A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures
Author:
Gentile Antonio Francesco1ORCID, Macrì Davide1ORCID, Carnì Domenico Luca2ORCID, Greco Emilio1ORCID, Lamonaca Francesco23ORCID
Affiliation:
1. Institute for High-Performance Computing and Networking (ICAR), National Research Council of Italy (CNR), Via P. Bucci 8/9C, 87036 Rende, Italy 2. Department of Computer Engineering, Modeling, Electonics and Systems Engineering (DIMES), University of Calabria, Via P. Bucci 39/c, 87036 Rende, Italy 3. Institute of Nanotechnology (CNRNANOTEC), National Research Council of Italy (CNR), Via P. Bucci 31C, 87036 Rende, Italy
Abstract
The widespread adoption of Internet of Things (IoT) devices in home, industrial, and business environments has made available the deployment of innovative distributed measurement systems (DMS). This paper takes into account constrained hardware and a security-oriented virtual local area network (VLAN) approach that utilizes local message queuing telemetry transport (MQTT) brokers, transport layer security (TLS) tunnels for local sensor data, and secure socket layer (SSL) tunnels to transmit TLS-encrypted data to a cloud-based central broker. On the other hand, the recent literature has shown a correlated exponential increase in cyber attacks, mainly devoted to destroying critical infrastructure and creating hazards or retrieving sensitive data about individuals, industrial or business companies, and many other entities. Much progress has been made to develop security protocols and guarantee quality of service (QoS), but they are prone to reducing the network throughput. From a measurement science perspective, lower throughput can lead to a reduced frequency with which the phenomena can be observed, generating, again, misevaluation. This paper does not give a new approach to protect measurement data but tests the network performance of the typically used ones that can run on constrained hardware. This is a more general scenario typical for IoT-based DMS. The proposal takes into account a security-oriented VLAN approach for hardware-constrained solutions. Since it is a worst-case scenario, this permits the generalization of the achieved results. In particular, in the paper, all OpenSSL cipher suites are considered for compatibility with the Mosquitto server. The most used key metrics are evaluated for each cipher suite and QoS level, such as the total ratio, total runtime, average runtime, message time, average bandwidth, and total bandwidth. Numerical and experimental results confirm the proposal’s effectiveness in foreseeing the minimum network throughput concerning the selected QoS and security. Operating systems yield diverse performance metric values based on various configurations. The primary objective is identifying algorithms to ensure suitable data transmission and encryption ratios. Another aim is to explore algorithms that ensure wider compatibility with existing infrastructures supporting MQTT technology, facilitating secure connections for geographically dispersed DMS IoT networks, particularly in challenging environments like suburban or rural areas. Additionally, leveraging open firmware on constrained devices compatible with various MQTT protocols enables the customization of the software components, a crucial necessity for DMS.
Funder
European Union—NextGenerationEU—National Recovery and Resilience Plan PNRR project Tech4You, Spoke4G4PP1, CUP
Reference49 articles.
1. On the Use of LoRaWAN and Cloud Platforms for Diversification of Mobility-as-a-Service Infrastructure in Smart City Scenarios;Ferrari;IEEE Trans. Instrum. Meas.,2022 2. Gentile, A.F., Macrì, D., Greco, E., and Forestiero, A. (2023, January 13–15). Privacy-Oriented Architecture for Building Automatic Voice Interaction Systems in Smart Environments in Disaster Recovery Scenarios. Proceedings of the International Conference on Information and Communication Technologies for Disaster Management, ICT-DM 2023, Cosenza, Italy. 3. Cicirelli, F., Guerrieri, A., Vinci, A., and Spezzano, G. (2023). IoT Edge Solutions for Cognitive Buildings—Technology, Communications and Computing, Springer. 4. Verde, M., Matera, R., Bonavolonta, F., Lamonaca, F., Angrisani, L., Fezza, C., Borzacchiello, L., Cotticelli, A., and Neglia, G. (2023). Comparative performance analysis between two different generations of an automatic milking system. Acta Imeko, 12. 5. Lamonaca, F., and Carni, D. (2023). Synergizing Measurement Science and Artificial Intelligence in Smart Agriculture, Institute of Electrical and Electronics Engineers Inc.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Real Network Performance Analysis Testbed for Encrypted MQTT in DMS;2024 IEEE International Workshop on Metrology for Living Environment (MetroLivEnv);2024-06-12
|
|