2021
DOI: 10.11591/ijece.v11i5.pp4577-4586
|View full text |Cite
|
Sign up to set email alerts
|

MQTT-PRESENT: Approach to secure internet of things applications using MQTT protocol

Abstract: The big challenge to raise for deploying the application's domain of the Internet of Things is security. As one of the popular messaging protocols in the IoT world, the message queue telemetry transport (MQTT) is designed for constrained devices and machine-to-machine communications, based on the publish-subscribe model, it offers a basic authentication using username and password. However, this authentication method might have a problem in terms of security and scalability. In this paper, we provide an analys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 22 publications
0
8
0
1
Order By: Relevance
“…Coupling a modified version of the famous Diffie-Hellman key exchange protocol, named AugPAKE algorithm, with a lightweight block cipher encryption mechanism, named PRESENT, in the approach proposed in [22], the confidentiality of the published message is protected twice: first when it is transferred to the broker, by using the secure session generated by the AugPAKE algorithm (i.e., only the client who has the session key can decrypt the message) and, in the second time, in the side of the broker, the message is not stored in plaintext due to the PRESENT encryption. Also, this solution provides mutual authentication between the broker and their clients (i.e., publishers and subscribers), the integrity, and non-repudiation of MQTT messages which are protected during transmissions.…”
Section: Confidentialitymentioning
confidence: 99%
“…Coupling a modified version of the famous Diffie-Hellman key exchange protocol, named AugPAKE algorithm, with a lightweight block cipher encryption mechanism, named PRESENT, in the approach proposed in [22], the confidentiality of the published message is protected twice: first when it is transferred to the broker, by using the secure session generated by the AugPAKE algorithm (i.e., only the client who has the session key can decrypt the message) and, in the second time, in the side of the broker, the message is not stored in plaintext due to the PRESENT encryption. Also, this solution provides mutual authentication between the broker and their clients (i.e., publishers and subscribers), the integrity, and non-repudiation of MQTT messages which are protected during transmissions.…”
Section: Confidentialitymentioning
confidence: 99%
“…The key is stored in a key register K with individual bytes are stored in decreasing order as represented in (1). 𝐾 = 𝑘 79 𝑘 78 ………………….. 𝑘 1 𝑘 0 (1) The algorithm will extract 64-bit subkey Kj in which j is the number of a round of the key scheduling process as rendered in (2).…”
Section: Figurementioning
confidence: 99%
“…𝐾 𝑗 = 𝑘 63 𝑘 62,………………….. 𝑘 1 𝑘 0 = 𝑘 78 𝑘 78 ………………….. 𝑘 17 𝑘 16 (2) After that, the algorithm updates the key register K as stated in (3), ( 4) and ( 5) in producing the addRoundKey function.…”
Section: Figurementioning
confidence: 99%
See 1 more Smart Citation
“…Data destined for the local server is relayed by means of the MQTT protocol. Given the size and format of the messages, MQTT is appropriate for use in relaying the messages to the server[88]. The data from the sensing devices is aggregated and forwarded to the network server.…”
mentioning
confidence: 99%