MQTT-A: A Broker-Bridging P2P Architecture to Achieve Anonymity in MQTT

被引:18
作者
Buccafurri, Francesco [1 ]
De Angelis, Vincenzo [1 ]
Lazzaro, Sara [1 ]
机构
[1] Univ Mediterranea Reggio Calabria, DIIES Dept, I-89124 Reggio Di Calabria, Italy
关键词
Protocols; Internet of Things; Bridges; Standards; Quality of service; Privacy; Metadata; Anonymity; IoT; MQTT bridging; P2P; INTERNET; SECURITY; PRIVACY; THINGS; SYSTEM; EFFICIENT; PROTOCOL; SCHEME;
D O I
10.1109/JIOT.2023.3264019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The demand for privacy in the current digital era is continuously growing. This is particularly true in the context of IoT, in which huge amounts of data are handled. Communication anonymity is a fundamental requirement when high privacy levels should be guaranteed. On the other hand, very little attention has been devoted to this problem in the past scientific literature, when referring to MQTT, which is the de-facto standard for IoT communication. In this article, we try to cover this gap. Specifically, we propose a new protocol, called MQTT-anonymous (MQTT-A), which extends the MQTT bridging mechanism to support the anonymity of both publishers and subscribers. This task is accomplished through the P2P collaboration of intermediate bridge brokers, which forward the requests of clients so that the final broker cannot understand the actual source/destination. Moreover, an anonymity-preserving topic discovery mechanism is provided, which allows clients to discover available topics and associated brokers, preventing client identification. Importantly, all the MQTT-A messages are exchanged by leveraging standard MQTT primitives and the bridging mechanism natively offered by MQTT. This allows us not to require changes in the standard MQTT infrastructure. To validate the performance of our solution, we performed a deep experimental campaign by deploying the bridge brokers on cloud platforms in various countries of the world. The experimental validation shows that, the price of latency we have to pay because of the tradeoff with anonymity is quite reasonable. Moreover, no significant impact on goodput occurs in the case of good network conditions.
引用
收藏
页码:15443 / 15463
页数:21
相关论文
共 83 条
[1]   AES and MQTT based security system in the internet of things [J].
Ahamed, Jameel ;
Zahid, Md ;
Omar, Mohd ;
Ahmad, Khaleel .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (08) :1589-1598
[2]   IoT transaction processing through cooperative concurrency control on fog-cloud computing environment [J].
Al-Qerem, Ahmad ;
Alauthman, Mohammad ;
Almomani, Ammar ;
Gupta, B. B. .
SOFT COMPUTING, 2020, 24 (08) :5695-5711
[3]  
Alam K.M., 2016, A Survey on MQTT Protocol for the Internet of Things
[4]  
Allen C., 1999, RFC 2246, DOI [10.17487/RFC2246, DOI 10.17487/RFC2246]
[5]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[6]  
Andrea I, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P180, DOI 10.1109/ISCC.2015.7405513
[7]  
[Anonymous], 1998, ACM Trans Inf Syst Secur, DOI DOI 10.1145/290163.290168
[8]  
[Anonymous], 2014, MQTT Version 3.1.1
[9]  
[Anonymous], 2007, ACM T KNOWL DISCOV D, V1, P3, DOI DOI 10.1145/1217299.1217302
[10]  
Anthraper J. J., 2019, P INT C SUST COMP SC, P8