Keywords
IoT, security constrained systems, communication protocols, latency, network utilization
Recommended Citation
Helbig, Colton; Otoum, Safa; and Jararweh, Yaser, "Modeling and Evaluation of the Internet of Things Communication Protocols in Security Constrained Systems" (2023). All Works. 5683.
https://zuscholars.zu.ac.ae/works/5683
Indexed in Scopus
no
Open Access
no