Evaluation of quality of service parameters for MQTT communication in IoT application by using deep neural network

被引:3
作者
Pawar S. [1 ]
Jadhav D.B. [2 ]
Lokhande M. [3 ]
Raskar P. [4 ]
Patil M. [5 ]
机构
[1] Department of Computer Engineering, Bharati Vidyapeeth’s College of Engineering for Women, Pune
[2] Department of Mechanical Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune
[3] Department of Computer Engineering, Pimpri Chinchwad College of Engineering, Pune
[4] Department of Computer Engineering, Smt. Kashibai Navale College of Engineering, Pune
[5] School of Mechatronics Engineering, Symbiosis Skills and Professional University, Pune
关键词
Industrial IoT (IIoT); Machine-to-machine (M2M); MQTT; MQTT broker; QoS; Security;
D O I
10.1007/s41870-023-01664-2
中图分类号
学科分类号
摘要
The three main pillars of the Internet of Things (IoT) are Computation, Communication and things that are connected in a network of IoT. In IoT for communication, various protocols like Constrained Application Protocol (CoAP), Extensible Messaging and Presence Protocol (XMPP), Message Queuing Telemetry Transport (MQTT), etc. are used. As MQTT requires less battery power, has a small bandwidth, requires fewer resources and is easy to use, it is an ideal protocol for IoT. Hence it is commonly used in IoT. Recently the number of IoT devices has been increasing at a faster rate. Therefore, it is important to focus on the Quality of Service (QoS) of IoT applications and the smooth transmission of data over the network. QoS is one of the important elements in IoT systems that can be used for the evaluation of the performance and quality of IoT systems. The security breach in IoT will have a great impact on the performance of the IoT system. Therefore, it is essential to evaluate the QoS parameters. This research focuses on the secure data transmission in IoT applications using the MQTT protocol. The performance and security related QoS parameters of MQTT communication in IoT were evaluated and the security breaches were detected by using a neural network. The developed system provides better security and if still, any misactivity happens then it can also be detected. The developed system provides very good accuracy for the detection of security breaches. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
引用
收藏
页码:1123 / 1136
页数:13
相关论文
共 33 条
[1]  
Bayilmis C., Ali Ebleme M., Cavusoglu U., Kucuk K., Sevin A., A survey on communication protocols and performance evaluations for Internet of Things, Digit Commun Netw, 8, 6, pp. 1094-1104, (2022)
[2]  
Hwang K., Jung I.H., Lee J.M., Monitoring of MQTT-based messaging server, Webology, 19, 1, pp. 4724-4735, (2022)
[3]  
Hariprasad S., Deepa T., Chandhar P., SENMQTT-SET: An intelligent intrusion detection in IoT-MQTT networks using ensemble multi cascade features, IEEE Access, 10, pp. 33095-33110, (2022)
[4]  
Moreton H.A., Mata J.A., Garcia J.O., Castaneda A.L.M., Garcia I., Benavides C., Multiclass classification procedure for detecting attacks on MQTT-IOT protocol, Complexity, (2019)
[5]  
Hasan M., Et al., Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches, Internet Things, (2019)
[6]  
Riedel E., MQTT protocol for SME foundries: potential as an entry point into industry 4.0, process transparency and sustainability, Procedia CIRP, 105, pp. 601-606, (2022)
[7]  
Kegenbekov Z., Saparova A., Using the MQTT protocol to transmit vehicle telemetry data, Transp Res Procedia, 61, pp. 410-417, (2022)
[8]  
Baccay J.B., Vicente C.P., Bravo M.T., IoT-based automated greenhouse with monitoring and control using MQTT protocol, Turk Online J Qual Inq, 12, 6, pp. 593-609, (2021)
[9]  
Gamess E., Ford T.N., Trifas M., Performance evaluation of a widely used implementation of the MQTT protocol with large payloads in normal operation and under a DoS attack, Proceedings of the 2021 ACM Southeast Conference, (2021)
[10]  
Bender M., Kirdan E., Pahl M.-O., Carle G., Open-source MQTT evaluation, 2021 IEEE 18Th Annual Consumer Communications and Networking Conference (CCNC), 2021, pp. 1-4, (2021)