MQTT-A: A Broker-Bridging P2P Architecture to Achieve Anonymity in MQTT

被引:13
作者
Buccafurri, Francesco [1 ]
De Angelis, Vincenzo [1 ]
Lazzaro, Sara [1 ]
机构
[1] Univ Mediterranea Reggio Calabria, DIIES Dept, I-89124 Reggio Di Calabria, Italy
关键词
Protocols; Internet of Things; Bridges; Standards; Quality of service; Privacy; Metadata; Anonymity; IoT; MQTT bridging; P2P; INTERNET; SECURITY; PRIVACY; THINGS; SYSTEM; EFFICIENT; PROTOCOL; SCHEME;
D O I
10.1109/JIOT.2023.3264019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The demand for privacy in the current digital era is continuously growing. This is particularly true in the context of IoT, in which huge amounts of data are handled. Communication anonymity is a fundamental requirement when high privacy levels should be guaranteed. On the other hand, very little attention has been devoted to this problem in the past scientific literature, when referring to MQTT, which is the de-facto standard for IoT communication. In this article, we try to cover this gap. Specifically, we propose a new protocol, called MQTT-anonymous (MQTT-A), which extends the MQTT bridging mechanism to support the anonymity of both publishers and subscribers. This task is accomplished through the P2P collaboration of intermediate bridge brokers, which forward the requests of clients so that the final broker cannot understand the actual source/destination. Moreover, an anonymity-preserving topic discovery mechanism is provided, which allows clients to discover available topics and associated brokers, preventing client identification. Importantly, all the MQTT-A messages are exchanged by leveraging standard MQTT primitives and the bridging mechanism natively offered by MQTT. This allows us not to require changes in the standard MQTT infrastructure. To validate the performance of our solution, we performed a deep experimental campaign by deploying the bridge brokers on cloud platforms in various countries of the world. The experimental validation shows that, the price of latency we have to pay because of the tradeoff with anonymity is quite reasonable. Moreover, no significant impact on goodput occurs in the case of good network conditions.
引用
收藏
页码:15443 / 15463
页数:21
相关论文
共 28 条
  • [1] Broker Bridging Mechanism for Providing Anonymity in MQTT
    Protskaya, Yanina
    Veltri, Luca
    PROCEEDINGS OF THE 2019 10TH INTERNATIONAL CONFERENCE ON NETWORKS OF THE FUTURE (NOF 2019), 2019, : 110 - 113
  • [2] Development of Cloud of Things Based on Proxy Using OCF IoTivity and MQTT for P2P Internetworking
    Xuan, Songai
    Kim, DoHyeun
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (03) : 729 - 741
  • [3] Agyaat: mutual anonymity over structured P2P networks
    Singh, Aarneek
    Gedik, Bugra
    Liu, Ling
    INTERNET RESEARCH, 2006, 16 (02) : 189 - 212
  • [4] Anonymity Scheme for Interactive P2P Services
    Shitrit, Sharon
    Felstaine, Eyal
    Gilboa, Niv
    Hermoni, Ofer
    JOURNAL OF INTERNET TECHNOLOGY, 2009, 10 (03): : 299 - 312
  • [5] Survey of anonymity and authentication in P2P networks
    Wang X.
    Yang L.
    Sun X.
    Han J.
    Liang W.
    Huang L.
    Information Technology Journal, 2010, 9 (06) : 1165 - 1171
  • [6] Preserving Receiver's Anonymity for Circular Structured P2P networks
    Naghizadeh, Alireza
    Berenjian, Samaneh
    Razeghi, Behrooz
    Shahanggar, Saghi
    Pour, Nima Razagh
    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 71 - 76
  • [7] An Anonymity Scheme Based on Pseudonym in P2P Networks
    Peng Hao
    Lu Songnian
    Li Jianhua
    Zhang Aixin
    Zhao Dandan
    CHINA COMMUNICATIONS, 2010, 7 (06) : 157 - 160
  • [8] Pecan: A Circuit-less P2P Design for Anonymity
    Xu, Gang
    Aguilera, Leonardo
    Guan, Yong
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 820 - 825
  • [9] Analysis and Improvement of an Anonymity Scheme for P2P Reputation Systems
    Hao, Li-ming
    Lu, Song-nian
    Yang, Shu-tang
    Liu, Ning
    Huang, Qi-shan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10) : 2893 - 2895
  • [10] Trust Model: Providing Witness Anonymity in P2P Network
    Elangovan, Bhavani
    Bharath
    2011 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2011, : 100 - 105