Performance analysis for devices in Internet of Things (IoT) environments is an important consideration, especially with their increasing integration in technological solutions, worldwide. The Single Board Computers (SBCs) of the Raspberry Pi Foundation have been widely accepted by the community, and hence, they have been incorporated in numerous IoT projects. To ease their integration, it is essential to assess their network performance. In this paper, we made an empirical performance evaluation of one of the most popular network protocols for IoT environments, named the Message Queuing Telemetry Transport (MQTT) protocol, on Raspberry Pi. To do so, we set up two different testbeds scenarios and assessed the performance with benchmarks. At the software level, we focused on Mosquitto, a popular open-source MQTT broker implementation and client library. Our principal metric is the transmission time, but we also investigated the throughput. In our experiments, we varied several parameters, such as the size of the payload of the published messages, the WiFi bandwidth, the QoS level, the security level (MQTT vs. MQTT with TLS), and the hardware for the clients and broker. We focus mainly on packet sizes ranging from 100 to 25,000 bytes. We also investigate how these low-cost devices handle a TCP SYN flood attack. In the research work presented within this paper, we aim to guide developers, researchers, network administrators, and hobbyists who plan to use these low-cost devices in an MQTT or IoT network by showing the performance that they should expect according to different Raspberry Pi options.
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Performance Evaluation of Soft RoCE over 1 Gigabit EthernetIOSR Journals
Abstract: Ethernet is most influential & widely used technology in the world. With the growing demand of low
latency & high throughput technologies like InfiniBand and RoCE have evolved with unique features viz. RDMA
(Remote Direct Memory Access). RDMA is an effective technology, which is used for reducing system load &
improves the performance. InfiniBand is a well known technology, which provides high-bandwidth and lowlatency
and makes optimal use of in-built features like RDMA. With the rapid evolution of InfiniBand technology
and Ethernet lacking the RDMA and zero copy protocol, the Ethernet community has came out with a new
enhancements that bridges the gap between InfiniBand and Ethernet. By adding the RDMA and zero copy
protocol to the Ethernet a new networking technology is evolved called RDMA over Converged Ethernet
(RoCE). RoCE is a standard released by the IBTA standardization body to define RDMA protocol over
Ethernet. With the emergence of lossless Ethernet, RoCE uses InfiniBand efficient transport to provide the
platform for deploying RDMA technology in mainstream data centres over 10GigE, 40GigE and beyond. RoCE
provide all of the InfiniBand benefits transport benefits and well established RDMA ecosystem combined with
converged Ethernet. In this paper, we evaluate the heterogeneous Linux cluster, having multi nodes with fast
interconnects i.e. gigabit Ethernet & Soft RoCE. This paper presents the heterogeneous Linux cluster
configuration & evaluates its performance using Intel’s MPI Benchmarks. Our result shows that Soft RoCE is
performing better than Ethernet in various performance metrics like bandwidth, latency & throughput.
Keywords: Ethernet, InfiniBand, MPI, RoCE, RDMA, Soft RoCE
This document discusses the deployment of a software-defined network testbed on the cloud. It begins with an introduction to software-defined networking and its advantages over traditional networking. It then discusses the design and implementation of an SDN testbed using OpenDaylight as the SDN controller, Mininet as the network emulator, and Wireshark for network traffic analysis. Various network topologies are implemented in Mininet including linear, single, tree and torus topologies. OpenFlow messages are captured to understand communication between the controller and switches. Network performance is evaluated by generating and measuring traffic across the testbed. The goal is to demonstrate and analyze the SDN concept in a practical virtualized environment.
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
The quality of service is a need in recent computer network developments. The present paper evaluates some characteristics in a proposed network topology such as dropped packets and bandwidth use, using two traffic sources, firstly a VoIP source over an UDP agent, then a CBR traffic source over an UDP agent as well as the previous one. Two possible configurations are proposed, implementing both of them in the Network Simulator, and implementing in one of them differentiated services to compare the results. Statistics results are shown, in both cases showing the accumulative dropped packet number and the throughput in the link, obtaining a reducer number of dropped packets in the stage with differentiated services, and an improvement in the bandwidth use.
A Study of Protocols for Grid Computing EnvironmentCSCJournals
This document summarizes a study of communication protocols for grid computing environments. It discusses the limitations of TCP for high bandwidth-delay networks and the need for new protocols to efficiently transfer bulk data across long distances. It categorizes various protocols that have been proposed into TCP-based, UDP-based, and application-layer protocols and evaluates them based on their operation, congestion control, throughput, fairness and other factors. The document also outlines issues in designing high performance protocols for grid computing and reviews several TCP variants and reliable transport protocols developed to improve performance over high-speed networks.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
This summary provides the key details from the document in 3 sentences:
The document proposes an efficient IoT-based sensor data analysis system in wireless sensor networks using cloud computing. It utilizes the Greedy Perimeter Stateless Routing (GPSR) algorithm to route sensor data to cloud storage. The system is evaluated through simulations analyzing parameters like packet delivery ratio, energy consumption, and delay.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Performance Evaluation of Soft RoCE over 1 Gigabit EthernetIOSR Journals
Abstract: Ethernet is most influential & widely used technology in the world. With the growing demand of low
latency & high throughput technologies like InfiniBand and RoCE have evolved with unique features viz. RDMA
(Remote Direct Memory Access). RDMA is an effective technology, which is used for reducing system load &
improves the performance. InfiniBand is a well known technology, which provides high-bandwidth and lowlatency
and makes optimal use of in-built features like RDMA. With the rapid evolution of InfiniBand technology
and Ethernet lacking the RDMA and zero copy protocol, the Ethernet community has came out with a new
enhancements that bridges the gap between InfiniBand and Ethernet. By adding the RDMA and zero copy
protocol to the Ethernet a new networking technology is evolved called RDMA over Converged Ethernet
(RoCE). RoCE is a standard released by the IBTA standardization body to define RDMA protocol over
Ethernet. With the emergence of lossless Ethernet, RoCE uses InfiniBand efficient transport to provide the
platform for deploying RDMA technology in mainstream data centres over 10GigE, 40GigE and beyond. RoCE
provide all of the InfiniBand benefits transport benefits and well established RDMA ecosystem combined with
converged Ethernet. In this paper, we evaluate the heterogeneous Linux cluster, having multi nodes with fast
interconnects i.e. gigabit Ethernet & Soft RoCE. This paper presents the heterogeneous Linux cluster
configuration & evaluates its performance using Intel’s MPI Benchmarks. Our result shows that Soft RoCE is
performing better than Ethernet in various performance metrics like bandwidth, latency & throughput.
Keywords: Ethernet, InfiniBand, MPI, RoCE, RDMA, Soft RoCE
This document discusses the deployment of a software-defined network testbed on the cloud. It begins with an introduction to software-defined networking and its advantages over traditional networking. It then discusses the design and implementation of an SDN testbed using OpenDaylight as the SDN controller, Mininet as the network emulator, and Wireshark for network traffic analysis. Various network topologies are implemented in Mininet including linear, single, tree and torus topologies. OpenFlow messages are captured to understand communication between the controller and switches. Network performance is evaluated by generating and measuring traffic across the testbed. The goal is to demonstrate and analyze the SDN concept in a practical virtualized environment.
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
The quality of service is a need in recent computer network developments. The present paper evaluates some characteristics in a proposed network topology such as dropped packets and bandwidth use, using two traffic sources, firstly a VoIP source over an UDP agent, then a CBR traffic source over an UDP agent as well as the previous one. Two possible configurations are proposed, implementing both of them in the Network Simulator, and implementing in one of them differentiated services to compare the results. Statistics results are shown, in both cases showing the accumulative dropped packet number and the throughput in the link, obtaining a reducer number of dropped packets in the stage with differentiated services, and an improvement in the bandwidth use.
A Study of Protocols for Grid Computing EnvironmentCSCJournals
This document summarizes a study of communication protocols for grid computing environments. It discusses the limitations of TCP for high bandwidth-delay networks and the need for new protocols to efficiently transfer bulk data across long distances. It categorizes various protocols that have been proposed into TCP-based, UDP-based, and application-layer protocols and evaluates them based on their operation, congestion control, throughput, fairness and other factors. The document also outlines issues in designing high performance protocols for grid computing and reviews several TCP variants and reliable transport protocols developed to improve performance over high-speed networks.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
This summary provides the key details from the document in 3 sentences:
The document proposes an efficient IoT-based sensor data analysis system in wireless sensor networks using cloud computing. It utilizes the Greedy Perimeter Stateless Routing (GPSR) algorithm to route sensor data to cloud storage. The system is evaluated through simulations analyzing parameters like packet delivery ratio, energy consumption, and delay.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document discusses using network coding with multi-generation mixing to improve data recovery in cloud storage systems. It provides a literature review of several papers that use techniques like Maximum Distance Separation codes, random linear network coding, and instantly decodable network coding. The proposed work develops an architecture that uses multi-generation mixing and the DODEX+ encoding scheme to encode and retrieve data across multiple mobile clients and cloud storage. This aims to provide more efficient and reliable data delivery over wireless mesh networks. Tools like Amazon S3 and the NS2 network simulator are used to implement and test the proposed system.
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONcseij
This is era of information blast. A huge quantity of information is pouring in from various sources. The
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
The document discusses open source grid middleware packages. It describes how grid middleware lies between grid hardware and software, providing services like remote process management, storage allocation, resource allocation, and security. It then summarizes several popular open source middleware packages: BIONIC was developed for the SETI@HOME project; UNICORN provides a Java-based integrated grid computing environment; GLOBUS is a widely used toolkit developed by the Globus Alliance; and Condor-G builds a high-throughput computing environment from Condor.
Traffic management inside software-defined data centre networkingjournalBEEI
In recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configurations, efficient enhancements and further elasticity to handle massive network schemes. In this paper the opendaylight controller (ODL-CO) with new version OF 1.4 protocol and the ant colony optimization algorithm is proposed to test the performance of the LB function using IPv6 in a SDN-DC network by studying the throughput, data transfer, bandwidth and average delay performance of the networking parameters before and after use of the LB algorithm. As a result, after applying the LB, the throughput, data transfer and bandwidth performance increased, while the average delay decreased.
SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...IJNSA Journal
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these protocols are TCP protocol variants, which have demonstrated better performance in simulation and several limited network experiments but have limited practical applications because of implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., in grid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based Data Transport Protocol) for cloud /grid computing. Despite the promising development of protocols like UDT, what remains to be a major challenge that current and future network designers face is to achieve
survivability and security of data and networks. Our previous research surveyed various security methodologies which led to the development of a framework for UDT. In this paper we present lowerlevel security by introducing an Identity Packet (IP) and Authentication Option (AO) for UDT.
