Performance of security options for message protocols: A comparative analysis

We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by sele...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of network management 2024-09, Vol.34 (5), p.n/a
Hauptverfasser: Reis Bezerra, Wesley, Koch, Fernando, Becker Westphall, Carlos
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page n/a
container_issue 5
container_start_page
container_title International journal of network management
container_volume 34
creator Reis Bezerra, Wesley
Koch, Fernando
Becker Westphall, Carlos
description We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by selecting the appropriate transmission technology for each configuration, considering the variations in sizing, installation, sensor profile, distribution, security, networking, and locality. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to generate datasets relevant to research and compare the results in terms of performance, resource utilization, security, and resilience—focused on authentication process. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to compare the results in different terms. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.
doi_str_mv 10.1002/nem.2274
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3129202054</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3129202054</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2544-6bd76465919d97e891a4fafa2cd3abe6781e880648e6137c595f16fe8592997d3</originalsourceid><addsrcrecordid>eNp10EFLwzAUB_AgCs4p-BECXrx0JmnSNN7G2FTY1IOeQ5a-SEfb1KRT-u3NnFdP78H78fjzR-iakhklhN110M4Yk_wETShRKqNUkdPDLkQmKS_P0UWMO5IoVXKCNq8QnA-t6Sxg73AEuw_1MGLfD7XvIk5H3EKM5gNwH_zgrW_iPZ5j69veBDPUX4BNZ5ox1vESnTnTRLj6m1P0vlq-LR6z9cvD02K-ziwTnGfFtpIFL4SiqlISSkUNd8YZZqvcbKGQJYWyJAUvoaC5tEIJRwsHpVBMKVnlU3Rz_JsSfe4hDnrn9yGFiDqnTDHCiOBJ3R6VDT7GAE73oW5NGDUl-lCWTmXpQ1mJZkf6XTcw_uv083Lz638An8hqkQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3129202054</pqid></control><display><type>article</type><title>Performance of security options for message protocols: A comparative analysis</title><source>Access via Wiley Online Library</source><creator>Reis Bezerra, Wesley ; Koch, Fernando ; Becker Westphall, Carlos</creator><creatorcontrib>Reis Bezerra, Wesley ; Koch, Fernando ; Becker Westphall, Carlos</creatorcontrib><description>We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by selecting the appropriate transmission technology for each configuration, considering the variations in sizing, installation, sensor profile, distribution, security, networking, and locality. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to generate datasets relevant to research and compare the results in terms of performance, resource utilization, security, and resilience—focused on authentication process. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to compare the results in different terms. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.</description><identifier>ISSN: 1055-7148</identifier><identifier>EISSN: 1099-1190</identifier><identifier>DOI: 10.1002/nem.2274</identifier><language>eng</language><publisher>Chichester: Wiley Subscription Services, Inc</publisher><subject>authentication ; Best practice ; Configuration management ; Cybersecurity ; Edge computing ; identity management ; Internet of Things ; IoT ; LPWAN ; message protocol ; Resource utilization</subject><ispartof>International journal of network management, 2024-09, Vol.34 (5), p.n/a</ispartof><rights>2024 John Wiley &amp; Sons Ltd.</rights><rights>2024 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c2544-6bd76465919d97e891a4fafa2cd3abe6781e880648e6137c595f16fe8592997d3</cites><orcidid>0000-0002-6098-7172</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fnem.2274$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fnem.2274$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,780,784,1417,27924,27925,45574,45575</link.rule.ids></links><search><creatorcontrib>Reis Bezerra, Wesley</creatorcontrib><creatorcontrib>Koch, Fernando</creatorcontrib><creatorcontrib>Becker Westphall, Carlos</creatorcontrib><title>Performance of security options for message protocols: A comparative analysis</title><title>International journal of network management</title><description>We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by selecting the appropriate transmission technology for each configuration, considering the variations in sizing, installation, sensor profile, distribution, security, networking, and locality. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to generate datasets relevant to research and compare the results in terms of performance, resource utilization, security, and resilience—focused on authentication process. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to compare the results in different terms. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.</description><subject>authentication</subject><subject>Best practice</subject><subject>Configuration management</subject><subject>Cybersecurity</subject><subject>Edge computing</subject><subject>identity management</subject><subject>Internet of Things</subject><subject>IoT</subject><subject>LPWAN</subject><subject>message protocol</subject><subject>Resource utilization</subject><issn>1055-7148</issn><issn>1099-1190</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp10EFLwzAUB_AgCs4p-BECXrx0JmnSNN7G2FTY1IOeQ5a-SEfb1KRT-u3NnFdP78H78fjzR-iakhklhN110M4Yk_wETShRKqNUkdPDLkQmKS_P0UWMO5IoVXKCNq8QnA-t6Sxg73AEuw_1MGLfD7XvIk5H3EKM5gNwH_zgrW_iPZ5j69veBDPUX4BNZ5ox1vESnTnTRLj6m1P0vlq-LR6z9cvD02K-ziwTnGfFtpIFL4SiqlISSkUNd8YZZqvcbKGQJYWyJAUvoaC5tEIJRwsHpVBMKVnlU3Rz_JsSfe4hDnrn9yGFiDqnTDHCiOBJ3R6VDT7GAE73oW5NGDUl-lCWTmXpQ1mJZkf6XTcw_uv083Lz638An8hqkQ</recordid><startdate>202409</startdate><enddate>202409</enddate><creator>Reis Bezerra, Wesley</creator><creator>Koch, Fernando</creator><creator>Becker Westphall, Carlos</creator><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-6098-7172</orcidid></search><sort><creationdate>202409</creationdate><title>Performance of security options for message protocols: A comparative analysis</title><author>Reis Bezerra, Wesley ; Koch, Fernando ; Becker Westphall, Carlos</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2544-6bd76465919d97e891a4fafa2cd3abe6781e880648e6137c595f16fe8592997d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>authentication</topic><topic>Best practice</topic><topic>Configuration management</topic><topic>Cybersecurity</topic><topic>Edge computing</topic><topic>identity management</topic><topic>Internet of Things</topic><topic>IoT</topic><topic>LPWAN</topic><topic>message protocol</topic><topic>Resource utilization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Reis Bezerra, Wesley</creatorcontrib><creatorcontrib>Koch, Fernando</creatorcontrib><creatorcontrib>Becker Westphall, Carlos</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of network management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Reis Bezerra, Wesley</au><au>Koch, Fernando</au><au>Becker Westphall, Carlos</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Performance of security options for message protocols: A comparative analysis</atitle><jtitle>International journal of network management</jtitle><date>2024-09</date><risdate>2024</risdate><volume>34</volume><issue>5</issue><epage>n/a</epage><issn>1055-7148</issn><eissn>1099-1190</eissn><abstract>We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by selecting the appropriate transmission technology for each configuration, considering the variations in sizing, installation, sensor profile, distribution, security, networking, and locality. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to generate datasets relevant to research and compare the results in terms of performance, resource utilization, security, and resilience—focused on authentication process. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to compare the results in different terms. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.</abstract><cop>Chichester</cop><pub>Wiley Subscription Services, Inc</pub><doi>10.1002/nem.2274</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0002-6098-7172</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1055-7148
ispartof International journal of network management, 2024-09, Vol.34 (5), p.n/a
issn 1055-7148
1099-1190
language eng
recordid cdi_proquest_journals_3129202054
source Access via Wiley Online Library
subjects authentication
Best practice
Configuration management
Cybersecurity
Edge computing
identity management
Internet of Things
IoT
LPWAN
message protocol
Resource utilization
title Performance of security options for message protocols: A comparative analysis
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T07%3A59%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Performance%20of%20security%20options%20for%20message%20protocols:%20A%20comparative%20analysis&rft.jtitle=International%20journal%20of%20network%20management&rft.au=Reis%20Bezerra,%20Wesley&rft.date=2024-09&rft.volume=34&rft.issue=5&rft.epage=n/a&rft.issn=1055-7148&rft.eissn=1099-1190&rft_id=info:doi/10.1002/nem.2274&rft_dat=%3Cproquest_cross%3E3129202054%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3129202054&rft_id=info:pmid/&rfr_iscdi=true