Abstract:
Many articles present comparative analyses of communication protocols used in IoT systems. However, most of them focus on analyzing the performance and functionality of these protocols, and the comparative analysis is limited to a few selected protocols.
This article aims to present a pragmatic comparison of several of the most frequently used communication protocols in IoT systems when choosing a protocol regarding security. To compare the protocols in terms of security we use the Common Vulnerabilities and Exposures (CVE) program and Common Vulnerability Scoring System (CVSS). We present a list of security services supported by message protocols according to the criteria: Authentication, Authorization and Confidentiality. We show the number of vulnerabilities detected in recent years regarding the protocols studied.