A Blockchain-based MQTT Protocol Optimization Algorithm

被引:0
作者
Gao W. [1 ]
Zhang L. [2 ]
Ju Y. [3 ]
机构
[1] State Grid Shanxi Electric Power Company, Taiyuan
[2] State Grid Shanxi Province Electric Power Company Information and Communication Branch, Taiyuan
[3] North China Electric Power University, Beijing
来源
Journal of ICT Standardization | 2023年 / 11卷 / 02期
关键词
blockchain; IoT; message proxy server; MQTT protocol; security;
D O I
10.13052/jicts2245-800X.1122
中图分类号
学科分类号
摘要
The communication protocol is an important support to realize the communication between equipment and Internet. And it covers all aspects of the IoT (Internet of things) system. To address the security problem of forging or tampering of key data in traditional IoT protocols, this paper designs an improved MQTT (message queue telemetry transmission) protocol that uses blockchain technology to ensure the security of transmitted data in the process of data transmission. Because the information in the blockchain is not tamperable, which in turn ensures that data stored in brokers are not maliciously tampered with. Through simulation experiments, it is proved that this scheme is lightweight, efficient and easy to implement, which helps to protect the security of IoT data. © 2023 River Publishers.
引用
收藏
页码:135 / 156
页数:21
相关论文
共 17 条
[1]  
Zhong C. L., Zhu Z., Huang R. G., Study on the IOT Architecture and Access Technology, proceedings of the 2017 16th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES), (2017)
[2]  
Xu L. D., He W., Li S., Internet of Things in Industries: A Survey, IEEE Transactions on Industrial Informatics, 10, 4, pp. 2233-2243, (2014)
[3]  
Wollschlaeger M., Sauter T., Jasperneite J., The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0, IEEE Industrial Electronics Magazine, 11, 1, pp. 17-27, (2017)
[4]  
Tao F., Cheng J., Qi Q., IIHub: An Industrial Internet-of-Things Hub Toward Smart Manufacturing Based on Cyber-Physical System, IEEE Transactions on Industrial Informatics, 14, 5, pp. 2271-2280, (2018)
[5]  
Sadio O., Ngom I., Lishou C., Lightweight Security Scheme for MQTT/MQTT-SN Protocol, proceedings of the 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), (2019)
[6]  
Andy S., Rahardjo B., Hanindhito B., Attack scenarios and security analysis of MQTT communication protocol in IoT system, proceedings of the 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), (2017)
[7]  
Amanlou S., Hasan M. K., Bakar K. A. A., Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model [J], Computer Networks, 199, (2021)
[8]  
Pattar S., MQTT based Secure Transport Layer Communication for Mutual Authentication in IoT Network [J], Global Transitions Proceedings, 3, 1, pp. 60-66, (2022)
[9]  
Yihan W., Yongzhen L., Improved Design of DES Algorithm Based on Symmetric Encryption Algorithm, proceedings of the 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA), (2021)
[10]  
Kim S., Goo Y., Kim M., Et al., A method for service identification of SSL/TLS encrypted traffic with the relation of session ID and Server IP, proceedings of the 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), (2015)