Abstract:The Message Queuing Telemetry Transport (MQTT) protocol is one of the most extended protocols on the Internet of Things (IoT). However, this protocol does not implement a strong security scheme by default, which does not allow a secure authentication mechanism between participants in the communication. Furthermore, we cannot trust the confidentiality and integrity of data. Lightweight IoT devices send more and more sensible data in areas of Smart Building, Smart City, Smart House, Smart Car, Connected Car, Hea… Show more
“…The performance overhead of HTTP and MQTT are compared in [7] using a case study of public bus tracking system. A more comprehensive review of the existing messaging protocols is presented in [8] where they compared applicability of the protocols across various IoT environments.…”
Many home IoT devices are joining IoT networks by gaining access to some home gateway that configures smart, multimedia, and home networks. To enable secure IoT-based home networking services, (1) an IoT network should be effectively designed and configured with a IoT server, (2) a messaging protocol is required to exchange information between the IoT server and IoT devices, and (3) the home gateway should monitor all safety aspects in both inbound and outbound traffic of the home network. However, not all home network users put in consideration the need for an adequate security posture. Instead, many users still rely on the minimum home network security by setting an easiest-to-guess password to restrict unauthorized access to their home gateway. In this paper, we propose a network design and configuration that enables secure IoT services with MQTT messaging protocol for home networks. With the proposed network design, a home network is interconnected to external networks through a home gateway. To separate the IoT-subnet from other parts of home network, the home gateway subdivides a home network into an inside-subnet and an IoT-subnet with a private IP address using subnet masking. The IoT server, located in the IoT-subnet can be implemented with either a general HTTP server or a security server that acts as an MQTT broker. The secure communications among network entities are governed by a home gateway operating a well-configured extended access control. The effectiveness of the proposed design and configuration is verified through a simulation by showing that it does not impose any significant performance degradation for reinforced security. We expect the proposed configuration to help facilitate interconnection among heterogeneous network entities.
“…The performance overhead of HTTP and MQTT are compared in [7] using a case study of public bus tracking system. A more comprehensive review of the existing messaging protocols is presented in [8] where they compared applicability of the protocols across various IoT environments.…”
Many home IoT devices are joining IoT networks by gaining access to some home gateway that configures smart, multimedia, and home networks. To enable secure IoT-based home networking services, (1) an IoT network should be effectively designed and configured with a IoT server, (2) a messaging protocol is required to exchange information between the IoT server and IoT devices, and (3) the home gateway should monitor all safety aspects in both inbound and outbound traffic of the home network. However, not all home network users put in consideration the need for an adequate security posture. Instead, many users still rely on the minimum home network security by setting an easiest-to-guess password to restrict unauthorized access to their home gateway. In this paper, we propose a network design and configuration that enables secure IoT services with MQTT messaging protocol for home networks. With the proposed network design, a home network is interconnected to external networks through a home gateway. To separate the IoT-subnet from other parts of home network, the home gateway subdivides a home network into an inside-subnet and an IoT-subnet with a private IP address using subnet masking. The IoT server, located in the IoT-subnet can be implemented with either a general HTTP server or a security server that acts as an MQTT broker. The secure communications among network entities are governed by a home gateway operating a well-configured extended access control. The effectiveness of the proposed design and configuration is verified through a simulation by showing that it does not impose any significant performance degradation for reinforced security. We expect the proposed configuration to help facilitate interconnection among heterogeneous network entities.
“…Ganesh et al ( 34 ) propose the smart, automated health machine using IoT, which provides health services to the local area. They discuss the authentication phase using the smart card system to secure their privacy, but the system is not integrated with the cloud ( 35 , 36 ).…”
The advent of the internet has brought an era of unprecedented connectivity between networked devices, making one distributed computing, called cloud computing, and popular. This has also resulted in a dire need for remote authentication schemes for transferring files of a sensitive nature, especially health-related information between patients, smart health cards, and cloud servers via smart health card solution providers. In this article, we elaborate on our proposed approach for such a system and accomplish an informal analysis to demonstrate the claim that this scheme provides sufficient security while maintaining usability.
“…MQTT assists this model to have better influence. MQTT protocol is one of the most extended protocol on the IoT that leads to less capacity for easy implementation on light weight, cheap, low-power and low memory devices [35] . The client can be a publisher or subscriber.…”
Section: Securitymentioning
confidence: 99%
“…As per A. Cerrada and et al [35] each MQTT has three types of participants: Broker that is charge of the exchange of messages between the other participants. Publisher/ subscriber (client) is send data to the broker and provider service receives data from broker.…”
Section: Combination Of Two Schema Has Shown In the Followingmentioning
Security level is a major subject that is considered rapidly. Major solution is focus on fault prevention against attacks. Many applications are monitored by fault tolerance. This implies clients have intend to tailor their application in special environment. This paper introduces an innovative on creating and managing security level that leads to boost service provider’s confidence and user satisfaction. This method allows user to specify and apply their security layer without requiring any knowledge about its implementation with SLA. This study proposes a multi- layer security that includes four main steps: Data Segmentation, Making Fake Services, Heuristic chaotic mapping and private key (PK) segment and Cryptography Code. PK is performed by chaotic maps and broker uses MQTT framework to facilitate security parameters. Experimental results show that the solution can balance the performance and security ranking and the propose scheme demonstrate security penalty cost is descended by 77%; the total penalty cost is decreased by 61.41% and the user satisfaction is grown by 60.67%. As a result, it ascends demanding and performance in cloud computing, compared with exiting approaches in encryption theories.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.