Performance of security options for message protocols: A comparative analysis
We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by sele...
Gespeichert in:
Veröffentlicht in: | International journal of network management 2024-09, Vol.34 (5), p.n/a |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | n/a |
---|---|
container_issue | 5 |
container_start_page | |
container_title | International journal of network management |
container_volume | 34 |
creator | Reis Bezerra, Wesley Koch, Fernando Becker Westphall, Carlos |
description | We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by selecting the appropriate transmission technology for each configuration, considering the variations in sizing, installation, sensor profile, distribution, security, networking, and locality. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to generate datasets relevant to research and compare the results in terms of performance, resource utilization, security, and resilience—focused on authentication process. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.
We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to compare the results in different terms. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations. |
doi_str_mv | 10.1002/nem.2274 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3129202054</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3129202054</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2544-6bd76465919d97e891a4fafa2cd3abe6781e880648e6137c595f16fe8592997d3</originalsourceid><addsrcrecordid>eNp10EFLwzAUB_AgCs4p-BECXrx0JmnSNN7G2FTY1IOeQ5a-SEfb1KRT-u3NnFdP78H78fjzR-iakhklhN110M4Yk_wETShRKqNUkdPDLkQmKS_P0UWMO5IoVXKCNq8QnA-t6Sxg73AEuw_1MGLfD7XvIk5H3EKM5gNwH_zgrW_iPZ5j69veBDPUX4BNZ5ox1vESnTnTRLj6m1P0vlq-LR6z9cvD02K-ziwTnGfFtpIFL4SiqlISSkUNd8YZZqvcbKGQJYWyJAUvoaC5tEIJRwsHpVBMKVnlU3Rz_JsSfe4hDnrn9yGFiDqnTDHCiOBJ3R6VDT7GAE73oW5NGDUl-lCWTmXpQ1mJZkf6XTcw_uv083Lz638An8hqkQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3129202054</pqid></control><display><type>article</type><title>Performance of security options for message protocols: A comparative analysis</title><source>Access via Wiley Online Library</source><creator>Reis Bezerra, Wesley ; Koch, Fernando ; Becker Westphall, Carlos</creator><creatorcontrib>Reis Bezerra, Wesley ; Koch, Fernando ; Becker Westphall, Carlos</creatorcontrib><description>We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by selecting the appropriate transmission technology for each configuration, considering the variations in sizing, installation, sensor profile, distribution, security, networking, and locality. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to generate datasets relevant to research and compare the results in terms of performance, resource utilization, security, and resilience—focused on authentication process. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.
We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to compare the results in different terms. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.</description><identifier>ISSN: 1055-7148</identifier><identifier>EISSN: 1099-1190</identifier><identifier>DOI: 10.1002/nem.2274</identifier><language>eng</language><publisher>Chichester: Wiley Subscription Services, Inc</publisher><subject>authentication ; Best practice ; Configuration management ; Cybersecurity ; Edge computing ; identity management ; Internet of Things ; IoT ; LPWAN ; message protocol ; Resource utilization</subject><ispartof>International journal of network management, 2024-09, Vol.34 (5), p.n/a</ispartof><rights>2024 John Wiley & Sons Ltd.</rights><rights>2024 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c2544-6bd76465919d97e891a4fafa2cd3abe6781e880648e6137c595f16fe8592997d3</cites><orcidid>0000-0002-6098-7172</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fnem.2274$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fnem.2274$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,780,784,1417,27924,27925,45574,45575</link.rule.ids></links><search><creatorcontrib>Reis Bezerra, Wesley</creatorcontrib><creatorcontrib>Koch, Fernando</creatorcontrib><creatorcontrib>Becker Westphall, Carlos</creatorcontrib><title>Performance of security options for message protocols: A comparative analysis</title><title>International journal of network management</title><description>We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by selecting the appropriate transmission technology for each configuration, considering the variations in sizing, installation, sensor profile, distribution, security, networking, and locality. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to generate datasets relevant to research and compare the results in terms of performance, resource utilization, security, and resilience—focused on authentication process. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.