Efficient End-to-End Secure Key Management Protocol for Internet of Things IJECEIAES
Internet of things (IoT) has described a futurevision of internetwhere users, computing system, and everyday objects possessing sensing and actuating capabilities are part of distributed applications and required to support standard internet communication with more powerful device or internet hosts. This vision necessitates the security mechanisms for end-to-end communication. A key management protocol is critical to ensuring the secure exchange of data between interconnecting entities, but due to the nature of this communication system where a high resource constrained node may be communicating with node with high energy makes the application of existing key management protocols impossible. In this paper, we propose a new lightweight key management protocol that allows the constrained node in 6loWPAN network to transmit captured data to internet host in secure channel. This protocol is based on cooperation of selected 6loWPAN routers to participate in computation of highly consuming cryptographic primitives. Our protocol is assessed with AVISPA tool, the results show that our scheme ensured security properties.
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets
This document discusses the need for network simulation tools to test telecom network components before they are deployed. It describes the key requirements for building an efficient simulation tool that can accurately model a complex telecom network, including 3G and UMTS networks. Specifically, it discusses the need to generate realistic traffic patterns and loads, model protocols and interfaces, and consider physical layer factors like RF path loss and power control mechanisms. The document provides details on using semi-Markovian models to generate traffic according to different states and distributions. It also outlines the overall architecture of a packet load generator tool to simulate network elements and evaluate their performance under different traffic scenarios.
IDENTIFICATION OF EFFICIENT PEERS IN P2P COMPUTING SYSTEM FOR REAL TIME APPLI...ijp2p
Currently the Peer-to-Peer computing paradigm rises as an economic solution for the large scale
computation problems. However due to the dynamic nature of peers it is very difficult to use this type of
systems for the computations of real time applications. Strict deadline of scientific and real time
applications require predictable performance in such applications. We propose an algorithm to identify the
group of reliable peers, from the available peers on the Internet, for the processing of real time
application’s tasks. The algorithm is based on joint evaluation of peer properties like peer availability,
credibility, computation time and the turnaround time of the peer with respect to the task distributor peer.
Here we also define a method to calculate turnaround time (distance) on task distributor peers at
application level.
IRJET- A Survey on Mobility in RPL for IoT ApplicationsIRJET Journal
This document summarizes a research paper that surveys mobility extensions for the Routing Protocol for Low-Power and Lossy Networks (RPL) in Internet of Things (IoT) applications. It begins by introducing RPL, a routing protocol designed for low-power and lossy networks. It then discusses various proposed methods for extending RPL to support node mobility, including methods that use signal strength to detect mobility and predict new parent nodes, and methods that introduce temporary parents to reduce routing failures during mobility. The document surveys these different RPL mobility extensions and their approaches to handling mobility in low-power and lossy networks.
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the IoT network scenario considered in the work, for the same coding rate and the number of decoding iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large number of decoding iterations and high coding rates.
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration
for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the
IoT network scenario considered in the work, for the same coding rate and the number of decoding
iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective
fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to
polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large
number of decoding iterations and high coding rates.
This document provides a detailed proposal for a research project on LANdroids, which are small autonomous robots that could establish and maintain wireless mesh networks to maximize connectivity and network longevity. The proposal outlines four main technical goals: 1) Identifying exploitable features of indoor radio environments through experiments and data collection. 2) Developing self-forming, self-healing network protocols that are energy aware. 3) Learning combined optimization techniques that operate in real and signal space. 4) Understanding the system architecture that maximizes performance at low cost. The proposal describes the benefits of exploiting radio structures to improve connectivity, challenges in modeling indoor radio environments, and approaches involving radio analysis, gradient-based control, feature learning, and system-level
New generations of applications call for new demands
that are totally different from previous uses of the Internet (e.g.,
cross-layer and network function virtualization), and the existing
networks are not optimized for these new demands due to being
overwhelmed by enormous numbers of external network
protocols. Overlay network technologies aim to respond to such
future network demands. Systems on overlay networks mitigate
this protocol overload by exploiting the unlimited
programmability of the overlay nodes comprising the system.
This paper proposes an overlay node that works as a transparent
proxy server and router for encrypted communication over
overlay networks. This overlay node acts as a virtual switch over
multiple layers of the OSI reference model (the datalink, network, transport, and session layers) using general-purpose components (a personal computer, physical network interface card, and
virtual network interface card, developed using the C language).
The ideas behind this proposal derive from the effectiveness of
software-defined networks and network function virtualization.
Finally, we examine the performance of the overlay node
experimentally and suggest possible designs for future overlay
networks.
Design and development of handover simulator model in 5G cellular network IJECEIAES
In the modern era of technology, the high speed internet is the most important part of human life. The current available network is reckoned to be slow in speed and not be up to snuff for data transmission regarding business applications. The objective of handover mechanism is to reassign the current session handle by internet gadget. The globe needs the next generation high mobility and throughput performance based internet model. This research paper explains the proposed method of design and development for handover based 5G cellular network. In comparison to the traditional method, we propose to control the handovers between base-stations using a concentric method. The channel simulator is applied over the range of the frequencies from 500 MHz to 150 GHz and radio frequency for the 700 MHz bandwidth. The performance of the simulation system is calculated on the basis of handover preparation and completion time regarding base station as well as number of users. From this experiment we achieve the 7.08 ms handover preparation time and 9.98 ms handover completion time. The author recommended the minimum handover completion time, perform the high speed for 5G cellular networks.
A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKSIJNSA Journal
Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network
operators will support ubiquitous connectivity and thus enhances users’ experience. However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes on these various networks. This paper looks at how existing research efforts the HOKEY WG, Mobile Ethernet and 3GPP
frameworks respond to this new environment and provide security mechanisms. The analysis shows that most of the research had realized the openness of the core network and tried to deal with it using different methods. These methods will be extensively analysed in order to highlight their strengths and weaknesses.
This paper compares the performance of two IPv6 transition mechanisms: BD-SIIT and DSTM. The authors implemented BD-SIIT and DSTM in a simulation to evaluate their throughput, end-to-end delay, and round-trip time using various packet sizes. The results showed that DSTM performed better than BD-SIIT when using large IPv6 packets, with lower delay and higher throughput.
This paper compares the performance of two IPv6 transition mechanisms: BD-SIIT and DSTM. The authors implemented BD-SIIT and DSTM in a simulation to evaluate their throughput, end-to-end delay, and round-trip time using various packet sizes. The results showed that DSTM performed better than BD-SIIT when using large IPv6 packets, with lower delay and higher throughput.
PERFORMANCE EVALUATION OF MODBUS TCP IN NORMAL OPERATION AND UNDER A DISTRIBU...IJCNCJournal
Modbus is the de facto standard communication protocol for the industrial world. It was initially designed to be used in serial communications (Modbus RTU/ASCII). However, not long ago, it was adapted to TCP due to the increasing popularity of the TCP/IP stack. Since it was originally designed for controlled serial lines, Modbus does not have any security features. In this paper, we wrote several benchmarks to evaluate the performance of networking devices that run Modbus TCP. Parameters reported by our benchmarks include: (1) response time for Modbus requests, (2) maximum number of requests successfully handled by Modbus devices in a specific amount of time, and (3) monitoring of Modbus devices when suffering a Distributed Denial of Service attack. Due to the growing adoption of IoT technologies, we also selected two widely known and inexpensive development boards (ESP8266 and Raspberry Pi 3 B+/OpenPLC) to realize a performance evaluation of Modbus TCP.
The document discusses the design and implementation of an Internet of Things (IoT) testbed framework with an enhanced performance approach. It aims to create an open IoT testbed that is accessible locally and over the internet for developers to create and test IoT applications and for data engineers to perform analytics on generated data. The testbed will host a range of sensors and be able to interface with microcontrollers like Arduino and Raspberry Pi to account for heterogeneous devices. It seeks to address challenges with proprietary systems like vendor lock-in and provide solutions for insufficient control, lack of concurrency, and diminished reusability.
Message queue telemetry transport and lightweight machine-tomachine comparis...IJECEIAES
Internet of things (IoT) is been advancing over a long period of time in many aspects. For data transfer between IoT devices in a wireless sensor network, various IoT protocols are proposed. Among them, the most widely used are constrained application protocol (CoAP) and message queue telemetry transport (MQTT). Overcoming the limitations of CoAP, lightweight machine-to-machine (LwM2M) framework was designed above CoAP. Recent statistics show that LwM2M and MQTT are the widely used, but LwM2M is still less used than MQTT. Our paper is aimed at comparing both MQTT and LwM2M on the basis of performance efficiency, which will be achieved by sending same file through both protocols to the server. Performance efficiency will be calculated in two scenarios, i) when the client makes a connection with the server i.e., while initial connection and ii) while sending data file to server i.e., while data transfer. Both the protocols will be tested on the number of packets sent and the variability of packet size throughout the session. Experimental results indicated that LwM2M outperformed MQTT in both above scenarios by almost 69%. Therefore, we concluded by stating that LwM2M is best choice over MQTT, but MQTT can still be used in some situations if necessary.
The document discusses using network coding with multi-generation mixing to improve data recovery in cloud storage systems. It provides a literature review of several papers that use techniques like Maximum Distance Separation codes, random linear network coding, and instantly decodable network coding. The proposed work develops an architecture that uses multi-generation mixing and the DODEX+ encoding scheme to encode and retrieve data across multiple mobile clients and cloud storage. This aims to provide more efficient and reliable data delivery over wireless mesh networks. Tools like Amazon S3 and the NS2 network simulator are used to implement and test the proposed system.
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONcseij
This is era of information blast. A huge quantity of information is pouring in from various sources. The
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
The document discusses open source grid middleware packages. It describes how grid middleware lies between grid hardware and software, providing services like remote process management, storage allocation, resource allocation, and security. It then summarizes several popular open source middleware packages: BIONIC was developed for the SETI@HOME project; UNICORN provides a Java-based integrated grid computing environment; GLOBUS is a widely used toolkit developed by the Globus Alliance; and Condor-G builds a high-throughput computing environment from Condor.
Traffic management inside software-defined data centre networkingjournalBEEI
In recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configurations, efficient enhancements and further elasticity to handle massive network schemes. In this paper the opendaylight controller (ODL-CO) with new version OF 1.4 protocol and the ant colony optimization algorithm is proposed to test the performance of the LB function using IPv6 in a SDN-DC network by studying the throughput, data transfer, bandwidth and average delay performance of the networking parameters before and after use of the LB algorithm. As a result, after applying the LB, the throughput, data transfer and bandwidth performance increased, while the average delay decreased.
SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...IJNSA Journal
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these protocols are TCP protocol variants, which have demonstrated better performance in simulation and several limited network experiments but have limited practical applications because of implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., in grid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based Data Transport Protocol) for cloud /grid computing. Despite the promising development of protocols like UDT, what remains to be a major challenge that current and future network designers face is to achieve
survivability and security of data and networks. Our previous research surveyed various security methodologies which led to the development of a framework for UDT. In this paper we present lowerlevel security by introducing an Identity Packet (IP) and Authentication Option (AO) for UDT.
Efficient End-to-End Secure Key Management Protocol for Internet of Things IJECEIAES
Internet of things (IoT) has described a futurevision of internetwhere users, computing system, and everyday objects possessing sensing and actuating capabilities are part of distributed applications and required to support standard internet communication with more powerful device or internet hosts. This vision necessitates the security mechanisms for end-to-end communication. A key management protocol is critical to ensuring the secure exchange of data between interconnecting entities, but due to the nature of this communication system where a high resource constrained node may be communicating with node with high energy makes the application of existing key management protocols impossible. In this paper, we propose a new lightweight key management protocol that allows the constrained node in 6loWPAN network to transmit captured data to internet host in secure channel. This protocol is based on cooperation of selected 6loWPAN routers to participate in computation of highly consuming cryptographic primitives. Our protocol is assessed with AVISPA tool, the results show that our scheme ensured security properties.
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets
This document discusses the need for network simulation tools to test telecom network components before they are deployed. It describes the key requirements for building an efficient simulation tool that can accurately model a complex telecom network, including 3G and UMTS networks. Specifically, it discusses the need to generate realistic traffic patterns and loads, model protocols and interfaces, and consider physical layer factors like RF path loss and power control mechanisms. The document provides details on using semi-Markovian models to generate traffic according to different states and distributions. It also outlines the overall architecture of a packet load generator tool to simulate network elements and evaluate their performance under different traffic scenarios.
IDENTIFICATION OF EFFICIENT PEERS IN P2P COMPUTING SYSTEM FOR REAL TIME APPLI...ijp2p
Currently the Peer-to-Peer computing paradigm rises as an economic solution for the large scale
computation problems. However due to the dynamic nature of peers it is very difficult to use this type of
systems for the computations of real time applications. Strict deadline of scientific and real time
applications require predictable performance in such applications. We propose an algorithm to identify the
group of reliable peers, from the available peers on the Internet, for the processing of real time
application’s tasks. The algorithm is based on joint evaluation of peer properties like peer availability,
credibility, computation time and the turnaround time of the peer with respect to the task distributor peer.
Here we also define a method to calculate turnaround time (distance) on task distributor peers at
application level.
IRJET- A Survey on Mobility in RPL for IoT ApplicationsIRJET Journal
This document summarizes a research paper that surveys mobility extensions for the Routing Protocol for Low-Power and Lossy Networks (RPL) in Internet of Things (IoT) applications. It begins by introducing RPL, a routing protocol designed for low-power and lossy networks. It then discusses various proposed methods for extending RPL to support node mobility, including methods that use signal strength to detect mobility and predict new parent nodes, and methods that introduce temporary parents to reduce routing failures during mobility. The document surveys these different RPL mobility extensions and their approaches to handling mobility in low-power and lossy networks.
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the IoT network scenario considered in the work, for the same coding rate and the number of decoding iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large number of decoding iterations and high coding rates.
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration
for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the
IoT network scenario considered in the work, for the same coding rate and the number of decoding
iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective
fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to
polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large
number of decoding iterations and high coding rates.
This document provides a detailed proposal for a research project on LANdroids, which are small autonomous robots that could establish and maintain wireless mesh networks to maximize connectivity and network longevity. The proposal outlines four main technical goals: 1) Identifying exploitable features of indoor radio environments through experiments and data collection. 2) Developing self-forming, self-healing network protocols that are energy aware. 3) Learning combined optimization techniques that operate in real and signal space. 4) Understanding the system architecture that maximizes performance at low cost. The proposal describes the benefits of exploiting radio structures to improve connectivity, challenges in modeling indoor radio environments, and approaches involving radio analysis, gradient-based control, feature learning, and system-level
New generations of applications call for new demands
that are totally different from previous uses of the Internet (e.g.,
cross-layer and network function virtualization), and the existing
networks are not optimized for these new demands due to being
overwhelmed by enormous numbers of external network
protocols. Overlay network technologies aim to respond to such
future network demands. Systems on overlay networks mitigate
this protocol overload by exploiting the unlimited
programmability of the overlay nodes comprising the system.
This paper proposes an overlay node that works as a transparent
proxy server and router for encrypted communication over
overlay networks. This overlay node acts as a virtual switch over
multiple layers of the OSI reference model (the datalink, network, transport, and session layers) using general-purpose components (a personal computer, physical network interface card, and
virtual network interface card, developed using the C language).
The ideas behind this proposal derive from the effectiveness of
software-defined networks and network function virtualization.
Finally, we examine the performance of the overlay node
experimentally and suggest possible designs for future overlay
networks.
Design and development of handover simulator model in 5G cellular network IJECEIAES
In the modern era of technology, the high speed internet is the most important part of human life. The current available network is reckoned to be slow in speed and not be up to snuff for data transmission regarding business applications. The objective of handover mechanism is to reassign the current session handle by internet gadget. The globe needs the next generation high mobility and throughput performance based internet model. This research paper explains the proposed method of design and development for handover based 5G cellular network. In comparison to the traditional method, we propose to control the handovers between base-stations using a concentric method. The channel simulator is applied over the range of the frequencies from 500 MHz to 150 GHz and radio frequency for the 700 MHz bandwidth. The performance of the simulation system is calculated on the basis of handover preparation and completion time regarding base station as well as number of users. From this experiment we achieve the 7.08 ms handover preparation time and 9.98 ms handover completion time. The author recommended the minimum handover completion time, perform the high speed for 5G cellular networks.
A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKSIJNSA Journal
Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network
operators will support ubiquitous connectivity and thus enhances users’ experience. However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes on these various networks. This paper looks at how existing research efforts the HOKEY WG, Mobile Ethernet and 3GPP
frameworks respond to this new environment and provide security mechanisms. The analysis shows that most of the research had realized the openness of the core network and tried to deal with it using different methods. These methods will be extensively analysed in order to highlight their strengths and weaknesses.
This paper compares the performance of two IPv6 transition mechanisms: BD-SIIT and DSTM. The authors implemented BD-SIIT and DSTM in a simulation to evaluate their throughput, end-to-end delay, and round-trip time using various packet sizes. The results showed that DSTM performed better than BD-SIIT when using large IPv6 packets, with lower delay and higher throughput.
This paper compares the performance of two IPv6 transition mechanisms: BD-SIIT and DSTM. The authors implemented BD-SIIT and DSTM in a simulation to evaluate their throughput, end-to-end delay, and round-trip time using various packet sizes. The results showed that DSTM performed better than BD-SIIT when using large IPv6 packets, with lower delay and higher throughput.
PERFORMANCE EVALUATION OF MODBUS TCP IN NORMAL OPERATION AND UNDER A DISTRIBU...IJCNCJournal
Modbus is the de facto standard communication protocol for the industrial world. It was initially designed to be used in serial communications (Modbus RTU/ASCII). However, not long ago, it was adapted to TCP due to the increasing popularity of the TCP/IP stack. Since it was originally designed for controlled serial lines, Modbus does not have any security features. In this paper, we wrote several benchmarks to evaluate the performance of networking devices that run Modbus TCP. Parameters reported by our benchmarks include: (1) response time for Modbus requests, (2) maximum number of requests successfully handled by Modbus devices in a specific amount of time, and (3) monitoring of Modbus devices when suffering a Distributed Denial of Service attack. Due to the growing adoption of IoT technologies, we also selected two widely known and inexpensive development boards (ESP8266 and Raspberry Pi 3 B+/OpenPLC) to realize a performance evaluation of Modbus TCP.
The document discusses the design and implementation of an Internet of Things (IoT) testbed framework with an enhanced performance approach. It aims to create an open IoT testbed that is accessible locally and over the internet for developers to create and test IoT applications and for data engineers to perform analytics on generated data. The testbed will host a range of sensors and be able to interface with microcontrollers like Arduino and Raspberry Pi to account for heterogeneous devices. It seeks to address challenges with proprietary systems like vendor lock-in and provide solutions for insufficient control, lack of concurrency, and diminished reusability.
Message queue telemetry transport and lightweight machine-tomachine comparis...IJECEIAES
Internet of things (IoT) is been advancing over a long period of time in many aspects. For data transfer between IoT devices in a wireless sensor network, various IoT protocols are proposed. Among them, the most widely used are constrained application protocol (CoAP) and message queue telemetry transport (MQTT). Overcoming the limitations of CoAP, lightweight machine-to-machine (LwM2M) framework was designed above CoAP. Recent statistics show that LwM2M and MQTT are the widely used, but LwM2M is still less used than MQTT. Our paper is aimed at comparing both MQTT and LwM2M on the basis of performance efficiency, which will be achieved by sending same file through both protocols to the server. Performance efficiency will be calculated in two scenarios, i) when the client makes a connection with the server i.e., while initial connection and ii) while sending data file to server i.e., while data transfer. Both the protocols will be tested on the number of packets sent and the variability of packet size throughout the session. Experimental results indicated that LwM2M outperformed MQTT in both above scenarios by almost 69%. Therefore, we concluded by stating that LwM2M is best choice over MQTT, but MQTT can still be used in some situations if necessary.
Efficient addressing schemes for internet of thingsIJECEIAES
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
The document discusses Internet of Things (IoT) network architecture and design. It provides an overview of key aspects of IoT architecture including drivers behind new network architectures, comparing IoT architectures from ETSI and IoT World Forum, and presenting a simplified IoT architecture model. The core IoT functional stack is also explained, covering the things layer, communications network layer, and application and analytics layer. Specific protocols and technologies for each layer are described such as LoRa, CoAP, MQTT, and more.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.
An energy efficiency analysis of lightweight security protocolsHamdamboy
This document analyzes the energy efficiency of lightweight security protocols for machine-to-machine (M2M) and internet of things (IoT) environments. It discusses resource-constrained IoT device protocols like CoAP, MQTT, and XMPP. It also examines security protocols like PANA, LDAP, HIP-DEX, CB-ABE, and XACML. Simulation results are presented comparing the energy efficiency and performance of these protocols. The conclusion discusses plans to simulate protocols over delay tolerant networks and develop underwater variants of CoAP and MQTT with security.
