SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation

被引:16
作者
Hamad, Mohammad [1 ]
Finkenzeller, Andreas [1 ]
Liu, Hangmao [1 ]
Lauinger, Jan [1 ]
Prevelakis, Vassilis [2 ]
Steinhorst, Sebastian [1 ]
机构
[1] Tech Univ Munich, Dept Elect & Comp Engn, D-80333 Munich, Germany
[2] Tech Univ Carolo Wilhelmina Braunschweig, Inst Comp & Network Engn, D-38106 Braunschweig, Germany
关键词
Cryptography; Security; Protocols; Cloud computing; Internet of Things; Encryption; Libraries; End-to-end (E2E) security; key sharing; message queue telemetry transport (MQTT); publish; subscribe (Pub/Sub) model; trust delegation;
D O I
10.1109/JIOT.2022.3221857
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The publish/subscribe (Pub/Sub) model offers a communication scheme that is appropriate for a variety of mobile Internet of Things (IoT) systems (e.g., autonomous vehicles). In most of these systems, ensuring the end-to-end (E2E) security of exchanged information is a critical requirement. However, the Pub/Sub scheme lacks appropriate mechanisms to ensure the E2E security, even when state-of-the-art solutions, such as transport layer security (TLS) or attribute-based encryption (ABE), were adopted. These solutions either do not offer E2E security or are infeasible to be adopted in mobile IoT systems with resource-constrained platforms. In this article, we propose a framework, so-called SEEMQTT, to ensure secure E2E Pub/Sub-based communication for mobile IoT systems. Our solution allows the publisher to encrypt the published messages and control which subscribers can decrypt these messages without violating the decoupling requirement of the Pub/Sub model. Our solution leverages multiple honest-but-curious KeyStores to store secret shares generated from a secret key using a secret sharing scheme. The links between the publisher and every KeyStores are secured using identity-based encryption (IBE). The publisher uses the secret key to encrypt published messages. Trust delegation is used to authorize certain subscribers to access these shares and consequently decrypt the published messages. We provide an Arduino-based library that implements our proposed protocol. Also, we perform an extensive performance evaluation using real IoT hardware. Experimental results show that adopting our proposed solution, SEEMQTT, makes E2E security for mobile IoT systems feasible.
引用
收藏
页码:3384 / 3406
页数:23
相关论文
共 18 条
  • [1] Open-Source MQTT-Based End-to-End IoT System for Smart City Scenarios
    D'Ortona, Cristian
    Tarchi, Daniele
    Raffaelli, Carla
    FUTURE INTERNET, 2022, 14 (02):
  • [2] Secure End-to-End Communication for Constrained Devices in IoT-enabled Ambient Assisted Living Systems
    Porambage, Pawani
    Braeken, An
    Gurtov, Andrei
    Ylianttila, Mika
    Spinsante, Susanna
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 711 - 714
  • [3] The sharing session key component (SSKC) algorithm for end-to-end secure wireless communication
    Wu, HK
    Yang, SC
    Lin, YT
    34TH ANNUAL 2000 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2000, : 242 - 250
  • [4] A secure end-to-end SMS-based mobile banking protocol
    Bojjagani, Sriramulu
    Sastry, V. N.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (15)
  • [5] NTRU and Secret Sharing Based Secure Group Communication for IoT Applications
    Saha, Sanchita
    Hota, Ashlesha
    Choudhury, Bikramjit
    Nag, Amitava
    Nandi, Sukumar
    IEEE ACCESS, 2023, 11 : 117341 - 117350
  • [6] End-to-End Data Quality Assessment Using Trust for Data Shared IoT Deployments
    Byabazaire, John
    O'Hare, Gregory M. P.
    Delaney, Declan T.
    IEEE SENSORS JOURNAL, 2022, 22 (20) : 19995 - 20009
  • [7] Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques
    Pekerti, Albertus Anugerah
    Sasongko, Arif
    Indrayanto, Adi
    IEEE ACCESS, 2024, 12 : 75146 - 75168
  • [8] Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system
    Babu, Erukala Suresh
    Rao, Mekala Srinivasa
    Swain, Gandharba
    Nikhath, A. Kousar
    Kaluri, Rajesh
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2023, 33 (05)
  • [9] A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT
    Li, Sensen
    Zhang, Tikui
    Yu, Bin
    He, Kuan
    IEEE SENSORS JOURNAL, 2021, 21 (04) : 5487 - 5501
  • [10] End-to-end security validation of IoT systems based on digital twins of end-devices
    Maillet-Contoz, Laurent
    Michel, Emmanuel
    Nava, Mario Diaz
    Brun, Paul-Emmanuel
    Lepretre, Kevin
    Massot, Guillemette
    2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2020,