2022
DOI: 10.3390/app12147173
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Tier MQTT Architecture with Multiple Brokers Based on Fog Computing for Securing Industrial IoT

Abstract: With the rapid growth of internet-connected devices and their resource-constrained capabilities, the current authentication mechanisms are unable to meet the complex IoT application requirements, such as in the Industrial Internet of Things (IIoT), due to the increased computation, communication, and storage overhead arising from these mechanisms. In the IIoT, machine-to-machine (M2M) communication is an underlying technology where devices (e.g., sensors, actuators, and controllers) can be enabled to exchange … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(27 citation statements)
references
References 30 publications
0
21
0
Order By: Relevance
“…Multitier broker‐based message queue telemetry transport (MQTT) (E6) was designed by, 47 in which lightweight authentication was introduced. The broker was designed at the authentication manager using simple XOR and hash functions.…”
Section: Techniques To Overcome the Security Issues Of Fogmentioning
confidence: 99%
See 4 more Smart Citations
“…Multitier broker‐based message queue telemetry transport (MQTT) (E6) was designed by, 47 in which lightweight authentication was introduced. The broker was designed at the authentication manager using simple XOR and hash functions.…”
Section: Techniques To Overcome the Security Issues Of Fogmentioning
confidence: 99%
“…Authentication and key agreement : The role of fog nodes is data gathering and aggregation, in which acquiring authentication with various levels of the gateways creates security issues. Hence, an end‐to‐end authentication approach and lightweight authentication techniques are considered significant criteria for acquiring secure information sharing in fog computing 40–49 …”
Section: Challenges Identifiedmentioning
confidence: 99%
See 3 more Smart Citations