This shows you the differences between two versions of the page.
|
iothings:proiecte:2021:gdavid [2022/01/28 00:10] gabriel.david [Evaluation] |
iothings:proiecte:2021:gdavid [2022/01/28 00:29] (current) gabriel.david [Resources] |
||
|---|---|---|---|
| Line 241: | Line 241: | ||
| ==== Conclusions ==== | ==== Conclusions ==== | ||
| \\ | \\ | ||
| + | The following conclusions were drawn from the above experiments: | ||
| + | * MQTT over TCP has no security at all and may be exploited in many ways. | ||
| + | * MQTT with username/password authentication provides access control to the network but may be easily exploited. | ||
| + | * MQTT over TCP and encryption at application level is the fastest available solution performance-wise only for one scenario: really small data sent over network at a high rate until. | ||
| + | * Overhead for MQTT over TCP and encryption at application level is exponentially growing over some point. | ||
| + | * MQTT over TCP and encryption at application level still may be exploited in many ways. | ||
| + | * MQTT over TLS provides best security and is the fastest method for most real life scenarios. | ||
| ==== Resources ==== | ==== Resources ==== | ||
| - | \\ | ||
| === Useful links and references === | === Useful links and references === | ||
| * [1] https://www.modbus.org/ | * [1] https://www.modbus.org/ | ||
| Line 260: | Line 266: | ||
| * [15] https://link.springer.com/article/10.1007/s13204-021-01985-3 | * [15] https://link.springer.com/article/10.1007/s13204-021-01985-3 | ||
| - | \\ | ||
| === Project files === | === Project files === | ||