Modeling and Evaluation of the Internet of Things Communication Protocols in Security Constrained Systems
Source of Publication
2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)
As the term implies, the main focus when designing security constrained systems is ensuring that the defined constraints are strictly adhered to. Developers of such systems must identify a balance between providing user and data security while also ensuring that the service's functionality is good. Extra security constraints can have a direct impact on other system aspects such as the communication between different devices especially in the emerging networking systems such as the Internet of Things and edge networking. In this work, we model and evaluate the main Internet of Things communication protocols including AMQP, CoAP, MQTT and XMPP in a security constrained system. We consider different evaluation metrics such the network utilization and success rate. Different protocols will react differently to the constrained security system but the increase in the communication latency is the common factor for all protocols.
IoT, security constrained systems, communication protocols, latency, network utilization
Helbig, Colton; Otoum, Safa; and Jararweh, Yaser, "Modeling and Evaluation of the Internet of Things Communication Protocols in Security Constrained Systems" (2023). All Works. 5683.
Indexed in Scopus