Message queuing telemetry transport-secure connection: a power-efficient secure communication

被引:6
作者
Bhardwaj, Shikhar [1 ]
Harit, Sandeep [1 ]
Shilpa, Darpan [1 ]
Anand, Darpan [2 ]
机构
[1] Punjab Engn Coll Deemed Univ, Dept Comp Sci & Engn, Chandigarh, India
[2] Sir Padampat Singhania Univ, Udaipur, Rajasthan, India
关键词
internet of things; IoT; networks; message queuing telemetry transport; MQTT; security; performance management; communication protocols; power consumption; network monitoring and measurements; MQTT; PROTOCOL; INTERNET;
D O I
10.1504/IJSNET.2023.131246
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trust must be established among the internet of things (IoT) devices to ensure successful communication. The key to this trust lies in security enhancements in all IoT connectivity, enabling the exchange of vast amounts of data but keeping in check their power consumption which is a very high constraint when dealing with battery-operated IoT devices. Thus, any added security primitive must take in-concern with the resource-restricted environment in terms of power consumption. After applying the appropriate security measures, this paper analyses the security requirements for the message queuing telemetry transport (MQTT) protocol and adapts it with enhanced versions for a scenario-based setup. The paper provides a power consumption-based performance comparison of the enhanced security for resource-constrained devices.
引用
收藏
页码:29 / 40
页数:13
相关论文
共 34 条
[1]  
Bhardwaj S., 2022, Lect. Notes Netw. Syst., V311, P599, DOI [10.1007/978-981-16-5529-6_47, DOI 10.1007/978-981-16-5529-6_47]
[2]  
Bisne L, 2017, 2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT)
[3]   ALE: AES-Based Lightweight Authenticated Encryption [J].
Bogdanov, Andrey ;
Mendel, Florian ;
Regazzoni, Francesco ;
Rijmen, Vincent ;
Tischhauser, Elmar .
FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 :447-466
[4]   Trusting the Internet of Things [J].
Bojanova, Irena ;
Voas, Jeffrey .
IT PROFESSIONAL, 2017, 19 (05) :16-19
[5]  
Burange A., 2019, COMMUNICATION NETWOR, P273
[6]  
Casado L, 2009, LECT NOTES COMPUT SC, V5838, P133, DOI 10.1007/978-3-642-04766-4_10
[7]  
Cheng Tan, 2018, Procedia Computer Science, V131, P65, DOI 10.1016/j.procs.2018.04.186
[8]  
Chien HY, 2020, INT J SENS NETW, V32, P54
[9]   Efficient implementation of the MQTT protocol for embedded systems [J].
Deschambault, Olivier ;
Gherbi, Abdelouahed ;
Légaré, Christian .
Journal of Information Processing Systems, 2017, 13 (01) :26-39
[10]   Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices [J].
Dinculeana, Dan ;
Cheng, Xiaochun .
APPLIED SCIENCES-BASEL, 2019, 9 (05)