A Comparative Qualitative and Quantitative Analysis of the Performance of Security Options for Message Protocols: Fog Computing Scenario

10/24/2022
by   Wesley dos Reis Bezerra, et al.
0

We analyze the utilization of publish-subscribe protocols in IoT and Fog Computing and challenges around security configuration, performance, and qualitative characteristics. Such problems with security configuration lead to significant disruptions and high operation costs. Yet, These issues can be prevented by selecting the appropriate transmission technology for each configuration, considering the variations in sizing, installation, sensor profile, distribution, security, networking, and locality. This work aims to present a comparative qualitative and quantitative analysis around diverse configurations, focusing on Smart Agriculture's scenario and specifically the case of fish-farming. As result, we applied a data generation workbench to create datasets of relevant research data and compared the results in terms of performance, resource utilization, security, and resilience. Also, we provide a qualitative analysis of use case scenarios for the quantitative data produced. As a contribution, this robust analysis provides a blueprint to decision support for Fog Computing engineers analyzing the best protocol to apply in various configurations.

READ FULL TEXT
research
10/09/2019

Fog Computing as Privacy Enabler

Despite broad discussions on privacy challenges arising from fog computi...
research
08/24/2023

Security Assessment and Hardening of Fog Computing Systems

In recent years, there has been a shift in computing architectures, movi...
research
01/15/2019

Blockchain enabled fog structure to provide data security in IoT applications

IoT provides services by connecting smart devices to the Internet, and e...
research
09/27/2018

Security Implications of Fog Computing on the Internet of Things

Recently, the use of IoT devices and sensors has been rapidly increased ...
research
12/25/2017

SoA-Fog: Secure Service-Oriented Edge Computing Architecture for Smart Health Big Data Analytics

The smart health paradigms employ Internet-connected wearables for telem...
research
06/20/2018

Adaptive Fog Configuration for the Industrial Internet of Things

Industrial Fog computing deploys various industrial services, such as au...
research
09/24/2018

The Struggle is Real: Analyzing Ground Truth Data of TLS (Mis-)Configurations

As of today, TLS is the most commonly used protocol to protect communica...

Please sign up or login with your details

Forgot password? Click here to reset