Performance Analysis of the Hybrid MQTT/UMA and Restful IoT Security Model
Open Access
- 1 January 2021
- journal article
- research article
- Published by Scientific Research Publishing, Inc. in Advances in Internet of Things
- Vol. 11 (01), 26-41
- https://doi.org/10.4236/ait.2021.111003
Abstract
Internet of Things (IoT) environments are being deployed all over the globe. They have the potential to form solutions to applications, from small scale applications to national and international ones. Therefore, scalability, performance, and security form a triangle of requirements that must be carefully set. Furthermore, IoT applications require higher security standards. A previously proposed IoT application framework with a security embedded structure using the integration between message queue telemetry transport (MQTT) and user-managed access (UMA) is analyzed in this work. The performance analysis of the model is presented. Comparing the model with existing models and different design structures shows that the model presented in this work is promising for a functioning IoT design model with security. The results and analysis showed that the built-in security model had performed better than models with other frameworks, especially with fog implementation.Keywords
This publication has 15 references indexed in Scilit:
- Live Data Analytics With Collaborative Edge and Cloud Processing in Wireless IoT NetworksIEEE Access, 2017
- Transfer protocols of tiny data blocks in IoT and their performance evaluationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Big data caching for networking: moving from cloud to edgeIEEE Communications Magazine, 2016
- Comparison with HTTP and MQTT on required network resources for IoTPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- OAuth 2.0Published by Springer Science and Business Media LLC ,2014
- IoT and cloud convergence: Opportunities and challengesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- The OAuth 2.0 Authorization Framework: Bearer Token UsagePublished by RFC Editor ,2012
- SenaaS: An event-driven sensor virtualization approach for Internet of Things cloudPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Sensors meet the Cloud: Planetary-scale distributed sensing and decision makingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Home Automation with ZigBeeLecture Notes in Computer Science, 2008