3 research outputs found

    Modeling and Evaluation of the Internet of Things Communication Protocols in Security Constrained Systems

    Get PDF
    As the term implies, the main focus when designing security constrained systems is ensuring that the defined constraints are strictly adhered to. Developers of such systems must identify a balance between providing user and data security while also ensuring that the service\u27s functionality is good. Extra security constraints can have a direct impact on other system aspects such as the communication between different devices especially in the emerging networking systems such as the Internet of Things and edge networking. In this work, we model and evaluate the main Internet of Things communication protocols including AMQP, CoAP, MQTT and XMPP in a security constrained system. We consider different evaluation metrics such the network utilization and success rate. Different protocols will react differently to the constrained security system but the increase in the communication latency is the common factor for all protocols
    corecore