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
This document discusses node selection algorithms for peer-to-peer content sharing over mobile cellular networks that consider downlink bandwidth limitations. It proposes two novel algorithms (DBaT-B and DBaT-N) that select peer nodes to maximize load balancing across cells while meeting the requesting peer's bandwidth needs. DBaT-B selects peers to satisfy the requesting peer's minimum bandwidth requirement, while DBaT-N selects a certain number of peers as requested. Both algorithms first choose peers in the least busy cell to improve load balancing.
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
The document discusses node selection algorithms for peer-to-peer content sharing over mobile cellular networks that consider downlink bandwidth limitations. It proposes two algorithms: DBaT-B selects peers to meet a minimum requested bandwidth sum, prioritizing load balancing across cells. DBaT-N selects a requested number of peers where the bandwidth sum exceeds the downlink limit, again balancing cell loads. Both aim to satisfy bandwidth demands while distributing traffic evenly across the network. The paper then evaluates the algorithms' performance through simulation.
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
This document discusses node selection algorithms for peer-to-peer content sharing over mobile cellular networks that consider downlink bandwidth limitations. It proposes two novel algorithms (DBaT-B and DBaT-N) that select peer nodes to maximize load balancing across cells while meeting the requesting peer's bandwidth needs. DBaT-B selects peers to satisfy the requesting peer's minimum bandwidth requirement, while DBaT-N selects a certain number of peers as requested. Both algorithms first choose peers in the least busy cell to improve load balancing.
This document discusses data transmission methods in multiprocessor interconnection networks. It begins with an abstract that outlines examining setup designs for robust commercial and experimental multiprocessor systems. High performance processor communication among nodes requires improvements over traditional host-to-network converters. Interchip and intrachip communication styles are traditionally designed separately under different constraints. The paper then discusses direct networks, communication protocols like TCP/IP, wormhole routing to reduce bandwidth usage, queuing models, and concludes that optical interconnections can overcome disadvantages of electrical networks by separating interchip and intrachip traffic flows.
Application Layer Security for IoT: The Case Study of a Smart HomeIRJET Journal
This document summarizes a research paper that applied application layer security protocols to a simulated smart home system using the Contiki-NG operating system. The researchers first designed a smart home network in Cooja simulator with various sensor nodes communicating with a border router and cloud. They then added the OSCORE and EDHOC security protocols to encrypt communication between the nodes. Finally, they evaluated the impact of applying these protocols on memory footprint and energy consumption compared to an unsecured implementation. The results showed that the current implementation introduced a small overhead compared to other security solutions.
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their
implementation has posed several challenges insofar that they generate and process vast amounts of
security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and
constrained devices communicating with each other and being accessed ubiquitously through lossy
networks. In this scenario, the routing of data is a specific area of concern especially with the inherent
constraints and limiting properties of such devices like processing resources, memory capacity and battery
life. To suit these constraints and to provide the required connectivity, the IETF has developed several
standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be
compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing
Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management
mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In
addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared
with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be
better
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
This document summarizes a study of latencies in the ThingSpeak IoT platform. The study measured roundtrip times for data packets sent to and received from the ThingSpeak cloud using different access methods: the REST API, MQTT API, and MQTT broker alone. Roundtrip times ranged from 1 to 3 seconds for the REST and MQTT APIs, and were below 250ms for the MQTT broker alone. Uploads generally took longer than downloads. The results provide insights into ThingSpeak's performance and can serve as a reference for other IoT platforms.
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSijngnjournal
As the demand for high speed Internet significantly increasing to meet the requirement of large data transfers, real-time communication and High Definition ( HD) multimedia transfer over IP, the IP based network products architecture must evolve and change. Application specific processors require high
performance, low power and high degree of programmability is the limitation in many general processor based applications. This paper describes the design of Ethernet packet processor for system-on-chip (SoC) which performs all core packet processing functions, including segmentation and reassembly, packetization classification, route and queue management which will speedup switching/routing performance making it
more suitable for Next Generation Networks (NGN). Ethernet packet processor design can be configured for use with multiple projects targeted to a FPGA device the system is designed to support 1/10/20/40/100 Gigabit links with a speed and performance advantage. VHDL has been used to implement and simulated the required functions in FPGA
The document is a training report submitted by Sagar Shashank summarizing his CCNA training completed at CETPA INFOTECH PVT. LTD. from June 20 to July 31, 2018. It includes an introduction to networking concepts and protocols like IP, ICMP, routing protocols, switching technologies and OSI model. The report contains detailed explanations of topics covered during the training along with declarations and acknowledgements.
Similar to Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and Clients (20)
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...IJCNCJournal
Paper Title
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications
Authors
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Abstract
Non-Orthogonal Multiple Access (NOMA) helps to overcome various difficulties in future technology wireless communications. NOMA, when utilized with millimeter wave multiple-input multiple-output (MIMO) systems, channel estimation becomes extremely difficult. For reaping the benefits of the NOMA and mm-Wave combination, effective channel estimation is required. In this paper, we propose an enhanced particle swarm optimization based long short-term memory estimator network (PSOLSTMEstNet), which is a neural network model that can be employed to forecast the bandwidth required in the mm-Wave MIMO network. The prime advantage of the LSTM is that it has the capability of dynamically adapting to the functioning pattern of fluctuating channel state. The LSTM stage with adaptive coding and modulation enhances the BER.PSO algorithm is employed to optimize input weights of LSTM network. The modified algorithm splits the power by channel condition of every single user. Participants will be first sorted into distinct groups depending upon respective channel conditions, using a hybrid beamforming approach. The network characteristics are fine-estimated using PSO-LSTMEstNet after a rough approximation of channels parameters derived from the received data.
Keywords
Signal to Noise Ratio (SNR), Bit Error Rate (BER), mm-Wave, MIMO, NOMA, deep learning, optimization.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL:https://aircconline.com/abstract/ijcnc/v14n5/14522cnc05.html
Pdf URL: https://aircconline.com/ijcnc/V14N5/14522cnc05.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
June 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Abstract: Accurate latency computation is essential for the Internet of Things (IoT) since the connected
devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not
an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while
still allowing communication with the cloud. Many applications rely on fog computing, including traffic
management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to
address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog
computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the
simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses
various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which
are essential for evaluating the performance of the ITCMS. Our system model is also compared with other
models to assess its performance. A comparison is made using two parameters, namely throughput and the
total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend
Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system
outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Call for Papers -International Journal of Computer Networks & Communications ...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
· Network Protocols & Wireless Networks
· Network Architectures
· High speed networks
· Routing, switching and addressing techniques
· Next Generation Internet
· Next Generation Web Architectures
· Network Operations & management
· Adhoc and sensor networks
· Internet and Web applications
· Ubiquitous networks
· Mobile networks & Wireless LAN
· Wireless Multimedia systems
· Wireless communications
· Heterogeneous wireless networks
· Measurement & Performance Analysis
· Peer to peer and overlay networks
· QoS and Resource Management
· Network Based applications
· Network Security
· Self-Organizing Networks and Networked Systems
· Optical Networking
· Mobile & Broadband Wireless Internet
· Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
· Submission Deadline : June 22, 2024
· Notification : July 22, 2024
· Final Manuscript Due : July 29, 2024
· Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Mechatronics is a multidisciplinary field that refers to the skill sets needed in the contemporary, advanced automated manufacturing industry. At the intersection of mechanics, electronics, and computing, mechatronics specialists create simpler, smarter systems. Mechatronics is an essential foundation for the expected growth in automation and manufacturing.
Mechatronics deals with robotics, control systems, and electro-mechanical systems.
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and Clients
1. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
DOI: 10.5121/ijcnc.2022.14201 1
PERFORMANCE EVALUATION OF
DIFFERENT RASPBERRY PI MODELS AS
MQTT SERVERS AND CLIENTS
Trent N. Ford, Eric Gamess and Christopher Ogden
MCIS Department, Jacksonville State University, Jacksonville, AL, USA
ABSTRACT
Performance analysis for devices in Internet of Things (IoT) environments is an important consideration,
especially with their increasing integration in technological solutions, worldwide. The Single Board
Computers (SBCs) of the Raspberry Pi Foundation have been widely accepted by the community, and
hence, they have been incorporated in numerous IoT projects. To ease their integration, it is essential to
assess their network performance. In this paper, we made an empirical performance evaluation of one of
the most popular network protocols for IoT environments, named the Message Queuing Telemetry
Transport (MQTT) protocol, on Raspberry Pi. To do so, we set up two different testbeds scenarios and
assessed the performance with benchmarks. At the software level, we focused on Mosquitto, a popular
open-source MQTT broker implementation and client library. Our principal metric is the transmission
time, but we also investigated the throughput. In our experiments, we varied several parameters, such as
the size of the payload of the published messages, the WiFi bandwidth, the QoS level, the security level
(MQTT vs. MQTT with TLS), and the hardware for the clients and broker. We focus mainly on packet sizes
ranging from 100 to 25,000 bytes. We also investigate how these low-cost devices handle a TCP SYN flood
attack. In the research work presented within this paper, we aim to guide developers, researchers, network
administrators, and hobbyists who plan to use these low-cost devices in an MQTT or IoT network by
showing the performance that they should expect according to different Raspberry Pi options.
KEYWORDS
MQTT, Mosquitto, Benchmark, Performance Evaluation, Raspberry Pi, DoS Attack.
1. INTRODUCTION
Internet of Things (IoT) devices are devices that have some data processing and transmission
capabilities. Since their cost is going down, they have been increasingly integrated into all kinds
of technological solutions. Hence, the performance analysis of IoT devices is becoming an
important consideration. To foster their smoother integration, it is fundamental to expand
researcher, industrial, and consumer knowledge concerning their network performance. Common
messaging protocols that have been used in IoT environments include Message Queuing
Telemetry Transport (MQTT) [1][2], Constrained Application Protocol (CoAP) [3][4], Advanced
Message Queuing Protocol (AMQP) [5][6], eXtensible Messaging and Presence Protocol
(XMPP) [7][8], and DDS (Data Distribution Service) [9]. MQTT and CoAP appear to be the
most frequently used.
In this work, we evaluate the performance of several Raspberry Pi Single Board Computers
(SBCs) as MQTT servers (brokers) and clients (publishers and subscribers). Our experiments
were done in testbed environments, using a transmission time benchmark that we previously
developed [10] and a throughput benchmark proposed in [11]. We varied several parameters such
2. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
2
as the size of the payload of the published messages, the WiFi bandwidth, the QoS level, the
security level (MQTT vs. MQTT with TLS), and the hardware for the clients and broker. With
this work, we aim to guide developers, researchers, network administrators, and hobbyists who
are planning to use low-cost Raspberry Pi SBCs in an MQTT or IoT network, and empirically
examine and analyze what the expected performance is between these options.
