Seoane-Merida, Victor; García-Rubio, Carlos; Almenares-Mendoza, Florina; Campo-Vázquez, Celeste Performance evaluation of CoAP and MQTT with security support for IoT environments Journal Article In: COMPUTER NETWORKS, vol. 197, iss. 108338, pp. 1-22, 2021, ISSN: 1389-1286. Abstract | Links | BibTeX | Tags: coap, cynamon, Internet of Things, magos, mqtt, Performance evaluation, Security Seoane-Merida, Victor; Almenares-Mendoza, Florina; Campo-Vázquez, Celeste; García-Rubio, Carlos Performance Evaluation of the CoAP Protocol with Security Support for IoT Environments Conference PE-WASUN '20: Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ASSOCIATION FOR COMPUTING MACHINERY, INC , 2020, ISBN: 978-1-4503-8118-5. Abstract | Links | BibTeX | Tags: coap, cynamon, DTLS, IoT, magos, Performance evaluation Arias-Cabarcos, Patricia; Almenárez-Mendoza, Florina; Sánchez-Guerrero, Rosa; Marín-López, Andrés; Díaz-Sánchez, Daniel SuSSo: Seamless and Ubiquitous Single Sign-on for Cloud Service Continuity across devices Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 58, iss. 4, pp. 1425-1433, 2012, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: Cloud computing, Computer architecture, context, middleware, Performance evaluation, personal multimedia devices, raudo2, Security, service continuity, sessionhandoff, xml2021
@article{campos004,
title = {Performance evaluation of CoAP and MQTT with security support for IoT environments},
author = {Victor Seoane-Merida and Carlos García-Rubio and Florina Almenares-Mendoza and Celeste Campo-Vázquez},
url = {http://hdl.handle.net/10016/33795},
doi = {https://doi.org/10.1016/j.comnet.2021.108338},
issn = {1389-1286},
year = {2021},
date = {2021-10-04},
urldate = {2021-10-04},
journal = {COMPUTER NETWORKS},
volume = {197},
issue = {108338},
pages = {1-22},
abstract = {World is living an overwhelming explosion of smart devices: electronic gadgets, appliances, meters, cars, sensors, camera and even traffic lights, that are connected to the Internet to extend their capabilities, constituting what is known as Internet of Things (IoT). In these environments, the application layer is decisive for the quality of the connection, which has dependencies to the transport layer, mainly when secure communications are used. This paper analyses the performance offered by these two most popular protocols for the application layer: Constrained Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT). This analysis aims to examine the features and capabilities of the two protocols and to determine their feasibility to operate under constrained devices taking into account security support and diverse network conditions, unlike the previous works. Since IoT devices typically show battery constraints, the analysis is focused on bandwidth and CPU use, using realistic network scenarios, since this use translates to power consumption.},
keywords = {coap, cynamon, Internet of Things, magos, mqtt, Performance evaluation, Security},
pubstate = {published},
tppubtype = {article}
}
2020
@conference{campo016b,
title = {Performance Evaluation of the CoAP Protocol with Security Support for IoT Environments},
author = {Victor Seoane-Merida and Florina Almenares-Mendoza and Celeste Campo-Vázquez and Carlos García-Rubio},
doi = {https://doi.org/10.1145/3416011.3424754},
isbn = {978-1-4503-8118-5},
year = {2020},
date = {2020-11-09},
urldate = {2020-11-09},
booktitle = {PE-WASUN '20: Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks},
pages = {41-48},
publisher = {ASSOCIATION FOR COMPUTING MACHINERY, INC },
abstract = {Internet of Things (IoT) can be defined as the interconnection through Internet of an unprecedented number of devices with the purpose of exchanging data. It stands as one of the most popular technologies for the following years and it is requiring substantial changes in the Internet protocols to meet its requirements. As the application layer is decisive for the quality of the connection, this paper analyzes the performance offered by one of the most popular protocols for the application layer in IoT: the Constrained Application Protocol (CoAP). This analysis aims to examine the features and capabilities of this protocol and to determine its feasibility to operate under constrained devices using security support. For this, a realistic network scenario is deployed to run the simulations and to measure bandwidth, consumption of resources (i.e., CPU cycles and bandwidth usage) and communication latency. Additionally, the trade-off between security and performance is discussed measuring the bandwidth overhead and the consumption increase associated to secure the communications. Different ciphering and authentication algorithms are tested, following the recommendations made by the Internet Engineering Task Force (IETF).},
keywords = {coap, cynamon, DTLS, IoT, magos, Performance evaluation},
pubstate = {published},
tppubtype = {conference}
}
2012
@article{ariascabarcos004,
title = {SuSSo: Seamless and Ubiquitous Single Sign-on for Cloud Service Continuity across devices},
author = {Patricia Arias-Cabarcos and Florina Almenárez-Mendoza and Rosa Sánchez-Guerrero and Andrés Marín-López and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/6415016
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6415016},
doi = {https://doi.org/10.1109/TCE.2012.6415016},
issn = {0098-3063},
year = {2012},
date = {2012-11-01},
urldate = {2012-11-01},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {58},
issue = {4},
pages = {1425-1433},
abstract = {The great variety of consumer electronic devices with support of wireless communications combined with the emerging Cloud Computing paradigm is paving the way to real anytime/anywhere computing. In this context, many services, such as music or video streaming, are delivered to the clients using Cloud-based providers. However, service continuity when moving across different terminals is still a major challenge. This paper proposes SuSSo, a novel middleware architecture that allows sessions initiated from one device to be seamlessly transferred to a second one, as might be desirable in the enjoyment of long running media.},
keywords = {Cloud computing, Computer architecture, context, middleware, Performance evaluation, personal multimedia devices, raudo2, Security, service continuity, sessionhandoff, xml},
pubstate = {published},
tppubtype = {article}
}
Publications
Performance evaluation of CoAP and MQTT with security support for IoT environments Journal Article In: COMPUTER NETWORKS, vol. 197, iss. 108338, pp. 1-22, 2021, ISSN: 1389-1286. Performance Evaluation of the CoAP Protocol with Security Support for IoT Environments Conference PE-WASUN '20: Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ASSOCIATION FOR COMPUTING MACHINERY, INC , 2020, ISBN: 978-1-4503-8118-5. SuSSo: Seamless and Ubiquitous Single Sign-on for Cloud Service Continuity across devices Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 58, iss. 4, pp. 1425-1433, 2012, ISSN: 0098-3063.2021
2020
2012