We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to compare the results in different terms. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.</description><subject>authentication</subject><subject>Best practice</subject><subject>Configuration management</subject><subject>Cybersecurity</subject><subject>Edge computing</subject><subject>identity management</subject><subject>Internet of Things</subject><subject>IoT</subject><subject>LPWAN</subject><subject>message protocol</subject><subject>Resource utilization</subject><issn>1055-7148</issn><issn>1099-1190</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp10EFLwzAUB_AgCs4p-BECXrx0JmnSNN7G2FTY1IOeQ5a-SEfb1KRT-u3NnFdP78H78fjzR-iakhklhN110M4Yk_wETShRKqNUkdPDLkQmKS_P0UWMO5IoVXKCNq8QnA-t6Sxg73AEuw_1MGLfD7XvIk5H3EKM5gNwH_zgrW_iPZ5j69veBDPUX4BNZ5ox1vESnTnTRLj6m1P0vlq-LR6z9cvD02K-ziwTnGfFtpIFL4SiqlISSkUNd8YZZqvcbKGQJYWyJAUvoaC5tEIJRwsHpVBMKVnlU3Rz_JsSfe4hDnrn9yGFiDqnTDHCiOBJ3R6VDT7GAE73oW5NGDUl-lCWTmXpQ1mJZkf6XTcw_uv083Lz638An8hqkQ</recordid><startdate>202409</startdate><enddate>202409</enddate><creator>Reis Bezerra, Wesley</creator><creator>Koch, Fernando</creator><creator>Becker Westphall, Carlos</creator><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-6098-7172</orcidid></search><sort><creationdate>202409</creationdate><title>Performance of security options for message protocols: A comparative analysis</title><author>Reis Bezerra, Wesley ; Koch, Fernando ; Becker Westphall, Carlos</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2544-6bd76465919d97e891a4fafa2cd3abe6781e880648e6137c595f16fe8592997d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>authentication</topic><topic>Best practice</topic><topic>Configuration management</topic><topic>Cybersecurity</topic><topic>Edge computing</topic><topic>identity management</topic><topic>Internet of Things</topic><topic>IoT</topic><topic>LPWAN</topic><topic>message protocol</topic><topic>Resource utilization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Reis Bezerra, Wesley</creatorcontrib><creatorcontrib>Koch, Fernando</creatorcontrib><creatorcontrib>Becker Westphall, Carlos</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of network management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Reis Bezerra, Wesley</au><au>Koch, Fernando</au><au>Becker Westphall, Carlos</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Performance of security options for message protocols: A comparative analysis</atitle><jtitle>International journal of network management</jtitle><date>2024-09</date><risdate>2024</risdate><volume>34</volume><issue>5</issue><epage>n/a</epage><issn>1055-7148</issn><eissn>1099-1190</eissn><abstract>We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by selecting the appropriate transmission technology for each configuration, considering the variations in sizing, installation, sensor profile, distribution, security, networking, and locality. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to generate datasets relevant to research and compare the results in terms of performance, resource utilization, security, and resilience—focused on authentication process. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.
We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to compare the results in different terms. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.</abstract><cop>Chichester</cop><pub>Wiley Subscription Services, Inc</pub><doi>10.1002/nem.2274</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0002-6098-7172</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1055-7148 |
ispartof | International journal of network management, 2024-09, Vol.34 (5), p.n/a |
issn | 1055-7148 1099-1190 |
language | eng |
recordid | cdi_proquest_journals_3129202054 |
source | Access via Wiley Online Library |
subjects | authentication Best practice Configuration management Cybersecurity Edge computing identity management Internet of Things IoT LPWAN message protocol Resource utilization |
title | Performance of security options for message protocols: A comparative analysis |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T07%3A59%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Performance%20of%20security%20options%20for%20message%20protocols:%20A%20comparative%20analysis&rft.jtitle=International%20journal%20of%20network%20management&rft.au=Reis%20Bezerra,%20Wesley&rft.date=2024-09&rft.volume=34&rft.issue=5&rft.epage=n/a&rft.issn=1055-7148&rft.eissn=1099-1190&rft_id=info:doi/10.1002/nem.2274&rft_dat=%3Cproquest_cross%3E3129202054%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3129202054&rft_id=info:pmid/&rfr_iscdi=true |