The rest of the paper is structured as follows. In Section 2, we discuss a number of peer-reviewed
literature work conducted within this research area. Section 3 provides a high-level overview of
the technologies used in this research: MQTT, TLS, and Raspberry Pi SBCs. We describe the
benchmarking tools used for our performance assessment in Section 4. In Section 5, we present
the testbeds utilized for our experiments. We show, examine, and analyze the results of our
experiments in Section 6. Finally, Section 7 concludes and summarizes the results of this paper as
well as discusses future avenues for further research work within the area of study.
2. RELATED WORK
Some related works are dedicated to comparing several messaging protocols for IoT
environments. Various research groups focused on contrasting functionalities, while others are
more dedicated to performance evaluation using real testbeds or simulation tools. For example,
Imane, Tomader, and Nabil [12] presented the relevance of IoT for the implementation of smart
healthcare systems. They started with a summary of some existing healthcare systems by
enumerating their strengths and weaknesses, before discussing in which context CoAP or MQTT
should be chosen. They did not conduct any performance comparison evaluation but offered
advice on selecting the most adequate network protocol for several different situations. The
authors of [13] did a practical assessment of CoAP and MQTT in a testbed environment. They
reported results related to the communication delay and the network traffic required for a variety
of simple tasks. As clients, an ESP8266 [14] and an ODROID [15] were used. Çorak, Okay,
Güzel, Murt, and Ozdemir [16] quantitatively compared the performance of CoAP, MQTT, and
XMPP in a real-world testbed, and reported results such as the packet creation time and packet
transmission time. The testbed consisted of one Intel Galileo Gen 2 board, one laptop (Intel Core
i7-6700HQ CPU at 2.60 GHz and 4 GB of RAM), and some sensors. The sensors were connected
to the Intel Galileo Gen 2 board, where the publisher was running. In the laptop, the authors
executed the broker and the subscriber. Banno, Ohsawa, Kitagawa, Takada, and Yoshizawa [17]
compared the performance of several MQTT brokers (Mosquitto [18], HiveMQ [19], and EMQ X
[19]) and reported metrics such as latency and throughput. The authors developed their own
MQTT performance testing tool. The testbed consisted of one Ethernet switch and four PCs that
were running a publisher, a broker, a subscriber, and an NTP server, respectively. The publisher
and subscriber synchronized their time using the NTP server. Laaroussi and Novo [20] presented
a performance analysis of the security protocols employed with MQTT and CoAP, and reported
parameters such as latency and throughput. The MQTT clients (both the publisher and the
subscriber) were installed in an Intel Core i5 CPU at 2.60 GHz with 16 GB of RAM, while the
broker was running in a Dell Latitude 7480 laptop with an Intel Core i7 CPU at 2.80 GHz and 16
GB of RAM. While the previous research groups used empirical experimentation for their
evaluations, a number of other research groups have opted for conducting their assessments using
simulators. As an example, Larmo, Carpio, Arvidson, and Chirikov [21] studied the performance
of sensors reporting their captured samples over CoAP and MQTT, running on top of two
different radio interfaces, namely Bluetooth Low Energy (BLE) and IEEE 802.11ah. The
evaluations were performed using an Ericsson internal event-based radio network system
simulator with detailed models of application, transport, network, and datalink layers for both
BLE and WiFi.
3. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
3
Other performance evaluation works are focused on MQTT. Pipatsakulroj, Visoottiviseth, and
Takano [22] developed muMQ, a high-performance MQTT broker that efficiently utilizes multi-
core CPUs. To assess their new broker, the research team compared its performance with the one
of Mosquitto, for parameters that include latency, throughput, and CPU usage. They conducted
their experiments by running the broker in a machine equipped with a 20-core CPU (Intel Xeon
E5-2650 @ 2.30 GHz) and 252 GB of RAM. As for client machines, they used virtual machines
created on a computer with an 8-core CPU (Intel Xeon E620 @ 2.4 GHz) and 20 GB of RAM. In
[23], the authors evaluated the usage of a Raspberry Pi Zero W as an MQTT gateway between
sensors and a broker. They installed the sensors locally, while the broker was in the cloud (public
broker). The gateway worked as the data-processing device closer to the sensors, and as a bridge
to the Internet. The authors reported performance metrics such as the processor temperature and
CPU utilization. In a home environment, MQTT performed better than CoAP on a Raspberry Pi 3
[24]. In [25], Baranauskas, Toldinas, and Lozinskis assessed a Raspberry Pi 2 as a broker in a
testbed environment. The clients (both the publisher and the subscriber) were running in an
ESP32 [14]. When using a Raspberry Pi 2 as a broker, the authors found that QoS 0 consumed
6.7% more energy than QoS 1 for MQTT with TLS. In [10], Gamess, Ford, and Trifas evaluated
the MQTT protocol considering large payload sizes (ranging from 512 to 1,048,576 bytes) for the
published messages, in testbed environments primarily based on conventional PCs. In one of the
scenarios, the broker was changed to different models of Raspberry Pi.
As can be seen from this literature survey, little research work has been published that evaluates
the performance of MQTT through the use of Raspberry Pi devices in an IoT network. In contrast
to all the previous literature work done within this research area that we surveyed, in this effort,
we conducted a number of empirical assessments that varied the role of low-cost devices,
Raspberry Pi SBCs, and determined how they compare to each other and against a PC with
average specifications, using benchmarks. We focused on two parameters, namely the
transmission time and throughput. We also investigated how these low-cost devices handle a DoS
attack, using Hping3 [26] to flood them with TCP SYN segments.
3. TECHNOLOGIES
3.1. Message Queuing Telemetry Transport
Message Queuing Telemetry Transport (MQTT) [1][2] is a machine-to-machine data exchange
protocol for IoT devices. MQTT uses a publish/subscribe model with a broker. There are a few
versions of the standard, with versions 3.1.1 [27][28] and 5.0 [29] as the most popular. TCP is the
transport protocol used by MQTT, with two reserved ports: 1883 (MQTT without security) and
8883 (MQTT over TLS). MQTT topics are a form of addressing that allows MQTT clients to
share information, through a broker. An MQTT broker, also known as an MQTT server, is the
message hub. It keeps track of which devices subscribe to which topics, receives all published
messages, and forwards them according to subscriptions. A client can be a publisher, a
subscriber, or both as necessary.
3.2. Transport Layer Security
Transport Layer Security (TLS) [30][31][32] is one of the most frequently used security
standards for network communication. Its most common usage is for securing sessions between a
web server and a web browser [33]. It is a continuation of earlier SSL protocols. The main
distinction between the TLS and SSL protocols is a question of who authored and who controlled
them. SSL was initially proprietary from Netscape; TLS has always been an open standard
created by the Internet Engineering Task Force since version 1.0 [30][33]. Both protocols use
4. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
4
X.509 [34] certificate standards, issued by an entity known as a Certificate Authority (CA). The
certificates allow TLS to use asymmetric encryption to exchange a symmetrical key that is
unique to a session. This is known as the handshake [33]. The asymmetrical aspect of the
handshake makes it challenging to get access to the session key, while the session key allows for
faster communication. The initial handshake is slightly resource-intensive for lower-powered and
less capable devices, but the session key encryption has been noted to only have a small effect on
performance [35]. The MQTT protocol does not have its own security layer, and it relies on the
security provided by TLS [35]. Different ciphers are being explored for use with MQTT to lessen
the overhead [35]. Shapsough, Aloul, and Zualkernan [35] concluded that low-cost, low-power
MQTT devices increasingly offer a challenge for developers and security researchers to address
the vulnerabilities while minimizing the impact on performance.
3.3. Raspberry Pi
The Single Board Computers (SBCs) from the Raspberry Pi Foundation are cheap, effective, and
highly versatile. They run a flavor of Linux, so technically, they can do anything that a desktop
computer with Linux can do. For example, a Raspberry Pi can be used as a desktop computer, an
email or web server, a network storage device, a gaming console, a media center, or a controller
for sensors and actuators [36]. They are also used to promote STEM education and for custom
DIY projects [37]. The Raspberry Pi Foundation wants to democratize technology and provide
access to tools to do so [38]. They created cheap general-purpose computers (e.g., US$15 for a
Raspberry Pi Zero 2 W) and claim that their SBCs are actively being used in many places such as
interactive museum exhibits, schools, national postal sorting offices, and government call centers
[38]. Their goal is to eliminate the barriers that priced people out of technology for education,
entertainment, and creativity. There is also a large open-source community and forums for
Raspberry Pi OS [39] and troubleshooting projects using Raspberry Pis [40].
For this paper, we focused our experiments on the Raspberry Pi Zero W [41] (RPi Zero W), the
Raspberry Pi Zero 2 W [42] (RPi Zero 2 W), and the Raspberry Pi 3 Model B [43] (RPi 3B). We
chose these models for their popularity and their low-cost (US$10 for RPi Zero W, US$15 for
RPi Zero 2 W, and $US35 for RPi 3B).
4. BENCHMARKING TOOLS
In a previous paper [10], we developed a novel benchmark for determining the transmission time
(time required for a PUBLISH message to go from the publisher to the subscriber, through the
broker) in an MQTT environment. Briefly, this benchmark tool is written in the C programming
language and uses the Mosquitto client library [18]. It requires two clients (clt1 and clt2) where
one client (clt1) publishes a message that is sent to the broker and forwarded to the other client
(clt2), triggering that client (clt2) to do the same thing. This gives a round-trip transmission time,
so the one-way transmission time (or transmission time) can be calculated as half of it. The
benchmark repeats the message’s exchange multiple times, and the overall time is divided by the
number of round-trip exchanges to minimize errors. The researcher can set several parameters,
including the ability to specify the payload size of the PUBLISH messages and the QoS level. In
this paper, we will refer to this benchmark as the transmission time benchmark.
Another benchmarking tool used in this paper is from [11]. It is written in the Go programming
language and uses the Eclipse Paho library [44] (the Eclipse Paho project provides open-source,
mainly client-side, implementations of MQTT and MQTT-SN in a variety of programming
languages). It reports the throughput, defined as the number of PUBLISH messages sent/received
per second. The benchmark needs two clients (a publisher and a subscriber) and a common topic.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
5
The subscriber establishes a connection with the broker, subscribes to the common topic, and
waits for the messages published by the publisher. The publisher establishes a connection with
the broker and sends a specific number of messages to the common topic (the inter-departure
time of the PUBLISH messages is one of the benchmark parameters). Once having sent all the
PUBLISH messages, the publisher ends its connection with the broker and shows the throughput
at its level (sending throughput). As soon as the subscriber has received all the PUBLISH
messages, it ends its connection with the broker and reports the throughput at its level (receiving
throughput). This benchmark has a number of other parameters, such as the payload size of the
PUBLISH messages and the support for TLS. In this paper, we will refer to this benchmark as the
throughput benchmark.
