Modeling and Evaluation of the Internet of Things Communication Protocols in Security Constrained Systems

Document Type

Conference Proceeding

Source of Publication

2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)

Publication Date

1-11-2023

Abstract

As the term implies, the main focus when designing security constrained systems is ensuring that the defined constraints are strictly adhered to. Developers of such systems must identify a balance between providing user and data security while also ensuring that the service's functionality is good. Extra security constraints can have a direct impact on other system aspects such as the communication between different devices especially in the emerging networking systems such as the Internet of Things and edge networking. In this work, we model and evaluate the main Internet of Things communication protocols including AMQP, CoAP, MQTT and XMPP in a security constrained system. We consider different evaluation metrics such the network utilization and success rate. Different protocols will react differently to the constrained security system but the increase in the communication latency is the common factor for all protocols.

ISBN

978-1-6654-9734-3

Publisher

IEEE

Volume

00

First Page

1

Last Page

6

Disciplines

Computer Sciences

Keywords

IoT, security constrained systems, communication protocols, latency, network utilization

Indexed in Scopus

no

Open Access

no

Share

COinS