A Lightweight Authentication and Privacy Preservation Scheme for MQTT

被引:2
作者
Tian, Sijia [1 ]
Vassilakis, Vassilios G. [1 ]
机构
[1] Univ York, Dept Comp Sci, York, N Yorkshire, England
来源
38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023 | 2023年
关键词
MQTT; Lightweight Authentication; Privacy Preservation; CHALLENGES; INTERNET;
D O I
10.1145/3555776.3577817
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Message Queuing Telemetry Transport (MQTT) is a protocol commonly used in smart IoT applications. The protocol reduces the resource saturation but does not implement appropriate security mechanisms. There have been attempts to add security features to MQTT; however, they do not take into account the resource-constrained nature of IoT devices. The Cipher-text Policy AttributeBased Encryption (CP-ABE) scheme provides fine-grained access to topic-related data and adequate data storage on MQTT server. In this work, we propose an Improved CP-ABE (ICP-ABE) scheme integrated with a lightweight symmetric encryption algorithm PRESENT. The new scheme separates the roles of attribute auditing and key extraction. By using a blind key, MQTT servers verify the identity of sender nodes without knowing the sender's attributes. The PRESENT algorithm is employed in the proposed scheme in order to securely share such blind keys between clients. The efficiency of the scheme is evaluated in terms of throughput, packet delivery ratio, network delay, and execution time.
引用
收藏
页码:1289 / 1292
页数:4
相关论文
共 7 条
[1]  
Andy S, 2017, 2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), P571
[2]  
Cambiaso E., 2013, Int. J. Trust Manage. Comput. Commun., V1, P300
[3]   MQTT Vulnerabilities, Attack Vectors and Solutions in the Internet of Things (IoT) [J].
Hintaw, Ahmed J. ;
Manickam, Selvakumar ;
Aboalmaaly, Mohammed Faiz ;
Karuppayah, Shankar .
IETE JOURNAL OF RESEARCH, 2023, 69 (06) :3368-3397
[4]   The Internet of Things (IoT): Applications, investments, and challenges for enterprises [J].
Lee, In ;
Lee, Kyoochun .
BUSINESS HORIZONS, 2015, 58 (04) :431-440
[5]   The Use of MQTT in M2M and IoT Systems: A Survey [J].
Mishra, Biswajeeban ;
Kertesz, Attila .
IEEE ACCESS, 2020, 8 :201071-201086
[6]   Access control in the Internet of Things: Big challenges and new opportunities [J].
Ouaddah, Aafaf ;
Mousannif, Hajar ;
Abou Elkalam, Anas ;
Ouahman, Abdellah Ait .
COMPUTER NETWORKS, 2017, 112 :237-262
[7]   The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices [J].
Perrone, Giovanni ;
Vecchio, Massimo ;
Pecori, Riccardo ;
Giaffreda, Raffaele .
IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, :246-253