5. EXPERIMENTAL SETUP
For our experiments, we used three Raspberry Pi Zero W, three Raspberry Pi Zero 2 W, two
Raspberry Pi 3 Model B, and four standard PCs of identical characteristics. We removed the
original microSD cards of the SBCs and replaced them with 64 GB SanDisk Extreme
microSDXC UHS-I Memory Cards (SDSQXA2-064G-GN6MA). They are considered as one of
the fastest microSD cards of the market, with up to 160 MB/s and 60 MB/s for the reading and
writing speeds, respectively. The specifications of the PCs were: Dell OptiPlex 3030 AIO, with a
64-bit Intel quad-core i3-4130 CPU at 3.4 GHz, 16 GB of RAM, a 512 GB SSD, a 1 Gbps
Ethernet NIC, and an Intel Wireless 7260 Network Adapter (dual-band WiFi adapter with support
to IEEE 802.11 a/b/n/g/ac). Debian amd64 11.1 (codename “Bullseye”) was installed as the
operating system.
The Raspberry Pi Zero W (RPi Zero W) [41] is based on a 32-bit Broadcom BCM2835 single-
core ARM1176JZF-S SoC @ 1.0 GHz, 512 MB of RAM, one 2.4 GHz IEEE 802.11b/g/n WiFi
interface, one micro USB On-The-Go port, and one mini HDMI connector. The Raspberry Pi
Zero 2 W (RPi Zero 2 W) [42] was released in October 2021. It is the last SBC of the Raspberry
Pi Foundation. It is based on an RP3A0, which consists of the integration of a 64-bit Broadcom
BCM2710A1 quad-core Cortex-A53 @ 1.0 GHz and 512 MB of RAM, in a single chip. It also
has one 2.4 GHz IEEE 802.11b/g/n WiFi interface, one micro USB On-The-Go port, and one
mini HDMI connector. It can be easily overclocked to 1.3 GHz, with an adequate heat sink. The
Raspberry Pi 3 Model B (RPi 3B) [43] is based on a 64-bit Broadcom BCM2837 quad-core
Cortex-A53 SoC @ 1.2 GHz, 1 GB of RAM, one 10/100 Mbps Ethernet interface, one 2.4 GHz
IEEE 802.11b/g/n WiFi interface, four USB 2.0 ports, and one full-size HDMI connector.
Many operating systems are available for Raspberry Pi, but we opted for the 32-bit version of the
Raspberry Pi OS (armhf), released in October 2021. This operating system is based on Debian
Bullseye. Of the three distributions (“Lite”, “Desktop”, and “Desktop and Recommended
Software”) supported by the Raspberry Pi Foundation, we chose the “Lite” distribution, which
consists of 493 packages, that do not include a desktop environment. It is worth mentioning that
the 64-bit version of Raspberry Pi OS (arm64) is still in the beta stage, and cannot be run on an
RPi Zero W.
The WiFi router had the following characteristics: NETGEAR AC1200 Smart WiFi Router
R6220, with an 880 MHz MediaTek processor that has two radio bands (IEEE 802.11b/g/n in the
2.4 GHz band and IEEE 802.11a/n/ac in the 5 GHz band), 128 MB of flash, and 128 MB of
RAM. In the 2.4 GHz band, the bandwidth can be set up to a maximum of 54, 145, or 300 Mbps.
We did not use the 5 GHz band, since the SBCs that we tested do not support it.
We opted for Mosquitto [18] version 2.0.11 as the broker in all the experiments and configured it
for MQTT version 3.1.1. It is an open-source message broker that implements MQTT versions
6. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
6
3.1, 3.1.1, and 5.0. We selected Mosquitto as the broker of all our experiments due to its open-
source license, maturity, wide availability, simple installation, and overall ease of use.
Figure 1. Testbed without a DoS Attack
We used two testbeds for our experiments. Figure 1 was the testbed for all the experiments
without a DoS attack and consisted of two clients and one broker. We varied the hardware for the
clients and the broker. However, the hardware for both clients was always identical. Each
subsequent experiment will specify which hardware was used.
Figure 2. Testbed for the DoS Attack
As shown in Figure 2, the testbed for the DoS attack is very similar to the setup in Figure 1. The
two clients and the two attackers were PCs, with the specifications mentioned previously. The
broker device was a Raspberry Pi and was varied for different experiments.
For both Figures 1 and 2, the communication between devices was controlled by the WiFi router
(NETGEAR AC1200 Smart WiFi Router R6220), using WiFi Protected Access 2 (WPA2). The
PCs and SBCs were placed 4 meters from the wireless router, with no obstacles between them.
Also, IPv4 was employed as the network protocol for all the experiments discussed within this
paper.
6. PERFORMANCE RESULTS AND ANALYSIS
In this section, we give and analyze the results of our experiments. In order to ensure the
consistency and validity of our empirical results, each experiment was conducted several times
(minimum 10 times), and the results depicted in the figures correspond to the performance results
averaged from the repeated experimental runs.
NETGEAR R6220
Client clt1 Client clt2
Broker
Legitimate User
NETGEAR R6220
Client clt1 Broker
PUBLISH
Topic=“test/clt1”
PUBLISH
Topic=“test/clt1”
PUBLISH
Topic=“test/clt2”
PUBLISH
Topic=“test/clt2”
Victim
Attacker Attacker
Legitimate User
Client clt2
7. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
7
6.1. WiFi Bandwidth Variation
The objective of this experiment is to determine the impact of the WiFi bandwidth over the
transmission time of a PUBLISH message. To do so, we used the testbed depicted in Figure 1.
Clients clt1 and clt2 were running the transmission time benchmark described in Section 4, with
QoS 0. In this experiment, we varied the WiFi bandwidth on the 2.4 GHz band using the router’s
built-in settings (maximum 54, 145, and 300 Mbps). Raspberry Pi devices acted as the clients and
published the messages, while a PC was the broker.
Figures 3, 4, and 5 show the experiment’s results using the RPi Zero W, the RPi Zero 2 W, and
the RPi 3B, respectively. The MQTT payload of the PUBLISH messages was varied from 100 to
25,000 bytes. The figures have three bars for each payload size: 54 Mbps in blue, 145 Mbps in
orange, and 300 Mbps in grey. It is noted that when the wireless router was configured at 54, 145,
and 300 Mbps, respectively, all the Raspberry Pi SBCs had a bitrate that capped out at 54, 72.2,
and 72.2 Mbps, respectively, while the PC’s bitrate capped at 54, 144.4, and 144.4 Mbps,
respectively.
Figure 3. Transmission Time when Using RPi Zero W as Clients with WiFi Bandwidth Variation
Figure 4. Transmission Time when Using RPi Zero 2 W as Clients with WiFi Bandwidth Variation
0
10
20
30
40
50
60
Transmission
Time
(ms)
Message Payload (Bytes)
54 Mbps 145 Mbps 300 Mbps
0
5
10
15
20
25
30
35
40
45
Transmission
Time
(ms)
Message Payload (Bytes)
54 Mbps 145 Mbps 300 Mbps
8. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
8
Figure 5. Transmission Time when Using RPi 3B as Clients with WiFi Bandwidth Variation
Across all devices, as seen in Figures 3, 4, and 5, 54 Mbps had the slowest transmission times.
Likely due to the bitrate caps innate to the device hardware, 145 Mbps and 300 Mbps yielded
very similar results. As a consequence of this bitrate cap, all the subsequent experiments were
carried out by setting up the wireless router at a maximum bandwidth of 145 Mbps.
6.2. Client Hardware Variation
This experiment aims to determine the impact of the client hardware over the transmission time
of a PUBLISH message. To do so, we used the testbed depicted in Figure 1. Clients clt1 and clt2
were running the transmission time benchmark described in Section 4, with QoS 0. In this
experiment, we varied the clients’ hardware; clients clt1 and clt2 were both changed out so that
both clients in the experiment were running the same hardware and software. Raspberry Pi
devices acted as the clients and published the messages, while a PC was the broker.
The MQTT payload of the PUBLISH messages was varied from 100 to 25,000 bytes. The WiFi
bandwidth was set to a maximum of 145 Mbps at the router using the 2.4 GHz band. Figure 6 has
four bars for each payload size: RPi Zero W in blue, RPi Zero 2 W in orange, RPi 3B in grey, and
RPi Zero 2 W Overclocked in yellow. It is worth remembering that all the Raspberry Pi SBCs
had a bitrate that capped out at 72.2 Mbps, while the PC’s bitrate capped out at 144.4 Mbps.
Figure 6. Transmission Time when Making Client Variation
0
5
10
15
20
25
30
35
40
45
Transmission
Time
(ms)
Message Payload (Bytes)
54 Mbps 145 Mbps 300 Mbps
0
5
10
15
20
25
30
Transmission
Time
(ms)
Message Payload (Bytes)
RPi Zero W RPi Zero 2 W RPi 3B RPi Zero 2 W Overclocked
9. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
9
As shown in Figure 6, the RPi 3B performed slightly better overall compared to the RPi Zero 2
W (when overclocked and when not), but their performance is nearly the same. Overclocking the
RPi Zero 2 W did not have a significant impact but was slightly faster. We think that most of the
time is spent in transmission, and not in computing, resulting in this slight difference. The poorest
performance was for the RPi Zero W, with the difference becoming greater with the increasing
payload size.
6.3. Large Payload Variation
The goal of this experiment is to determine the impact of a large payload over the transmission
time of a PUBLISH message. To do so, we used the testbed depicted in Figure 1. Clients clt1 and
clt2 were running the transmission time benchmark described in Section 4, with QoS 0.
Raspberry Pi devices acted as the clients and published the messages, while a PC was the broker.
The MQTT payload of the PUBLISH messages was varied from 100,000 to 1,000,000 bytes. The
WiFi bandwidth was set to a maximum of 145 Mbps at the router using the 2.4 GHz band. Figure
7 has three bars for each payload size: RPi Zero W in blue, RPi Zero 2 W in orange, and RPi 3B
in grey.
Figure 7. Transmission Time of Large Payloads with Client Variation
As shown in Figure 7, the performance of the RPi 3B was slightly better overall compared to the
RPi Zero 2 W. Both of these Raspberry Pi devices significantly outperformed the RPi Zero W in
this experiment, with the performance differences becoming greater with increasing payload
sizes.
6.4. Client and Broker Hardware Variation
Choosing the most suitable hardware for the broker often comes down to a compromise between
cost and capability. This experiment aimed to determine the impact of the client and broker
hardware over the transmission time of a PUBLISH message. To do so, we used the testbed
depicted in Figure 1. Both clients clt1 and clt2 were running the transmission time benchmark
described in Section 4, with QoS 0. In this experiment, we varied the hardware of the clients and
the broker so that all devices in the experiment were running the same hardware and software.
