{"title":"Performance evaluation of IoT network infrastructure","authors":"Waleed Rafique, M. A. Shah","doi":"10.1109/IConAC.2016.7604944","DOIUrl":null,"url":null,"abstract":"It is expected that billions of devices will be connected with each other through the Internet of Things (IoT). Different aspects of IoT, such as security, have been extensively explored in the literature. However, the research focuses on how to identify and secure the IoT. We believe that it is very important to investigate how the IoT infrastructure will response when a huge amount of data is generated by IoT devices. We also need to make sure that the existing network infrastructure will not be chocked, causing the existing services to block. Along with that, the security and privacy are the huge concern for IoT. In this research, our contribution is twofold. Firstly, we investigate the performance issues of IoT network infrastructures for parameters such as throughput, delay and load etc. Secondly, we analyze the overheads that are generated as a result of deploying security in IoT. We simulate different IoT scenarios. Some interesting results are revealed.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 22nd International Conference on Automation and Computing (ICAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IConAC.2016.7604944","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
It is expected that billions of devices will be connected with each other through the Internet of Things (IoT). Different aspects of IoT, such as security, have been extensively explored in the literature. However, the research focuses on how to identify and secure the IoT. We believe that it is very important to investigate how the IoT infrastructure will response when a huge amount of data is generated by IoT devices. We also need to make sure that the existing network infrastructure will not be chocked, causing the existing services to block. Along with that, the security and privacy are the huge concern for IoT. In this research, our contribution is twofold. Firstly, we investigate the performance issues of IoT network infrastructures for parameters such as throughput, delay and load etc. Secondly, we analyze the overheads that are generated as a result of deploying security in IoT. We simulate different IoT scenarios. Some interesting results are revealed.