This shows you the differences between two versions of the page.
iothings:proiecte:2021:gdavid [2022/01/28 00:10] gabriel.david [Evaluation] |
iothings:proiecte:2021:gdavid [2022/01/28 00:29] (current) gabriel.david [Resources] |
||
---|---|---|---|
Line 241: | Line 241: | ||
==== Conclusions ==== | ==== Conclusions ==== | ||
\\ | \\ | ||
+ | The following conclusions were drawn from the above experiments: | ||
+ | * MQTT over TCP has no security at all and may be exploited in many ways. | ||
+ | * MQTT with username/password authentication provides access control to the network but may be easily exploited. | ||
+ | * MQTT over TCP and encryption at application level is the fastest available solution performance-wise only for one scenario: really small data sent over network at a high rate until. | ||
+ | * Overhead for MQTT over TCP and encryption at application level is exponentially growing over some point. | ||
+ | * MQTT over TCP and encryption at application level still may be exploited in many ways. | ||
+ | * MQTT over TLS provides best security and is the fastest method for most real life scenarios. | ||
==== Resources ==== | ==== Resources ==== | ||
- | \\ | ||
=== Useful links and references === | === Useful links and references === | ||
* [1] https://www.modbus.org/ | * [1] https://www.modbus.org/ | ||
Line 260: | Line 266: | ||
* [15] https://link.springer.com/article/10.1007/s13204-021-01985-3 | * [15] https://link.springer.com/article/10.1007/s13204-021-01985-3 | ||
- | \\ | ||
=== Project files === | === Project files === | ||