Raspberry Pi devices acted as the clients and published the messages, while an identical
Raspberry Pi device performed as the broker.
0
100
200
300
400
500
600
700
800
Transmission
Time
(ms)
Message Payload (Bytes)
RPi Zero W RPi Zero 2 W RPi 3B
10. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
10
The MQTT payload of the PUBLISH messages was varied from 100 to 25,000 bytes. The WiFi
bandwidth was set to a maximum of 145 Mbps at the router using the 2.4 GHz band. Figure 8 has
three bars for each payload size: RPi Zero W in blue, RPi Zero 2 W in orange, and RPi Zero 2 W
Overclocked in grey.
Figure 8. Transmission Time when Making Client and Broker Variation
By analyzing Figure 6 (the broker is a PC) and Figure 8 (the broker is a Raspberry Pi), we can
observe that the overall transmission time increases when using a Raspberry Pi as a broker. When
finding the average percentage difference across the tested points, the RPi Zero W, the RPi Zero
2 W, and the RPi Zero 2 W Overclocked had 37.47%, 32.90%, and 29.26% slower transmission
times than when using the PC as the broker. Unfortunately, we did not have a third RPi 3B
available for our experiments, but it is likely to follow a trend similar to the one observed for the
RPi Zero 2 W, based on the results shown so far.
6.5. QoS Level Variation
It is worth reminding that MQTT has native support for Quality of Service (QoS). It defines three
levels of QoS where QoS 0 is at most one delivery (fire and forget), QoS 1 is at least one delivery
(acknowledged delivery), and QoS 2 is exactly one delivery (assured delivery). With QoS 0, a
publication is done through a single message between the MQTT client and server (PUBLISH).
With QoS 1 and when there are no communication problems, a publication requires two
messages (PUBLISH and PUBACK). With QoS 2 and without issues in the communication, a
publication requires four messages (PUBLISH, PUBREC, PUBREL, and PUBCOMP). Hence,
there is an increase in network traffic with an upper QoS level, but it is usually acceptable for
important messages.
The goal of this experiment is to determine the impact of the QoS level over the transmission
time of a PUBLISH message. To do so, we used the testbed depicted in Figure 1. Clients clt1 and
clt2 were running the transmission time benchmark described in Section 4, where we varied the
QoS level (0, 1, and 2). Raspberry Pi devices acted as the clients and published the messages,
while a PC performed as the broker.
Figures 9, 10, and 11 depict the results of the experiments using RPi Zero W, RPi Zero 2 W, and
RPi 3B as clients, respectively. The MQTT payload of the PUBLISH messages was varied from
100 to 25,000 bytes. The WiFi bandwidth was set to a maximum of 145 Mbps at the router using
0
5
10
15
20
25
30
35
Transmission
Time
(ms)
Message Payload (Bytes)
RPi Zero W RPi Zero 2 W RPi Zero 2 W Overclocked
11. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
11
the 2.4 GHz band. The figures have three bars for each payload size: QoS 0 in blue, QoS 1 in
orange, and QoS 2 in grey.
Figure 9. Transmission Time when Using RPi Zero W as Clients with QoS Variation
As can be seen in Figures 9, 10, and 11, QoS 0 (i.e., at most once) has the shortest transmission
time, followed by QoS 1 (i.e., at least once), then QoS 2 (i.e., exactly once). The RPi Zero W is
the slowest of the devices, while the RPi Zero 2 W and the RPi 3B perform similarly.
Interestingly, there are significant spikes in transmission time for a payload of a PUBLISH
message that can be sent within one TCP segment, for both QoS 1 and QoS 2. Hence, in these
cases, it might be better for programmers to extend the payload with random bytes and force the
usage of a second TCP segment since it should significantly reduce the transmission time.
Figure 10. Transmission Time when Using RPi Zero 2 W as Clients with QoS Variation
0
10
20
30
40
50
60
70
Transmission
Time
(ms)
Message Payload (Bytes)
QoS 0 QoS 1 QoS 2
0
10
20
30
40
50
60
70
Transmission
Time
(ms)
Message Payload (Bytes)
QoS 0 QoS 1 QoS 2
12. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
12
Figure 11. Transmission Time when Using RPi 3B as Clients with QoS Variation
6.6. Throughput of Messages with Security Variation
This experiment aims to determine the impact of security on the transmission of PUBLISH
messages. To do so, we used the testbed depicted in Figure 1. Clients clt1 and clt2 were running
the throughput benchmark described in Section 4, with QoS 0. We varied whether the
communication was secured (with TLS) or not (without TLS) in this experiment. We used TLS
version 1.2. Raspberry Pi devices acted as the clients and published the messages, while a PC
performed as the broker.
The publisher (clt1) was set to publish 500 messages per second (inter-departure time of two
milliseconds). Figures 12 and 13 depict the throughput at the level of the subscriber (clt2) without
and with TLS, respectively, that is, the number of PUBLISH messages that could make it to the
subscriber, per second. The MQTT payload of the PUBLISH messages was varied from 100 to
25,000 bytes. The WiFi bandwidth was set to a maximum of 145 Mbps at the router using the 2.4
GHz band. Figures 12 and 13 have three bars for each payload size: RPi Zero W in blue, RPi
Zero 2 W in orange, and RPi 3B in grey. The experiments were run for thirty seconds for each
payload size.
Figure 12. Throughput at the Level of the Subscriber without Security (without TLS)
0
10
20
30
40
50
60
70
Transmission
Time
(ms)
Message Payload (Bytes)
QoS 0 QoS 1 QoS 2
0
50
100
150
200
250
300
350
400
450
Throughput
(message/second)
Message Payload (Bytes)
RPi Zero W RPi Zero 2 W RPi 3B
13. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
13
Figure 13. Throughput at the Level of the Subscriber with Security (with TLS version 1.2)
According to Figures 12 and 13, adding TLS security slowed the performance. The majority of
the differences are minor, except for the RPi Zero W, where the impact of TLS is noticeable for
payload sizes between 1,000 and 5,000 bytes.
The worst performance recorded in this experiment was for the RPi Zero W. Meanwhile, the RPi
Zero 2 W and the RPi 3B yielded similar results to each other for small payloads. However, the
RPi Zero 2 W outperformed the RPi 3B for larger payloads in this experiment.
6.7. Performance under a DoS Attack
A Denial-of-Service (DoS) attack is an attack meant to slowdown or shutdown a network service
or resource, making it inaccessible to the intended users. In general, DoS attacks are
accomplished by flooding the target with traffic, or sending it packets that trigger a crash due to
bugs. Constrained devices are an easy target for DoS attacks, resulting in a great deal of time and
money for the victim to handle. Hence, the importance is assessing DoS attacks on MQTT for
Raspberry Pi.
The goal of this experiment is to determine the impact of a DoS attack on the transmission time
of a PUBLISH message. To do so, we used the testbed depicted in Figure 2. Clients clt1 and clt2
were running the transmission time benchmark described in Section 4, with QoS 0. In this
experiment, we varied the hardware of the broker. Clients clt1 and clt2 were both PCs, and
another two PCs were used as the attackers. All four PCs have the specifications described in
Section 5.
To carry out the DoS attack, we flooded the broker with TCP SYN segments generated by
Hping3 [26], an open-source packet generator and analyzer for the TCP/IP protocol suite. We
used the following command, where options –V, –S, –i, and –p enable verbose output, send
TCP SYN segments to the target, indicate the interval of time between the sending of two
consecutive segments (inter-departure time), and specify the destination TCP port (1883 for
MQTT), respectively. The argument at the end of the command is the victim’s IP address (i.e.,
MQTT broker).
0
50
100
150
200
250
300
350
400
450
Throughput
(message/second)
Message Payload (Bytes)
RPi Zero W RPi Zero 2 W RPi 3B
14. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
14
hping3 –V –S –i <interval> –p 1883 <brokerIPAddress>
Figures 14, 15, and 16 illustrate the effects of the TCP SYN flood attack over the transmission
time with an inter-departure time of 1 ms for an RPi Zero W, RPi Zero 2 W, and RPi 3B as a
broker, respectively. The MQTT payload of the PUBLISH messages was varied from 100 to
25,000 bytes. The WiFi bandwidth was set to a maximum of 145 Mbps at the router using the 2.4
GHz band. For each payload size, the figures have three bars: no attacker in blue, 1 attacker in
orange, and 2 attackers in grey.
Figure 14. Transmission Time During a DoS Attack when Using an RPi Zero W as the Broker
Figure 15. Transmission Time During a DoS Attack when Using an RPi Zero 2 W as the Broker
0
10
20
30
40
50
60
Transmission
Time
(ms)
Message Payload (Bytes)
No Attacker 1 Attacker 2 Attackers
0
10
20
30
40
50
60
70
Transmission
Time
(ms)
Message Payload (Bytes)
No Attacker 1 Attacker 2 Attackers
15. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
15
Figure 16: Transmission Time During a DoS Attack when Using an RPi 3B as the Broker
In Figure 14, the two attackers successfully stalled the RPi Zero W broker, so we were unable to
get any MQTT transmissions through the network. This is the reason why there are only results
for no attacker (in blue) and one attacker (in orange) in this case. As shown in Figure 16, the RPi
3B handled the attack the best, followed by the RPi Zero 2 W shown in Figure 15. In all figures,
it is noticeable that each attacker creates a significant increase over the transmission time
observed by the legitimate MQTT traffic.
7. CONCLUSIONS AND FUTURE WORK
It is estimated that over 152,000 new IoT devices will connect to the Internet every minute by
2025. MQTT seems to be the most accepted messaging transport protocol for them. The
introduction of so many IoT devices makes understanding their capabilities with respect to
MQTT a matter of ever more critical importance.
In this paper, we set up MQTT experimental scenarios that varied the roles within the network
oflow-cost devices, Raspberry Pi SBCs, and determined how each device compared not only
against one another, but also against PCs of average specifications. According to our
experiments, each Raspberry Pi could be a good to adequate broker for some circumstances, as
they only increased transmission time by 29.26%-37.47% (RPi Zero 2 W Overclocked: 29.26%,
RPi Zero 2 W: 32.90%, and RPi Zero W: 37.47%) compared to an average PC as the broker (see
Section 6.4). When performing a DoS attack on the Raspberry Pi as a broker, the RPi Zero W
could only handle one attacker. As shown in Section 6 of this paper, the RPi Zero 2 W and RPi
3B devices were both capable of handling the 1 and 2 attacker scenarios, at the cost of a very
noticeable increase in overall transmission time. When factoring in the TLS protocol, the RPi
Zero 2 W performed the best as a broker out of the Raspberry Pi devices that we tested in the
experiments discussed within the scope of this paper.
The broker and client are both an essential part of an MQTT implementation, but there will only
be one broker to many clients, so low-cost but capable devices become more of a priority for
clients. With this in mind, we also performed other experiments with the Raspberry Pi SBCs
acting as clients. We found that when varying the network bandwidth, the faster-allowed speed
unsurprisingly yielded better transmission time results, at least up to the bitrate cap of the
devices. Lower levels of QoS also have faster transmission times.
0
10
20
30
40
50
60
Transmission
Time
(ms)
Message Payload (Bytes)
No Attacker 1 Attacker 2 Attackers
16. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
16
In general, the RPi 3B and RPi Zero 2 W often performed with similar experimental results to
one another, so both could fit the same role. The RPi Zero W had the poorest performance in all
circumstances but is a much cheaper option compared to the other IoT devices examined, tested,
and analyzed within this paper.
In our future research work, we plan to analyze the performance of several MQTT brokers, such
as VerneMQ, ActiveMQ, RabbitMQ, and Mosquitto. We also wish to investigate the
performance of MQTT when using IPv6, instead of IPv4. Finally, we are interested in proposing
some mathematical models that approximate the transmission time and the maximum throughput
in basic MQTT scenarios.
CONFLICTS OF INTEREST
The author declares no conflict of interest.
ACKNOWLEDGMENTS
We are grateful to “Faculty Commons” and the “College of Science & Mathematics” at
Jacksonville State University for partially funding this project.
REFERENCES
[1] T. Pulver, Hands-On Internet of Things with MQTT. Packt Publishing, 2019.
[2] “MQTT Homepage.” https://mqtt.org
[3] “CoAP – Constrained Application Protocol Homepage.” https://coap.technology
[4] Z. Shelby, K. Hartke, and C. Bormann, “The Constrained Application Protocol (CoAP),” RFC 7252.
Internet Engineering Task Force (IETF), Jun. 2014.
[5] “AMQP Homepage.” https://www.amqp.org
[6] “Advanced Message Queuing Protocol (AMQP) Version 1.0,” OASIS Standard, Oct. 2012.
http://docs.oasis-open.org/amqp/core/v1.0/os/amqp-core-complete-v1.0-os.pdf
[7] “XMPP | The Universal Messaging Standard.” https://xmpp.org
[8] P. Saint-Andre, “Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and
Presence,” RFC 6121. Internet Engineering Task Force (IETF), Mar. 2011.
[9] Object Management Group (OMG), “OMG Data Distribution Service (DDS) Version 1.4,” Apr.
2015. https://www.omg.org/spec/DDS/1.4/PDF
[10] E. Gamess, T. N. Ford, and M. Trifas, “Performance Evaluation of a Widely used Implementation of
the MQTT Protocol with Large Payloads in Normal Operation and Under a DoS Attack,” in
Proceedings of the 2021 ACM Southeast Conference (ACMSE 2021), May 2021, pp. 154–162. doi:
10.1145/3409334.3452067.
[11] Takanorig, “MQTT-Bench: Benchmark Tool for MQTT Broker.” https://github.com/takanorig/mqtt-
bench
[12] S. Imane, M. Tomader, and H. Nabil, “Comparison between CoAP and MQTT in Smart Healthcare
and Some Threats,” in Proceedings of the 2018 International Symposium on Advanced Electrical and
Communication Technologies (ISAECT 2018), Nov. 2018, pp. 1–4. doi:
10.1109/ISAECT.2018.8618698.
[13] H. W. van der Westhuizen and G. P. Hancke, “Practical Comparison between CoAP and MQTT -
Sensor to Server Level,” in Proceedings of the 2018 IEEE Wireless Advanced Conference (WiAd
2018), Jun. 2018, pp. 1–6. doi: 10.1109/WIAD.2018.8588443.
[14] N. Cameron, Electronics Projects with the ESP8266 and ESP32, 1st edition. Apress, 2020. doi:
10.1007/978-1-4842-6336-5.
[15] A. Lintermann, D. Pleiter, and W. Schröder, “Performance of ODROID-MC1 for Scientific Flow
Problems,” Future Generation Computer Systems, vol. 95, pp. 149–162, 2019, doi:
10.1016/j.future.2018.12.059.
[16] B. H. Çorak, F. Y. Okay, M. Güzel, Ş. Murt, and S. Ozdemir, “Comparative Analysis of IoT
Communication Protocols,” in Proceedings of the 2018 International Symposium on Networks,
17. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
17
Computers and Communications (ISNCC 2018), Jun. 2018, pp. 1–6. doi:
10.1109/ISNCC.2018.8530963.
[17] R. Banno, K. Ohsawa, Y. Kitagawa, T. Takada, and T. Yoshizawa, “Measuring Performance of
MQTT v5.0 Brokers with MQTTLoader,” in Proceedings of the 2021 IEEE 18th Consumer
Communications and Networking Conference (CCNC 2021), Jan. 2021, pp. 1–2. doi:
10.1109/CCNC49032.2021.9369467.
[18] R. A. Light, “Mosquitto: Server and Client Implementation of the MQTT Protocol,” The Journal of
Open Source Software, vol. 2, no. 13, pp. 1–2, 2017, doi: 10.21105/joss.00265.
[19] M. Bender, E. Kirdan, M. O. Pahl, and G. Carle, “Open-source MQTT evaluation,” 2021. doi:
10.1109/CCNC49032.2021.9369499.
[20] Z. Laaroussi and O. Novo, “A Performance Analysis of the Security Communication in CoAP and
MQTT,” in Proceedings of the 2021 IEEE 18th Consumer Communications and Networking
Conference (CCNC 2021), Jan. 2021, pp. 1–6. doi: 10.1109/CCNC49032.2021.9369565.
[21] A. Larmo, F. del Carpio, P. Arvidson, and R. Chirikov, “Comparison of CoAP and MQTT
Performance over Capillary Radios,” in Proceedings of the 2018 Global Internet of Things Summit
(GIoTS 2018), Jun. 2018, pp. 1–6. doi: 10.1109/GIOTS.2018.8534576.
[22] W. Pipatsakulroj, V. Visoottiviseth, and R. Takano, “muMQ: A Lightweight and Scalable MQTT
Broker,” in Proceedings of the 2017 IEEE Workshop on Local and Metropolitan Area Networks
(LANMAN 2017), Jun. 2017, vol. 2017-June, pp. 1–6. doi: 10.1109/LANMAN.2017.7972165.
[23] D. B. C. Lima, R. M. B. da Silva Lima, D. de Farias Medeiros, R. I. S. Pereira, C. P. de Souza, and O.
Baiocchi, “A Performance Evaluation of Raspberry Pi Zero W Based Gateway Running MQTT
Broker for IoT,” in Proceedings of the 2019 IEEE 10th Annual Information Technology, Electronics
and Mobile Communication Conference (IEMCON 2019), Oct. 2019, pp. 0076–0081. doi:
10.1109/IEMCON.2019.8936206.
[24] Y. Guamán, G. Ninahualpa, G. Salazar, and T. Guarda, “Comparative Performance Analysis between
MQTT and CoAP Protocols for IoT with Raspberry Pi 3 in IEEE 802.11 Environments,” in
Proceedings of the 2020 15th Iberian Conference on Information Systems and Technologies (CISTI
2020), Jun. 2020, pp. 1–6. doi: 10.23919/CISTI49556.2020.9140905.
[25] E. Baranauskas, J. Toldinas, and B. Lozinskis, “Evaluation of the Impact on Energy Consumption of
MQTT Protocol over TLS,” in CEUR Workshop Proceedings, May 2019, pp. 56–60.
[26] “Hping3 Homepage.” http://www.hping.org/hping3.html
[27] A. Banks and R. Gupta, “MQTT Version 3.1.1,” OASIS Standard, Oct. 2014. http://docs.oasis-
open.org/mqtt/mqtt/v3.1.1/os/mqtt-v3.1.1-os.pdf
[28] ISO, “ISO/IEC 20922:2016 - Information Technology - Message Queuing Telemetry Transport
(MQTT) v3.1.1,” International Organization for Standardization, 2016, [Online]. Available:
https://www.iso.org/standard/69466.html
[29] A. Banks, E. Briggs, K. Borgendale, and R. Gupta, “MQTT Version 5.0,” OASIS Standard, Mar.
2019. https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.pdf
[30] T. Dierks and C. Allen, “The TLS Protocol Version 1.0,” RFC 2246. Internet Engineering Task Force
(IETF), Jan. 1999.
[31] T. Dierks and E. Rescorla, “The Transport Layer Security (TLS) Protocol - Version 1.2,” RFC 5246.
Internet Engineering Task Force (IETF), Aug. 2008.
[32] E. Rescorla, “The Transport Layer Security (TLS) Protocol Version 1.3,” RFC 8446. Internet
Engineering Task Force (IETF), Aug. 2018.
[33] R. Grimmick, “TLS vs SSL: What’s the Difference & How it Works | Varonis,” Sep. 2021.
https://blogvaronis2.wpengine.com/tls-vs-ssl
[34] “X.509: Information Technology - Open Systems Interconnection - The Directory: Public-key and
Attribute Certificate Frameworks.” https://www.itu.int/rec/T-REC-X.509
[35] S. Shapsough, F. Aloul, and I. A. Zualkernan, “Securing Low-Resource Edge Devices for IoT
Systems,” in Proceedings of the 2018 International Symposium in Sensing and Instrumentation in IoT
Era (ISSI 2018), Sep. 2018, pp. 1–4. doi: 10.1109/ISSI.2018.8538135.
[36] T. Klosowski, “Why We Love the Raspberry Pi | Reviews by Wirecutter,” Nov. 2021.
https://www.nytimes.com/wirecutter/reviews/raspberry-pi
[37] “Teach, Learn, and Make with Raspberry Pi.” https://www.raspberrypi.org
[38] “Raspberry Pi - About Us.” https://www.raspberrypi.com/about
[39] “Raspberry Pi OS – Raspberry Pi.” https://www.raspberrypi.com/software
[40] “Raspberry Pi Forums - Index Page.” https://forums.raspberrypi.com
18. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
18
[41] “Raspberry Pi Zero W – Raspberry Pi.” https://www.raspberrypi.com/products/raspberry-pi-zero-w
[42] “Raspberry Pi Zero 2 W – Raspberry Pi.” https://www.raspberrypi.com/products/raspberry-pi-zero-2-
w
[43] “Raspberry Pi 3 Model B – Raspberry Pi.” https://www.raspberrypi.com/products/raspberry-pi-3-
model-b
[44] “Eclipse Paho | The Eclipse Foundation.” https://www.eclipse.org/paho